At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Arrangement in a gateway for registering mobile routers of a mobile AD HOC
network to respective home agents
A gateway, configured for providing connectivity between a wide area network and mobile routers within a mobile ad hoc network, is configured for registering the...
Method and apparatus for implementing forwarding decision shortcuts at a
In one embodiment, a first packet is forwarded based on a network layer routing decision rendered by a router. A shortcut entry is generated based on a first...
Method and apparatus for measuring one-way delay at arbitrary points in
Timestamps are inserted into trace packet expiration messages to identify delay in a network. A Time To Live (TTL) value in the trace packet is varied to...
Mechanisms for providing connectivity in NAT redundant/fail-over scenarios
in unshared address-space
Disclosed are methods and apparatus for facilitating reliable session based communication with a local host via a subnet of redundant network devices that also...
Method and system for a graceful reroute of connections on a link
A method and system for a graceful reroute of connections on a link are described. According to one embodiment, in a digital communications network, a method...
Methods and apparatus for automated creation of security policy
An automated method and apparatus for creating a security policy for one or more applications is provided. The method includes exercising the features of the one...
Method and apparatus for managing security policies on a network
Security policies that regulate communication packets on a network may be segmented into independent sets, where each security policy of an independent set does...
Locally-updated interactive program guide
A method for providing an interactive program guide (IPG) includes receiving from a user a request for an IPG, and providing the user with an IPG that includes...
Copy protection built into a network infrastructure
A method for a network infrastructure copy protection system. The method includes the step of applying a digital signature to a digital content file prior to...
Managing a content distribution system using virtual content-distribution
A technique can be used to obtain content (e.g., a live feed, pre-positioned content, etc.) from a content-originating device (a content source). The technique...
Transmitting streams over asynchronous networks
A network stream transmitter receives a transport stream having content packets and packets to be filtered out and is adapted to selectively encapsulate content...
Pseudowire termination directly on a router
A method, apparatus and computer program product for routing data within a packet-switched network using a PW wherein the PW is terminated directly on the...
Methods and apparatus to configure a communication port
A data communication device automatically configures its own communication ports based on attributes of a remote device with which it communicates. The process...
Arrangement for providing content-based quality of service for a service
flow based on parsing XML tags...
A network node, for example a router, is configured for assigning network parameters for an identified flow of data packets associated with an application...
Method and system for a method for evaluating a message based in part on a
A method and system for evaluating a message. A message including an originator is received. A registrar lookup for determining a registrar for the originator is...
Wireless network security mechanism including reverse network address
Methods, apparatuses and systems directed to preventing unauthorized access to internal network addresses transmitted across wireless networks. According to the...
Node dependent wireless transmit antenna selection technique
A system and method for selecting a best transmit antenna for a transceiver using antenna diversity that caches the identity of the best transmit antenna for...
Frequency synthesizer and synthesis method for generating a multiband
local oscillator signal
A phase locked loop (PLL) frequency synthesizer to produce a local oscillator signal for a transmitter for operation at a plurality of RF frequency bands that...
Error vector magnitude selection diversity metric for OFDM
Described herein is an apparatus for inclusion in a station of a wireless network, and a method implemented in a station of a wireless network. The method...
Method and system for self-calibrating transmit power
A small number of transmissions are performed at a sufficient number of frequencies and power levels so that a correlation between frequency, measured power, and...
Mechanism and apparatus for encapsulation of entitlement authorization in
conditional access system
A method for determining whether the terminal is authorized to receive the selected service is practiced in a terminal of a conditional access system in which a...
Synchronizing portions of a database with different databases on different
nodes of a network
Techniques are disclosed for synchronizing a database related to a first node in a network with multiple nodes. Each node includes a database different from a...
Method and system for efficient flow control for client data frames over
GFP across a SONET/SDH transport path
A method and system for flow control of GFP-encapsulated client data frames over SONET/SDH transport networks is described. Transport interfaces, in the form of...
Techniques for reducing adjacencies in a link-state network routing
A method and apparatus are presented supporting shortest path first (SPF) routing of data packets over a network by establishing link-state data at an router....
Managing devices across NAT boundaries
An address management scheme allows a Network Management System (NMS) to manage devices in a private network operating behind a Network Address Translator (NAT)...
