At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method and system for prevention of control word sharing
A method and system of preventing control word sharing, the method and system including receiving a temporal key, denoted TK.sub.i, at a removable security...
Managing command compliance in internetworking devices
In an embodiment, an internetworking device is configured with compliance proxy logic that is configured for sending, to a compliance server, a request to...
Seamless engagement and disengagement of transport layer security proxy
Techniques are presented for seamless engagement and disengagement of Transport Layer Security proxy services. A first initial message of a handshaking...
Context awareness during first negotiation of secure key exchange
Techniques are presented for establishing context awareness during first negotiation of secure key exchange. These techniques may be embodied as a method,...
Zero copy acceleration for session oriented protocols
Techniques are provided for zero copy accelerated processing of packets received at a network device according to a session oriented protocol. Each packet...
User-equipment-initiated framed routes on customer-premises equipment for
wireless wide area networks
Systems and methods are disclosed for processing framed routes initiated by user equipment (UE) at customer-premises equipment (CPE) and gateways using protocol...
Reducing buffer bloat while probing for additional bandwidth in an
adaptive bitrate network
In one embodiment, a device receives data from a network at a TCP buffer at a selected data rate, and copies the data from the TCP buffer to a decoder buffer at...
Determining backup forwarding paths based on route distinguisher
In one embodiment, a packet switching device determines backup forwarding paths based on route distinguisher correlation values. A route distinguisher...
Topology aware provisioning in a software-defined networking environment
An example method for topology aware provisioning in a software-defined network environment is provided and includes receiving, at a provider edge device (PE),...
Technique for improving LDP-IGP synchronization
A technique may improve LDP-IGP synchronization in a MPLS network when an interface of a router coupled to a communications link along a shortest path between a...
Delay budget based forwarding in communication networks
In one embodiment, certain nodes in a computer network maintain a plurality of routing topologies, each associated with a different corresponding delay (e.g.,...
Network topologies for energy efficient networks
One embodiment receives at a first node in at least a portion of a network a routing table, the portion of the network comprising the first node and one or more...
Digital frequency offset monitor for coherently detected optical
Techniques are provided to estimate a distance of one received optical subchannel to one or both of its neighbor (adjacent) subchannels. An optical field...
Systems and methods for network inventory management utilizing mobile
A system for streamlining a network management system (NMS) includes scanning, via a mobile device, a code on a hardware or software component; and determining,...
Balancing server load according to availability of physical resources
based on the detection of out-of-sequence...
According to one embodiment, availability information describing virtual machines running on physical machines is accessed. The availability information...
VM migration based on matching the root bridge of the virtual network of
the origination host and the...
A method is provided in one example embodiment that includes detecting a migration of a virtual machine from an origination host to a destination host and...
Coupling system for optical fibers and optical waveguides
An optical coupler may include a fiber optic structure that has a portion of an outer surface that is beveled at a predetermined angle relative to a...
Proactive link-estimation in reactive routing networks
In one embodiment, a node in a computer network may receive one or more reactive routing route requests (RREQs) originated by an originating node, and may then...
Location-based power management for virtual desktop environments
In one embodiment, an illustrative technique determines when an end-user is within a specified proximity of a client device configured to provide an interface...
System and method for rate control in a network environment
A method is provided in one example embodiment and includes receiving video data and gathering statistics associated with the video data. At least some of the...
Scrambled packet stream processing
A method for processing a packet-based scrambled stream, the method including receiving a plurality of scrambled packets in a packet stream, descrambling any of...
Split frame multistream encode
Presented herein are techniques for creating video for participants in a video conference. A designated primary video stream is decoded and the resulting video...
Device and method for multistream bandwidth control in videoconferencing
In one embodiment, an apparatus includes a memory that stores executable instructions and a processor that executes the instructions. The processor may...
Delayed network protocol proxy for packet inspection in a network
An intermediary device, which behaves as a proxy for two entities after the entities have established a connection between themselves, is disclosed, as is a...
Graceful failover of a principal link in a fiber-channel fabric
In one embodiment, detecting a failure mode of a first communication link on a first port, selecting a second communication link on a second port associated...
