At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
US-7,627,675 |
Methods and devices for regulating traffic on a network Methods and devices are provided for regulating traffic on a network. According to some aspects of the invention, if a subscriber's upstream traffic exceeds a... |
US-7,627,656 |
Providing configuration information to an endpoint Providing configuration information to an endpoint includes receiving at a file server a configuration information request from the endpoint. The configuration... |
US-7,627,629 |
Method and apparatus for multipoint conferencing A method of controlling a multimedia multipoint conference that includes two or more participating multimedia terminals that each includes one or more codecs.... |
US-7,627,573 |
Bypassing native storage operations by communicating protected data within
locking messages using a lock... Data is protected using locks, with the protected data sometimes being included in the locking messages, which may reduce overall processing latency, and/or... |
US-7,627,290 |
Route convergence monitoring system and method A route convergence monitoring system and method provide for determining routing changes or affected devices that may cause detrimental or other quality... |
US-7,627,004 |
Transporting synchronization channel information across a packet network A technique for preserving information contained in a synchronization channel of a Time Division Multiplexing (TDM) frame across a packet network. Information... |
US-7,627,000 |
Using an external router to manage foreign data communication channel
traffic Methods and apparatus for efficiently managing third-party data communication channel (DCC) channels using an optical network element without an OSI stack in... |
US-7,626,987 |
Using ordered locking mechanisms to maintain sequences of items such as
packets Sequences of items may be maintained using ordered locks. These items may correspond to anything, but using ordered locks to maintain sequences of packets may be... |
US-7,626,969 |
Relative location of a wireless node in a wireless network In one embodiment, a method includes computing a probability surface corresponding to the location probability of the wireless node within a physical region... |
US-7,626,963 |
EAP/SIM authentication for mobile IP to leverage GSM/SIM authentication
infrastructure Methods and apparatus for dynamically generating a set of Mobile IP keys are disclosed. The set of Mobile IP keys is dynamically generated using an existing... |
US-7,626,948 |
System and method for verifying the validity of a path in a network
environment A method for verifying a validity of a path is provided that includes receiving an advertisement communication at a first autonomous system from a second... |
US-7,626,925 |
Methods for finding a merge point node for MPLS fast re-route Methods and apparatus for unambiguously identifying merge points associated with backup label switched paths (LSPs) which substantially bypass border routers... |
US-7,625,247 |
Self-contained internal connector seizure mechanism In one embodiment a self-contained seizure mechanism comprises a plunger, a spring, and a retainer guide having means for movably securing the plunger to the... |
US-7,625,240 |
Receptacle connector A connector comprising an insulating body defining a slot that is adapted to receive a pluggable module. A plurality of conductive pins extend into the slot and... |
US-7,624,447 |
Using threshold lists for worm detection A computer-implemented method is provided for screening communication traffic. A list of one or more threshold pairs including respective first and second... |
US-7,624,437 |
Methods and apparatus for user authentication and interactive unit
authentication In a hardware client for remote logon to a network, a two layer authentication protocol enables authorized users to log on while discouraging unauthorized users.... |
US-7,624,431 |
802.1X authentication technique for shared media The present invention provides a technique for securely implementing port-based authentication on a shared media port in an intermediate node, such as a router.... |
US-7,624,270 |
Inter subnet roaming system and method The present invention communication network system and method facilitates authentication and registration in a communication network as mobile nodes move from... |
US-7,624,195 |
Method and apparatus for distributed network address translation
processing Methods and apparatuses for distributing network address translation. By having a gateway inform inside devices of global addresses, the gateway can avoid... |
US-7,624,190 |
Methods and apparatus for inserting data into a communications session Mechanisms and techniques provide a system that operates in a data communications device such as a switch or a router to provide a technique for inserting data... |
US-7,624,184 |
Methods and apparatus for managing access to data through a network device The invention is directed to techniques for managing access to data available from a data access device using a network switching protocol to manage content... |
US-7,624,181 |
Techniques for authenticating a subscriber for an access network using
DHCP Techniques for authenticating a user for access to an IP network include receiving from the user's host a DHCP request which includes user identifier data. A... |
US-7,624,164 |
Method and apparatus for retrieving network configuration from a remote
network node In one embodiment, a first network node in a subnet retrieves a network configuration from a second network node located outside the subnet. The first network... |
US-7,623,659 |
Biometric non-repudiation network security systems and methods In accordance with an embodiment of the present invention, a client device includes a biometric unit, a transceiver unit, and a cryptographic engine. The... |
US-7,623,633 |
System and method for providing presence information to voicemail users A method of providing telecommunication service includes receiving a call for a called party from a calling party. The method also includes determining a... |
