At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Pre-equalization enhancement for telecommunication networks
Presented herein are techniques for enhancing pre-equalization operations in a telecommunications network. In one example, a cable modem termination system...
Compact and efficient communication security through combining anti-replay
A method of providing anti-replay protection, authentication, and encryption with minimal data overhead is provided. A sender uses an arbitrary-length...
Media access control for MIMO wireless network
An apparatus and method for operating a Multiple Input Multiple Output (MIMO)-capable subscriber node are disclosed. In one embodiment, an apparatus includes a...
Fast frequency-hopping schedule recovery
In one embodiment, a device determines a need to resynchronize a broadcast and unicast frequency-hopping schedules on its network interface. In response to the...
Out of band management of basic input/output system secure boot variables
A method is provided in one example embodiment and includes storing secure boot variables in a baseboard management controller; and sending the secure boot...
Extensible attribute summarization
In one embodiment a method includes at first a network device, identifying an attribute of the first network device, selecting a function that defines how the...
Retail digital signage
In one embodiment, a plurality of digital displays is connected to a control computer having a processor and a memory. The memory is configured to communicate...
Self-aligning optical connector assembly
An apparatus for providing self-aligned optical coupling between an opto-electronic substrate and a fiber array, where the substrate is enclosed by a...
Proactive timer-based local repair path communication in reactive routing
In one embodiment, an intermediate device may determine a source route in use from a source to a destination in a reactive routing computer network, and may...
Dynamic coding for network traffic by fog computing node
In one embodiment, a method comprises determining access network conditions by a network device in an access network, the access network providing...
Virtual content sharing
A method for providing DLNA compatible content directory service (CDS) on a media content server device includes: entering content item metadata properties into...
Dynamically constructing a broadcast multiplex
A method and apparatus for dynamically constructing a broadcast multiplex are described. The method includes: receiving metadata associated with a first...
Efficient frame forwarding in large scale real-time screen content sharing
Techniques are provided to improve user experience at endpoint devices that are participating in a multipoint screen content sharing session. A server in a...
Traffic segregation in DDoS attack architecture
In one embodiment, a particular node in a network determines information relating to network attack detection and mitigation from a local machine learning...
Method and apparatus for provisioning of information in a cellular
A network management system for managing communications in a cellular communication network comprising an access point operably coupled to an access controller....
Use of virtual network interfaces and a websocket based transport
mechanism to realize secure node-to-site and...
Techniques are provided herein for enabling a virtual private network (VPN) using a bidirectional, full duplex transport channel configured to send and receive...
Keepalive mechanism to maintain links in a lossy environment
In one embodiment, a particular device determines a selected link from the particular device toward a root device in a computer network, wherein traffic...
Autonomous performance probing
A method, device, and computer-readable medium are disclosed for automatically activating a probe configured to generate test network traffic in response to...
Distributed voting mechanism for attack detection
In one embodiment, a network node receives a voting request from a neighboring node that indicates a potential network attack. The network node determines a set...
Security in virtualized computer programs
In an embodiment, a data processing method comprises implementing a memory event interface to a hypercall interface of a hypervisor or virtual machine operating...
Compute and storage provisioning in a cloud environment
In one embodiment, a method includes receiving at a network device, resource information comprising attributes for compute and storage resources in a network,...
Fast channel change for hybrid device
There is provided according to embodiments of the invention a method of changing channels in a hybrid multicast video distribution environment, which is carried...
System and method for automated whitelist management in an enterprise
small cell network environment
A method is provided in one embodiment and includes receiving a network address associated with a wireless device at a first network element in which the...
WAN optimization without required user configuration for WAN secured VDI
In order for intermediary WAAS devices to process and accelerate ICA traffic, they must decrypt the ICA traffic in order to examine it. Disclosed is a mechanism...
Path optimization in multi-node virtual switch with orphan ports
Embodiments provide techniques for optimizing paths in a network environment with a virtual network device that includes a first physical network device and a...
