At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Restarting network reachability protocol sessions based on transport layer
In an embodiment, a method comprises establishing a first data communications session with a first router. In response to receiving a first request to establish...
Increasing transmission rate to a remote device in response to attributing
information loss as not being a...
In response to a detected loss of previously transmitted information by an apparatus communicating with a remote device (e.g., using TCP), the rate of...
Shortening of service paths in service chains in a communications network
A method is provided in one example embodiment and includes receiving at a network element a flow offload decision for a first service node that includes a...
Expanded quality of service processing of multiprotocol label switching
In one embodiment, a packet switching device provides more than eight behavior aggregates of Quality of Service (QoS) processing based on a service type of a...
Method and apparatus for forwarding information base scaling
In one embodiment, a method includes receiving a packet at an edge device in a first network site in communication with a second network site through a...
Packet metadata channels carrying infrastructure metadata in networks
In one embodiment, an apparatus in a network determines particular metadata to communicate infrastructure information associated with a particular packet to...
Compressing data packet routing information using bloom filters
In one embodiment, a Transit Information Bloom Filter (TIBF) signal component is generated for use with a routing protocol control message, the TIBF signal...
Ordered flooding requests for path computation elements
In one embodiment, a stateful path computation element (PCE) in a computer network determines a need to route at least a threshold number of tunnels, and in...
Technique for efficiently and dynamically maintaining bidirectional
forwarding detection on a bundle of links
In one embodiment, a plurality of links between a network node and another network node are configured as a link bundle. The network node establishes one or...
On-demand bandwidth provisioning in a network environment
An example method for facilitating on-demand bandwidth provisioning in a network environment is provided and includes receiving a request from a client at a...
Providing in-line services through radio access network resources under
control of a mobile packet core in a...
A method is provided in one example embodiment and includes sending, by a first entity associated with an access network, a first request message including a...
Systems, methods and media for location reporting at a charging area level
Systems, methods, and media for location reporting at a charging area level granularity are provided. The method includes detecting at a mobility management...
Multi-wavelength distributed raman amplification set-up
Techniques are presented herein to set power levels for multiple Raman pump wavelengths in a distributed Raman amplification configuration. A first receive...
Scanning and tracking dynamic objects with depth cameras
A video conference server receives a plurality of video frames including a current frame and at least one previous frame. Each of the video frames includes a...
Software revocation infrastructure
In one implementation, software components include an identity of a revocation authority. Prior to loading of the software in a given platform, the revocation...
Classes of meeting participant interaction
A technology for interacting with a collaborative videoconferencing environment is disclosed. A display having a substantially "L-shaped" configuration allows...
System and method for robust multiple access network mobility in a network
An example method is provided in one example embodiment and includes establishing a mobility context associated with a user equipment that includes a...
Distributed load management on network devices
This disclosure relates to a system and method for dynamically managing load on network devices in a distributed manner. As the proliferation of data rich...
Transporting serially over TCP/IP using raw TCP encapsulation
In one embodiment, a router establishes a serial-over-TCP/IP (Transmission Control Protocol/Internet Protocol) communication session between terminal units...
Producing equivalent content across encapsulators in a network environment
A method is provided in one example and includes receiving first synchronization information associated with a first encapsulated output, receiving second...
Automatic future meeting scheduler based upon locations of meeting
In a network that supports communications between client devices and at least one meeting server, a meeting request that includes one or more meeting...
Entitlement for call routing and denial
In one embodiment, a network device enforces entitlement rules based on call control traffic received. The call control traffic is received at the network...
Control loop control using broadcast channel to communicate with a node
In one embodiment, a control loop control using a broadcast channel may be used to communicate with a node under attack. A management device may receive data...
Tracking and tracing information theft from information systems
In one embodiment, a processing device receives, from an accessing system, an access request for stored information. In response, the device generates unique...
Redirect to inspection proxy using single-sign-on bootstrapping
An authentication request is generated when a user of a client device attempts to initiate a user session with an application managed by a service provider. An...
