At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Calculating a fully qualified number
A teleconference server may calculate a fully qualified number (FQN), which specifies a string of numbers that, if dialed by an calling party, will establish a...
Determination of packet loss locations
In one embodiment, a system may determine receiver identifiers to identify affected receivers, where each of affected receivers failed to receive a packet...
Apparatus and method for a generic service locking mechanism for a fibre
channel switching fabric of a storage...
An apparatus and method for a Generic Service locking mechanism that enables a Host to lock the Fibre Channel Switching Fabric of a storage area network while...
Subnet scoped multicast / broadcast packet distribution mechanism over a
In one embodiment, receiving a data packet in a data forwarding domain, encapsulating a header to the received data packet, and routing the encapsulated data...
Method and system for in-band signaling of multiple media streams
Methods and systems are provided for in-band signaling of at least two simultaneous digital media streams in a network, the two simultaneous streams being a...
Optimized flush operation in response to topology changes for spanning
In one embodiment, in response to receiving a topology change notification at a network bridge having ports identified as either a network port or an edge port,...
Methods and apparatus for improved determination of network metrics
A metric measurement mechanism is used to determine network characteristics such as latency and round trip time with more precision than that available from...
Technique for fast activation of a secondary head-end node TE-LSP upon
failure of a primary head-end node TE-LSP
A technique dynamically activates a secondary Traffic Engineering Label Switched Path (TE-LSP) at a secondary head-end node upon failure of a primary TE-LSP in...
Method and system for fast link failover
A method and system for fast link failover is disclosed. According to one embodiment, a method is provided in which a failure of a first link between a network...
Method and apparatus to enable a hybrid synchronous/asynchronous routing
A hybrid routing protocol may be provided. A disruption tolerant mechanism may be provided for analyzing a network, detecting a disruption between nodes of the...
Minimizing fast video update requests in a video conferencing system
In one embodiment, a method includes dropping an initial series of video frames received by a video conferencing system from a first endpoint that has entered a...
Anti-content spoofing (ACS)
A system to prevent content spoofing by detecting phishing attacks is provided. The system checks each webpage visited by a user and determines if the page is...
User sensitive filtering of network application layer resources
In one embodiment, a method includes receiving authorization data at a local node of a network. The authorization data indicates a particular network address of...
Integrated out-of-office assistant reminder tool
In one embodiment, a method includes scanning, by an automated tool, a set of application programs and/or systems associated with a user, the set including one...
Method and apparatus for electronically configuring a secured user desktop
A method of providing endpoint security for a session on an untrusted computer accessing data on a networked server is disclosed. A virtual secure desktop is...
Dynamic chain creation and segmentation of the packet-forwarding plane
A method is disclosed for dynamically creating encapsulation and decapsulation chains and segmenting the packet-forwarding plane. A distributed router may...
Wireless node location mechanism featuring definition of search region to
optimize location computation
A wireless node location mechanism that defines a search region to optimize the computations associated with estimating the location of a given wireless node....
Context adaptive hybrid variable length coding
A coding method for an ordered series of quantized transform coefficients of a block of image data, including a context adaptive position coding process to...
Group key management re-registration method
In an embodiment, a fast group key management re-registration is described. One computer-implemented method comprises, at a key server: receiving a registration...
Method to prevent TTY/TDD probing and unwanted TTY/TDD tone generation on
A method to prevent TTY/TDD (teletypewriter/telecommunications device for the deal) probing and unwanted TTY/TDD tone generation on voice gateways comprises...
Techniques for encapsulating point to point (PPP) over Ethernet frames
Techniques for negotiating Point-to-Point Protocol (PPP) sessions over an Ethernet network include receiving configuration data that indicates a first node is...
Virtual port channel switches with distributed control planes
In one embodiment, an apparatus includes one or more ports for connection to one or more links in communication with a network device, a multi-chassis trunk...
Using PSTN reachability to verify caller ID information in received VoIP
A system for verifying caller ID information in received VoIP calls. In particular implementations, a method includes receiving a caller identification (ID)...
