At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Remote control unit
Remote control for video management
Method of reducing solder wicking on a substrate
This invention relates to a substrate with via and pad structure(s) to reduce solder wicking. Each via and pad structure connects a component to conductive...
Interleaving low transmission power and medium transmission power channels
in computer networks
In a multiple interface, low power and lossy network comprising a plurality of nodes, a low transmission power and medium transmission power topology are...
System and method for collaboration revelation and participant stacking in
a network environment
A method is provided in one example embodiment and includes receiving video data associated with a meeting in a video conferencing environment; and displaying a...
Scalable system and method for DSL subscriber traffic over an Ethernet
A system and method for identifying and forwarding traffic to/from Digital Subscriber Line Access Multiplexer (DSLAM) devices and feature servers without...
Intelligent overload control for contact center
Particular embodiments provide intelligent overload control for contact centers. In one embodiment, an overload condition at a contact center is determined....
Handling incoming video calls with hunt list
In an example embodiment, when an incoming video call associated with a hunt list is received, the call is first routed to recipients in the hunt list who are...
Quality of service based on logical port identifier for broadband
A provider edge (PE) device provides subscribers with access to an Internet Service Provider (ISP) network. The subscribers are connected to the PE device via a...
Throttling and limiting the scope of neighbor solicitation (NS) traffic
In one embodiment, a switch in a computer network may receive a neighbor solicitation (NS) message for a target node for which no neighbor authentication (NA)...
Method and apparatus for detecting malicious software through contextual
convictions, generic signatures and...
Novel methods, components, and systems that enhance traditional techniques for detecting malicious software are presented. More specifically, methods,...
System and method for implementing a session initiation protocol feature
A method for implementing a SIP feature includes, in particular embodiments, establishing a communication session via a communications platform between a first...
System and method for non-disruptive management of servers in a network
An example method includes disengaging a target node from a cluster, where the disengaging comprises: selecting an inheritor; migrating flows from the target...
Maximizing bottleneck link utilization under constraint of minimizing
queuing delay for targeted...
In one embodiment, a system and method include determining bandwidth of a link that connects a local modem to a remote router. A first percentage of the...
Stitching multicast trees
Techniques for stitching multicast trees in a multiple data center environment. According to one embodiment, a technique for stitching multicast trees is...
Generating a loop-free routing topology using routing arcs
In one embodiment, a method comprises creating, in a computing network, a loop-free routing topology comprising a plurality of routing arcs for reaching a...
Method and apparatus for preventing loops in a network by controlling
Methods and apparatus for eliminating loops associated with interconnects between clusters are disclosed. According to one aspect of the present invention, a...
System and method for optimizing maintenance of geographically distributed
A system and method are provided for optimizing maintenance of a geographically distributed data processing system. The method comprises selecting a primary...
Using Ethernet ring protection switching with computer networks
In one embodiment, a first routing device establishes a virtual channel with a remote routing device in a G.8032 protocol Ethernet network ring. The first...
Authentication of cache DNS server responses
A response to a Domain Name System (DNS) query can be protected with authentication information to be used by a host that originated the query. In one example,...
Power save mode for lightpaths
A method for communicating optically between nodes of an optical network, including forming, between a first node and a second node of the network, a set of...
Adaptive control of power grid operations based on energy profiles
In one embodiment, an energy manager determines respective energy profiles of one or more local end-devices for which the energy manager is responsible. Through...
Real time strain sensing solution
Strain sensing may be provided. First, a strain threshold for a circuit board may be determined. Then a strain capacitor may be selected that will fail when the...
Two-dimensional barcode system
An end-user device, including a processor to prepare barcode-input data including (a) at least one of an identification of a user of the end-user device, and an...
Echo mitigation in a conference call
In an example embodiment, an example method is provided for echo mitigation in a conference call. In this method, a test audio signal is transmitted to a...
Method for cloud-based access control policy management
A Web-based management server includes an ACP manager to manage access control rules (ACRs) and access control policies (ACPs). The ACRs and ACPs are configured...
