At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Integer matrix transform video compression system, method and computer
A video decoding method, system and computer program product perform inverse transforming of transform coefficients for a video image. The inverse transforming...
Network development and testing as a cloud service
Presented herein are techniques to receive configuration instructions for elements of a network topology to be simulated and tested. In response to receiving...
Method and system for minimizing disruption during in-service software
A method and a system for in-service software upgrade in a Hot Standby Redundant Distributed (HSRD) system are provided. A standby route processor in HSRD...
System and method for providing computer code to obtain data from devices
optionally using a web services interface
A system and method accepts source code including one or more variables or constants, and, for those variables or constants flagged as those that are to be...
Video conference system endpoint
System and method for location reporting in an untrusted network
An example method is provided and may include retrieving by a user equipment (UE) an access point (AP) Media Access Control (MAC) address for an AP to which the...
Managed access point protocol
Methods, apparatuses and systems facilitating deployment and configuration of managed access points in hierarchical wireless network systems. An embodiment of...
Fast switching hybrid video decoder
Techniques are presented herein for switching between a software decoder and a hardware decoder in a hybrid decoder. A video bit stream is received. The video...
Virtual device context (VDC) integration for network services
Methods and apparatus are provided for virtual device context (VDC) integration for network services. VDC integration for network services generally includes...
Network equipment authentication
Presented herein are authentication systems and methodologies for equipment deployed in an operational electronic network. Information about a piece of...
Differentiation of multiple media endpoints behind an address translation
In one embodiment, two way communication between an IP phone behind a firewall and an IP phone behind a translation device is established. A network security...
System and method for layer-2 network routing
An example method is provided and includes receiving a data message from a first virtual local area network; determining at an edge switch-router of a Layer-2...
Architecture for agentless service insertion
An example method for service insertion in a network environment is provided in one example and includes configuring a service node by tagging one or more...
Stacking metadata contexts for service chains
Presented herein are techniques useful in a network comprising a plurality of network nodes each configured to apply one or more service functions to traffic...
Policy based configuration of interfaces in a virtual machine environment
In one embodiment, an apparatus includes a port profile manager for receiving a port configuration policy and creating a port profile for the port configuration...
Multi-layer stateful path computation element architecture
In one embodiment, a stateful computing entity in a computer network determines underlying network information (physical and/or optical) for the computer...
Measuring network performance using inter-packet gap metric
Techniques for measuring network performance using the inter-packet gap metric are described. According to one approach, a computer-implemented method comprises...
Cumulative node heartbeat relay agents in constrained computer networks
In one embodiment, a message instructing a particular node to act as a heartbeat relay agent is received at the particular node in a network. The particular...
System and method for maintaining a provisioned configuration for an
endpoint in a communications network
A system and method for maintaining provisioned configuration for an endpoint in a packet switched communications network are disclosed, the communications...
Security for remote access VPN
Techniques are disclosed for improving security in virtual private network. In one embodiment, key information is generated for a virtual private network (VPN)...
Providing a backup network topology without service disruption
In one embodiment, a primary root node may detect one or more neighboring root nodes based on information received from a first-hop node and may select a backup...
Network interface card device pass-through with multiple nested
In a data center computing system, multiple nested hypervisors are run, including an outer hypervisor and at least one inner hypervisor running as a virtual...
System and method for checking run-time consistency for sequentially and
non-sequentially fetched instructions
A system and method includes modules for determining whether an instruction is a target of a non-sequential fetch operation with an expected numerical property...
Video conference system endpoint
System and method for managing tracking area identity lists in a mobile
A method is provided in one example embodiment and includes communicating a plurality of queries associated with common tracking areas in a wireless network;...
Network device configuration by mobile device
In one implementation, a wireless network device is automatically accessed and configured through a mobile device. The mobile device receives provisioning data...
Systems, methods and media for enhanced circuit-switched fallback
interworking function signaling procedures...
Systems, methods and media for enhanced voice call procedures are provided. A method for enhanced voice call procedure includes receiving at a CSFB-IWF a...
Method and system for analyzing video stream accuracy in a network
A method is provided in one example and includes receiving a video sequence having at least one code symbol embedded therein. The at least one code symbol is...
Touch control of a camera at a remote video device
A device, computer program product, and method control the operation of one or more cameras associated with a video conference endpoint in a video conference...
Panoramic video conference
In one embodiment, video is transmitted between a sending device and a receiving device. The sending device is configured to receive adjacent camera views and...
Method and apparatus for displaying a social networking status message on
a dialing phone
In one embodiment, a method includes identifying when a call to a callee has been initiated by a system. Once the call is identified as being initiated, status...
Location based mixer priorities in conferences
In one embodiment, a method includes identifying a plurality of locations associated with a conference system that has a conference server and a mixer, and...
Optimizing application performance in a network environment
An example method for optimizing application performance in a network environment is provided and includes retrieving an L7 session identifier (ID) from a...
Efficient link repair mechanism triggered by data traffic
In one embodiment, an intermediate device transmits a data message away from a root device toward a receiver device in a computer network, the data message...
Multiple topology routing architecture in computer networks
In a multiple interface, low power and lossy network comprising a plurality of nodes, a low transmission power and medium transmission power topology are...
Network mediated multi-device shared authentication
Described in an example embodiment herein is an apparatus, comprising a communication interface and authentication logic coupled with the wireless interface....
Encoding techniques using multiple coding strengths within a single LDPC
Techniques are presented herein to encode information bits. The information bits are partitioned into at least two groups based on inherent reliability and...
Searching sensor data
In particular embodiments, a method includes receiving a query for particular sensor data among multiple sensor data from multiple sensors. The plurality of...
Method for managing heterogeneous cellular networks
A method is provided for managing heterogeneous cellular networks. The method comprises obtaining measurement reports from wireless entities relating to the...
Handoff of communication sessions between cellular and desktop telephones
A method for effecting handoff of a communication session between a cellular telephone and a desktop telephone includes anchoring a communication session...
System and apparatus for rogue VoIP phone detection and managing VoIP
A method and a system track network access information for authorized network devices. The access information facilitates tracking movement of the device...
A client device requests permission from a network access device to access a network associated with the network access device. The client device sends...
Selective packet sequence acceleration in a network environment
At least one first frame of a first data flow is inspected by a general processing unit to at least determine whether a subsequent portion of the first data...
Assisted intelligent routing for minimalistic connected object networks
In one embodiment, a distributed intelligence agent (DIA) collects local state information from a plurality of minimalistic connected objects (MCOs) in a...
Method and apparatus for transferring BGP state information during
A method of transferring application layer network information comprises the computer-implemented steps of electronically transferring, from a first electronic...
Per-port multicast processing
In a multicast networking device having a plurality of output ports, a hierarchical packet scheduling tree is generated for a first port. The hierarchical...
Dynamic address assignment for address aggregation in low power and lossy
A node in a Low power and Lossy Network (LLN) is managed by monitoring a routing configuration on a node in a LLN. A triggering parameter that is used to invoke...
Distinguishing between connectivity verification availability and
forwarding protocol functionality in a...
In one embodiment, a local network device transmits a connectivity verification protocol control message over a link to a remote network device to attempt to...
Optimizing throughput of data frames in orthogonal frequency division
multiplexing (OFDM) communication networks
In one embodiment, a device maintains a predetermined number of high-priority subcarriers for use in communicating high-priority data frames and a predetermined...