Virtual console-port management
Techniques are providing for managing and optimizing the configuration of network devices. At a management device in a network, a message is received from a...
Redundancy for inter-AS L2VPN service with optimal forwarding
In one embodiment, a particular autonomous system border router (ASBR), in a control-plane media access control (MAC) learning (CPML) network, discovers other...
Network switch and method for automatically establishing connection to a
wide area network
A network switch is configured to automatically establish a connection to a WAN by determining which of a plurality of ports of the network switch is a current...
Interior gateway protocol summarization preserving internet protocol
In one example embodiment, a system and method is illustrated that includes receiving connectivity data for at least one network device, the connectivity data...
Managing grey zones of unreachable nodes in computer networks
In one embodiment, a node (e.g., a root-node) of a currently known directed acyclic graph (DAG) topology of a computer network can identify a sub-DAG of one or...
Techniques for message waiting indication support across different
Techniques and systems for inter-working between different protocols are disclosed. In one embodiment, a protocol inter-working system can include: (i) a first...
Revocation of public key infrastructure signatures
In one implementation, a public key infrastructure utilizes a two stage revocation process for a set of data. One stage authenticates or revokes the set of data...
Code diversity method and system
A software diversity system including an executable provider to provide an executable program including component blocks such that different combinations of...
Method and system for speech recognition using social networks
In an example embodiment, there is disclosed an apparatus comprising an audio interface configured to receive an audio signal, a data interface is configured to...
Virtualized movement of enhanced network services associated with a
In one embodiment, a method comprises detecting an initiation of a movement process of a virtual machine executed by a first physical host to a destination...
Silicon photonics structures with pluggable light sources
A pluggable light source device connects in a plug-in engaging manner with an optical modulating device that includes an optical modulator component. The...
System and method for detecting a failure in a field replaceable unit
An apparatus is provided in one example embodiment and includes a light guide configured to couple to an electronic unit. The electronic unit is a replaceable...
Mobile network operator multihoming and enterprise VPN solution
The disclosed embodiments support mobility internal and external to enterprise networks. Service providers provide mobility by providing Home Agent...
Protecting packet traffic in a network including an adaptive bandwidth
In one embodiment, a packet switching device receives a notification that a link has a diminished packet transport capacity. In response, the packet switching...
Techniques for providing access to cloud services via a plurality of different network interfaces of a client device. In accordance with one example, during...
Method and system for obtaining an audio signal
A method and system for obtaining an audio signal. In one embodiment, the method comprises receiving a first sound signal at a first microphone arranged at a...
Video content item timeline
In one embodiment, a method includes: querying a database for data related to a video content item currently being displayed on a display device, the video...
Delivering an audio video asset
Delivering an audio video asset in a way that makes best use of different delivery mechanisms available.
Video conference virtual endpoints
A method and a device providing one virtual endpoint dedicated to serve one particular real endpoint, and the virtual endpoint is typically installed on a...
Dynamic EQAM discovery in M-CMTS architecture
In one example, an Edge Quadrature Amplitude Modulation (EQAM) communicates EQAM information to a Modular Cable Modem Termination System (M-CMTS) core using a...
Routing messages in a computer network using deterministic and
probabilistic source routes
In one embodiment, a data packet message is provided which includes a routing header configured to accommodate both a deterministic source route and a...
Bicasting using non-congruent paths in a loop-free routing topology having
In one embodiment, a method comprises creating, in a computing network, a loop-free routing topology comprising a plurality of routing arcs for reaching a...
First hop load balancing
In an implementation, a packet is received from a network device. A group identifier is retrieved from the received packet. A plurality of layer-2 switch...
Method and system for detecting changes in a network using simple network
management protocol polling
In an embodiment, methods and systems have been provided for detecting changes in a network using improved Simple Network Management Protocol (SNMP) polling...
Method and system for managing virtual talk groups
A method for managing virtual talk groups includes facilitating communications from a plurality of endpoints via an interoperability system. The plurality of...