At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Tag location, client location, and coverage hole location in a wireless
Determining the location of a radio tag or client station of a wireless network, and the location of coverage holes by receiving from a plurality of wireless...
Method and system for modeling behavior of elements in a
A node representing a network element is provided. A service state for the node is stored in the node. A service state for a first parent node upon which the...
Automatically discovering management information about services in a
An automatic service discovery approach allows a network management system to discover service managed objects from the network, eliminating the need for a user...
Methods and apparatus supporting access to stored data
A data processing device, such as a television set top box, receives user-selected content data from a remote source over a network in response to user initiated...
Method and apparatus for value-based access to network management
In one aspect, a message is received requesting access to a set of managed objects associated with a network device. A set of object instances associated with...
Method and apparatus for transferring synchronous optical
network/synchronous digital hierarchy(SONET/SDH)...
The present invention relates to methods and systems for transferring SONET/SDH frames between nodes by mapping the SONET/SDH frames onto individual channels of...
Efficient available bandwidth usage in transmission of compressed video
Described herein are systems and methods for multiplexing and transmitting video data. The systems and methods use excess bandwidth in a channel available after...
Large-scale layer 2 metropolitan area network
A system and method permits the creation of very-large metropolitan area networks (MANs) using Layer 2 (L2) switching technology. Different groups of L2 switches...
Flexible, high performance support for QoS on an arbitrary number of
A VTMS queue scheduler integrates traffic shaping and link sharing functions within a single mechanism and that scales to an arbitrary number of queues of an...
End-to-end preservation of VLAN priority in connection-oriented networks
Virtual local area network (VLAN) identifications (VIDs) used in a local area network (LAN) are identified. The LAN is connected to a connection-oriented wide...
Distributed router forwarding architecture employing global translation
An efficient distributed architecture for forwarding packets. The packet to be forwarded arrives in an ingress port, is processed by an ingress forwarding...
System and method for distributing information in a network environment
A method for distributing information in a network environment is provided that includes receiving one or more packets from a communication flow initiated by an...
Circuit board assembly having a set of edge clips for connecting multiple
A circuit board assembly includes a motherboard defining a motherboard plane, and a daughter board defining a daughter board plane which is substantially...
Techniques for controlling removal of a circuit board from a chassis using
A control assembly controls removal of a circuit board from a chassis. The control assembly includes a support member configured to fasten to the circuit board,...
Incremental plotting of network topologies and other graphs through use of
Plotting a graph using a markup language comprises receiving a request to generate a display of a graph of nodes connected by links and focused on a first...
Apertures for signal shaping using ground and signal PTH back-drilling
A method and apparatus for shaping signals transmitted via plated through holes (PTHs) utilizes standard back-drilling techniques to reduce the resonant stub...
Method and apparatus for cryptographically blocking network denial of
service attacks based on payload size
A method and apparatus for protecting, from denial of service attacks, a device that provides particular services that consume substantial computational...
Access control by a real-time stateful reference monitor with a state
collection training mode and a lockdown...
A Stateful Reference Monitor can be loaded into an existing commercial operating system, and then can regulate access to many different types of resources. The...
Method of reverting to a recovery configuration in response to device
A method is disclosed for reverting to a recovery configuration in response to device faults. A change to the configuration is received. The change may be in the...
Zero overhead resource locks with attributes
A technique efficiently accesses locks associated with resources in a computer system. A processor accesses (e.g., acquires or releases) a lock by specifying and...
Full access to memory interfaces via remote request
A system and method for enabling a processor to access a memory not directly coupled to the processor. A memory request, including a request identifier field, is...
Error protection for lookup operations in content-addressable memory
Error protection for lookup operations in a content-addressable memory (CAM) entries is disclosed. Values extended to include error protection or error...
Adaptive feedback technique implemented in mobile IP networks
An adaptive feedback technique is described for a Mobile IP environment in which Mobile IP mechanisms provide early feedback to mechanisms in the transport layer...
Location detection and network awareness for multi-mode/multi-radio mobile
The present invention provides methods and devices using location detection to enable MMMDs to activate and tune to appropriate radios and networks. Some...
