At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Technique for nondisruptively recovering from a processor failure in a
multi-processor flow device
A technique non-disruptively recovers from a processor failure in a multi-processor flow device, such as an intermediate network node of a computer network. Data...
Techniques for attaching a heatsink to a circuit board using anchors which
install from an underside of the...
A heatsink attachment assembly includes a first anchor, a second anchor and a heatsink clip. The first anchor is configured to insert into a first hole in a...
Methods and devices for uniquely provisioning RFID devices
Methods and devices are provided for identifying and provisioning individual RFID devices in a network. According to some implementations of the invention, a...
Methods and apparatus for scheduling operation of a data source
A computerized device has dynamically modifiable hardware, such as an ASIC, that performs queue-scheduling operations. The hardware incorporates a generic...
Multi-port line card redundancy technique for an intermediate network node
A multi-port line card redundancy technique automatically reconfigures ports on line cards of an intermediate network node, such as an aggregation router, in the...
Iterative architecture for hierarchical scheduling
Conventional schedulers employ designs allocating specific processor and memory resources, such as memory for configuration data, state data, and scheduling...
Method and apparatus for availability measurement of complex networks
A method for performing an availability measurement on a networked system comprising: identifying at least one measurement point in the system; defining a...
Methods and apparatus for transform coefficient filtering
According to the present invention, methods and apparatus for filtering transform coefficients are provided. Transform coefficients associated with an input bit...
Techniques for attaching a heatsink to a circuit board using anchors which
install from an underside of the...
An improved heatsink attachment assembly includes a first anchor configured to secure to a first location of the circuit board, and a second anchor configured to...
Method and apparatus for using far end camera control (FECC) messages to
implement participant and layout...
A method and an apparatus for providing layout selection, participant selection, and/or participant-to-participant far end camera control of the selected...
Method and system for configurable network intrusion detection
According to one embodiment of the invention, a method for use in intrusion detection includes storing a default signature file defining one or more default...
Methods and apparatus for selecting a server to process a request
The invention is directed to techniques for selecting a resource from several resources to process a request from a client. A client sends the request to a data...
Configuration synchronization for redundant processors executing different
versions of software
Methods and devices are provided for maintaining configuration synchronization when an Active unit and a Standby unit have different versions of a software...
Controlling delivery of power and network communications to a set of
An improved assembly (e.g., an integrated power cycler and terminal server) controls power and communications to a set of devices. The assembly includes a...
Media gateway adapter
A method for communicating messages from a media gateway is disclosed. A thread pair comprising a communication protocol control stack thread and one or more...
Single number reachability using cellular and desktop telephones
A system for providing a single number reachability solution for communications with a desktop telephone and a cellular telephone includes a mobility application...
Digital circuit apparatus and method for accelerating preliminary
operations for cryptographic processing
A digital circuit apparatus and method for cryptographic data processing includes steps and means for determining a first modulus having up to a first number of...
Voice conference historical monitor
A method for displaying a voice conference historical monitor is provided. A summation of a plurality of voice streams is received at a user's endpoint of a...
Method for enabling a user interface for a network telephone
According to the present invention, methods, data structures, and computer-readable media for processing input to a telephone having an interactive user...
Distributed imposition of multi-level label stack using local label
Improved scalability and performance for label switched routers are provided. Large numbers of interfaces may be readily accommodated. In one implementation,...
System and method for exchanging awareness information in a network
A method for communicating packets in a network environment is provided that includes receiving a packet at a network element and identifying a sequence number...
Time division polling scheme for network management systems
Techniques for monitoring nodes in a network are provided. A circular list of bins is maintained and each bin stores identifiers to zero or more nodes to be...
Communication system with priority data compression
A data compression system that dynamically adapts the degree of compression used in response to the priority of the data to be compressed is provided by virtue...
Wireless access point
Method for physical placement of an integrated circuit based on timing
A method, system, apparatus, and machine-readable medium for physical placement of an integrated circuit based on the timing constraints are provided. The method...