Modem mode control based on flow ranking
A system can include a precondition detector configured to determine that the system has network congestion at a network link. The system can also include a...
Interconnecting virtual private networks
In one embodiment, a method includes receiving from a plurality of customer edge devices, endpoint addresses at a central mapping system operating as a control...
Identifying, translating and filtering shared risk groups in
A method, apparatus, and computer-readable storage medium for processing shared risk group (SRG) information in communications networks are disclosed. The...
Method to select interface for IP packets when destination subnet is
reachable on multiple interfaces
An interface may be selected. First, it may be determined that an application is intended to use a first one of a plurality of network interfaces. Next, a first...
Adjustable data rates
Adjustable data rate data communications may be provided. First, a plurality of remote data rates at which a remote device is configured to operate may be...
Dynamic policy based interface configuration for virtualized environments
In one embodiment, a method includes receiving static profiles each comprising one or more properties of an operating environment, receiving a dynamic profile...
Host traffic driven network orchestration within data center fabric
Presented herein are techniques to handle data packets received at a top-of-rack (ToR) switch in an underlay network hosting one or more tenant networks. The...
System and method for computer originated audio file transmission
A system and method for computer originated audio file transmission includes a server having a communications module operable to communicate with a terminal...
Optimized multicast routing in a Clos-like network
Techniques are provided for optimizing multicast routing in a network. At a router device, a message is sent to one or more physical devices. The message is...
Detection of stale encryption policy by group members
Various techniques that allow group members to detect the use of stale encryption policy by other group members are disclosed. One method involves receiving a...
Methods and apparatus for refreshing digital memory circuits
Dynamic memory systems require each memory cell to be continually refreshed. During a memory refresh operation, the refreshed memory cells cannot be accessed by...
Messaging system with content-based dynamic menu generation
A unified messaging system for an enterprise includes a messaging module operable to store a message sent by a first user to a second user in a first media...
Almost blank subframe based orthogonal resource allocation in a wireless
An example method for facilitating almost blank sub-frame (ABS) based orthogonal resource allocation in a wireless network environment is provided and includes...
Battery consumption monitoring
In one embodiment, a method for battery monitoring on a computing device includes: estimating a battery consumption estimate for an event scheduled on the...
System and method for muting audio associated with a source
In one embodiment, a method includes receiving audio at a plurality of microphones, identifying a sound source to be muted, processing the audio to remove sound...
Interactive dynamic ordering of deep packet inspection rules
A network device processes packets transiting the device using successive deep packet inspection (DPI) rules. For each rule, the device attempts to apply the...
Web caching with security as a service
In one implementation, Web-Cache deployed in the Enterprise premises and cloud-based SecaaS are combined such that similar identity-based polices are enforced...
Network security using encrypted subfields
In one embodiment, a method includes receiving from a secure device, an encrypted rule at a first network device, receiving at the first network device, a...
Adaptive infrastructure for distributed virtual switch
In one embodiment, a method includes identifying at a network device, characteristics of a distributed virtual switch comprising a control plane component and a...
Method and apparatus for in-band channel change for multicast data
In one embodiment, a method includes transmitting media from a source to a plurality of receivers in a first source-specific multicast (SSM) channel and...
Loop avoidance technique for the multicast control plane
The present disclosure provides for a loop avoidance technique that implements an upstream neighbor check to detect any forwarding inconsistencies. When a...
Adjacency server for virtual private networks
Devices, methods and instructions encoded on computer readable medium are provided herein for creation of an overlay network on a non-multicast or source...
Dynamic multicast mode selection in a communication network
In one embodiment, a network device selectively operates according to a sparse multicast mode where the network device stores individual devices interested in...
Quarantine-based mitigation of effects of a local DoS attack
In one embodiment, techniques are shown and described relating to quarantine-based mitigation of effects of a local DoS attack. A management device may receive...
Methods and apparatus providing computer and network security utilizing
probabilistic signature generation
A system receives information from at least one security interceptor associated with at least one computer system. The information identifies details associated...