At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
System and method for establishing a communication session between two
endpoints that do not both support...
A method for establishing a communication session between two endpoints that do not both support secure media includes receiving a registration from a first...
Methods and apparatus for achieving route optimization between mobile
networks and a correspondent node using a...
Methods and apparatus for establishing an optimized route between a node and a Correspondent Node are disclosed. In a Mobile Router supporting Mobile IP, the...
Cooperative flow locks distributed among multiple components
Disclosed are, inter alia, methods, apparatus, computer-storage media, mechanisms, and means associated with cooperative flow locks distributed among multiple...
Pre-processing of video data
A method including: obtaining, with the video processing apparatus, video frames, the video frames including macroblocks; comparing, with a video processing...
Digital signal processor clustering in integrated media-services gateways
A Digital Signal Processor (DSP) cloud architecture for clustering DSP resources across multiple integrated media-services gateways. The control plane...
Method and system for mobile trajectory based services
In accordance with one embodiment of the present disclosure, a method for mobility profiling includes collecting a plurality of locations of a mobile electronic...
Wireless network self-adaptive load balancer
A load balancer is provided for balancing distribution of wireless clients among wireless access points. The load balancer includes a tracking implementation...
Breakpoint determining for hybrid variable length coding using
relationship to neighboring blocks
A method, and apparatus, and logic encoded in one or more computer-readable tangible medium to carry out a method. The method is to code an ordered sequence of...
Neighbor discovery in cable networks
A network device has a communications link to allow the device to communicate with customer devices and a processor. The processor is to receive neighbor...
Generic provisioning of voice over internet protocol (VoIP)
In accordance with an embodiment of the invention, a provisioning method for establishing a telecommunications service including the operations of sending a...
Framework for managing network data processing elements
In one embodiment an apparatus comprises a transceiver in data communication with an associated network and control logic coupled to the transceiver. The...
Reducing flooding in a bridged network
Disclosed are, inter alia, methods, apparatus, computer-storage media, mechanisms, and means associated with loss of reducing flooding in a bridged network,...
CMTS upstream channel bandwidth scheduler
In one embodiment, a Cable Modem Termination System (CMTS) generates a bandwidth grant message corresponding to a time segment. The CMTS identifies a portion of...
Method and apparatus for providing network redundancy
According to one embodiment, providing network redundancy includes configuring a session registrant database to have one or more virtual standby states. Each...
Open-loop beamforming MIMO communications in frequency division duplex
Techniques are provided for wireless communication between a first wireless communication device and a second wireless communication device. At a plurality of...
Digital video camera with built-in connector and lens
Dual cryptographic keying
A dual cryptographic keying system. In particular implementations, a method includes responsive to an initial session key negotiation, storing security...
Technique for selecting a path computation element
A technique efficiently selects a Path Computation Element (PCE) to compute a path between nodes of a computer network. The PCE selection technique is...
Method and system for the automatic reroute of data over a local area
A method and system for rerouting data over a local area network is provided. The method comprises defining at least one port group associated with a bridging...
Method and apparatus for registering a mobile object on a foreign network
A method and apparatus for registering a mobile object on a foreign network includes a first virtual machine at a first router on a foreign network executing a...
Fibre channel intelligent target management system
In one embodiment, a network device receives a port login directed to a target from a first host. The network device determines whether at least one other host...
Selectively joining clients to meeting servers
In an embodiment, a hosted-on-premises meeting exchange server operates seamlessly with web meeting servers. For example, one computer-implemented method...
Variable length coding for clustered transform coefficients in video
Coding quantized transform coefficients as occur in image compression combines a position identifying method to identify the relative position of clusters of...
Retrieval and transfer of encrypted hard drive content from DVR set-top
boxes to a content transcription device
A system and method for the retrieval and transfer of encrypted content from a failed set-top box by a content transcription device. When content is recorded to...