Mintree-based routing in highly constrained networks
In one embodiment, a capable node in a computer network may host a path computation element, receive one or more neighborhood discovery messages including...
Scalability of providing packet flow management
Systems and methods for managing packet flows in a communication network are provided. Packet information can be cached on different levels and used to avoid...
Apparatus and method for applying network policy at a network device
This document discusses, among other things, applying network policy at a network device. In an example embodiment fiber channel hard zoning information may be...
Supporting multiple IEC-101/IEC-104 masters on an IEC-101/IEC-104
In one embodiment, a network device, such as a router, receives a frame containing a message from a first terminal unit. The network device modifies the...
Method and apparatus for detecting malicious software through contextual
Novel methods, components, and systems that enhance traditional techniques for detecting malicious software are presented. More specifically, we describe...
Distributed bi-directional flow control in wireless mesh networks
A distributed, bidirectional congestion control and starvation avoidance system for wireless mesh networks. In particular implementations, the nodes of the...
System and method for providing selective bearer security in a network
An example method includes receiving a message related to a bearer or an Internet Protocol (IP) flow, the message includes an extension indicating whether an...
Microphone mute/unmute notification
A processing system can include a processor that includes circuitry. The circuitry can be configured to: receive far-end and near-end audio signals; detect...
Selection of a Multipoint Control Unit (MCU) for a video meeting on a
To select an appropriate multipoint control unit (MCU) for hosting an upcoming video meeting, video meeting data of previous meetings is stored, including time...
Split frame multistream encode
Presented herein are techniques for creating video for participants in a video conference. A designated primary video stream is decoded and the resulting video...
Faster access to television channels
In one embodiment, a receiver for an accelerated channel change is provided. The receiver receives a first version of a video stream for a first channel and...
Authentication of devices having unequal capabilities
A system authenticates in-vehicle electronic devices having unequal capabilities such as having varying different communication and processing capabilities. A...
Method and apparatus to process an incoming message
A method and apparatus to process an incoming message is described. The method may comprise, at a recipient system, receiving an incoming message from a message...
Enhancing performance of rapid channel changes and other playback
positioning changes in adaptive streaming
Content is received within a network at a content receiver and that is communicated from a content source, where the content comprises packets to be sent to the...
Network packet steering via configurable association of packet processing
resources and network interfaces
Methods and systems are provided for steering network packets. According to one embodiment, a dynamically configurable steering table is stored within a memory...
Flexible and scalable monitoring in a TRILL network
A monitoring session associated with a virtual nickname may be established in a TRILL network. A monitoring station may be connected to an edge switch of the...
Automated network device provisioning using dynamic host configuration
In an embodiment, an electronic digital data packet router performs receiving a DHCP initiation message on a particular interface among a plurality of network...
Aggregated delivery of tunnel fault messages on common ethernet segments
In one embodiment, a device in a computer network determines one or more tunnels affected by a downstream fault in the computer network, and determines one or...
Methods for exchanging network management messages using UDP over HTTP
A network access device (NAD) receives a UDP packet from a client to be transmitted to a management server over Internet, the UDP packet including a management...
Social cloud application-mediated mobile data hotspot sharing
A method is provided in one example embodiment and includes receiving a message that offers use of a first mobile device as a mobile hotspot for enabling access...
Computer-implemented method and apparatus for encoding natural-language
text content and/or detecting plagiarism
A computer-implemented letter-based method of encoding a length-significant portion of natural language text to generate a letter-based fingerprint of the text...
Method and system for a storage area network
In a system and method for a storage area network (SAN), a first controller receives a write request for a SAN and communicates with a first nested storage...
Dynamically provisioning digital voice trunks
Computer systems and logic are operable to establish a local network connection to a network device; establish a remote network connection to a network service...
Releasable fiber connector for opto-electronic assemblies
An apparatus for providing releasable attachment between a fiber connector and an opto-electronic assembly, the opto-electronic assembly utilizing an interposer...
Modular cable management system
A set of modular bracket units are mountable end-to-end in series on a support structure adjacent a cable interface area of an electronic equipment assembly,...