At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Low-level remote sharing of local devices in a remote access session
across a computer network
In one embodiment, a device is connected to a first computer via a first local communication port of the first computer. If the device is configured to...
Dynamic configuration of access point names in gateways
Methods and apparatus for maintaining access point names (APNs) at a centralized location for distribution to gateway nodes are disclosed. According to one...
Differential quadrature phase-shift keying transmission system with
variable transmission rate
Methods and apparatus for varying the transmission rate of a signal transmitted within a dense wavelength division multiplexing (DWDM) system or network are...
Fibre channel dynamic zoning
Zone information is automatically and dynamically configured and managed in a fiber channel storage area network upon detection of network events. Some examples...
Distributing packets to line cards of a packet switching device based on
bridge indication values received...
A packet switching device maintains mappings of bridge identification values to line cards for each of multiple virtual bridges. When a packet is received that...
Virtual service domains
In one embodiment, layer-2 (L2) ports of a network device may each be assigned to a particular virtual service domain (VSD). One or more virtual service engines...
Restriction of communication in VoIP address discovery system
In one embodiment, a system is provided to restrict VoIP communication. The system may validate a Voice over Internet Protocol (VoIP) call initiation message...
System and method for implementing multiple ring networks using a common
Various systems and methods for implementing virtual ports within ring networks are disclosed. For example, one method involves allocating a logical port that...
Protecting commercials within encoded video content
In one embodiment, a method comprises identifying an identifiable video object from a video picture of a digital video having video content and commercial...
Network mobility over a multi-path virtual private network
Methods and apparatus for applying a single virtual private network (VPN) address to tunnels or connections associated with different access interfaces are...
Layer two encryption for data center interconnectivity
Systems, methods, and other embodiments associated with layer two (L2) encryption for data center interconnectivity are described. One example system includes a...
Streaming network coding
In one embodiment, a method comprises supplying, by a network node to a peer network node, a randomization seed assigned to the network node for generating a...
System and method for multiple address of record registration using a
single implicit SIP request
A method for registering multiple addresses of record comprises receiving a session initiation protocol register request, the session initiation protocol...
Creation of context for communications based on previous interactions
In one embodiment, an identification (ID) of a person involved in a current communication is utilized to access a communication log to determine an active time...
Use of pre-validated paths in a WDM network
Various example embodiments are disclosed. According to an example embodiment, a method may include receiving a resource request for optical resources within a...
Call routing using voice signature and hearing characteristics
In an example embodiment, a system that appropriately routes calls to an agent at a contact center based on the agent's voice and/or hearing characteristics....
Reduced bandwidth off-loading of entropy coding/decoding
Techniques are provided herein to produce encoded video bitstreams and to similarly decode encoded video bitstreams according to a coding standard not supported...
Using black detection to improve video splicing
In one embodiment, a network device analyzes an encoded video stream using black detection before splicing video into the encoded video stream. When black data...
Method and apparatus for self-learning of VPNS from combination of
unidirectional tunnels in MPLS/VPN networks
A technique is provided for implementing deep-packet inspection (DPI) services in a MPLS/VPN configured computer network. The technique employs a novel...
Packet routing and switching device
A method for routing and switching data packets from one or more incoming links to one or more outgoing links of a router. The method comprises receiving a data...
Crossbar apparatus for a forwarding table memory in a router
A router including a lookup execution unit including a plurality of stages, a forwarding table memory arranged in hierarchy including addressable sectors,...
System and method for securing mesh access points in a wireless mesh
network, including rapid roaming
Authentication in a mesh network controlled by a central controller, including using standard IEEE 802.11i mechanisms between a potential child mesh access...
Method for a simple 802.11e HCF implementation
A Hybrid Coordination Function (HCF) implementation wherein an access point's existing (E)DCF transmit queues are augmented by at least one strict priority HCF...
Method for low power radio operation in a wireless packet network
A system and method allows devices to send and receive packets while using power to do so to the extent needed, thereby conserving power.
