At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Detection of cabling error in communication network
In one embodiment, a method at a network device includes receiving a link layer advertisement, comparing information in the link layer advertisement with...
Port chunk allocation in network address translation
A system and method for providing network and port address translation is provided. A global IP address and a block (chunk) of ports are allocated for each...
Verifying availability and reachability through a network device
In an embodiment, in response to receiving from a client computer a client request to connect to a server: processing the client request in a network protection...
Retransmission-based stream repair and stream join
The Real-time Transport Protocol (RTP) and its related standards define a retransmission packet format and a way to give feedback via Negative ACKnowledge...
System and method for providing resource sharing, synchronizing, media
coordination, transcoding, and traffic...
A method in one embodiment includes maintaining a list of authorized devices; creating an association between a wireless device being operated by an end user...
System and method for communicating with an applet using an inline web
frame in a network environment
A method in an example embodiment includes modules for identifying an applet for a local network and providing instructions in a parent container file to enable...
Signaling co-routed and non co-routed LSPs of a bidirectional packet TE
Particular embodiments may enable setup and signaling of co-routed and non co-routed label switched paths (LSPs) of a bidirectional packet traffic engineering...
Securing virtual lane physical layers
A data stream with a given data rate is distributed into a plurality of virtual lanes or streams, each with a lower data rate than the data stream. Virtual...
Self-tuning an optical network at an operating point
Techniques are presented for automatic tuning of operating parameters, e.g., amplifier gain, in an optical network. A section of an optical network comprises a...
System and method for verifying parameters in an audiovisual environment
A method is provided in one example embodiment and includes communicating a code to initiate cycling through a plurality of potential audiovisual inputs. The...
Preventing unauthorized data extraction
An electronic device (22, 48, 50) includes an array (26) of memory cells, which are configured to store data values. One or more sense amplifiers (40) have...
Packet forwarding optimization with virtual machine mobility by comparing
device identifiers to determine VM...
In one embodiment, a method includes tracking at a network device in communication with a plurality of virtual machines, virtual machine movement based on a...
Method and apparatus to control routing convergence during node reboot by
entering a freeze state that inhibits...
In one embodiment, a technique may enable control of routing convergence in a computer network during reboot of a node of a routing topology represented by a...
System and method for reducing power used for radio transmission and
A system and method allows devices to send and receive packets while using power to do so in a manner that responds to events, such as receipt or other...
Mobile personal video recorder
A method of digital television recording including receiving a content item at a first Personal Video Recorder (PVR), determining whether to transfer the...
Scalable replay counters for network security
In one embodiment, an authenticator in a communication network maintains a persistent authenticator epoch value that increments each time the authenticator...
Messaging security device
In one embodiment, a system can comprise an interface that receives data related to a communication session and a messaging security device component that...
Restricting network access while connected to an untrusted network
In an example embodiment, disclosed herein is an apparatus comprising an interface configured to communicate with at least one external device, and processing...
System and method for policy selection and switching function in a network
A method is provided in one example embodiment and includes receiving a request for a service for a subscriber at an access gateway; receiving a default...
System and method for providing route information
A system and method changes a rate at which routing information is sent to increase it upon the detection of one or more events, maintaining the then current...
Exporting real time network traffic latency and buffer occupancy
Techniques are presented herein to facilitate the monitoring of occupancy of a buffer in a network device. Packets are received at a network device. Information...
Global state resynchronization for path computation element failure during
a reoptimization process
In one embodiment, a router initiates reroutes of one or more tunnels at the router as part of optimization of a plurality of tunnels in a computer network, and...
System and method for layer-2 multicast multipathing
An example method is provided and includes a multicast data message from a data source, the message in a first virtual local area network and being associated...
QSFP+ to SFP+ form-factor adapter with signal conditioning
Techniques are provided for sending and receiving data communications between an enhanced Quad Small Form-Factor Pluggable (QSFP+) transceiver module and an...
