At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Linking recognized emotions to non-visual representations
A method of linking recognized emotions to non-visual representations includes receiving at a first location information corresponding to demonstrative...
Route optimization of services provided by one or more service providers
for combined links
A technique performs route optimization of services provided by one or more service providers (SPs) for communication links that are combined in a computer...
Functionality distribution for a mobile endpoint
In an embodiment, a method includes identifying a first component device of a plurality of component devices in a communication network and determining that the...
Unscheduled protocols for switched antenna arrays
In an example embodiment, an apparatus, comprising a first wireless transceiver, a first directional antenna coupled to the first wireless transceiver, a second...
Form factor adapter module
According to one example embodiment, a form factor adapter module may include a small form factor (SFF) host connector, an X2 or XENPAK edge finger connector,...
Methods and apparatus for bootstrapping mobile-foreign and foreign-home
authentication keys in mobile IP
Methods and apparatus for dynamically generating authentication keys are disclosed. Specifically, a Mobile-Foreign authentication key is separately generated by...
Distributed service creation environment for intelligent endpoints
According to one embodiment, a method for creating telephony features for an endpoint includes receiving a plurality of instructions defining a graphical...
The invention is related to decoding of block wise coded video pictures. The determination of using de-blocking filtering between coded blocks is based on...
Maintaining network compatibility
A method for improving network compatibility, the method including but not limited to the following: receiving a first-protocol data-link layer packet having a...
Shaper-scheduling method and system to implement prioritized policing
A scheduling method and system for a multi-level class hierarchy are disclosed. The hierarchy includes a root node linked to at least two groups. One of the...
Virtual port based SPAN
Methods and apparatus for performing SPAN for a virtual port are disclosed. Specifically, a frame is received from a first port. The frame or a copy thereof is...
Method for managing the quality of encrypted voice over IP to teleagents
A voice over Internet protocol (VoIP) system and more particularly, an improved VoIP system serving a distributed group of teleagents. Network parameters that...
Multiple instance spanning tree protocol
A multiple instance spanning tree protocol (MI-STP) creates a plurality of active topologies (i.e., loop-free paths) within a computer network. These active...
Methods for the secured interconnection of VNET sites over WAN
One embodiment provides a method to interconnect virtual network segments (VNETs) defined for a local-area network (LAN) infrastructure separated by a wide-area...
Policy-based resource management
In one embodiment, a network device receives a request from a client in association with a connection, where the request indicates an amount of one or more...
Combining views of a plurality of cameras for a video conferencing
endpoint with a display wall
A telepresence apparatus, a method of operating a telepresence apparatus, and a tangible computer readable storage medium in a telepresence apparatus that is...
Apparatus and method for generating a message based on traffic flow
A method includes determining a first flow characteristic of a flow, the flow comprising at least one targeted user. The method also includes generating for...
Digital video camera with a retractable data connector
System and method for detection and mitigation of network worms
An intrusion detection system for a computer network includes a knowledge database that contains a baseline of normal host behavior, and a correlation engine...
Monitoring traffic to provide enhanced network security
A communication system includes a traffic monitoring element that monitors network traffic between network components. The network traffic monitoring element...
Stateful application firewall
A method and system to protect web applications from malicious attacks is described. A stateful means of distinguishing between valid (e.g., harmless) and...
Method for secure data entry in an application
A method and device for entering data in an application is disclosed. The method may comprise displaying a graphical user interface (GUI) keyboard within the...
Method and apparatus for remote web-based technical support
A system provides task-oriented enhancement of a software application that allows for remote, Web-based, technical support. The system observes user-interactive...
Method and apparatus for assigning IPv6 link state identifiers
In one embodiment, a technique is used by a routing system to generate a link state identifier for a link state advertisement message. The routing system...
Managing network congestion using dynamically advertised congestion status
A method and apparatus are described for managing congestion in a network. For a receiving node, a congestion status associated with a node in the network is...
Highly scalable application layer service appliances
A highly scalable application layer service appliance is described herein. According to one embodiment, a network element includes a plurality of application...
Smart zoning to enforce interoperability matrix in a storage area network
The present invention describes various mechanisms which may be used for improving SAN device interoperability enforcement techniques implemented in SAN or...
Network device provided spam reporting button for instant messaging
In one embodiment, a system can comprise an interface that receives a portion of a messaging communication associated with a client and a tagging component that...
Method and apparatus for providing a virtual service agent that receives
queries, compares questions to a set...
A virtual agent is disclosed. The virtual agent may receive a question from a user, and compare the question against a list of queries contained in a database....
Controlling multi-mode devices
In an example embodiment, a technique for automatically controlling radio interfaces of a multi-mode device. Wireless interfaces are enabled or disabled based...
Performing deep packet inspection for a communication session
Performing deep packet inspection (DPI) includes facilitating a communication session for an access terminal. The access terminal is associated with a home...
System and method for encrypted group network communication with
Various embodiments of the disclosed subject matter provide methods and systems for improved efficiency and security in secure gateway-to-secure gateway network...
System and method for establishing roaming line numbers
A method is provided for establishing a roaming line number in a communication network. The method includes receiving information from a telephony device...
Buffering a media stream
An apparatus and method of buffering a media stream is provided. The method may comprise receiving a plurality of IP packets of the media stream, each packet...
Dynamically allocating channel bandwidth between interfaces
In one example, a bandwidth allocation device allocates physical channel bandwidth between local interfaces. Thereafter, at a polling time, the bandwidth...
Fibre channel over ethernet
The present invention provides methods and devices for implementing a Low Latency Ethernet ("LLE") solution, also referred to herein as a Data Center Ethernet...
Timing system for modular cable modem termination system
A modular Cable Modem Termination System (CMTS) includes a packet shelf operating a Data Over Cable Service Interface Specifications (DOCSIS) Media Access...
System and methods for identifying network path performance
A pseudowire verification framework gathers and maintains status of individual pseudowires by aggregating the state of the individual node hops defining the...
Point-controlled contention arbitration in multiple access wireless LANs
A power management method that divorces multicast frames for power save stations from DTIM beacons. An access point associates power save stations with a...
Seamless tree creation and movement
In an example embodiment, a beacon is sent on all available interfaces of a device comprising data indicating the operating parameters of all interfaces of the...
Initial timing estimation in a wireless network receiver
An apparatus for and a method of wirelessly receiving a signal, and detecting a start of packet (SOP) from the received signal using at least one SOP detection...
Digital video camera with a retractable data connector
Protection against reflection distributed denial of service attacks
A method includes monitoring outgoing request packets transmitted by a node in a protected network over a link connecting the protected network to an external...
Method and system for verifying identification of an electronic mail
A method and system for verifying identification of an electronic mail message. An electronic mail message including a signature and a key is received, the...
Conditional data delivery to remote devices
In one embodiment a method comprises enrolling a mobile device in a local area network by setting a variable to a mobile device identifier and authenticating...
Establishing secure communication sessions in a communication network
In one embodiment, a method for establishing a session between a first party and a second party in a communication network comprises issuing a request to...
Scalable resources in a virtualized load balancer
In one embodiment, a load balancing system may include a first physical device that provides a resource. The first physical device may have a first virtual...
Role aware network security enforcement
Generating a binding between a source address and one or more roles of a user accessing the network and distributing the binding to a filter node. The source...
Self-restarting network devices
A method and apparatus for self-monitoring to identify an occurrence of a threshold and rebooting in response to the occurrence of the threshold is provided. In...