Mitigating threats in a network
Mitigating threats in a network includes receiving a message at a network device. The message includes device-independent parameters generated in response to a...
Virtual internet protocol migration and load balancing
A system for virtual internet protocol (VIP) address migration. The system comprises serving one or more clients connected via a switch router over a network to...
System and method for multipoint label distribution protocol node
protection using a targeted session in a...
A method is provided in one example and includes receiving first address information from a protected node over a first label switched path having a first...
System and method for distributed netflow exporter with a single IP
endpoint in a network environment
An example method for a distributed NetFlow exporter with a single IP endpoint in a network environment is provided and includes configuring a network protocol...
Method to transport bidir PIM over a multiprotocol label switched network
A method, system and an apparatus to transport bidir PIM over a multiprotocol label switched network are provided. The method may comprise receiving a multicast...
Assisted traffic engineering for minimalistic connected object networks
In one embodiment, a distributed intelligence agent (DIA), hosted on a border router that provides access for a computer network to a global computer network,...
Detection of cabling error in communication network
In one embodiment, a method at a network device includes receiving a link layer advertisement, comparing information in the link layer advertisement with...
Port chunk allocation in network address translation
A system and method for providing network and port address translation is provided. A global IP address and a block (chunk) of ports are allocated for each...
Verifying availability and reachability through a network device
In an embodiment, in response to receiving from a client computer a client request to connect to a server: processing the client request in a network protection...
Retransmission-based stream repair and stream join
The Real-time Transport Protocol (RTP) and its related standards define a retransmission packet format and a way to give feedback via Negative ACKnowledge...
System and method for providing resource sharing, synchronizing, media
coordination, transcoding, and traffic...
A method in one embodiment includes maintaining a list of authorized devices; creating an association between a wireless device being operated by an end user...
System and method for communicating with an applet using an inline web
frame in a network environment
A method in an example embodiment includes modules for identifying an applet for a local network and providing instructions in a parent container file to enable...
Signaling co-routed and non co-routed LSPs of a bidirectional packet TE
Particular embodiments may enable setup and signaling of co-routed and non co-routed label switched paths (LSPs) of a bidirectional packet traffic engineering...
Securing virtual lane physical layers
A data stream with a given data rate is distributed into a plurality of virtual lanes or streams, each with a lower data rate than the data stream. Virtual...
Self-tuning an optical network at an operating point
Techniques are presented for automatic tuning of operating parameters, e.g., amplifier gain, in an optical network. A section of an optical network comprises a...
System and method for verifying parameters in an audiovisual environment
A method is provided in one example embodiment and includes communicating a code to initiate cycling through a plurality of potential audiovisual inputs. The...
Preventing unauthorized data extraction
An electronic device (22, 48, 50) includes an array (26) of memory cells, which are configured to store data values. One or more sense amplifiers (40) have...
Packet forwarding optimization with virtual machine mobility by comparing
device identifiers to determine VM...
In one embodiment, a method includes tracking at a network device in communication with a plurality of virtual machines, virtual machine movement based on a...
Method and apparatus to control routing convergence during node reboot by
entering a freeze state that inhibits...
In one embodiment, a technique may enable control of routing convergence in a computer network during reboot of a node of a routing topology represented by a...
System and method for reducing power used for radio transmission and
A system and method allows devices to send and receive packets while using power to do so in a manner that responds to events, such as receipt or other...
Mobile personal video recorder
A method of digital television recording including receiving a content item at a first Personal Video Recorder (PVR), determining whether to transfer the...
Scalable replay counters for network security
In one embodiment, an authenticator in a communication network maintains a persistent authenticator epoch value that increments each time the authenticator...
Messaging security device
In one embodiment, a system can comprise an interface that receives data related to a communication session and a messaging security device component that...
Restricting network access while connected to an untrusted network
In an example embodiment, disclosed herein is an apparatus comprising an interface configured to communicate with at least one external device, and processing...