At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Optimized multicast routing in a Clos-like network
Techniques are provided for optimizing multicast routing in a network. At a router device, a message is sent to one or more physical devices. The message is...
Detection of stale encryption policy by group members
Various techniques that allow group members to detect the use of stale encryption policy by other group members are disclosed. One method involves receiving a...
Methods and apparatus for refreshing digital memory circuits
Dynamic memory systems require each memory cell to be continually refreshed. During a memory refresh operation, the refreshed memory cells cannot be accessed by...
Messaging system with content-based dynamic menu generation
A unified messaging system for an enterprise includes a messaging module operable to store a message sent by a first user to a second user in a first media...
Almost blank subframe based orthogonal resource allocation in a wireless
An example method for facilitating almost blank sub-frame (ABS) based orthogonal resource allocation in a wireless network environment is provided and includes...
Battery consumption monitoring
In one embodiment, a method for battery monitoring on a computing device includes: estimating a battery consumption estimate for an event scheduled on the...
System and method for muting audio associated with a source
In one embodiment, a method includes receiving audio at a plurality of microphones, identifying a sound source to be muted, processing the audio to remove sound...
Interactive dynamic ordering of deep packet inspection rules
A network device processes packets transiting the device using successive deep packet inspection (DPI) rules. For each rule, the device attempts to apply the...
Web caching with security as a service
In one implementation, Web-Cache deployed in the Enterprise premises and cloud-based SecaaS are combined such that similar identity-based polices are enforced...
Network security using encrypted subfields
In one embodiment, a method includes receiving from a secure device, an encrypted rule at a first network device, receiving at the first network device, a...
Adaptive infrastructure for distributed virtual switch
In one embodiment, a method includes identifying at a network device, characteristics of a distributed virtual switch comprising a control plane component and a...
Method and apparatus for in-band channel change for multicast data
In one embodiment, a method includes transmitting media from a source to a plurality of receivers in a first source-specific multicast (SSM) channel and...
Loop avoidance technique for the multicast control plane
The present disclosure provides for a loop avoidance technique that implements an upstream neighbor check to detect any forwarding inconsistencies. When a...
Adjacency server for virtual private networks
Devices, methods and instructions encoded on computer readable medium are provided herein for creation of an overlay network on a non-multicast or source...
Dynamic multicast mode selection in a communication network
In one embodiment, a network device selectively operates according to a sparse multicast mode where the network device stores individual devices interested in...
Quarantine-based mitigation of effects of a local DoS attack
In one embodiment, techniques are shown and described relating to quarantine-based mitigation of effects of a local DoS attack. A management device may receive...
Methods and apparatus providing computer and network security utilizing
probabilistic signature generation
A system receives information from at least one security interceptor associated with at least one computer system. The information identifies details associated...
Deployment and upgrade of network devices in a network environment
A method for deployment and upgrade of network devices in a network environment includes receiving (for example, at a switch being activated in the network...
Optical communication reception system
A system configured to maintain a consistent local-oscillator-power-to-primary-signal-power ratio (LO/SIG ratio). The system may be configured to: receive the...
Handset with cradle
An apparatus may be provided. The apparatus may comprise a substrate and a circuit board. A ball grid array structure may be disposed between the substrate and...
Multi-operator core network shared small cell deployment in a
non-multi-operator macro network environment
A method provided in one embodiment includes receiving a resource list including a first core network identifier identifying a first core network, at least a...
Method and system for facial recognition for a videoconference
Videoconferencing may be provided. A participant may be identified from audio information and in video information. From the video information, a plurality of...
Application hints for network action
A user application may provide a hint which may be used by a compute device to select a tag to be inserted into the packets generated by the user application....
Cloud-assisted threat defense for connected vehicles
In an example embodiment herein, there is provided methods and a system for cloud-assisted threat defense for connected vehicles. A vehicle suitably includes an...
In one implementation, an interposer library is installed on an embedded system or another type of computing system. The system may be configured to host web...