Mobile intelligent roaming using multi-modal access point devices
A system and method are provided in which access point (AP) devices in a wireless local area network (WLAN) are typed or configured into one of three...
Method and system for communicating digital voice data
Methods and systems have been provided for communicating digital voice data. According to various embodiments of the invention, a user interface is provided at...
Link policy routing based on link utilization
A technique dynamically applies a link utilization based policy to traffic traversing links in a computer network. According to the novel technique, a link...
Bi-directional policer for data rate enforcement over half-duplex mediums
A bi-directional policer especially suitable for application in, but not limited to, wireless networks or other shared access or half-duplex communication...
Quality of service in a storage area network
In one embodiment, a solution is provided wherein a minimum and/or maximum bandwidth may be guaranteed for specific flows. These guarantees can be associated to...
Colored access control lists for multicast forwarding using layer 2
In one embodiment, a method includes receiving, by an access node, multicast control parameters for white, black, and grey lists of multicast groups. The access...
Transparent automatic protection switching for a chassis deployment
Methods and apparatus for allowing a traffic level switch associated with an automatic protection switching (APS) topology to occur transparently and without...
Method and system for optimal balance and spatial consistency
A method for assigning video signals includes receiving a plurality of video signals from a plurality of cameras located at one or more remote sites, the...
Synchronous rectifier post regulator
Methods and apparatus for regulating a synchronous rectifier DC-to-DC converter by adjusting one or more existing synchronous rectifiers in the converter are...
Digital video camera with retractable data connector
Secure extended authentication bypass
Methods and apparatus are provided to allow Internet Key Exchange (IKE) phase 1 keying materials to be periodically refreshed in a secure manner without...
Authorizing network access based on completed educational task
In one embodiment, a method comprises authentication a user of a client device by a network access device; selectively sending an education assignment request...
Apparatus and methods for moving cable modems between upstream channels
Disclosed are apparatus and methods for managing upstream channels on a per cable modem basis. In certain embodiments, one or more thresholds are defined for...
Minimizing black video segments during ad insertion
Black video segments in a video playlist may be minimized. Black detection may be utilized by a network device to identify true starting point and a true ending...
Power consumption management in a network device
A method includes buffering an initial amount of data of a data set transmitted from a MAC. When an amount of time for data associated with the data set to fill...
Method for the provision of a network service
Methods and systems provide for sharing information between computer networks in which the information to be shared is required at one location (e.g. for the...
Verifying cryptographic identity during media session initialization
An authentication agent may cryptographically identify a remote endpoint that sent a media initialization message even though intermediate devices may modify...
Method and apparatus for a generic rule based engine to perform action
when an event of interest transpires
A system and method for providing a rule based engine in a routing operating system. The system includes a set of predefined events, a set of predefined...
Detecting overloads in network devices
Systems and methods are provided to allow detection of the load conditions on network devices. The load detection can occur using a mobility management device...
Address security in a routed access network
In one embodiment, providing multi-layer address security incorporating Layer 2 Media Access Control (MAC) addresses and corresponding Layer 3 Internet Protocol...
Enhanced wireless node location using differential signal strength metric
A wireless node location mechanism that employs a differential signal strength metric to reduce the errors caused by variations in wireless node transmit power,...
System and method for routing calls across call managers using a route
A call manager includes a first device process that controls a first telephony device and that receives a call request from the first telephony device. The call...
Camp on location
In one embodiment, a method includes obtaining a request for a notification regarding an event associated with a first party and a first location. The request...
Scalable approach to large scale queuing through dynamic resource
Methods and devices are provided for the efficient allocation and deletion of virtual output queues. According to some implementations, incoming packets are...
Using PSTN reachability to verify VoIP call routing information
A system for verifying VoIP call routing information. In particular implementations, a method includes verifying one or more Voice-over-Internet-Protocol (VoIP)...
Correlating calls after a referral
In one embodiment, a network device attaches a header including an identifier for an original call to an outgoing refer message and may also modify a table...