Method and apparatus providing prioritized convergence in border gateway
A method is disclosed for providing prioritized routing table convergence in Border Gateway Protocol (BGP) hosts, as part of a BGP process that is executed by a...
Methods and apparatus supporting configuration in a network
A configuration server maintains configuration information associated with a given host computer. Thus, the configuration information is maintained at a remote...
Apparatus, system and device for collecting, aggregating and monitoring
network management information
A system, apparatus and device are described for collecting, aggregating and monitoring network management information from a plurality of network devices in a...
Performing compression of user datagram protocol packets
Performing compression includes receiving at a compressor a flow comprising packets, where each packet has a packet identifier. The packet identifiers are...
Action based termination of multidimensional lookup
A technique classifies packets in a manner that enables the number of lookup operations performed when classifying a data packet to be reduced. A lookup...
Redundancy for dual optical ring concentrator
A novel and useful mechanism for optical ring networks providing concentrator redundancy in the event of a failure of a concentrator. The nodes in a network are...
Cable connector module
Method and system for managing calls of an automatic call distributor
A method for managing calls of an automatic call distributor includes receiving a call from a user over a first connection with a first endpoint of the user. The...
Methods and apparatus for routing a content request
Mechanisms and techniques provide a method for routing a packet that includes a content request and an Internet Protocol address and port number that identify a...
Radio plan generator
A method, apparatus, and carrier medium carrying instructions to assign frequency channels and transmit powers for a plurality of access points of a wireless...
Protecting against spoofed DNS messages
A method for authenticating communication traffic includes receiving a first request, such as a DNS request, sent over a network from a source address, to...
Method and apparatus of integrating link layer security into a physical
An apparatus for providing link layer security in a Physical Layer Transceiver (PHY) is disclosed. In one embodiment, the apparatus may comprise analog circuitry...
Methods and apparatus for mapping fields of entries into new values and
combining these mapped values into...
Fields of entries are mapped into new values with these mapped values combined into mapped entries for use in lookup operations typically for packet processing....
Methods and apparatus for longest common prefix based caching
Methods and apparatus are disclosed for longest common prefix based caching. An information space is partitioned into multiple subsets such that a particular...
Method and apparatus for simulating a load on an application server in a
A method is disclosed for simulating a load on an application server in a network. The method intercepts data packets of a request from a sender to a receiver....
Arrangement for emulating an unlimited number of IP devices without
assignment of IP addresses
A protocol emulator includes an executable emulation application configured for promiscuously detecting IP frames on a network interface. The executable...
Method and apparatus for partial replication of directory information in a
A method is disclosed for partially replicating directory information from a master directory server to one or more distributed directory servers. Distributed...
Arrangement for sharing a single signaling point code between multiple
hosts in an IP-based network
A Voice over IP network having multiple signaling message transfer nodes (e.g., call agents, signaling gateways), communicate with switched circuit network nodes...
Methods and apparatus for selectively discarding packets during overload
Methods and apparatus are disclosed for selectively discarding packets such as in, but not limited to a packet switching system, by reacting to packet traffic...
Method and apparatus for communicating an encrypted broadcast to virtual
private network receivers
A method of communicating an encrypted data broadcast to a plurality of virtual private network receivers is disclosed. A first communication channel is...
Port adapter for high-bandwidth bus
A port adapter for connecting zero or more network interfaces to a host system having a SPI-4 bus is disclosed. The port adapter comprises zero or more network...
Methods and systems for managing class-based condensation
The present application discloses methods and systems for configuring and managing class-based condensation. One aspect thereof includes an automated mechanism...
Method and system for triggering handoff of a call between networks
A method for handing off a call between networks includes monitoring a quality of a first link between a mobile station and a wireless local area network (WLAN)...
Language for implementing telephony processing in end points
A system includes telephony devices that provide services and applications through the execution of scripts in web pages.
Method and system for an instant messenger home automation system
interface using a home router
A method for interfacing with a home automation system using a router. The router receives control signals from an instant messenger application via a...