At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Systems, methods, and other embodiments associated with programmable application specific integrated circuit (ASIC) fault injection are described. One example...
Multi-bridge LAN aggregation
A method and system for multi-bridge LAN aggregation is disclosed. The method includes aggregating a plurality of LANs coupling a host to a first and a second...
Providing SCSI acceleration as a service in the SAN
Techniques are disclosed for abstracting write acceleration techniques and tape acceleration techniques away from transport providers (e.g., away from an FC or...
Distributed computing based on multiple nodes with determined capacity
selectively joining resource groups...
A network provides distributed computing services based on participation in respective resource groups by computing nodes, each resource group including a...
Method and apparatus for persisting SNMP variable values
A method of persisting SNMP (Simple Network Management Protocol) variable values associated with SNMP object IDs for an SNMP managed network element across...
System and method for communicating with a network node behind a
subscriber station with an IP convergence...
A system and method for providing service in a network having a wireless component is disclosed. The system and method comprise receiving a request for a...
Method and system for detecting messages using enhanced distributed
A method and system are provided for detecting messages using enhanced distributed signaling in a wireless communication network that offers transmission...
Techniques for managing keys using a key server in a network segment
The election of a key server is provided. The key server is a single device that broadcasts an encryption key to other devices in a network segment. Also,...
Multi-tone signal discriminator
In one embodiment, a method for discriminating between a machine generated multi-tone signal and a simulated voice multi-tone signal is provided. The method may...
System and method for capturing accounting data for a communication
A method for creating an accounting record in a communication network may include receiving a SIP message and matching service point triggers with data. The...
System and method for offering quality of service in a network environment
A method for providing a quality of service in a network environment is provided that includes receiving communication session information associated with a...
Simple virtual private network for small local area networks
In one embodiment, a method includes establishing a control channel across a wide area network (WAN) from a first gateway that has a first public internetwork...
System and method for implementing reflector ports within hierarchical
In some ring protocols, control messages are exchanged among ring nodes in order to implement certain behaviors, such as loop-free behavior and/or failure...
Controlling inline power at a powered device
A powered device includes a first switch, a second switch, and a controller. The first switch is disposed between a center tap of the first transformer and a...
System and method for maintaining resiliency of subscriptions to an event
A system and method for maintaining resiliency of subscriptions to an event server includes receiving a subscription request to establish a subscription to...
Method and apparatus for controlling double-ended soft permanent virtual
A method and apparatus control a double-ended soft permanent virtual circuit (SPVC) connection coupling from a source end to a destination end via a...
Load balancing network access requests
A method of load balancing network access requests comprises receiving a network access request from a serving node linked to a radio access network. The...
Throttling of mass mailings using network devices
A system and method that effectuates dynamic mass mail throttling utilizing an upstream network device. The system and method includes intercepting messages...
Method and system for communicating using position information
A method for communicating using position information includes communicating on a first communication network at a first location using one or more first...
Assigning a serving-CSCF during access authentication
Assigning a serving-call session control function (serving-CSCF) to an access terminal includes receiving an access authorization request corresponding to the...
Mechanism for tracking wavelengths in a DWDM network without specialized
In one embodiment, techniques provide a mechanism for tracking wavelengths in a DWDM network. In particular, embodiments of the present invention also provide...
Extensions to IPv6 neighbor discovery protocol for automated prefix
In one embodiment, a method comprises detecting, by a router, a first router advertisement message from an attachment router that provides an attachment link...
Method and system for operating a communication service portal
A method of providing communication service, includes receiving user identification information and first communication service criteria. The user...
Location architecture for large scale networks
In one embodiment, a method includes receive a connection event message including information identifying a wireless node, wherein the identifying information...
Method and system for the automatic configuration of conference resources
A method for the automatic configuration of conference resources includes receiving a user request identifying at least one conference resource to be used in a...
Intelligent provisioning of DSP channels for codec changes
A communication system in which a profile of codecs is loaded at the originating end. The originating end sends the profile of codecs to the terminating end and...
