At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method for comparison between a pattern sequence and a variable length key
A method is disclosed for comparing a pattern sequence with a variable length key. A first bit of this sequence is identified by a pointer, the length and the...
ATM node having local error correcting procedures
A telecommunication node for an Asynchronous Transfer Mode (ATM) telecommunication network performs Segmentation and Reassembly (SAR) of ATM cells. The SAR...
Peer-model support for virtual private networks with potentially
A service provider's routers (PE1, P1, P2, PE2) provide connections between and share routine information with routers (CE1, CE2) of a customer virtual private...
Method and apparatus to properly route ICMP messages in a tag-switching
A tag-switching router on a tag-switching network properly generates and forwards an ICMP message when an input packet containing a faulty tagged IP datagram is...
System and method for spatial temporal-filtering for improving compressed
A filter that filters in the spatial and temporal domain in a single step with filtering coefficients that can be varied depending upon the complexity of the...
Method and apparatus for interconnecting a circuit-switched telephony
network and a packet-switched data...
A method and apparatus are disclosed for interconnecting a circuit-switched telephone network and a packet-switched data network for communication among them. A...
Method and system for virtual memory compression in an embedded system
The present invention provides a system and method for reducing memory requirements in a low resource computer system. Although examples herein are described in...
Multi-stream coherent memory controller apparatus and method
Multiple memory access streams issued by multiple memory controller access devices are used for accessing DRAM or other memory. The memory controller can...
System for synchronizing configuration information of a network element if
received trap sequence number is...
A system for updating a memory storing configuration information of a network element includes a network element and a network manager coupled to the network...
Virtual interfaces with dynamic binding
A method and system for providing a virtual interface between a router and a network, in which the router is not connected to the network using a local...
Failure tolerant high density dial router
A Fault Tolerant Dial Router (FTDR) includes redundant subsystem resources that operate independently of telephone line interface connections. The redundant...
Recognizing and processing conflicts in network management policies
A method and apparatus are provided for recognizing and processing conflicts in policies that govern a policy-based system. The method and apparatus may be...
A method and system for maintaining and updating routing information in a packet switching network for a set of quasidynamic routes, in which intermittent...
Solderless optical transceiver interconnect
A method and apparatus for assembly of a printed circuit board (PCB) having surface mount technology (SMT) components and an optics device utilizes a compressive...
System and method for rules-driven multi-phase network vulnerability
In one aspect of the invention, a computer implemented method for rules-driven multi-phase network vulnerability assessment is disclosed. The method comprises...
Method and apparatus for domain name service request resolution
A gateway is provided which resolves a DNS request in a manner that minimizes the time and bandwidth required to conduct a DNS search as well as increases the...
Method and apparatus for switching and managing bandwidth in an ATM/TDM
An ATM/TDM cross-connection in a digital loop carrier (DLC) network providing switching and bandwidth management facilities. TDM traffic is encapsulated in ATM...
Method and apparatus for managing connections based on a client IP address
A system and method are disclosed for assigning an incoming connection to a server. The method includes defining a client specific virtual machine object...
Extensible storage of network device identification information
A method for dynamically storing network device identification information to allow for the easy addition of new fields as well as simple modification of...
Traffic management and flow prioritization on a routed computer network
Traffic shaping is combined with per-flow fairness in routing devices operating on virtual circuit (VC) networks. In the case of a backlogged VC, flows are...
System for distributing load over multiple servers at an internet site
Disclosed is a system and method for distributing connections among a plurality of servers at an Internet site. All connections are made to a single IP address...
Method and system for optimizing transmission link bandwidth occupation in
high speed digital networks
A method and system for optimizing transmission links bandwidth utilization in an Asynchronous Transfer Mode (ATM) packet switching network including switching...
Method and apparatus for transmitting an internet protocol (IP) packet
within a fiber optic network
An embodiment includes an optical source, an optical receiver, and an interconnecting optical fiber. A data sequence is received and encoded or formatted as an...
Multiple A to D converters for enhanced dynamic range
Systems and methods for providing analog to digital conversion with improved dynamic range. Multiple low cost analog to digital converters may be used in...
Method and apparatus for distributed bandwidth allocation for a
bi-directional ring media with spatial and...
