At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Distributing and processing streams over one or more networks
In an embodiment, a method for distributing and processing streams over wide area networks comprises receiving, at a unified data processing node, a continuous...
Provisioning and redundancy for RFID middleware servers
The present invention provides for the provisioning and redundancy of RFID middleware servers. Middleware servers can be automatically provisioned and RFID...
Summating temporally-matched frames in 3D-based video denoising
In one system embodiment, an overlapped block processing module configured to provide three-dimensional (3D) denoising of plural frames corresponding to a raw...
Controlling echo in a wideband voice conference
In one embodiment, an echo canceller configured to cancel echo in a wideband voice conference is provided. A double-talk condition may be when a plurality of...
Transport layer security traffic control using service name identification
Traffic control techniques are provided for intercepting an initial message in a handshaking procedure for a secure communication between a first device and a...
Method and apparatus for providing network security using role-based
A method and apparatus for providing network security using role-based access control is disclosed. A network device implementing such a method can include, for...
Acceptance of policies for cross-company online sessions
A user associated with a first organization is authenticated, via a meeting server, for participation in an online session hosted by a second organization. It...
Network system time domain re-stamping
One embodiment of the invention includes a coax media converter (CMC) system communicatively coupled to at least one modem in a network system. The system...
System and method for efficient upstream transmission using suppression
A system and method suited for improved overall data transmission having a hardware-based transceiver configured for transmitting upstream data with suppressed...
Congestion alleviation in network systems
In one embodiment, a method is provided for alleviating congestion in a network system. In this method, the receipt of data packets destined for a destination...
Media access control (MAC) address summation in Datacenter Ethernet
Techniques are presented to summarize the Media Access Control (MAC) addresses behind a single edge port so that the Datacenter Ethernet edge devices do not...
Enhanced path selection scheme for equal cost paths in communication
In one embodiment, a node in a communication network receives a label switched path (LSP) request and in response, the node determines at least two equal cost...
Apparatus, system, and method for providing energy management, profiles,
and message blocks in a cable service...
A method is provided in one example and includes generating one or more message blocks to be propagated along a narrow-band channel, wherein the message blocks...
Apparatus, system, and method for providing energy management, profiles,
and message blocks in a cable service...
A method is provided in one example and includes creating a plurality of profiles that describe one or more downstream modulations for each data-subcarrier in a...
Path validation in segment routing networks
In one embodiment, a method includes generating a path validation packet at a network device, the path validation packet including a plurality of segment...
Route convergence monitoring and diagnostics
In one embodiment, a method includes assigning an identifier to a route computation at a network device, grouping route updates for the route computation,...
System and method for remote monitoring and control of network devices
A managed network provides unique network addresses that are assigned to nodes such that no two nodes will have the same address in the managed network and such...
Pre-equalization enhancement for telecommunication networks
Presented herein are techniques for enhancing pre-equalization operations in a telecommunications network. In one example, a cable modem termination system...
Compact and efficient communication security through combining anti-replay
A method of providing anti-replay protection, authentication, and encryption with minimal data overhead is provided. A sender uses an arbitrary-length...
Media access control for MIMO wireless network
An apparatus and method for operating a Multiple Input Multiple Output (MIMO)-capable subscriber node are disclosed. In one embodiment, an apparatus includes a...
Fast frequency-hopping schedule recovery
In one embodiment, a device determines a need to resynchronize a broadcast and unicast frequency-hopping schedules on its network interface. In response to the...
Out of band management of basic input/output system secure boot variables
A method is provided in one example embodiment and includes storing secure boot variables in a baseboard management controller; and sending the secure boot...
Extensible attribute summarization
In one embodiment a method includes at first a network device, identifying an attribute of the first network device, selecting a function that defines how the...
Retail digital signage
In one embodiment, a plurality of digital displays is connected to a control computer having a processor and a memory. The memory is configured to communicate...
Self-aligning optical connector assembly
An apparatus for providing self-aligned optical coupling between an opto-electronic substrate and a fiber array, where the substrate is enclosed by a...
