At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Methods and apparatus for filtering packets for preventing packet reorder
and duplication in a network
Methods and apparatus are disclosed for identifying the relevancy of packets. In one embodiment, source addresses are associated with network topology...
Containment of rogue systems in wireless network environments
Methods, apparatuses and systems facilitating containment of the effects of rogue or unauthorized access points on wireless computer network environments....
Devices, methods and software for generating indexing metatags in real
time for a stream of digitally stored...
Devices, softwares and methods generate, in real time, indexing metadata for select portions of a telephone conversation or conference. The indexing metadata is...
Managing multicast conference calls
Managing a multicast conference call includes receiving signals at a local endpoint participating in a multicast conference call with remote endpoints. The...
Detection of potential forwarding loops in bridged networks
Potential forwarding loops in bridged networks are detected. A switch monitors the movement of packet addresses in the forwarding table to different ports. If...
Apparatus and methods for updating stale link state packets and routing
Disclosed are methods and apparatus for handling Link State Packets (LSPs) sent between processing nodes within a computer network. At a first node, an LSP sent...
Techniques for measuring network resistive loss within a power-sourcing
Improved techniques involve provisioning power for a remote device through a data communications cable. Such techniques involve providing a first electrical...
Method and system for pre-authentication
A wireless station prepares to roam by pre-authenticating itself with a neighboring access point. The wireless station sends a rekey request, which can include...
Method and apparatus for securely exchanging cryptographic identities
through a mutually trusted intermediary
A method of securely exchanging cryptographic identities through a mutually trusted intermediary is disclosed. Data, which specifies a petitioner's cryptographic...
Method and apparatus for automatically synchronizing a unique identifier
of a network device
A method is disclosed for synchronizing a device identifier value with management point systems of a service provider. In one aspect, the method involves...
Improving reliability and availability of a load balanced server
The invention provides a method and apparatus for improving reliability and availability of a load balanced server. The apparatus performs and the method...
Systems and methods for network address failover
Systems and methods provide network address failover capability within an application gateway device. In one aspect, a system has a first network interface and a...
Method and apparatus for reducing overhead on a proxied connection
A method of communicating data between a client and a server includes initiating a participating application for transmitting packets between a client and a...
Programmable rule processing apparatus for conducting high speed
contextual searches and characterizations of...
A method and apparatus is disclosed herein for a rule processor for conducting contextual searches, the processor comprising a plurality of input payload search...
Method and system for managing real-time bandwidth request in a wireless
A method and system for managing real-time bandwidth request in a wireless network includes receiving a request for a connection for bandwidth of a cell of a...
Method and system for call answer while connected to voice mail
A method and system for call answer while connected to voice mail includes generating real-time packets for transmission of a message toward a voice mail system....
System and method for improving the robustness of spatial division
multiple access via nulling
The present invention discloses a base transceiver station (BTS) equipped with a plurality of antennas for improving the robustness of spatial division multiple...
System and method for managing a VolP network
The invention provides a system and method for improved management of VoIP networks. In one respect, embodiments of the invention provide a dual channel...
System and method for allocating and distributing end user information in
a network environment
A method for distributing information in a network environment is provided that includes receiving one or more packets from a communication flow and recognizing...
System and method for distributing guaranteed bandwidth among service
groups in a network node
A system and method for distributing guaranteed bandwidth among service groups in a network node are described. A position on a time scale of a buffer containing...
System and method to multicast guaranteed and best-effort traffic in a
A system and method to multicast guaranteed and best-effort traffic in a communications network are disclosed. According to one embodiment, incoming traffic is...
Reconfigurable apparatus providing 1:N and 1:1 equipment redundancy for
high speed broadband interfaces with...
A reconfigurable apparatus providing 1:N redundancy and 1:1 redundancy for high speed broadband interfaces with 1+1 and 1:N Automatic protection Switching (APS),...
Crossbar apparatus for a forwarding table memory in a router
A router including a lookup execution unit including a plurality of stages, a forwarding table memory arranged in hierarchy including addressable sectors,...
BCH forward error correction decoder
An OC-192 front-end application-specific integrated circuit (ASIC) de-interleaves an OC-192 signal to create four OC-48 signals, and decodes error-correction...
Method and apparatus for establishing a dynamic multipoint encrypted
virtual private network
A process is disclosed in which a security policy is associated with a virtual private network (VPN) interface at a first device, for example, a router. Input is...