Low latency authentication of gated media relay services
Media relay services are often used to establish sufficiently direct connections in order to enable provisioning of a real-time media service and/or improve the...
System and method for providing prefixes indicative of mobility properties
in a network environment
An example method includes receiving an Internet protocol (IP) address request in a network and selecting an IP address associated with a prefix that represents...
Quality of service (QoS) configuration in low-power and lossy networks
In one embodiment, a distributed intelligence agent (DIA) in a computer network performs deep packet inspection on received packets to determine packet flows,...
Smarter policy decisions based on metadata in data flows
Modern day user applications leverages new communication technologies such as WebRTC, WebEx, and Jabber allow devices to connect and exchange media content...
Intelligent handling of virtual machine mobility in large data center
At a physical device in a network configured to host a virtual switch and one or more virtual machines, a packet is received at the virtual switch from a source...
Interoperability of data plane based overlays and control plane based
overlays in a network environment
Technologies are provided in example embodiments for intercepting a packet being multicast from a first tunnel endpoint in a network, determining first address...
Any-to any multicasting in a tunnel based virtual private network
Systems, methods, and other embodiments associated with any-to-any multicasting in a tunnel based virtual private network (VPN) are described. One example...
Efficient network discovery in frequency hopping networks
In one embodiment, a device in a frequency hopping communication network transmits responsive beacon messages based on adaptive types of responsive beacon...
Unified communication audit tool
Providing for dynamic auditing of components of a communication network is provided herein. By way of example, network components can be queried by way of...
Methods and apparatus for data processing using data compression, linked
lists and de-duplication techniques
Data processing methods and apparatus for efficiently storing and retrieving data, e.g., blocks of data, to and from memory. The data processing includes, e.g.,...
System and method for simultaneously storing and reading data from a
A system and method for providing high-speed memory operations is disclosed. The technique uses virtualization of memory space to map a virtual address space to...
System and method for selecting a least cost path for performing a network
boot in a data center network...
A method is provided in one example embodiment and includes logging in to a multipath target via first and second boot devices instantiated on a network device,...
Battery level presentation
In one embodiment, a method implemented on a first computing device includes: receiving video conference data for a video conference session; receiving battery...
Dynamic zone routing in a mobile ad hoc network based on maximum available
network device battery power
In one embodiment, a wireless network device identifies whether any other detectable network device advertises a higher advertised remaining power than a...
Adaptive reoptimization rate for unstable network topologies
In one embodiment, the network stability of a communication network is determined based on one or more network metrics related to stability, and then based on...
Delivering wireless information associating to a facility
Systems, methods, and apparatus may perform operations related to delivering wireless information associating to a facility. A message is received from a first...
System and method for internal networking, data optimization and dynamic
frequency selection in a vehicular...
A system includes an on-board unit (OBU) in communication with an internal subsystem in a vehicle on at least one Ethernet network and a node on a wireless...
Securing media content using interchangeable encryption key
An embodiment of a system for securing media content includes a digital media device comprising a memory associated with a secure element. The memory contains a...
Sub-picture hierarchical QP coding
A method including: dividing a first video frame into a predetermined plurality of regions; assigning a quantization parameter to each of the predetermined...
Map your movie
A method of displaying an interactive geographical representation associated with a video content item is described. The method includes: playing the video...
Presence based connecting number search
Methods and apparatus for using a presence status to generate a list of possible contacts based on a partial entry of a contact address are disclosed. According...
LISP stretched subnet mode for data center migrations
The present disclosure describes methods and systems for enabling a migration of network elements from a first location to a second location remote from the...
Hierarchical scheduling system with layer bypass including updating
scheduling information of a scheduling...
In one embodiment, a hierarchical scheduling system including multiple scheduling layers with layer bypass is used to schedule items (e.g., corresponding to...
Dynamic multi-path forwarding for shared-media communication networks
In one embodiment, a quality of one or more links of a particular node in a communication network may be determined, and then whether the quality of the one or...