At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Transparent proxy of encrypted sessions
In one embodiment, a server and a client are configured to trust a certificate of an intermediate proxy device. The proxy device may then intercept a...
Virtualization of scalable role-based command line interface views
Providing for virtualization of a role-based command line interface (CLI) view that enables highly scalable association of such a view with an inter-networking...
System and method for executing a seamless handoff in a network
A method for providing a handoff in a network environment is provided that includes a mobile station operable to conduct a call. The mobile station is further...
Providing location based services for mobile devices
Systems and methods are provided that allow the delivery of location based services within a communication network. The location information can be retrieved...
System for retaining optical devices
A system for organizing and retaining optical devices and fiber optic cable includes a housing, at least one module, and a tray coupled to the housing and...
Call management using call routing engine
A telephone call management system first receives a call over a telephone network from a calling device. The calling device is connected to a first called...
Channel variation detection of wireless channel for adaptive transmission
A first wireless communication device recovers data from a transmission received over a wireless channel from a second wireless communication device and...
Method and system for processing traffic in an access network
A method and system for processing traffic in an access network includes receiving a plurality of ingress traffic streams from customer premise equipment (CPE)....
Comprehensive model for VPLS
A VPLS model is implemented in a network-facing provider edge (n-PE) device configured to receive a packet from an access network; the packet having a first...
Wireless hand-over in mobile deployments
The network communication system includes a wireless interface to exchange wireless signals during at least one network connection, and a handover controller...
Distributed data center access switch
In one embodiment, an apparatus includes a processor configured for operation in a control plane in a distributed virtual switch in communication with a...
System and method for enhanced teleconferencing security
A method and system with means for preventing unauthorized monitoring of a local conference room in which a local conferencing system is located comprising...
Inventory devices and methods
In one implementation, a method includes reading first component data from a first tag associated with a first component of a device. The device may be powered...
Methods and systems for correlating rules with corresponding event log
Methods and systems for associating an event log entry with the rule that triggered its creation are described. In one embodiment, an apparatus is described....
Virtual server recirculation
In one embodiment, a method can include: (i) classifying a packet in a server load balancer (SLB) for determining if the packet is destined for a virtual...
Methods and apparatuses for dynamically searching for electronic mail
In one embodiment, an original search input entered is detected. A plurality of stored terms in a record are detected. The original search input is modified to...
Encryption and utilization of hard drive content
Examples of a system, method, and apparatus for encrypting and recording content are presented. When content is recorded to storage media, the content is...
Calculating a fully qualified number
A teleconference server may calculate a fully qualified number (FQN), which specifies a string of numbers that, if dialed by an calling party, will establish a...
Determination of packet loss locations
In one embodiment, a system may determine receiver identifiers to identify affected receivers, where each of affected receivers failed to receive a packet...
Apparatus and method for a generic service locking mechanism for a fibre
channel switching fabric of a storage...
An apparatus and method for a Generic Service locking mechanism that enables a Host to lock the Fibre Channel Switching Fabric of a storage area network while...
Subnet scoped multicast / broadcast packet distribution mechanism over a
In one embodiment, receiving a data packet in a data forwarding domain, encapsulating a header to the received data packet, and routing the encapsulated data...
Method and system for in-band signaling of multiple media streams
Methods and systems are provided for in-band signaling of at least two simultaneous digital media streams in a network, the two simultaneous streams being a...
Optimized flush operation in response to topology changes for spanning
In one embodiment, in response to receiving a topology change notification at a network bridge having ports identified as either a network port or an edge port,...
Methods and apparatus for improved determination of network metrics
A metric measurement mechanism is used to determine network characteristics such as latency and round trip time with more precision than that available from...
Technique for fast activation of a secondary head-end node TE-LSP upon
failure of a primary head-end node TE-LSP
A technique dynamically activates a secondary Traffic Engineering Label Switched Path (TE-LSP) at a secondary head-end node upon failure of a primary TE-LSP in...