Proactive timer-based local repair path communication in reactive routing
In one embodiment, an intermediate device may determine a source route in use from a source to a destination in a reactive routing computer network, and may...
Dynamic coding for network traffic by fog computing node
In one embodiment, a method comprises determining access network conditions by a network device in an access network, the access network providing...
Virtual content sharing
A method for providing DLNA compatible content directory service (CDS) on a media content server device includes: entering content item metadata properties into...
Dynamically constructing a broadcast multiplex
A method and apparatus for dynamically constructing a broadcast multiplex are described. The method includes: receiving metadata associated with a first...
Efficient frame forwarding in large scale real-time screen content sharing
Techniques are provided to improve user experience at endpoint devices that are participating in a multipoint screen content sharing session. A server in a...
Traffic segregation in DDoS attack architecture
In one embodiment, a particular node in a network determines information relating to network attack detection and mitigation from a local machine learning...
Method and apparatus for provisioning of information in a cellular
A network management system for managing communications in a cellular communication network comprising an access point operably coupled to an access controller....
Use of virtual network interfaces and a websocket based transport
mechanism to realize secure node-to-site and...
Techniques are provided herein for enabling a virtual private network (VPN) using a bidirectional, full duplex transport channel configured to send and receive...
Keepalive mechanism to maintain links in a lossy environment
In one embodiment, a particular device determines a selected link from the particular device toward a root device in a computer network, wherein traffic...
Autonomous performance probing
A method, device, and computer-readable medium are disclosed for automatically activating a probe configured to generate test network traffic in response to...
Distributed voting mechanism for attack detection
In one embodiment, a network node receives a voting request from a neighboring node that indicates a potential network attack. The network node determines a set...
Security in virtualized computer programs
In an embodiment, a data processing method comprises implementing a memory event interface to a hypercall interface of a hypervisor or virtual machine operating...
Compute and storage provisioning in a cloud environment
In one embodiment, a method includes receiving at a network device, resource information comprising attributes for compute and storage resources in a network,...
Fast channel change for hybrid device
There is provided according to embodiments of the invention a method of changing channels in a hybrid multicast video distribution environment, which is carried...
System and method for automated whitelist management in an enterprise
small cell network environment
A method is provided in one embodiment and includes receiving a network address associated with a wireless device at a first network element in which the...
WAN optimization without required user configuration for WAN secured VDI
In order for intermediary WAAS devices to process and accelerate ICA traffic, they must decrypt the ICA traffic in order to examine it. Disclosed is a mechanism...
Path optimization in multi-node virtual switch with orphan ports
Embodiments provide techniques for optimizing paths in a network environment with a virtual network device that includes a first physical network device and a...
Mintree-based routing in highly constrained networks
In one embodiment, a capable node in a computer network may host a path computation element, receive one or more neighborhood discovery messages including...
Scalability of providing packet flow management
Systems and methods for managing packet flows in a communication network are provided. Packet information can be cached on different levels and used to avoid...
Apparatus and method for applying network policy at a network device
This document discusses, among other things, applying network policy at a network device. In an example embodiment fiber channel hard zoning information may be...
Supporting multiple IEC-101/IEC-104 masters on an IEC-101/IEC-104
In one embodiment, a network device, such as a router, receives a frame containing a message from a first terminal unit. The network device modifies the...
Method and apparatus for detecting malicious software through contextual
Novel methods, components, and systems that enhance traditional techniques for detecting malicious software are presented. More specifically, we describe...
Distributed bi-directional flow control in wireless mesh networks
A distributed, bidirectional congestion control and starvation avoidance system for wireless mesh networks. In particular implementations, the nodes of the...
System and method for providing selective bearer security in a network
An example method includes receiving a message related to a bearer or an Internet Protocol (IP) flow, the message includes an extension indicating whether an...
Microphone mute/unmute notification
A processing system can include a processor that includes circuitry. The circuitry can be configured to: receive far-end and near-end audio signals; detect...