At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Flooding and multicasting in a loop-free routing topology using routing
In one embodiment, a method comprises creating, in a computing network, a loop-free routing topology comprising a plurality of routing arcs for reaching...
Reference frame management for screen content video coding using hash or
Techniques are provided for reference frame management for screen content video coding using hash or checksum functions. A video data stream including a...
System and method for validating video security information
A method is provided in one example and includes receiving video data captured by a camera at a location; comparing a portion of the video data to security...
Plaintext injection attack protection
A system including a memory having regions including a first and second region, the first region being different from the second region, and a digital rights...
System and method for verifying integrity of platform object using locally
A method is provided in one example embodiment that includes storing a reference measurement of an object in a trusted storage and retrieving the reference...
Repository-based enterprise search with user customizations
In one embodiment, a search string is received from a user and the search type of the search is determined from the search string. Based on the search type, an...
Annotating a presentation in a telepresence meeting
A processing system can include an encoder to encode a real-time transmission of a presentation. A memory buffer can copy and store images of the presentation...
Optical components including bonding slots for adhesion stability
An opto-electronic apparatus comprises a substrate for supporting a plurality of components forming an opto-electronic assembly and an optical component...
Method and system for automatically identifying wireless signal quality of
A method for automatically identifying wireless signal quality of a region includes receiving signal quality information associated with wireless signals...
Rogue wireless beacon device detection
Techniques are presented for detecting rogue wireless beacon devices. Wireless transmissions from beacon devices are received at a plurality of receiver...
Secure combined interoperable multiplexing
Systems and methods for combining a plurality of transport streams into a single transport stream for transmission to, e.g., a single frequency network via a...
Audio bandwidth extension for conferencing
In one embodiment, a method includes extracting, by a processor, components from an audio signal to generate a modulating signal. The audio signal is generated...
Service assembly and delivery
A system for assembling and delivering a communications service or product is described which is flexible to accommodate the rapid introduction of new...
Technique for managing sessions with entities in a communication network
A technique for managing sessions in a communication network that does not subscribe to registration events immediately after an entity in the network is...
Dynamic filtering for SDN API calls across a security boundary
Presented herein are techniques to reduce the vulnerabilities of network elements to malicious API calls. One or more filters that validate data across an API...
Secure over-the-air provisioning for handheld and desktop devices and
In one embodiment, a device and a services provisioning system establish an over-the-air connection with each other, and perform device posture validation to...
Simplified mechanism for multi-tenant encrypted virtual networks
The present disclosure provides protection of customer data traveling across a network. A reverse cryptographic map (also referred to herein as a reverse crypto...
Host detection by top of rack switch devices in data center environments
Techniques are provided for detecting and identifying host devices in a network. At a switch device, a packet is received from a server that is interfaced with...
Hierarchical programming of dual-stack switches in a network environment
An example method for hierarchical programming of dual-stack switches in a network environment is provided and includes receiving packets from the network at a...
Symmetric service chain binding
A plurality of network nodes are deployed in a network, each network node configured to apply a service function to traffic that passes through the respective...
Detecting and mitigating forwarding loops in stateful network devices
In one embodiment, a stateful device receives a packet on a particular interface of a stateful device in a computer network, where the packet includes source...
Supporting arbitrary routing criteria in software defined networks
System, method, and computer program product to route data communications based on non-routing criteria, by receiving, by a network element, a data packet,...
Multiple path availability between walkable clusters
In one embodiment, a method comprises creating, in a computing network, a hierarchal routing topology for reaching a destination, the hierarchal routing...
Fibre channel over Ethernet support in a trill network environment
An example method for Fibre Channel over Ethernet (FCoE) support in a Transparent Interconnection of Lots of Links (TRILL) network environment is provided and...
Server-layer path negotiation between client and server network layers
In one embodiment, negotiation is performed between the client-layer (e.g., Layer-3 or Layer-2) network and the server-layer (e.g., optical) network to...
