At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
System to dynamically detect and correct errors in a session
A system for detecting and correcting an error in session between a client and a host over a network. When the system receives an indication of an error in a...
Method and apparatus for rate limiting client requests
As a server device receives packets from a client device, the server device counts the number of packets received over a particular time interval and compares...
Detecting cloning of network devices
Techniques are provided to detect cloning of network device identity when network device is seeking registration for service in a network. A control server...
Authorizing an endpoint node for a communication service
A network system for authorizing an endpoint node for a communication service includes an operator network and an organization network. The operator network...
Sharing AGC loop between demodulator and spectrum analysis system
Systems and methods for sharing an AGC loop between a wireless data demodulator and a spectrum analysis module that operates simultaneously with the data...
Method and system for interference reduction
A method and system for interference reduction for telecommunication systems are disclosed. The system comprises a base station control device (BCD) for...
Real-time face detection using temporal differences
An apparatus, a method, and a computer-readable medium having instructions encoded thereon that when executed cause a method to be carried out. The method...
Data driven configuration of call management applications
A call manager uses a call management application in conjunction with a live dial database to control routing of calls for managed devices. To generate the live...
Ethernet layer 2 protocol packet switching
In one embodiment, an apparatus includes an access node, and the access node includes ports. The access node is operable to perform downlink switching based...
Virtual loop carrier system with automatic configuration of ATM endpoints
In an ATM network having ATM endpoints connected to a central server over respective virtual circuits, ATM endpoints are configured for Internet Protocol (IP)...
MPLS device enabling service providers to control service levels in
forwarding of multi-labeled packets
A MPLS device which receives configuration data identifying a group of multi-labeled packets and desired EXP (corresponding to the 3-bit experimental bit field...
System and method for managing a list of entries containing routing
A system and method adds and manages entries on a list of entries of routing information to allow the top entry to be used for routing to a destination...
Data driven route advertisement
Various methods and systems for performing data-driven route advertisement are disclosed. One method involves inhibiting advertisement of a route that is...
Minimizing packet loss during fast roaming
A packet loss reduction system. In particular implementations, a method includes responsive to indications of roaming intent of a wireless client relative to...
Returning domain identifications without reconfiguration
In one embodiment, a technique for returning Domain IDs to a Fibre Channel fabric without a full build fabric (BF) phase is provided. A switch in the fabric may...
Aggregation and propagation of sensor data within neighbor discovery
messages in a tree-based ad hoc network
In one embodiment, a method comprises attaching, by a mobile router, to an attachment router according to a protocol requiring establishment of a tree topology...
Method and apparatus to test a data path in a network
A method and apparatus for testing a data path in a network is described. The method may comprise creating a closed loop in the data path so that test data...
Method and system for providing interoperable communications with
A method for providing interoperable communications with congestion management includes facilitating communications of a plurality of virtual talk groups. Each...
Failure tolerant high density dial router
A Fault Tolerant Dial Router (FTDR) includes redundant subsystem resources that operate independently of telephone line interface connections. The redundant...
System and method for displaying a videoconference
According to one embodiment of the present invention, a method for displaying a videoconference includes receiving a first video feed. The first video feed...
Methods and apparatus for selecting a server to process a request
The invention is directed to techniques for selecting a resource from several resources to process a request from a client. A client sends the request to a data...
Method and system for inserting advertisements in unified messaging
A method and an apparatus for inserting an included message into an e-mail message, wherein the e-mail message is transferred through a unified messaging...
Configuring an operating state of a terminal device
Techniques are described herein for achieving network-based wake-up functionality for power management functions using a standard network controller for...
Data communications device for communicating with and concurrently
providing power to a set of powerable devices
A method for managing the delivery of power for a plurality of devices includes allocating a power limit for each of the plurality of devices and providing...
Providing probe signals from a node to a centralized controller
Providing probe signals from a node includes receiving at the node an instruction to send the probe signals over channels, where the instruction comprises probe...
