At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Apparatus and methods for controlling a data tapping session in a storage
Disclosed is a session modification mechanism for altering a data tapping process in a storage area network (SAN). In general, a data tapping mechanism is set...
Network device proximity data import based on weighting factor
Systems, methods, and other embodiments associated with importing proximity data are provided. Device identification information and device location information...
Controlling multi-mode devices
In an example embodiment, a technique for automatically controlling radio interfaces of a multi-mode device. Wireless interfaces are enabled or disabled based...
Real-time location information from mobile devices including embedding
location information in media packet payload
One embodiment includes a method in a mobile device, including accepting real-time location information on the location of the mobile device, and ascertaining...
Hybrid QoS access method for power save stations
A hybrid QoS access method for a wireless station, such as a power-save VoIP station, where a first method, such as "reverse polling" is used on a lightly...
Access technology independent identifier generation
A network system for communicating with mobile nodes has multiple gateways that can operate with each using a different access technology. In an IPv6 system,...
Split/smart channel allocated WDM-PON architecture
Various example embodiments are disclosed. According to an example embodiment, a dual split passive optical network (PON) may be provided that includes an...
Controlling echo during double-talk in a voice conference
An echo canceller apparatus comprises a receive side attenuator coupled in a receive side signal path that is configured to couple from a conference call bridge...
Log-likelihood ratio algorithm for use in reducing co-channel interference
in wireless communication systems
In one embodiment, an apparatus includes a receiver configured to receive a transmission from a wireless communication device, the transmission associated with...
System and apparatus for rogue VoIP phone detection and managing VoIP
A method and a system track network access information for authorized network devices. The access information facilitates tracking movement of the device...
Fibre channel over ethernet
A Data Center Ethernet ("DCE") network and related methods and device are provided. A DCE network simplifies the connectivity of data centers and provides a...
Interior gateway protocol summarization preserving internet protocol
In one example embodiment, a system and method is illustrated that includes receiving connectivity data for at least one network device, the connectivity data...
Constructing a transition route in a data communication network
A method is described of constructing a transition route in a data communication network having as components nodes and links. Upon receipt of a transition...
Adaptive policers responsive to utilization levels of a resource
Policers receive packets of flows of packet traffic, which are to be communicated to monitored resource. The utilization levels of the monitored resource are...
Register clustering in a SIP-based network
In one embodiment, a method can include: receiving a request for service in a first edge proxy; applying a hash function to a source address of an endpoint; and...
Detection of multiple powered devices connected to an inline power
Power sourcing equipment in a power over Ethernet (POE) system detects the connection of multiple powered devices to an inline power delivery channel to enable...
Embedded image quality stamps
In an image generation and rendering system, a quality stamp indicative of image fidelity is embedded in image data units resulting from image data...
System and method for the playing of key phrases in voice mail messages
A method is provided for playing one or more key portions of a voice communication. The method includes storing, in a memory, a communication that includes one...
Voice gateway failure decoder
An apparatus including an operation manager for an Internet Protocol (IP) telephony system. The operation manager is configured to identify a gateway which is...
Access class based picocell policy enforcement
Methods and systems for providing access class based picocell policy enforcement includes determining whether user equipment registered with a radio access...
Protocol independent multicast in a point-to-multipoint network
In one example embodiment, a method of using protocol independent multicast (PIM) in a point-to-multipoint (P2MP) label switched path is provided. In this...
Using an IP registration to automate SIP registration
In one embodiment, a network device receives an Internet protocol (IP) registration request, such as a mobile IP registration request, from an access terminal....
System and method for controlling and tracking network content flow
Systems and methods for controlling the flow of information content in a network are described. The system includes a tracking module that remembers a...
Linecard to chassis securing
A holder secures a linecard to a chassis. The holder acts as a releasable expansion bolt. To alleviate tolerance requirements for the linecard and/or chassis,...