System and method for providing cryptographic video verification
A method is provided in one example embodiment and includes generating a first document and a second document associated with video data that includes a group...
Exclusive and overlapping transmission unit allocation and use in a
One embodiment allocates and uses exclusive and overlapping transmission units in a network. One embodiment includes sending information, from a first network...
Configuring new paths in a wireless deterministic network
In one embodiment, a first node in a wireless deterministic network communicates to a second node configuration information identifying a destination-facing...
Monotonic segmented digital to analog converter
In one implementation, a digital analog converter (DAC) is monotonic because the output moves only in the direction of the input and segmented because a more...
Apparatus and method for controlling a charging circuit in a power over
A charging circuit and method for charging a power storage device in a power over Ethernet environment are necessary to prevent unnecessary power consumption....
Multi-fabric SAN based data migration
In one embodiment, a network device in a network obtains information identifying first storage and second storage. The network device notifies one or more other...
Selective access to executable memory
In an embodiment, a data processing method comprises, in a computer executing a supervisor program: the supervisor program establishing a plurality of different...
Rule-based virtual address translation for accessing data
In one embodiment, rule-based virtual address translation is performed for accessing data (e.g., reading and/or writing data) typically stored in different...
Electromagnetic isolating ball spring
A device including a port barrel, a ball spring, a first enclosure part, and a mounting plate disposed adjacent to the first enclosure part is disclosed. The...
Variable optical attenuator
In one embodiment, a variable optical attenuator includes a core configured to propagate optical data signals and a cladding surrounding at least part of the...
Localizing a mobile data path in a radio access network under control of a
mobile packet core in a network...
A method is provided in one example embodiment and includes establishing a control channel between a first entity associated with an access network and a second...
Network-enabled light fixture for locating movable object
In one embodiment, a method comprises a wireless detector in a lighting element detecting a movable object within a prescribed detection zone of the wireless...
Optimizing a neighbor list of access points
In an example embodiment, a neighbor radio/access point (AP) list is obtained. The neighbor AP list is optimized for a client that is associated with a current...
Wireless roaming and authentication
In one embodiment, a method includes receiving a Wi-Fi authentication request from a mobile device at a wireless controller, the request including a network...
Handling redirect calls
In a particular embodiment, a network device receives, from a first device, a first call request for a second device. The network device may then send the first...
Service insertion architecture
In one embodiment, an apparatus can include a service broker configured to: (i) register a service classifier, and to provide context information to the service...
Local reroute protection for multicast multiprotocol label switching
In one embodiment, a merge process can determine a primary tree among nodes in a communication network, determine a backup tree for a protected segment of the...
Rich media status and feedback for devices and infrastructure components
using in path signaling
A STUN message is received at a router device in a network from a client device in the network along a network path. The STUN message is evaluated for...
Changing group member reachability information
In an embodiment, a method comprises obtaining a second network address at a computer node, which has been already associated with a first network address and...
System and method for optimizing within subnet communication in a network
A method for optimizing within subnet communication in a network environment is provided and includes receiving, at a Top-Of-Rack (ToR) switch, an advertisement...
System and method for routing using path identifiers
In one embodiment, a method includes receiving a first packet sent by a first node. The packet includes a first Layer 3 source address, a first Layer 3...
Breaking loops in overlay networks using an IP transport header
In one embodiment, a device receives a payload encapsulated in an Internet Protocol (IP) transport header having a time-to-live (TTL) value, and decapsulates...
Trigger message routing according to a service class
In one embodiment, a machine type communication (MTC) device can receive registration associated with a new device upon the new device registration for a...
Remote monitoring and controlling of network utilization
A non-transitory computer-readable storage medium storing instructions which, when executed by processors, cause the processors to perform: at a management...
Advertising layer 0 network topology information to a layer 3 network
In one embodiment, techniques are provided to generate a Border Gateway Protocol-Link State (BGP-LS) advertisement message comprising information configured to...