Smart protection escalation mechanism prevention
Techniques are provided for detecting at a controller associated with a physical layer of a network an occurrence of a failure within the physical layer of the...
Method and apparatus for tracking layer-2 (L2) resource of a switch
A method and apparatus for tracking at least one Layer-2 (L2) resource of a network device is provided. The method includes monitoring software operations on...
Tailored relief for congestion on application servers for real time
Techniques for managing computational load in real-time communications include receiving usage data on a particular node of a packet-switched network. The usage...
Multimedia data flow dropping
The present invention introduces a congestion control mechanism for constant bit rate (CBR) multimedia data flows in cable operator IP networks. A flow drop...
A method and apparatus accesses a database where entries are linked to at least two sets of patterns. One or more patterns of a first set of patterns are...
Allowing network access for proxy mobile IP cases for nodes that do not
support CHAP authentication
The disclosed embodiments support proxy Mobile IP registration for nodes that do not implement CHAP. This is accomplished, in part, through the generation of a...
System and method for enforcing policy in a communication network
A system for enforcing policy in a communication network includes a policy server which is operable to receive a request to invoke an application, receive a...
Automatic system for power and data redundancy in a wired data
Redundancy of data and/or Inline Power in a wired data telecommunications network from a pair of power sourcing equipment (PSE) devices via an automatic...
Techniques for hardware-assisted multi-threaded processing
Techniques for processing each of multiple threads that share a core processor include receiving an intra-thread register address from the core processor. This...
System and method for a policy enforcement point interface
Systems and methods for providing an interface to communicate policy information from a policy server to a policy enforcement point are presented. An external...
Method and system for providing network services
A method for providing network services includes receiving a mobile station identifier (MSID) from a mobile node at a packet data serving node. The packet data...
Utilizing captured IP packets to determine operations performed on packets
by a network device
Methods and systems for utilizing captured packets to determine the operations performed on packets by a network device are described. One or more packets are...
System and method for providing channel configurations in a communications
A method is provided in one example embodiment and includes monitoring a plurality of channels provisioned for an endpoint. The method also includes reacting to...
Variable length coding of coefficient clusters for image and video
A coding method, apparatus, and medium with software encoded thereon to implement a coding method. The coding method includes encoding cluster of consecutive...
Policy-based control of content intercept
In one embodiment, a method includes detecting registration of an endpoint associated with a user on a network. The method further includes accessing a policy...
System and method for active mobile collaboration
A communication system is provided that uses loosely-coupled client-server architectures to improve the efficiency of communications. The communication system...
Transferring multiple dialogs of a call
Communicating a call having a number of dialogs includes initiating a call between a first endpoint and a second endpoint. A first connection for a primary...
Admission control for virtualized services in routers
In one embodiment, a method includes receiving a request to provision a first customer interface to a service instance, and identifying a resource capacity for...
Multiple spanning tree extensions for trunk ports carrying more than 4K
In one embodiment, bridges in a computer network maintain a per-port mapping table for each of its ports, where each mapping table maps, for each virtual...
Method and system for removing dead access control entries (ACEs)
Methods and systems have been provided for removing dead Access Control Entries (ACEs) in an Access Control List (ACL). In one embodiment, the dead ACEs can be...
Programmable packet classification system using an array of uniform
A versatile and efficient technique for classifying packets in an intermediate node. According to the technique, criteria and rules associated with the packet...
Constraining multicast traffic between a layer 2 network device and a
A method, system, computer program product and apparatus are presented to enable a L2 network device, such as a bridge or switch, to control the flow of a...
System and method for providing emergency services in a visited
An apparatus for routing in a network environment, is provided that includes an application manager residing in a home network and being operable to interface...
Method and system for hierarchical processing of protocol information in a
In a wireless Local Area Network (WLAN) system, a hierarchical architecture is provided which employs a protocol which divides protocol processing functions...