Portable video conference camera
An image capturing device includes a main body which has a tab that extends therefrom. The main body houses a video capturing unit, and a communication unit...
Router interface card
System and method for defending against denial of service attacks on
virtual talk groups
In one embodiment, a method includes establishing a first virtual talk group (VTG) that includes a plurality of endpoints and has a first multicast address. The...
Allowing differential processing of encrypted tunnels
In one embodiment, a method can include: (i) receiving an outbound packet in a network device, where the outbound packet includes a packet header; (ii)...
Dynamically creating trick files to hide latency in streaming networks
A system and process are provided to reduce the latency associated with delivery of data for trick functions (e.g., fast-forward or rewind) in data distribution...
Processor reliability improvement using automatic hardware disablement
Techniques are provided herein to dynamically disable a hardware component in a processor device. Notifications for single-bit errors detected in a hardware...
Multicast-routing-protocol-independent realization of IP multicast
Improved systems and methods for implementing data-driven protocols are provided. In one embodiment, improved implementations of multicast routing protocols are...
Remote computer system management through an FTP internet connection
A method for remote computer systems management through an FTP Internet connection. A user operating on a remote client issues requests to the host server....
Arrangement for a distributed file system having data objects mapped
independent of any data object attribute
Each data file of a distributed file system is identified by a corresponding globally-unique object identifier that is independent of any attribute of the data...
Use of copyright text in key derivation function
Consistent with embodiments of the present invention, systems and methods are disclosed for deriving a secure key. In some embodiments, a method for deriving a...
Routing operations using sensor data
In one embodiment, a method comprises an Internet Protocol (IP) router receiving sensor data from at least one of a second IP router or an attached host sensor...
System and method for providing support for multipoint L2VPN services in
devices without local bridging
A network device has a network interface to allow the device to send and receive traffic across a network. The device also has a cable connection to allow the...
Apparatus for hardware-software classification of data packet flows
An apparatus for routing data packets includes a network interface, a memory, a general purpose processor and a flow classifier. The memory stores a flow...
Using PSTN reachability in anonymous verification of VoIP call routing
In one embodiment, an apparatus may verify an identity of a destination Voice-over-Internet-Protocol (VoIP) call agent for a destination telephone number based...
Integration of VoIP address discovery with PBXs
A system for verifying VoIP call routing information. The system may include an apparatus integrated with a private branch exchange (PBX). The apparatus may...
Separation of validation services in VoIP address discovery system
In one embodiment, an apparatus may receive at least one call attribute of a public switched telephone network (PSTN) call initiated to a destination telephone...
Avoiding high-speed network partitions in favor of low-speed links
In one embodiment, each network interface of a network device in a computer network may be classified as either a low-speed interface (e.g., wireless) or a...
Hierarchical flooding among peering overlay networks
In a tiered system of networks capable of processing distributed hash table (DHT) Put and Get messages, if a sending network of a Put or Get is at a tier below...
QoS-aware service flow mapping in mobile wireless all IP networks
In one embodiment, techniques provide QoS-aware service flow mapping in an access network. A message is received from an access device at a gateway in the...
Dynamic shared risk node group (SRNG) membership discovery
A technique is provided for dynamically discovering shared risk node group (SRNG) memberships of a plurality of interconnected edge devices in a computer...
System, method and computer program for providing scalability in two or
more streaming and/or archiving systems...
The present invention is a method and system for clustering two or more video conferencing recording/streaming devices, making the cluster of two or more...
Tripod for a camera
Tripod for a camera
Protection of computer resources
In one embodiment, local software code present in a computer system enables real-time detection of whether the computer system is properly protected against...
System and method for providing media server redundancy in a network
A method is provided in one example embodiment and includes evaluating a first plurality of messages from a media server configured to receive a media stream....
Logical partitioning of a physical device
In one embodiment, an indication of a fault condition is received relating to a first service running on a physical device in a computer network. The first...