Technique for distinguishing between link and node failure using
bidirectional forwarding detection (BFD)
A technique distinguishes between link and node failure using bidirectional forwarding detection (BFD) in a computer network. According to the novel technique,...
DHCP proxy for static host
A DHCP proxy agent is provided to send on behalf of a static host a DHCP request so that an access layer security feature such as DHCP snooping/IPSG can be...
Guaranteed delivery of application layer messages by a network element
A method is disclosed by which network elements such as packet routers and packet switches guarantee the delivery of application layer messages within a...
Automobile personal radio recorder
In one embodiment, an audio recorder is disclosed that interfaces with an automobile radio. The audio recorder includes a radio tuner that receives radio...
System and method for integrated queue management
A system and method for integrated queue management are provided. The method may include receiving, from a user, a request for a connection to one of a...
Map message expediency monitoring and automatic delay adjustments in
An M-CMTS compatible UEQAM device implements circuitry to identify and analyze MAP message in the data stream sent from the M-CMTS Core with respect to timing...
Method for routing information over a network employing centralized
A method and apparatus for centralized control of a network is described. The network includes a number of nodes. The method includes creating a database and...
Role determination for network devices
Techniques for selecting authentication roles when establishing a link between devices in a secure network are provided. By assigning role levels to devices,...
Protecting multi-segment pseudowires
The protection of multi-segment pseudowires by utilizing pre-computed backup paths is disclosed herein. Disclosed embodiments include methods that establish at...
Method and apparatus for supporting a computer chip on a printed circuit
A printed circuit board assembly and method of assembly in which underfill is placed between a chip and substrate to support the chip. A trench is formed in the...
Dynamically switched and static multiple video streams for a multimedia
An end station for a videoconference/multimedia conference is disclosed, where the end station requests, receives and displays multiple video streams. Call...
Detecting stolen authentication cookie attacks
In one embodiment, an apparatus comprises logic for detecting stolen authentication cookie attacks. A first transport connection is established between a client...
Method and system using presence information to manage network access
In accordance with a particular embodiment of the present invention, a method using presence information to manage network access includes maintaining presence...
Automatic load-balancing and seamless failover of data flows in storage
media encryption (SME)
Methods and apparatus for encrypting data are disclosed. In accordance with one embodiment, data path information identifying a data path is provided to one or...
Method and apparatus for negotiating power between power sourcing
equipment and powerable devices
The present invention provides a power negotiation protocol that enables PDs and PSEs to negotiate the amount of inline power that a PD consumes and the...
Computing a path for an open ended uni-directional path protected switched
Methods and apparatus for enabling a protected circuit path to be created efficiently are disclosed. In accordance with one embodiment of the present invention,...
Solution for handling URL-substitution for data access in a private
Disclosed are methods and apparatus for handling requests for data from a private network. In general terms, a client who wishes access to secure data, such as...
Dynamic host configuration protocol (DHCP) initialization responsive to a
loss of network layer connectivity
Disclosed are, inter alia, methods, apparatus, computer-storage media, mechanisms, and means associated with loss of network layer connectivity triggering...
Automatic hardware failure detection and recovery for distributed max
A Max Sessions Server (MSS) automatically detects hardware and communications failures. Upon detection, counters are adjusted accordingly to maintain an...
Method and system for faster device learning
Method and system for faster device learning are provided. The invention provides a method of sending multiple object identifiers in a single Get Next Request,...
Method and system for automating collateral configuration in a network
In one embodiment of the invention, a method for automating collateral configuration in a network is provided. A service is configured on a network device...
System and method for managing remote computer training labs
An educational and training system allows organization and management of computers and course material used in teaching and administering classes of computer...
Sharing of presence-based time-zone information
A system for sharing presence-based time-zone information includes a database, and a controller. The database includes a plurality of presence profiles, each...
Device, methods, and user interface for providing optimized entry of
The present invention includes a device, method, and user interface for providing optimized entry of alphanumeric text. In one form, a method for providing...
Optical link characterization
Various example embodiments are disclosed. According to one example embodiment, a method may include transmitting a semiconductor laser-generated optical signal...