Broadband access note with a virtual maintenance end point
A broadband access node includes a port for connection with a Digital Subscriber Line and a processor to run code that implements a virtual maintenance end point...
Technique for efficiently managing bandwidth for multipoint-to-multipoint
services in a provider network
A technique efficiently manages bandwidth (BW) for multipoint-to-multipoint (MP2MP) services in a provider network of a computer network. According to the novel...
Efficient mechanism for fast recovery in case of border router node
failure in a computer network
A technique protects traffic (IP) against the failure of a border router between two domains in a computer network using Fast Reroute and backup tunnels. The...
Cooperative TCP / BGP window management for stateful switchover
A system and method for performing stateful switchover with reduced data, such as only metadata about a TCP window state. The metadata comprises a size of TCP...
Fan field replaceable unit
A fan device includes a connector, a fan, and an attachment assembly. The fan is configured to provide cooling to circuitry when the fan receives a power signal...
An antenna comprising: (a) a conductive ground plane; and (b) a rod shaped monopole element having a conductive surface, oriented out from the ground plane and...
Adjustable power cord retainer and method of use
A retainer for use with a conventional cord to stabilize the cord within a plug of an electronic device is provided. The retainer includes a bushing for...
Host credentials authorization protocol
A protocol, method, apparatus and computer program product for providing and utilizing a host credential authorization protocol (HCAP) is presented. The protocol...
System and method for archiving multiple downloaded recordable media
A recordable media content archiving system in a subscriber network. The recordable media content archiving system comprises, among other elements, a memory for...
Method and system for improving the performance of a trellis-based decoder
Method and system are provided for improving the performance of a trellis-based decoder. States with reduced uncertainty (SRUs) are defined for one or more...
Method and apparatus providing highly scalable server load balancing
A method and apparatus providing highly scalable server load balancing are disclosed. Data packets from a client are routed through one or more routers to a...
Optical failure detection using polarization
Systems and methods for evaluating an optical communication link are provided. The evaluation is based on a polarization analysis of received optical power. Such...
Managing time shift buffers
Systems and methods are provided for managing a time-shift buffer (TSB) that is used for buffering video presentations. One such method includes receiving user...
Fibre channel fabric and switches with flexible prefix addressing
A way to assign flexible prefixes to Switches in Fiber Channel Fabrics while using the currently defined FC_ID address space. This allows end devices in...
Telephone-based hypertext transport protocol server
A telephone is provided for delivering content to a client that is coupled to a communications network. The telephone includes a processor and a network...
Techniques for distributing routing information using multicasts
Techniques for sending routing data include sending first routing data in a first multicast packet to a number N of adjacent nodes. It is determined whether...
Routing data packets to a mobile node
Routing data packets to a mobile node includes registering a mobile node with a home agent associated with the mobile node. The home agent establishes that the...
Reducing overhead when setting up multiple virtual circuits using
Setting up a group of virtual circuits using a single set up message request. In an embodiment, fewer than all of the virtual circuits in the group are...
Avoiding micro-loop upon failure of fast reroute protected links
A technique incorporates an efficient means for avoiding micro-loops on a backup path associated with a failed protected link. An intermediate node delays...
Border router protection with backup tunnel stitching in a computer
A technique protects against the failure of a border router between two domains in a computer network using Fast Reroute and backup tunnels. According to the...
Method and apparatus for shielding a circuit board of a circuit board
A circuit board shielding assembly includes an electrically conductive fabric over foam gasket that forms part of a circuit board card guide in a computer...
Method and apparatus for locating a cleaner bandwidth in a frequency
channel for data transmission
Apparatus, methods, and computer program products for utilizing a frequency channel determined to be unacceptably noisy by finding a cleaner, narrower bandwidth...
Method and system for managing power delivery for power over Ethernet
A method for managing the delivery of power for a plurality of devices includes allocating a power limit for each of the plurality of devices and providing power...
System and method for dynamic secured group communication
Conventional mechanisms exist for denoting such a communications group (group) and for establishing point-to-point, or unicast, secure connections between...
Bi-directional line switched ring support for path trace monitoring on a
Methods and apparatus for enabling a protection path within a network to be monitored are disclosed. According to one aspect of the present invention, a method...