At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Mechanism for compacting shared content in collaborative computing
In an example embodiment disclosed herein, there is described methods and a system for sharing of content in collaborative computing sessions. The methods and...
Integrated signaling between mobile data networks and enterprise networks
A method is provided in one example and includes receiving a request from a first network element associated with a first network for establishing a first...
Dynamic and adaptive traffic scanning
Systems and methods are provided that enable probabilistic application of data traffic scanning in an effort to catch malicious software or code being carried...
Managing address validation states in switches snooping IPv6
In one embodiment, a particular device (e.g., switch) receives a neighbor discovery (ND) message from a non-trusted non-switch device, the ND message having an...
Quality of service for SIP-based data
A method and system for providing Quality of Service (QoS) for Session Initiation Protocol (SIP)-based signaling and traffic are disclosed. The method can...
Dynamic communication link scaling
Traffic between a first device and a second device across a plurality of communication lanes of a communication link is stalled. A first device side of the...
Congestion control using congestion prefix information in a named data
An example method for congestion control using congestion prefix information in a Named Data Networking (NDN) environment is provided and includes sensing, at a...
Apparatus and method for applying network policy at virtual interfaces
Methods and apparatus are disclosed for applying network policy to communications originating at operating system virtual interfaces. In an example embodiment,...
Host route convergence based on sequence values
In an example embodiment, a method is provided that assigns a sequence value to a host. The host is identified by a host network layer address. After the...
Diverse paths using a single source route in computer networks
In one embodiment, a source device determines a source route from itself to a destination device in a computer network, and forwards a first packet on the...
Controlling distribution and routing from messaging protocol
An apparatus can include a connection manager adapter that is configured to maintain presence for each of the plurality of non-IP endpoints in an IP messaging...
Synchronization of traffic multiplexing in link aggregation
Synchronization of traffic multiplexing in link aggregation is described. In an embodiment, a first link aggregator and a second link aggregator are associated...
Service node using services applied by an application node
Packets are encapsulated and sent from a service node to an application node for applying one or more Layer-4 to Layer-7 services to the packets, with...
Session layer for monitoring utility application traffic
Techniques are provided to facilitate monitoring of utility application traffic streams. At a network device that routes utility application traffic for utility...
Method and system to identify a network device associated with poor QoS
A method and apparatus to analyze real-time data transmissions across a network is described. The method may comprise transmitting a sample data stream between...
BGP slow peer detection
In one embodiment, a router selects a particular peer from an original update group used with an Exterior Gateway Protocol (EGP) such as Border Gateway Protocol...
Endpoint initiation of multipart conferences
A method establishes a conference through a Multipoint Control Unit, MCU. The method includes pre-assigning and storing in the MCU one or more conference...
Cascaded communication of serialized data streams through devices and
their resulting operation
In one embodiment, an apparatus cascades groups of serialized data streams through devices, and performs operations based on information communicated therein. A...
Sub-sampled carrier phase recovery
Presented herein are sub-sampled carrier phase recovery techniques. In accordance with one example, a plurality of consecutive symbols associated with a...
Systems and methods for providing a seamless electrical signal between
In an embodiment, an apparatus (e.g., for selectively contacting a plurality of electrical contacts on a printed circuit board (PCB)), comprises a support...
Network infrastructure validation of network management frames
A detection-based defense to a wireless network. Elements of the infrastructure, e.g., access points or scanning-only access points, detect intruders by...
Receiving and processing multiple video streams associated with a video
Methods and systems for the efficient and non-redundant transmission of a single video program in multiple frame rates, optionally employing a combination of...
Enriched digital photographs
A method for enriching digital photographs, the method comprising: receiving a digital photograph and video data captured before a time at which the digital...
Apparatus and methods for handling network file operations over a fibre
Disclosed are methods and apparatus for facilitating transmission of file access type messages over a Fiber Channel (FC) network. In one embodiment, at a file...
