At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
System and method for routing ISIS traffic through unidirectional links of
a computer network
A system and method routes data traffic over a unidirectional link of a computer network configured to implement a routing protocol, such as the ISIS routing...
System and method for clock distribution and synchronization and radio
A system for locating a client in a wireless network. The system includes at least three access points. Each access point is adapted to wirelessly communicate...
System and method for preserving bandwidth in a RSVP environment
A communication system includes a call agent that coordinates and supervises communications between endpoints. The call agent allocates a QoS agent for each...
Fibre channel switch that enables end devices in different fabrics to
communicate with one another while...
An Fibre Channel Switch which enables end devices in different Fabrics to communicate with one another while retaining their unique Fibre Channel Domain_IDs. The...
Method and system for establishing a communications connection
According to one embodiment of the invention, a method for establishing a communications connection is provided. The method includes transmitting, by a digital...
BFD rate-limiting and automatic session activation
A system and method for bidirectional forwarding detection (BFD) rate-limiting and automatic BFD session activation includes tracking a total bidirectional...
Dual mode firewall
Methods and devices are provided for implementing a dual mode firewall. Some implementions provide a firewall in a network device that acts as bridge for layer 2...
Interactive program guide for bidirectional services
The present invention provides methods and systems for accessing services in a television system. In one embodiment, a DHCT presents a subscriber an EPG...
Wireless security using media access control address filtering with user
An improved system, apparatus, and method for securing a network using MAC address filtering is provided. Advantageously, the present invention does not require...
Performing security functions on a message payload in a network element
Techniques are provided for performing security functions on a message payload in a network element. According to one aspect, a network element receives one or...
Method and apparatus for monitoring the availability of network resources
A method for monitoring the availability of resources in a network comprises the computer-implemented steps of receiving an activity announcement packet from a...
Identifying and suppressing transient routing updates
One or more sets of routing information are maintained. A network topology change indication of a progressive series of network changes is received, with at...
Method and apparatus for managing a network component change
A method is disclosed of managing a network component change in a data communications network having as components nodes and links defining a pre-change...
System and method for communicating messages between a text-based client
and a voice-based client
A system for communicating messages comprises a session server and a messaging server. The session server receives a call from a first client. The call is...
Rechargeable battery facilitated customer-premises equipment
A Customer-Premises Equipment (CPE) device includes a power supply for generating a first power at a first voltage level; a rechargeable battery for generating a...
Authorizing a mobile node for service
Authorizing a mobile node for a service includes receiving at an enforcement point a session initiation invitation from the mobile node. The session initiation...
Partial dual encrypted stream utilizing program map tables
The present invention is suitable for use in a partial dual encrypted system. The present invention allows for two different decryption devices (e.g., an...
System and method for retrieving computed paths from a path computation
element using encrypted objects
A technique retrieves computed path segments across one or more domains of a computer network in accordance with a stateless Path Computation Element (PCE)...
Method and apparatus for integrated wireless communications in private and
public network environments
A communications system extends over a cellular region formed of a plurality of wireless cells where each cell covers a portion of the cellular region. Each cell...
Method and system for defining hardware routing paths for networks having
IP and MPLS paths
A method for defining hardware routing paths for networks having IP and MPLS paths generally comprises assigning a path ID for each path within a path group. The...
System and method for allocating packet identifiers in a transport stream
in a subscriber network
An apparatus in a digital network includes the logic for allocating and assigning packet identifiers (PIDs) to digital packets, such as MPEG packets. The logic...
Route tree building in a wireless mesh network
In one embodiment, a tree-topology building method for a wireless mesh network includes using a centralized parent selection process to select a parent and join...
Providing a multicast service using a multicast group-source key
Providing a multicast service to a mobile node includes receiving a first request to join a multicast group from a first cell site. The first request requests...
Methods and apparatus for optimizations in 3GPP2 networks using mobile
Methods and apparatus are disclosed for reducing latency in a Mobile IP environment. These embodiments are particularly applicable in a 3GPP2 architecture using...
Method and apparatus for analyzing a media path for an internet protocol
(IP) media session
Time To Live (TTL) values are modified in media packets to intentionally cause rejection of the media packets at intermediate nodes in a media path. Rejection...
