At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Identifying threats based on hierarchical classification
A system and a method are disclosed for identifying network threats based on hierarchical classification. The system receives packet flows from a data network...
Computer network access control
Receive, at an access control node (ACN) of a first network enclave, a plurality of data packets inbound to the enclave. The characteristics of each received...
Method and system for including network security information in a frame
A method and apparatus for including network security information in a frame is disclosed. Network security information is included in a secure portion of...
Zone-based firewall policy model for a virtualized data center
Techniques are provided for implementing a zone-based firewall policy. At a virtual network device, information is defined and stored that represents a security...
Redirecting of network traffic for application of stateful services
Techniques are presented herein for redirection between any number of network devices that are distributed to any number of sites. A first message of a flow is...
Techniques for auto assigning IP telephone extension numbers based on a
Techniques are provided for assigning extension numbers to Internet Protocol (IP) telephony devices. The techniques include receiving a message from the IP...
Network assisted virtual machine mobility
A first addressing message is received at a first switch in a network fabric indicating that a first virtual machine has undergone migration from connection to...
Path maximum transmission unit handling for virtual private networks
Techniques are described herein for optimizing communications in a network. At a router in a virtual private network, a packet is received from a device in a...
Stateless flexible boot control
Techniques are provided herein for optimizing boot order for devices in a data center environment. These techniques may be embodied as a method, apparatus and...
Display screen with a graphical interface
OAM and time slot control in a deterministic ARC chain topology network
In one embodiment, a network of nodes is configured to communicate according to a configuration of Available Routing Construct (ARC) chains as well as...
Reducing proliferation of network-to-link-layer address resolution
In one embodiment, the processing by a packet switching device of a received network-to-link-layer address resolution request message (e.g., Address Resolution...
Flexible deterministic binary scheduler
A method for allocating port assignments for transmitting a reserved network stream across a network node comprises determining a cycle time associated with a...
Application services based on dynamic split tunneling
One embodiment provides selectively routing Domain Name System (DNS) request for sub-domains associated with a first network through a tunnel associated with...
Bi-directional flow stickiness in a network environment
An example method for bi-directional flow stickiness in a network environment is provided and includes receiving a packet of a flow from a source address in a...
Recording packet routes using bloom filters
In one embodiment, a Bloom filter is provided in a data packet signal functional to preferably encode the identifier of each nodal device and record the nodal...
Light emitting diode (LED)-based multi-bitrate data links
In one embodiment, a method comprises receiving, by an apparatus, first data at a first bitrate and second data at a second bitrate faster than the first...
Raman-based static and dynamic tilt control in an optical system
An optical fiber carries optical channels injected into the optical fiber to a Raman amplifier. A controller determines a static tilt associated with the...
Reflection based tracking system
In one embodiment, a processor can receive data representing a view reflected by a mirror of a plurality of mirrors. The plurality of mirrors may be configured...
Automatically determining relative locations of collaboration endpoints
within a building
Techniques are presented herein for a server to automatically determine the locations of collaboration endpoints and user devices throughout a building, and...
Muting a sound source with an array of microphones
A processing system can include tracking microphone array(s), audio-tracking circuitry configured to detect a location of audio sources from audio signals from...
Automatic image alignment in video conferencing
In one implementation, at least two images are captured from a respective at least two cameras of a telepresence system. The at least two cameras have...
Hierarchical event detection in a computer network
In one embodiment, network data is received at a first node in a computer network. A low precision machine learning model is used on the network data to detect...
Target-based SMB and DCE/RPC processing for an intrusion detection system
or intrusion prevention system
A method performed in a processor of an intrusion detection/prevention system (IDS/IPS) checks for valid packets in an SMB named pipe in a communication...
Network attack detection using combined probabilities
In one embodiment, a device in a network receives a set of output label dependencies for a set of attack detectors. The device identifies applied labels that...
Secure over-the-air provisioning solution for handheld and desktop devices
In one embodiment, a device and a services provisioning system establish an over-the-air connection with each other, and perform device posture validation to...
Distributed proxy addressing operations
An addressing redirection mechanism is initiated at a first networking device in a computing network in order to enable the first networking device to perform...
CDNI request routing using flow metadata
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium for Content Delivery Networks Interconnection (CDNI) request...
Method and apparatus for supporting call admission control using graph
assembly and fate-share identifiers
In one embodiment, a method includes obtaining a potential bandwidth deduction at a call agent, the call agent being associated with an intercluster call...
Standby bandwidth aware path computation
At a first network device, a plurality of paths through a network from a source network device to a destination network device are determined. A vacant...
System and method for tracking packets in a network environment
A method is provided in one example embodiment that includes transmitting a message from a first port to a second port, recording a timestamp of the message at...
Domain classification using domain co-occurrence information
Domain classification based on domain co-occurrence information derived from client request behavior is provided. The network requests of clients are analyzed...
System and method for management of network-based services
In one embodiment, a system includes an interface configured to receive a first request sent from a first customer for a first service provided by a first...
Seamless segment routing
In one embodiment, a packet and a segment ID stack is received at a node. The segment ID stack includes a plurality of segment IDs, one or which is a first...
Autonomic network sentinels
Autonomic network sentinels are disclosed. An occurrence of a particular network condition is detected at a network entity. The network entity compares the...
Policy-driven automatic redundant fabric placement mechanism for virtual
In one embodiment, a service provider management device provides a plurality of redundant fabric motifs, each indicating a subgraph pattern of logical...
Fast protection switchover in a transport network
Presented herein are techniques that enable fast switchover or reversion between label switched paths. In accordance with examples presented herein, a working...
Power conservation and latency minimization in frequency hopping
In one embodiment, a communication device samples a particular frequency hopping sequence during only a particular specified sub-timeslot of a timeslot. If a...
Distributed intelligence architecture with dynamic reverse/forward
In one embodiment, a grid application function is hosted at a primary grid device in a utility grid, which may determine whether or not to distribute at least a...
Providing reconstructed data based on stored aggregate data in response to
queries for unavailable data
In an embodiment, a method comprises dividing collected data into data clusters based on proximity of the data and adjusting the clusters based on density of...
Methods and apparatus for error detection and correction in data storage
systems using hash value comparisons
Data processing methods and apparatus for processing stored data with error correcting bits to detect and in some instances correct errors. The data processing...
Bridging wireless and wired media in a computer network
In one embodiment, a transmitting node may be configured to transmit a wireless advertisement frame over a computer network, wherein the frame includes a source...
Apparatus, systems, and methods for providing interworking gateway
Systems and methods are provided that allow inter-working between communication networks for the delivery of service to mobile nodes. A gateway is provided that...
Contribution and attendance for recurring meetings
In one implementation, a periodic teleconference for multiple participant endpoints is established. The periodic teleconference occurs on multiple dates or...
Identifying and enhancing motion video in a conference call channel by
Presented herein are techniques for detecting whether a presentation video stream in a conference call includes motion video. In an embodiment, this can be done...
System and method for dynamically allocating stream identifiers in a
multi-encryption transport system
The present invention is suitable for use in a multi-encrypted system that dynamically allocates stream identifiers in a second stream depending upon the...
Group member recovery techniques
Techniques are presented for optimizing secure communications in a network. A first router receives from a second router an encrypted packet with an unknown...
System and method for secure cloud service delivery with prioritized
services in a network environment
An example method includes receiving a request for a cloud capability set during an Internet Key Exchange negotiation associated with a virtual private network...
Recursive DNS nameserver
A recursive DNS server receives a request for domain name information associated with a domain name from a subscriber. In response to the request for domain...