At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Downlink OFDMA for service sets with mixed client types
Techniques are provided herein to allow a wireless network access point (AP) to more fully use its bandwidth in order to leverage the different bandwidth...
Communication network topology management based on an associated electric
In one embodiment, a computer determines a grid topology of an electric grid based on one or more electric grid configuration description files, and also...
Addressing cache coherence in updates to a shared database in a network
Example embodiments are provided that may include receiving a request to update a particular object based on a modified object, where the particular object is...
Electro-optical modulators with folded gate layers
An optical modulator may include a lower waveguide, an upper waveguide, and a dielectric layer disposed therebetween. In one embodiment, the lower waveguide may...
This disclosure relates to systems and methods for paging devices in a communication network. A network device providing mobility management through control...
Probe response suppression using angle-of-arrival in a high density
A first wireless device (e.g., an access point) receives a message from a second wireless device (e.g., a client device). The first device determines an...
Wireless network flow monitoring
Techniques are presented herein for enabling performance monitoring of flows within a management and provisioning tunnel used for communicating packets between...
Video conference virtual endpoints
A method and a device providing one virtual endpoint dedicated to serve one particular real endpoint, and the virtual endpoint is typically installed on a...
Establishing a remotely hosted conference initiated with one button push
A method includes registering with a first remote conference manager operated by a first entity and a request to enable conferencing with a second entity. The...
Load balancing of distributed media agents in a conference system
A load balancer controls a cluster of media agents each configured to perform media packet processing operations in a conference session. The load balancer...
Mechanisms to use network session identifiers for software-as-a-service
Techniques are provided for authenticating a subject of a client device to access a software-as-a-service (SaaS) server. A network access device receives a...
Techniques for scalable and foolproof virtual machine move handling with
virtual port channels
Techniques are provided for managing movements of virtual machines in a network. At a first switch, a virtual machine (VM) is detected. The VM is hosted by a...
MSDC scaling through on-demand path update
In one embodiment, a copy of an original packet of a traffic flow is created at an ingress leaf node of a cloud switch. The ingress leaf node forwards the...
System and method for classifying and managing applications over
compressed or encrypted traffic
System and methods for identifying and managing applications over compressed or encrypted traffic in a network are described. The first and second embodiments,...
Using statistical and historical information of topology metrics in
Statistical and historical values of performance metrics are actively used to influence routing decisions for optimum topologies in a constrained network....
Programmable management engine for networks
A network node may contain a virtual software-defined networking (SDN) switch and a local a management engine (e.g., a software application) for generating...
Redirecting traffic via tunnels to discovered data aggregators
In one embodiment, a data aggregator discovery (DAD) message may be distributed by an associated data aggregator, the DAD message identifying the initiating...
Apparatus and method to hide transit only multi-access networks in OSPF
In one embodiment, a first router determines whether a network coupling the first router to one or more second routers is transit-only, wherein transit-only...
Field aware virtual connection discovery
A method for field aware virtual connection discovery is described. In an embodiment, a set of virtual connection domains and a set of virtual connection...
Reassignment of unused portions of a transmission unit in a network
One embodiment includes signaling, by a first network node to a transmission unit owner node, identifying one or more remaining wireless time slot-frequency...
Detecting active region in collaborative computing sessions using voice
In an example embodiment disclosed herein, there is described methods and a system for sharing of content in collaborative computing sessions. The methods and...
System and method for providing small cell gateway redundancy in a network
An example method is provided in one example embodiment and may include configuring a Home eNode B (HeNB) with plurality of tracking area identities (TAIs),...
Managing the bandwidth of a communication session
A system includes a processor operable to identify each of a plurality of first video packets from a communication session with a first identifier designating...
Distributed web object identification for web caching
In some embodiments, a request for a content object may be received as a data packet. Upon determining that the content object is not cached, an element of the...
Recording a hyper text transfer protocol (HTTP) session for playback
In one embodiment, a method includes recording a sequence of online activities of a first user. The online activities include online consumption of online...