Inter-chip processor control plane communication
An inter-chip communication (ICC) mechanism enables any processor in a pipelined arrayed processing engine to communicate directly with any other processor of...
Methods and apparatus for supporting transmission of streaming data
A gateway application in a content engine multiplexes requests for real-time content to servers that, in turn, service the requests by streaming appropriate...
Load balancing network access requests
A method of load balancing network access requests comprises receiving a network access request from a serving node linked to a radio access network. The network...
Multiple channel optical transceiver modules
Techniques for multiple channel optical transceivers for use in network devices are provided. In general, a row of optical emitters are disposed adjacent to a...
Unpowered twisted pair loopback circuit for differential mode signaling
A method and apparatus provide an IP telephone or similar device with a mechanism to receive and at least briefly loop back discovery signals received from a...
Multiple multicast forwarder prevention during NSF recovery of control
failures in a router
A technique prevents multiple multicast forwarders from forwarding multicast packets for a route over a link in a computer network during non-stop forwarding...
PVC suited for supporting user applications with changing requirements
The services offered (e.g., bandwidth) by a PVC can be changed, potentially as and when desired. An end system (of a PVC) may send a request to initiate a change...
Method and system for optimized reliable non-member group communication
through write-only membership
A group communication mechanism for optimized reliable non-member group communication through write-only membership is disclosed. The group communication...
Methods and apparatus for supporting mobile IP proxy registration in a
system implementing mulitple VLANs
Methods and apparatus for implementing proxy Mobile IP in a system implementing multiple VLANs are disclosed. Specifically, a network device such as an Access...
Methods and apparatus for implementing mobile IPv6 route optimization
Methods and apparatus for establishing an optimized route between a Mobile Node and a Correspondent Node are disclosed. In particular, a Correspondent Node is...
Mobile IP dynamic Home Address resolution
Methods and apparatus for processing a registration request packet received from a mobile node during registration are disclosed. The registration request packet...
Method and apparatus for the creation and maintenance of a self-adjusting
repository of service level...
A method and apparatus for producing and maintaining a repository of service level test points for network based VPNs is presented. A determination is made...
Method to distribute IEEE 802.1X authenticated users among multiple
A technique optimizes the distribution of authenticated users among a plurality of broadcast domains, such as virtual local area networks (VLAN). Users are...
Methods and apparatus for anchoring of mobile nodes using DNS
Methods and apparatuses for obtaining home agent assignment. The invention uses a DNS query to signal a request for dynamic home agent assignment. The DNS query...
Ethernet switch with configurable alarms
According to one embodiment, an Ethernet switch includes a plurality of ports operable to receive and transmit Ethernet traffic. The Ethernet switch also...
Dynamic and hybrid RFID
Disclosed is an active or dynamic RFID tag that actively provides current status information regarding a particular item, as well as mechanisms for recognizing...
Apparatus and method for prevention of incorrect insertion of cable bundle
An apparatus and method for preventing incorrect insertion of individual plugs into multiple connector ports is provided. A cable bundle is provided for the...
Network device and method of operation
A network device to maintain resource management within a network may comprise an emulator or watchdog that may send an emulation request to a resource manager...
Method and apparatus providing virtual private network access
A virtual private network device enables individual machines at a remote subnet to be visible and addressable from a central site by establishing a private...
System and method for configuring multiple ISCSI devices
A system includes a configuration module operable to configure a routing device to communicate with one or more network devices. Each of the network devices have...
Method and system for providing supplementary services for a wireless
A method and system for providing supplementary services for a wireless access network includes downloading supplementary service triggers from a call agent to a...
Automated real-time site survey in a shared frequency band environment
An intelligent spectrum management (ISM) system and method that includes sophisticated features to detect, classify, and locate sources of RF activity. The...
Arrangement for reaching IPv4 public network nodes by a node in a IPv4
private network via an IPv6 access network
An IPv4 node is able to send an IPv4 packet to an IPv4 destination via an IPv6 access network, based on translation of the IPv4 packet into an IPv6 packet for...
Multiple network connections from a single PPP link with network address
Multiple simultaneous network connections from a single PPP connection may be accomplished by utilizing a gateway in the following manner. A first network...
Method for traffic management, traffic prioritization, access control, and
packet forwarding in a datagram...
The invention provides an enhanced datagram packet switched computer network. The invention processes network datagram packets in network devices as separate...