Method and system for fast link failover
A method and system for fast link failover is disclosed. According to one embodiment, a method is provided in which a failure of a first link between a network...
Method and apparatus to enable a hybrid synchronous/asynchronous routing
A hybrid routing protocol may be provided. A disruption tolerant mechanism may be provided for analyzing a network, detecting a disruption between nodes of the...
Minimizing fast video update requests in a video conferencing system
In one embodiment, a method includes dropping an initial series of video frames received by a video conferencing system from a first endpoint that has entered a...
Anti-content spoofing (ACS)
A system to prevent content spoofing by detecting phishing attacks is provided. The system checks each webpage visited by a user and determines if the page is...
User sensitive filtering of network application layer resources
In one embodiment, a method includes receiving authorization data at a local node of a network. The authorization data indicates a particular network address of...
Integrated out-of-office assistant reminder tool
In one embodiment, a method includes scanning, by an automated tool, a set of application programs and/or systems associated with a user, the set including one...
Method and apparatus for electronically configuring a secured user desktop
A method of providing endpoint security for a session on an untrusted computer accessing data on a networked server is disclosed. A virtual secure desktop is...
Dynamic chain creation and segmentation of the packet-forwarding plane
A method is disclosed for dynamically creating encapsulation and decapsulation chains and segmenting the packet-forwarding plane. A distributed router may...
Wireless node location mechanism featuring definition of search region to
optimize location computation
A wireless node location mechanism that defines a search region to optimize the computations associated with estimating the location of a given wireless node....
Context adaptive hybrid variable length coding
A coding method for an ordered series of quantized transform coefficients of a block of image data, including a context adaptive position coding process to...
Group key management re-registration method
In an embodiment, a fast group key management re-registration is described. One computer-implemented method comprises, at a key server: receiving a registration...
Method to prevent TTY/TDD probing and unwanted TTY/TDD tone generation on
A method to prevent TTY/TDD (teletypewriter/telecommunications device for the deal) probing and unwanted TTY/TDD tone generation on voice gateways comprises...
Techniques for encapsulating point to point (PPP) over Ethernet frames
Techniques for negotiating Point-to-Point Protocol (PPP) sessions over an Ethernet network include receiving configuration data that indicates a first node is...
Virtual port channel switches with distributed control planes
In one embodiment, an apparatus includes one or more ports for connection to one or more links in communication with a network device, a multi-chassis trunk...
Using PSTN reachability to verify caller ID information in received VoIP
A system for verifying caller ID information in received VoIP calls. In particular implementations, a method includes receiving a caller identification (ID)...
Mobile intelligent roaming using multi-modal access point devices
A system and method are provided in which access point (AP) devices in a wireless local area network (WLAN) are typed or configured into one of three...
Method and system for communicating digital voice data
Methods and systems have been provided for communicating digital voice data. According to various embodiments of the invention, a user interface is provided at...
Link policy routing based on link utilization
A technique dynamically applies a link utilization based policy to traffic traversing links in a computer network. According to the novel technique, a link...
Bi-directional policer for data rate enforcement over half-duplex mediums
A bi-directional policer especially suitable for application in, but not limited to, wireless networks or other shared access or half-duplex communication...
Quality of service in a storage area network
In one embodiment, a solution is provided wherein a minimum and/or maximum bandwidth may be guaranteed for specific flows. These guarantees can be associated to...
Colored access control lists for multicast forwarding using layer 2
In one embodiment, a method includes receiving, by an access node, multicast control parameters for white, black, and grey lists of multicast groups. The access...
Transparent automatic protection switching for a chassis deployment
Methods and apparatus for allowing a traffic level switch associated with an automatic protection switching (APS) topology to occur transparently and without...
Method and system for optimal balance and spatial consistency
A method for assigning video signals includes receiving a plurality of video signals from a plurality of cameras located at one or more remote sites, the...
Synchronous rectifier post regulator
Methods and apparatus for regulating a synchronous rectifier DC-to-DC converter by adjusting one or more existing synchronous rectifiers in the converter are...