Secure network deployment
In one embodiment, a Manufacturer Installed Certificate (MIC) and a personal identification number are sent to a call controller to request a configuration...
Public key cryptography with reduced computational load
A cryptographic method, comprising receiving a public key belonging to a message recipient having a private key corresponding to the public key, selecting a...
Proxy address resolution protocol on a controller device
Techniques are presented herein for reducing network congestion in data center environments. A controller device in a network receives a registration request...
System and method for utilization of a segmentation identification to
support transmission of data to a...
A method is provided in one example and includes receiving, at a receiving node, a packet that comprises information indicative of an internet protocol address...
Dynamic enabling of routing devices in shared-media communication networks
In one embodiment, a non-repeated reachability probe is transmitted from a particular node into a shared-media network, where nodes that receive the probe are...
Abstract representation and provisioning of network services
A network management device connects to a device on the network, receives a trigger for an operation command, supplies to the device a command line interface...
Method and system to calculate multiple shortest path first trees
An example method is provided in accordance with one embodiment and includes identifying distances for a sub-tree of a leaf node of a plurality of leaf nodes in...
Identifying media network flows that use dynamic codec identifications
Techniques for identifying media network flows that use dynamic codec identifications are described. In an embodiment, network flow information for a network...
Dynamic ternary content-addressable memory carving
Example embodiments of the present disclosure describe mechanisms for dynamic carving (i.e., applying a revised template for ternary content addressable memory...
Flooding and multicasting in a loop-free routing topology using routing
In one embodiment, a method comprises creating, in a computing network, a loop-free routing topology comprising a plurality of routing arcs for reaching...
Reference frame management for screen content video coding using hash or
Techniques are provided for reference frame management for screen content video coding using hash or checksum functions. A video data stream including a...
System and method for validating video security information
A method is provided in one example and includes receiving video data captured by a camera at a location; comparing a portion of the video data to security...
Plaintext injection attack protection
A system including a memory having regions including a first and second region, the first region being different from the second region, and a digital rights...
System and method for verifying integrity of platform object using locally
A method is provided in one example embodiment that includes storing a reference measurement of an object in a trusted storage and retrieving the reference...
Repository-based enterprise search with user customizations
In one embodiment, a search string is received from a user and the search type of the search is determined from the search string. Based on the search type, an...
Annotating a presentation in a telepresence meeting
A processing system can include an encoder to encode a real-time transmission of a presentation. A memory buffer can copy and store images of the presentation...
Optical components including bonding slots for adhesion stability
An opto-electronic apparatus comprises a substrate for supporting a plurality of components forming an opto-electronic assembly and an optical component...
Method and system for automatically identifying wireless signal quality of
A method for automatically identifying wireless signal quality of a region includes receiving signal quality information associated with wireless signals...
Rogue wireless beacon device detection
Techniques are presented for detecting rogue wireless beacon devices. Wireless transmissions from beacon devices are received at a plurality of receiver...
Secure combined interoperable multiplexing
Systems and methods for combining a plurality of transport streams into a single transport stream for transmission to, e.g., a single frequency network via a...
Audio bandwidth extension for conferencing
In one embodiment, a method includes extracting, by a processor, components from an audio signal to generate a modulating signal. The audio signal is generated...
Service assembly and delivery
A system for assembling and delivering a communications service or product is described which is flexible to accommodate the rapid introduction of new...
Technique for managing sessions with entities in a communication network
A technique for managing sessions in a communication network that does not subscribe to registration events immediately after an entity in the network is...
Dynamic filtering for SDN API calls across a security boundary
Presented herein are techniques to reduce the vulnerabilities of network elements to malicious API calls. One or more filters that validate data across an API...
Secure over-the-air provisioning for handheld and desktop devices and
In one embodiment, a device and a services provisioning system establish an over-the-air connection with each other, and perform device posture validation to...
Simplified mechanism for multi-tenant encrypted virtual networks
The present disclosure provides protection of customer data traveling across a network. A reverse cryptographic map (also referred to herein as a reverse crypto...