At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method and apparatus for pacing the flow of information sent from a device
Methods and apparatuses are disclosed for pacing the rate at which packets of one or more information streams are sent from a device, such as, for example, a...
System and method for preventing phantom data communication links
A data communication system is provided that comprises a head-end switching system which comprises a plurality of communication ports. A port controller causes...
Arrangement for arbitration of display information from multiple
applications for a network enabled display device
A network-enabled user interface device, for example a VoIP telephony device, includes a display, a user input interface, an interface controller, and an...
Method and system for voltage tracking and sequencing in a power supply
A method for controlling multiple voltages in a power supply includes providing a plurality of DC to DC power converters. Each power converter includes a pulse...
Method and system for dynamically controlling frame retransmissions in a
A method and system for dynamically controlling frame retransmissions over a wireless link includes determining for a frame unsuccessfully received over a...
PERFORMING LOOKUP OPERATIONS USING ASSOCIATIVE MEMORIES OPTIONALLY
INCLUDING MODIFYING A SEARCH KEY IN...
Methods and apparatus are disclosed for performing lookup operations using associative memories, including, but not limited to modifying search keys within an...
System and method for monitoring information in a network environment
A method for monitoring information in a network environment is provided that includes receiving one or more packets from a communication flow initiated by an...
Business vocabulary data retrieval using alternative forms
Techniques for responding to a request for data about an enterprise include storing a set of names for a single entity associated with the enterprise as a first...
Method and apparatus for distributing and updating private keys of
multicast group managers using directory...
An approach for establishing secure multicast communication among multiple multicast proxy service nodes is disclosed. The multicast proxy service nodes, which...
Optical transport concentrator audit system and method
The present invention is a system and method that facilitates audits of network device (e.g., an optical network concentrator) characteristics and operations and...
Mechanism for translating between two different voice-over-IP protocols
Disclosed are methods and apparatus for translating data within a cable network between a first voice-over-IP (VOIP) protocol used by a user agent and a second...
Hardware load balancing through multiple fabrics
The present invention relates to a method and apparatus for balancing loads in multiple switching fabrics. Each switching fabric comprises data ports through...
Approach for tracking internet protocol telephony devices in networks
An approach for tracking IP telephony devices in a network generally involves detecting changes in physical connections of IP telephony devices to the network by...
Method and system for efficient utilization of transmission resources in a
A method and system for efficient utilization of transmission resources in a wireless network includes requesting retransmission of an unsuccessfully received...
Error correction using redundant packet streams in wireless communications
A communications system includes a mobile unit that transmits redundant content to a plurality of destinations. A copy of the content that is transmitted to each...
Call optimization in ad-hoc conference calls
A method and system for adding a participant to a conference call. A feature of the method and system is that with respect to individual invitees to ad-hoc...
Autosensing LMI protocols in frame relay networks
The invention provides a method and system for auto-sensing LMI protocols in frame relay networks. When a router is first coupled to a frame relay network, it...
Automatic installation and alignment mode for wireless bridges
Disclosed are methods and apparatus for automatically installing and/or aligning antennas of wireless bridges in computer networks. In general terms, when a...
Barrier synchronization mechanism for processors of a systolic array
A mechanism synchronizes among processors of a processing engine in an intermediate network station. The processing engine is configured as a systolic array...
Method and apparatus providing controlled access of requests from virtual
private network devices to managed...
Access control approaches are disclosed wherein managed object in Simple Network Management Protocol (SNMP) Management Information Bases (MIBs) are accessed on a...
Method and apparatus for retrieving network quality of service policy
information from a directory in a quality...
A method and apparatus is provided for retrieving and storing quality of service policy management information using a directory service in a manner that...
System using truncated superior resource name and unique counter number
obtained from a global counter for...
A method for generating a unique subordinate resource name is disclosed where the method includes the steps of identifying a subordinate resource and the name of...
Server load balancing method and system
A method and system for providing a connection between a client and a server with load balancing between servers are disclosed. A computer-implemented method of...
Method and apparatus for concealing jitter buffer expansion and
Methods for concealing audible distortions resulting from changes in jitter buffer size include receiving an audio stream, storing the audio stream in a jitter...
Method and apparatus for detecting a compatible phantom powered device
using common mode signaling
A method and an apparatus provide for determining whether a data terminal equipment (DTE) device represents a compatible device lacking an independent power...