Partially reversible key obfuscation
Techniques are provided to obfuscate seed values to produce a decryption key for a simplified content protection scheme. A first repeatable sequence is...
Enhanced directory for communications devices
In one embodiment, a method includes establishing a call, and continuously monitoring the call from or using a first endpoint associated with the call....
Method for estimating channel response in a wireless communications
network based on pilot signals
The present invention discloses a method for estimating a channel response of data subcarriers in a wireless communications network. The method comprises...
Method and apparatus for aggregating network traffic flows
A method of aggregating network traffic flows for network traffic elements is described. The traffic elements are characterized by a plurality of...
Carrier ethernet service discovery, correlation methodology and apparatus
In an example embodiment, a method of service discovery and correlation is provided. In example embodiments, a network management system discovers, categorizes,...
System and method for controlling a data transfer over a network
A method is provided in one example and includes querying for a total capacity for data transmissions for a local network segment, and identifying an available...
Method and apparatus to elect ABRs dynamically and intelligently
The present invention elects an area border router from a plurality of potential area border routers by determining a full set of all areas attached to a...
System and method for detecting a protective device has limited or
interrupted current it carries
A system and method monitors indicators including other-than-current indicators of protective devices such as cutouts and reclosers, to determine whether the...
Network context triggers for activating virtualized computer applications
A computer system, comprising at least one controlled execution space hosting an operating system and an application program; a vulnerability monitoring agent...
Graphical user interface on a display of an electronic device
Video unit with integrated features
Abstracting transformation for model driven architecture
An example embodiment of the present invention provides a process for abstracting an implementation-independent model to an implementation-specific model during...
Interlocking input/outputs on a virtual logic unit number
In one embodiment, a solution is provided wherein a lock client sends lock requests to a lock manager upon receipt of an input/output (I/O) and receives back a...
Method and apparatus for managing proxy and non-proxy requests in
A method is disclosed for determining a location of a client session in a telecommunications network by comparing attributes of the client session connection to...
Method and system for installing software and hardware feature licenses on
A method and system for installing software and hardware licenses on electronic devices supporting licensable features. Specifically, a method is disclosed for...
System and method for providing a trunked radio and gateway
A method is provided in one example and includes receiving a first channel release notification from a communication network at a trunked radio network gateway...
Use of non-audible band to relay information for echo cancellation in a
distributed media system
Particular embodiments provide for attenuating one or more microphone signals in a teleconferencing system upon detecting a non-audible signal. A far end voice...
Method and system for automatic supervisor intervention in problematic
calls in a call center
According to one embodiment of the invention, a method for processing a call in a call center includes monitoring a characteristic of at least a portion of the...
Per multi-block partition breakpoint determining for hybrid variable
A method, and apparatus, and logic encoded in one or more computer-readable tangible medium to carry out a method. The method is to code a plurality of ordered...
System and method for exporting structured data in a network environment
An apparatus is provided in one example embodiment and includes a network element configured to receive a plurality of packets. The network element is...
Remote management of a bridge device
A method and system for remotely managing a bridge device, such as a modem, are disclosed. Management traffic from a service provider can be communicated to a...
First-hop domain reliability measurement and load balancing in a computer
In one embodiment, probe messages may be transmitted from a local domain to a set of one or more responding probe targets located beyond a plurality of probed...
Cryptographic peer discovery, authentication, and authorization for
A method is disclosed for cryptographic peer discovery, authentication, and authorization. According to one embodiment, a data packet, which is addressed to a...
System, method, and device for providing secure operating environments for
The present invention includes a system, method, and device for providing secure operating environments for computer systems. In one form, a method for...
Powered communications interface providing low-speed communications
between power-sourcing equipment and...
A powered communications interface in a power-over-Ethernet (POE) system has a non-powered operating mode in which it withholds operating power from a powered...
Methods and apparatus for providing security to a computerized device
When establishing a communications channel to a wireless network, through a wireless connection, a computerized device receives an Internet protocol (IP)...