Data stream classification
Systems, methods, and other embodiments associated with data stream classification are described. One example method includes identifying packets associated...
Methods and apparatus for network communications via a transparent
A data security device for providing a network transport connection via a transparent network proxy that employs different encryption security mediums along a...
Synchronizing a routing-plane and crypto-plane for routers in virtual
Techniques are presented herein for optimizing secure communications in a network. A router in a virtual private network determines whether or not it has...
Reliable bulk data dissemination using rateless codes
In one embodiment, an aggregating node receives feedback messages from one or more destination nodes in the network. The destination nodes are designated to...
Performance enhancement and congestion control of multipath protocol
packets in a heterogeneous network...
An example method for performance enhancement in a heterogeneous network environment with multipath transport protocols is provided and includes receiving...
Congestion mitigation and avoidance
In one embodiment, a method is provided for congestion mitigation. In this method, a congestion level of data flows along a path is monitored relative to a...
Label switching in fibre channel networks
Methods and apparatus are provided for label switched routing in fiber channel networks. Techniques are provided for implementing label switching based on...
Simultaneous acknowledgments for multicast packets
In one embodiment, a multicast communication is received at a particular node of a plurality of nodes receiving the multicast communication in a network. The...
Forwarding data in a data communications network
In an embodiment, an apparatus for forwarding data in a data communications network having as components nodes and links therebetween comprises a network...
Efficient network probing for deterministic wireless networks
In one embodiment, a device (e.g., path computation device) informs a network management device of a plurality of possible probing profiles, where nodes of a...
Dynamic management of maintenance association membership in a computer
In one embodiment, a particular maintenance end-point (MEP) transmits, during a joining phase, one or more join announcement messages (JAMs) to other MEPs in a...
Method and system for homomorphicly randomizing an input
A fully homomorphic method and system for randomizing an input, wherein all computations are over a commutative ring is described. Equivalent methods for...
Multi-beam free space optical endpoint
Free space optics (FSO) is a wireless technology that utilizes optical frequencies. Previously available FSO transceivers are restricted to point-to-point links...
Common slot battery backup unit for network devices
An internal common slot battery backup unit (CSBBU) is provided that can be placed in a network device's power supply unit (PSU) slot. The CSBBU has the same...
Network appliance for transcoding or enriching virtual desktop
infrastructure desktop images
Disclosed in an example embodiment herein is an apparatus that comprises an interface for receiving image data from a hosted virtual desktop and sending a...
Facilitating automatic neighbor relation in a wireless telecommunication
An example method for facilitating automatic neighbor relation in a wireless telecommunication network environment is provided and includes initiating a fake...
Detection of false vehicle-to-vehicle emergency brake light messages
The trustworthiness of vehicle-to-vehicle (V2V) messages received from one or more associated vehicles in the vicinity of a subject vehicle is determined...
Method and system for visualizing social connections in a video meeting
A method implemented on a computing device for conducting a video conference includes identifying at least some attendees of the video conference, acquiring a...
Social-driven precaching of accessible objects
A precaching system identifies an object, such as a media file, that a user accesses and then analyzes a social graph of the user to identify social graph...
Techniques for event based queuing, ordering and time slot computation of
multi-modal meeting presentations
A scheduling request to schedule an online meeting is received. The online meeting involves a plurality of participants during which multiple participants may...
Detection of malicious network connections
In one embodiment a method, system and apparatus is described for detecting a malicious network connection, the method system and apparatus including...
Label-switched path aggregation
Techniques are disclosed for aggregating label-switched paths (LPSs). One method for aggregating LSPs may include a first node comparing forwarding equivalence...
Handling unacceptable asymmetrical communication paths in computer
In one embodiment, a plurality of communication paths in a second direction in a communication network is determined, based on reversing communication paths...
Virtual service topologies in virtual private networks
In one embodiment, a method includes storing a service topology route at a network device interconnecting at least two zones comprising a plurality of hosts,...