Call management using call routing engine
A call management technique implemented using a call routing engine is disclosed. In the technique, local (e.g., ACD) switching resources and a public network...
Node detection and ring configuration for physical star connected networks
A novel and useful mechanism for detecting the nodes connected to a network device and for creating a ring network from the nodes detected thereby. The invention...
Method and system for finding shared risk diverse paths
A method for finding shared risk diverse paths is disclosed. The method includes receiving route information at a node and running a shortest path algorithm to...
Method and system for logging voice quality issues for communication
A method and system for logging voice quality issues for a communication connection includes receiving a signal for logging quality information for a voice...
Hooked stub collinear array antenna
A hooked stub collinear array antenna formed from a single conductor. The antenna operates at a design frequency having an associated wavelength. The antenna...
Techniques for mounting an area array package to a circuit board using an
improved pad layout
A circuit board assembly includes a printed circuit board (PCB). The PCB has a pad layout which includes a set of pads arranged in a two-dimensional array having...
Methods and apparatus for facilitating network splicing
The invention provides systems and methods for providing compressed video data from multiple bit streams. The systems and methods apply a two-stage strategy. In...
Method and system for automatically documenting system command file tags
and generating skeleton documentation...
A method for generating documentation content for computer operating system commands with command specifications in command definition files is disclosed. The...
Method and apparatus for negotiating Diffie-Hellman keys among multiple
parties using a distributed recursion...
A method and apparatus for negotiating a shared secret among members of a multicast group are disclosed. A tree that represents the group is created and stored...
DHCP over mobile IP
A protocol that enables an 802 mobile host to obtain a "home IP address," and other configuration parameters via DHCP or BOOTP, while attached to either its home...
Methods and apparatus for pooling and depooling the transmission of stream
Mechanisms and techniques provide a system that can transmit stream data in a computer network. The system can identify at least two packets of stream data that...
Marking network data packets with differentiated services codepoints based
on network load
A method and apparatus for performing load-based packet marking within a network is described. In one aspect, a first group of one or more packets of a data flow...
Methods and system for processing changes to existing purchase orders in
an object-oriented order processing system
In an order processing system, mechanisms and techniques receive a change to an existing order in the order processing system and generate a change order based...
Encryption method and apparatus with forward secrecy and random-access key
An encryption method and apparatus that provides forward secrecy, by updating the key using a one-way function after each encryption. By providing forward...
Devices, softwares and methods for selectively limiting the total
modem-on-hold timeout time of a single log-in...
Devices, softwares and methods limit the total Modem-On-Hold ("MOH") timeout time of a single log-in session. When a logged in user requests a Modem-On-Hold...
OFDM interference cancellation based on training symbol interference
Systems and methods for optimally combining signals from multiple antennas to ameliorate the effects of noise and/or interference on OFDM communications are...
Port isolation for restricting traffic flow on layer 2 switches
This invention provides for an apparatus and method to isolate ports on layer 2 switches on the same VLAN to restrict traffic flow. The apparatus comprises a...
Reliable multicast communication
Disclosed are various ways of performing reliable multicast communication which may include, for example, designating which node or nodes to acknowledge a...
System and method for deriving IPv6 scope identifiers and for mapping the
identifiers into IPv6 addresses
A system and method for use at an intermediate network device employs Virtual Local Area Network (VLAN) designations as Internet Protocol version 6 (IPv6) link...
Method and apparatus for deploying configuration instructions to security
devices in order to implement a...
A method and apparatus for deploying configuration instructions to security devices in order to implement a security policy on a network are disclosed. An...
Unified messaging system configured for converting short message service
messages to audible messages
A unified communications system includes an SMS command processor configured for executing prescribed messaging operations based on reception of an SMS message...
Arrangement for common-format notification delivery messages based on
notification device type in an IP-based...
A notification architecture utilizes multiple processes configured for managing notification operations based on reception of SMTP-based messages within IMAP...
Method and apparatus for measuring network data packet delay, jitter and
An apparatus for measuring data transmission performance through a packet switched network, the apparatus having a time of day (TOD) clock for determining a send...
Redirecting multiple requests received over a connection to multiple
servers and merging the responses over the...
Methods and apparatus are disclosed for redirecting requests received over a connection and redirecting them to multiple servers. The responses are then merged...
Method and apparatus for mapping an MPLS tag to a data packet in a headend
A method of using DOCSIS 1.1 features to allow the addition of ISPs and QOS levels to a single cable modem without having to modify the CMTS is described in the...