Methods and apparatus for defining flow types and instances thereof such
as for identifying packets...
Methods and apparatus are disclosed for defining flow types and instances thereof such as for identifying packets corresponding to instances of the flow types. A...
Method and system for managing failure information
A method, system and apparatus for managing data pertaining to the failure of a network device are provided. The data is stored in a memory, and access to the...
Call control system and method for automatic routing of circuit switched
data connections based upon stored...
A method and apparatus for automatic routing of multi-link circuit switched connections are shown. A routing processor monitors the behavioral characteristics of...
Virtual private data network session count limitation
A data communications network with a plurality of PoPs maintains a local database associated with each PoP and a central database somewhere on the data...
Dynamic timeout in a client-server system
The invention provides techniques for dynamic timeout including the steps of receiving a request from a requestor; determining whether an interim message should...
Methods and apparatus for redirecting network cache traffic
A method for routing a data request received by a caching system is described. The caching system includes a router and a cache, and the data request identifies...
Method and apparatus for monitoring responses of configuration commands
using a MIB-based approach
A method is disclosed for monitoring responses of configuration commands using MIB-based and event-based approaches. According to one embodiment, a network...
Avoiding server storage of client state
A method is disclosed for avoiding the storage of client state on a server. Based on a local key that is not known to a client, a server encrypts the client's...
Storing and searching a hierarchy of policies and associations thereof of
particular use with IP security...
Mechanisms for storing and searching a hierarchy of policies and associations thereof are disclosed which may be particularly useful for implementing security...
Method for grouping 802.11 stations into authorized service sets to
differentiate network access and services
A method for associating a WSTA to a service set, wherein the service set is configurable at the AP. Each service set is an arbitrary grouping of one or more...
Video coding using multi-dimensional amplitude coding and 2-D
non-zero/zero cluster position coding
A method, apparatus, and computer readable medium to encode a series of quantized transform coefficients. The method includes identifying events that each...
Methods and devices for networking blade servers
Some embodiments of the present invention provide blade servers having blade switches that function as switches in the data plane, but do not have a Domain_ID....
Method and system for reserving resources of a multipoint conference
A method for reserving conference resources includes communicating a conference notification to each of a plurality of conference invitees. The conference...
Link sizing based on both user behavior and traffic characteristics
A method of determining an amount of bandwidth needed on a communication link is disclosed. According to one aspect of the method, instead of considering only...
Frame synchronization and fault protection for a telecommunications device
According to one embodiment, a telecommunications device includes a bus. A first controller coupled to the bus is operable to generate first pulses for...
Heatsink attachment mechanism
Methods and apparatus for supporting heatsinks used to cool components of a board are disclosed. According to one aspect of the present invention, a carrier...
Testing self-repairing memory of a device
Testing one or more memories of a device includes receiving one or more first repair records from one or more built-in self-testers of a device having one or...
Method and apparatus for current sharing ethernet power across four
conductor pairs using a midspan device
Methods and apparatus are disclosed for balancing power across all conductors of an Ethernet connection. Balancing circuitry is disclosed to allow an Ethernet...
Conditional access overlay partial encryption using MPEG transport
A conditional access overlay system utilizing partial encryption without requiring additional program identifiers. The conditional access overlay system...
Method and apparatus for computing a path in a system with nodal and link
Methods and apparatus for defining an alternate circuit path within a network are described. According to one aspect of the present invention, a device for...
Method providing server affinity and client stickiness in a server load
balancing device without TCP...
A method of routing data from a client through one or more load-balancing routers to a selected load-balanced server among a plurality of servers in a network...
Multimodal system and method
The invention relates to a system and method for coordinating multiple session multimodal interaction. The system and method includes a capability discovery...
Text to speech system and method having interactive spelling capabilities
A method for audibly spelling a word in an audio file includes playing an audio file to a user, receiving a command to spell a word in the audio file from the...
VoIP service over an ethernet network carried by a DWDM optical
A local area network is used to interconnect media equipment, such as telephones, VoIP telephones, a media server, etc., located at geographically distributed...
Method, system and apparatus for scheduling a large pool of resources
A system and method for scheduling resources utilizes a data structure that supports quick sorting to find a highest priority eligibility key. The data structure...