Methods and apparatus for minimizing requantization error
According to the present invention, methods and apparatus for performing error minimizing requantization are provided. Quantized coefficients associated with a...
Method and apparatus for data transport using label switching
A method including receiving a call connection request message having a prefix number and determining a corresponding IP address based on the prefix number....
Method and apparatus for managing incoming and outgoing calls at an
endpoint placed on hold
A method and apparatus for managing incoming and outgoing calls at an endpoint placed on hold are disclosed. A first call that includes an outbound media stream...
System and methodology for voice activated access to multiple data sources
and voice repositories in a single...
A system and method and computer program for seamlessly accessing multiple data sources and voice repositories using voice commands in a single phone call...
Methods and apparatus for processing content requests using domain name
Mechanisms and techniques provide a system that operates in content routers and content engines in peered content distribution networks. Using domain name...
Switching fabric port mapping in large scale redundant switches
A method and system for mapping logical fabric ports to line ingress queues. The system provides for the mapping of line ingress queues to logical destination...
Method for automatically configuring a DSLAM to recognize customer
A method for automatically configuring a digital subscriber line add-drop multiplexer (DSLAM) includes receiving a request for a connection with unrecognized...
Slow-start packet scheduling particularly applicable to systems including
a non-blocking switching fabric and...
Methods and apparatus are disclosed for slow-start scheduling packets, such as in systems having a non-blocking switching fabric and homogeneous or heterogeneous...
Flexible WAN protocol call admission control algorithm
An intermediate network node is configured to drop or reject new client sessions when its available resources are below a predetermined level. In this manner,...
Method for verifying function of redundant standby packet forwarder
In one embodiment, an intermediate node includes one or more active forwarding planes and one or more redundant forwarding planes. The intermediate node may also...
Method and apparatus for detection of signal having random characteristics
A method for detecting a signal having random characteristics. A plurality of bursts are detected within a predetermined time period. The plurality of bursts are...
System and method for securing transactions in a contact center
A system and method for protecting confidential user information employed in an electronic transaction. The system and method provide for associating an...
Internet telephone base
Dual-mode cordless phone base
System and method for dynamic ordering in a network processor
In one embodiment a set of threads are assigned in a particular order to an order group. The first assigned thread is treated as being, at least initially, at a...
System using idle connection metric indicating a value based on connection
characteristic for performing...
Idle connections are processed in a computerized device in order to improve the efficiency of at least one server where the computerized device monitors a set of...
Using context-sensitive intelligent diffs to modify router configurations
Methods and devices are disclosed for changing the configuration state of a network device such as a router, a switch or a similar device without the need for a...
Method and apparatus for adaptive transmission beam forming in a wireless
A method for forming an adaptive phased array transmission beam pattern at a base station without any knowledge of array geometry or mobile feedback is...
System and method for aggregating multiple radio interfaces into a single
logical bridge interface
A system and method for aggregating multiple radio interfaces into a single logical bridge interface with reference to an IEEE 802.11 Wi-Fi network and an...
DWDM system with IP telephony provisioning at remote locations
A method for providing voice communications at an optical amplifier site of a DWDM system is disclosed. The method generally comprises receiving an optical...
High performance interface logic architecture of an intermediate network
An aggregation router architecture comprises a plurality of line cards coupled to at least one performance routing engine (PRE) via an interconnect system. The...
Discovery and tag space identifiers in a tag distribution protocol (TDP)
A tag-switching router on a tag-switching network establishing a single tag distribution protocol (TDP) session with a peer for the advertisement of tag bindings...
Synchronous pipelined switch using serial transmission
The invention provides a method and system for operating a switch, in which incoming data cells are converted from parallel to serial for synchronous input to a...
Method, apparatus, and software product for detecting rogue access points
in a wireless network
A method, an apparatus, and a software program to implement a method to detect a rogue access point of a wireless network. The method includes maintaining an AP...
Private branch exchange (PBX) conditioning method and apparatus
Method for maintaining a virtual presence of a first remote telephone user in a PBX system having a frame relay network connection between two endpoint routers...
Virtual local area network membership registration protocol for multiple
spanning tree network environments
The invention relates to a method and apparatus for disseminating Virtual Local Area Network (VLAN) membership information across computer networks defining...