US-7,623,546 |
Latency improvement for file transfers over network connections A method of improving latency time of a data transfer between a sender and a receiver, receiving an odd number of data segments from among a plurality of data... |
US-7,623,535 |
Routing protocol support for half duplex virtual routing and forwarding
instance A method, apparatus and computer program product for providing dynamic routing support for Half-Duplex Virtual Routing and Forwarding (HDVRF) environments. The... |
US-7,623,505 |
Method and system for label edge routing in a wireless network A method for label edge routing in a wireless network is provided. The method includes providing a flow between an application of a mobile unit and a serving... |
US-7,623,491 |
Decoding using redundant packet selection information in wireless
communications systems A communications system includes a mobile unit that transmits coded content. The system also includes a number of base transceiver stations that receive the... |
US-7,623,474 |
Techniques for distributing information using multicast subsets Techniques for sending data in a packet-switched communications network include determining multiple subsets of adjacent network nodes of the network. The... |
US-7,623,468 |
Programmable packet parsing processor The present invention provides a packet processing device and method. A parsing processor provides instruction-driven content inspection of network packets at... |
US-7,623,464 |
Rapid protocol failure detection A method is disclosed for rapidly detecting a protocol failure. In one embodiment, the method includes receiving an indication that a first process has failed.... |
US-7,623,461 |
Trigger for packing path computation requests A technique triggers packing of path computation requests (PCRs) for traffic engineering (TE) label switched paths (LSPs) that are sent from one or more... |
US-7,623,456 |
Apparatus and method for implementing comprehensive QoS independent of the
fabric system An apparatus and method for implementing comprehensive QOS independent of the fabric system is disclosed. According to one embodiment, a system is provided... |
US-7,623,455 |
Method and apparatus for dynamic load balancing over a network link bundle Techniques for distributing data packets over a network link bundle include storing an output data packet in a data flow queue based on a flow identification... |
US-7,623,445 |
Multiple ring support within a single network element A network element receives frames from multiple ring networks. Each ring network linked to the network element is supported by a designated support program. The... |
US-7,623,273 |
Technique for connecting V.34 fax machines via fax relay gateways which
are not adapted to support V.34 fax... A method and system for connecting V.34 enabled fax machines (that is fax machines capable of operating at 33,600 bps) over network gateways that use the... |
US-7,621,190 |
Method and apparatus for strain monitoring of printed circuit board
assemblies A technique of monitoring strain on a printed circuit board assembly involves the use of a strain detector mounted on a printed circuit board. The strain... |
US-7,620,975 |
Internal routing protocol support for distributing encryption information A method and apparatus for providing routing protocol support for distributing encryption information is presented. Subnet prefixes reachable on a first customer... |
US-7,620,870 |
Data compression method and system A data compression method and system is disclosed. In one embodiment, the data compression method includes receiving a data packet. Also, the method includes... |
US-7,620,848 |
Method of diagnosing and repairing network devices based on scenarios A method and an apparatus are disclosed for diagnosing and repairing network devices based on scenarios. The method and apparatus aggregate responses to a... |
US-7,620,846 |
Redundant power and data over a wired data telecommunications network A method and apparatus for redundant power and data over a wired data telecommunications network permits power to be received at a local powered device (PD) from... |
US-7,620,836 |
Technique for synchronizing network devices in an access data network A master clock reference signal may be provided to selected packet fiber nodes in order to synchronize the local clock reference signals generated at selected... |
US-7,620,754 |
Carrier card converter for 10 gigabit ethernet slots A carrier module is physically compatible with a XENPAK/X2 10 GE slot and includes a socket for accepting a non-XENPAK/X2 module and interface circuitry for... |
US-7,620,733 |
DNS anti-spoofing using UDP A method for authenticating communication traffic includes receiving a first Domain Name System (DNS) request, sent using a connectionless protocol over a... |
US-7,620,714 |
Method and apparatus for measuring the availability of a network element
or service A method is disclosed for a method for measuring the availability of a network element or service. For each network element N, a current real availability value... |
US-7,620,708 |
Automatic discovery of controlling policy enforcement point in a policy
push model The present invention provides a method for performing automatic discovery of controlling policy enforcement points in a policy push computer network. The method... |
US-7,620,423 |
Method and system for creating beamformed channels in a multi-input
multi-output network The present invention discloses a method and system for signal communication in a multi-input multi-output network. The method creates beamformed channels by... |
US-7,620,396 |
Monitoring for radio frequency activity violations in a licensed frequency
band Techniques for monitoring radio frequency (RF) activity in a frequency band where licensed spectrum service is occurring. One or more monitoring devices are... |
US-7,620,258 |
Extended amplitude coding for clustered transform coefficients Coding quantized transform coefficients as occur in image compression combines a position coding method to code the position of clusters of consecutive... |