A system and method for locally determining a fair allocated bandwidth for a network node configured to send and receive packets in an upstream direction and a...
Method and apparatus for creating and dismantling a transit path in a
A system and method are disclosed for determining when to set up or tear down such a temporary transit path so that temporary transit paths are set up when they...
Method for providing single step log-on access to a differentiated computer
A method for providing single step log-on access for a subscriber to a computer network. The computer network is differentiated into public and private areas....
Method and apparatus for dynamic link name negotiation
A technique allows dynamic negotiation of application names executing on nodes of a computer network for creating a data link for communication between the...
Connection pin layout for connecting integrated magnetics modules to a
printed circuit board
A connection pin layout for connecting one or more integrated magnetics modules (IMMs) to a printed circuit board (PCB) for reduced electromagnetic interference...
Power management system for modular electronics
Each modular processor card of a modular electronic system carries a component defining its maximum current or power requirements. The component, which may be a...
Routing table lookup implemented using M-trie having nodes duplicated in
multiple memory banks
The invention provides a method and system for rapid access to one or more M-tries for responding to header information. The M-tries are stored in a plurality of...
Virtual dial-up protocol for network communication
A layer two forwarding protocol (L2F) provides virtual direct dial-up service into private networks through public internet service providers. An authorized...
Network flow data export
The invention provides a system for collecting, exporting and using data relating to message flows responsive to message flow patterns in a flow switching...
Detecting an active network node using an invalid protocol option
A method and apparatus for providing notification to a client that an access server is on-line during a communication session is disclosed. The client and the...
Multiple VLAN architecture system
A system in which a single VLAN architecture spans multiple VLAN transport protocols and technologies, including a method and system in which multiple different...
Distributed interactive multimedia system architecture
Various aspects of an interactive multimedia system and associated methods. In general, the multimedia system employs central and peripheral hubs that function...
Token ring spanning tree protocol
An improved spanning tree protocol for use by token ring intermediate devices having one or more Concentrator Relay Function (CRF) entities and associated Bridge...
End-to-end bidirectional keep-alive using virtual circuits
The invention provides a method and system for sending and receiving end-to-end bidirectional keep-alive messages using virtual circuits. Nodes coupled to a...
Method and system for adaptive network security using network vulnerability
A method and system for adaptive network security using network vulnerability assessment is disclosed. The method comprises directing a request onto a network. A...
Generic serial interface with automatic reconfigurability
A generic serial interface includes any one of multiple transition cables having a first connector conforming to one of several different serial interface...
Forced sequential access to specified domains in a computer network
The present invention is a method and apparatus for providing the owners of domain sites on a computer network or the owners of private remotely accessible intra...
Verifying that a network management policy used by a computer system can be
satisfied and is feasible for use
A method and apparatus are provided for verifying policies that govern a policy-based system. The method and apparatus may be implemented as a policy verifier...
Data scanning network security
A system and method are disclosed for providing enhanced computer network security by scanning data, specifically electronic mail messages, sent to the network...
Integration of authentication authorization and accounting service and
A single database maintained centrally hosts both proxy service data and authentication, authorization and accounting (AAA) data. Data is then copied to storage...
System and method for information retrieval regarding services
The present invention relates to a system and method for information retrieval related to a service. According to an embodiment of the present invention, two...
Method and apparatus for reducing overhead on a proxied connection
A system and method are disclosed for bypassing a participating application that receives data from a client connection between a proxy and a client and receives...
System and method for providing backup machines for implementing multiple
IP addresses on multiple ports
A system and method are disclosed for redirecting a connection from a first server having a first server IP address. Incoming SYN packets sent from a client are...
Port aggregation protocol
A port aggregation protocol (PAGP) dynamically aggregates redundant links between two neighboring devices in a computer network through the exchange of...
Early detection of in-band signals in a packet voice transmitter with
reduced transmission delay
A packet voice transmitter and method of transmitting digital audio signals are disclosed that detect and alter transmission processing for in-band signals such...
Apparatus for simulating internet traffic
A system and method are disclosed for simulating a plurality of TCP connections directed toward an Internet site under test. The method includes activating a...