Hardware virtualization module for exclusive controlled access to CPU
In one embodiment, a method comprises providing an apparatus having exclusive access to each of one or more central processing units (CPUs) of a computing...
System for handling a broken uniform resource locator
A method and apparatus for receiving a request for a Uniform Resource Locator (URL), determining the URL is broken, retrieving query data from a first database...
Power negotiation protocol
In one embodiment, a method includes a first device providing a first power to a second device using a first set of conductors out of a plurality of conductors....
Sub-slotting to improve packet success rate in carrier sense multiple
In one embodiment, a communication device in a frequency hopping communication network determines an intention to forward a first packet in a particular...
Video bandwidth optimization
In one embodiment, a method includes receiving at a network device, video from a first endpoint, analyzing the video received from the first endpoint,...
In an example embodiment, a Voice over IP (VoIP) system that provides for media forking at the caller's (ingress) gateway. The gateway receives data with a...
Integration of network admission control functions in network access
In one embodiment, a method includes receiving a communication from an endpoint device at a network access device located within a data path between the...
Encryption key management for storage area network devices
An encryption key management system is provided for storage area network devices. A create key request is received at a storage area network switch. The key is...
Timestamp estimation and jitter correction using downstream FIFO occupancy
First, a packet may be received and a timestamp value may be placed on the packet. The timestamp value may comprise a place time value comprising a time when...
Protocol independent multicast designated router redundancy
In one embodiment, a method includes transmitting a packet from a router located in a communication path between a source and a receiver, the load balancing...
Multicast group assignment using probabilistic approximations
In one embodiment, a source node (e.g., responsible node) determines a plurality of destination nodes of a message, and generates a probabilistic data structure...
Dual adjacency between edge devices at a network site
Devices, methods and instructions encoded on computer readable medium for implementation of a dual-adjacency between edge devices of a network site. A first...
Pilot-less noise estimation
Presented herein are pilot-less noise estimation techniques that utilize a correlation between attributes of a received signal and the noise to generate...
Converting traditional computer product licenses into cloud-based
Techniques are provided for converting a node-locked licensing scheme to a cloud-based management of licenses to use computer products. In one example, a...
Ranking of computing equipment configurations for satisfying requirements
of virtualized computing environments...
Performance test data of a plurality of virtualization computing equipment configurations is collected and stored for each of a plurality of virtualization...
Service-aware distributed hash table routing
In one embodiment, a node in a computer network joins a global ring associated with a distributed hash table (DHT), and maintains a DHT routing table and DHT...
System and method for monitoring two-wire communication in a network
An example method is provided and includes receiving, from a host device, a first signal over a two-wire bus to an address on the two-wire bus corresponding to...
Air filtration and visual barrier for enclosure with front-to-back airflow
An enclosure has a perforated front door with a replaceable filter, and a perforated rear side allowing air to flow through the enclosure. The enclosure also...
Uplink signal bandwidth characterization from channel state information
Techniques are provided to determine whether or not incident power at a wireless communication device in at least two frequency channels is from the same...
Method and apparatus for hands-free control of a far end camera
One embodiment of the present invention sets forth a method for intuitively controlling a far-end camera via physical movements. The method includes the steps...
System and method for displaying a videoconference
According to one embodiment of the present invention, a method for displaying a videoconference includes receiving a first video feed. The first video feed...
Integrating telephony and voice mail routing
A data processing system comprises call processing logic comprising a voice mail subsystem, or a call management subsystem configured to process voice-over-IP...
Reduction of chaining in conference sessions
Techniques are provided for adding a participant at an end point device to an ongoing conference session. An ongoing conference session is established, where...
Streaming network coding
In one embodiment, a method comprises supplying, by a network node to a peer network node, a randomization seed assigned to the network node for generating a...
System and method for performing signaling on behalf of a stateless client
A system for, and method for, performing state-based signaling on behalf of a stateless client. In one embodiment, the system includes a controller, couplable...
Active load distribution for control plane traffic using a messaging and
Techniques are provided herein for a device in a network to receive information configured to indicate a control plane traffic load level for one or more server...