Synthetic frame loss ratio
An endpoint for determining a frame loss ratio is provided. The endpoint includes a processor and a memory coupled with the processor. The memory stores...
Network-adaptive preemptive repair in real-time video
A network-adaptive error recovery method for real-time video transmission based on sending repair frames preemptively with a frequency that is based on observed...
Cooling arrangement for a rack mounted processing device
To increase air flow, an air intake/outtake (i.e., intake, outtake, or both) is positioned on a front surface of a housing, such as a rack-mounted computer...
Floor control in multi-point conference systems
In one embodiment, a conference with multiple end points is provided. At the locations, multiple screens may be configured to display video from a portion of...
System and method for single action initiation of a video conference
A method is provided for configuring a video conference endpoint. The method comprises receiving session data that comprises endpoint connection data for remote...
Techniques for network protection based on subscriber-aware application
Techniques for responding to intrusions on a packet switched network include receiving user data at a subscriber-aware gateway server between a network access...
Method and system to provide high availability of shared data
A data storage system and method are described. The system may comprise a data repository to store data, and first and second storage controllers. The first and...
Globally synchronized timestamp value counter
The present invention relates to a synchronized timestamp mechanism in a packet processing system. This synchronized timestamp mechanism provides a globally...
Negotiating power between power sourcing equipment and powerable devices
The present invention provides a power negotiation protocol that enables PDs and PSEs to negotiate the amount of inline power that a PD consumes and the...
System and method for communicating confidential messages
A method of recording messages includes recording audio data in a first file structured in accordance with a file format that defines a first portion and a...
Method and apparatus for performing encryption of data at rest at a port
of a network device
Methods and apparatus for performing encryption for data at rest at a port of a network device such as a switch are disclosed. Specifically, when data is...
Secure mobile IPv6 registration
In one embodiment, a method comprises receiving by an agent a request from a network node for generation of a secure IPv6 address for use by the network node,...
Identity brokering in a network element
A network infrastructure element such as a router or switch performs brokering network user identity and credential information. An application or...
Dynamic key management server discovery
Various systems and method are disclosed for automatically disseminating key server contact information in a network. For example, one method (e.g., performed...
System and method for enforcing advertising policies using digital rights
A system and method for policy-based advertising. According to an embodiment, an advertisement server receives a request for advertising content from a user...
Application gateway device
In an embodiment, a data processing system comprises application workflow optimizing logic and which when executed is operable to receive first workflow data...
Tracking policy decisions in a network
An apparatus is disclosed for creating and storing policy data records comprising data identifying network policy decisions. After a data packet is received, a...
Transamplifier, system and method for amplification of optical signals at
Disclosed herein are embodiments of a device, method of use and system for an analog multi-wavelength transamplifier. The transamplifier embodiments described...
Triggering call-handling events
In one embodiment, a method includes identifying a call from a first endpoint to a second endpoint as originating while the second endpoint is connected to a...
Context adaptive position and amplitude coding of coefficients for video
A coding method, apparatus, and medium with software encoded thereon to implement a coding method. The coding method includes encoding the position of...
A packet comparator includes a match packet buffer and a first in first out (FIFO) buffer that stores a reference packet stream. Once a packet in the reference...
Centralized wireless QoS architecture
A QoS mechanism that evaluates congestion in one or more network nodes along the wireless delivery path to optimize the processing priority at the centralized...
Collecting network performance data from multiple autonomous systems
A computer apparatus comprises first Border Gateway Protocol (BGP) logic comprising BGP route table data; a network interface to communicatively couple to a...
Systems and methods for selecting tracking areas and reducing tracking
Some embodiments provide methods for selecting tracking areas in a network, comprising: receiving messages from a plurality of base transceiver stations, the...
Locally unique node port identifiers
In one embodiment, a method includes selecting a locally unique node port identifier at a Fiber Channel over Ethernet (FCoE) node in communication with at least...
System and method for dynamically responding to event-based traffic
A technique dynamically resizes Traffic Engineering (TE) Label Switched Paths (LSPs) at a head-end node of the TE-LSPs in preparation to receive redirected...