At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
System and method for adaptively sharpening digital images
Embodiments of the invention provide a technique to sharpen luminance data associated with each pixel of a digital image without introducing certain sharpening...
Method, system, and computer readable medium for face detection
A method, system, and computer readable medium for detecting a face in a video stream including receiving a sequence of input color images; and for each input...
Toroid microphone apparatus
A video teleconferencing directional microphone includes two microphone elements arranged coincidentally on a vertical axis. The two microphone elements are...
Enhancing comprehension of phone conversation while in a noisy environment
In one embodiment, one or more users may be participating in a conversation. In one example, a first user may be speaking into a speaker end device and a second...
Facilitating fast channel changes through promotion of pictures
In one embodiment, a method that includes receiving plural representations of a single video signal, wherein each includes a respective sequence of latticed...
Processing of a video program having plural processed representations of a
single video signal for...
In one embodiment, a method that includes receiving a single video stream, wherein the video stream includes plural processed representations of a video signal,...
Method and system for improving color sharpness in video and images
A method in a decoding process for determining full-resolution chroma pixel information (Cx) corresponding to a spatial fraction of a still-image or a...
Multiple channels and flow control over a 10 Gigabit/second interface
A transmitter transmits a data frame as an uninterrupted stream of codeblocks of predefined size on a first 10 Gigabit/second data path between a MAC and PHY....
Scatter and gather scheme for aggregating multiple high speed
A mechanism for combining plurality of point-to-point data channels to provide a high-bandwidth data channel having an aggregated bandwidth equivalent to the...
Time-based authorization of internet protocol (IP) multicast subscription
A switching device (e.g., router, bridge) provides time-based authorization of multicast services. When a message is received to request the delivery of a...
Triple-tier anycast addressing
In one embodiment, a solution is provided wherein redundant routers are treated as a single emulated switch. When a packet is received at a layer 2 edge switch...
Transparent network service enhancement
Embodiments of the disclosure may be used to optimize communications between a first routing device and a second routing device. The first routing device may...
Attribute driven mobile service control logic
The disclosed embodiments enable service policies to be provisioned for a Mobile Node dynamically. A network device receives a message including at least one of...
Methods and apparatus for securing proxy mobile IP
Various security mechanisms may be used independently, or in combination with one another, to authenticate the identity of a node during the Mobile IP...
Automatic clustering of wireless network nodes toward selected mesh access
In one embodiment, a method comprises detecting by a mesh access point a number of wireless network nodes that are attached to the mesh access point within a...
Dynamic picture layout for video conferencing based on properties derived
from received conferencing signals
A method and apparatus for conferencing dynamically determines composite image layout based on properties of received conferencing signals that include video...
Method of routing multicast traffic
A method of routing multicast traffic in a computer network is disclosed. The method comprises associating a plurality of multicast group addresses on a network...
Dynamic reroute of network traffic
In an example embodiment, a method is provided that receives a broadcast of available bandwidth from a first routing device. A congestion of traffic is detected...
Differentiated services for unicast and multicast frames in layer 2
In one embodiment, a method includes receiving information on layer 2 topologies at a network device in a core network, mapping one or more Virtual Local Area...
Wiring closet redundancy
Systems and method for providing redundancy of communications and/or inline power to a powered Ethernet device are disclosed. A redundancy device is configured...
System and method for charging rechargeable batteries in a digital camera
One embodiment of the present invention sets forth a digital camera configured to be powered by rechargeable nickel-metal hydride (NiMH) batteries. The digital...
Video fingerprint systems and methods
A method that provides identification information for a portion of a video stream includes receiving a video stream, wherein the video stream includes one or...
Providing perspective-dependent views to video conference participants
During a video conference between a local endpoint and a remote endpoint, a display at the local endpoint may be configured to provide perspective-dependent...
Digital video camera
Digital video camera
Digital video camera with a connector
Digital video camera with a connector
Methods and apparatus providing computer and network security utilizing
probabilistic policy reposturing
A system defines at least one key event to be monitored by at least one agent, and creates a graphical model for the at least one key event. The system observes...
Application of an embedded instrumentation interface definition language
In one example embodiment, a system and method are illustrated that includes defining an interface that is independent of a management interface associated with...
Techniques for binding scalable vector graphics to associated information
Techniques for providing information about an object through a graphical interface include providing in a document scalable vector graphics (SVG) statements...
Adaptive memory scrub rate
In one embodiment an example apparatus includes a memory with an error detection system (EDS) that detects an error event in the memory. The error event...
Early authentication in cable modem initialization
A system that eliminates some of the security vulnerabilities in the prior art systems by using a new sequence of steps to perform initialization of the cable...
Multicast and synchronization emulation for content transformed streams
Embodiments of the present disclosure emulate multicast by generating and synchronizing multiple unicasts of a single content in different encoding formats to...
Method and system to generate execution-based scheduling signature for an
A method and system to profile applications are provided. The system may include a capture module to capture resources consumption data for an application and a...
Metric-based monitoring and control of a limited resource
Detecting unauthorized or excessive use of a resource is disclosed. The value of a metric is updated based at least in part on a first data associated with a...
Network bookmarking based on network traffic
A system comprises a packet data processing element; first network resource tracking logic operable to perform monitoring data packets as the packets pass...
Efficient transmission of changing images using image caching
In one embodiment, a display of a source device is shared with one or more viewer devices, e.g., of an online collaborative computing session, and the display...
Speaker activation for mobile communication device
In one embodiment, an apparatus includes a mobile communication device configured for operation in a first operating mode wherein a speaker function is off and...
Service monitoring and disconnection notification in a wireless gateway
A gateway apparatus configured to wirelessly communicate with and provide a service to a wireless client device includes a wireless access point module, a...
Intrusion prevention system for wireless networks
In one embodiment, a method includes receiving security context information relevant to a connection between a wireless network infrastructure component and a...
Combined beamforming and nulling to combat co-channel interference
Techniques are provided to improve receive beamforming at a wireless communication device that receives energy in a frequency band at M plurality of antennas,...
Supervisor intercept for teleagent voice over internet protocol
A system for transferring a call from one teleagent to another in response to a loss of voice quality in a voice over Internet protocol (VoIP) communication...
System and method for providing a recovery mode in a session initiation
protocol (SIP) environment
A method to be executed in a session initiation protocol (SIP) environment is provided that includes detecting, by a first agent, a potential lost connection...
Implementing priority based dynamic bandwidth adjustments
A method that includes receiving a reservation request from a first endpoint that comprises a bandwidth list identifying a plurality of bandwidth levels...
User isolation between network devices
In one embodiment, a network device may have its network interfaces identified as either network-to-network interfaces (NNIs) configured to communicate with...
Fast border gateway protocol synchronization
A checkpointing approach enables BGP peers to reduce the number of UPDATE messages that are exchanged and processed after a router restarts. A router receives...
Technique for providing constant bit rate (CBR) service over a
time-slotted access channel
According to specific embodiments of the invention, a technique is described for providing constant bit rate (CBR) service over shared access channels in a...
Maintaining network availability for wireless clients in a wireless local
In an example embodiment, there is described herein a technique that provides network availability to wireless clients (e.g., wireless clients running mission...
Tracing connection paths through transparent proxies
In one embodiment, a method for tracing a connection path from a source node to a destination node through a network having one or more transparent proxies...
Operations administration management for path computation element chains
In one embodiment, an interested node (e.g., a path computation client or "PCC", network management node, etc.) may send a path computation element (PCE)...