At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Media access control for MIMO wireless network
An apparatus and method for operating a Multiple Input Multiple Output (MIMO)-capable subscriber node are disclosed. In one embodiment, an apparatus includes a...
Method and architecture for distributed video switching using media
Disclosed are video conferencing systems, devices, architectures, and methods for using media notifications to coordinate switching between video in a...
Multiple digital signals from a single integrated circuit
Multiple digital signals from a single integrated circuit (IC) may be provided. The IC may receive an analog signal comprising a plurality of channels, convert...
Transient noise control for digital RF modulation
In one embodiment, a switch provides output to a digital radio frequency (RF) modulator having a filtered input stage. The switch is configured to selectively...
Apparatus for securing a cable connector to a device
In one embodiment, an apparatus includes a main body defining a channel configured to receive and hold a cable connector. Means for releasably securing the main...
Cable fixture device with a slider bar
A robust multi-port front panel RF (radio frequency) connector system design using a single lead screw is provided. The system allows for individual connector...
Digital video camera with built-in connector and ornamental band
Video unit with integrated features
Method for supporting new network element software versions in an element
management system without upgrading
A method and apparatus for configuring an element management system server (an EMS server) to support new network element service application versions without...
Method and apparatus for providing multicast messages across a data
A method and apparatus for providing multicast messages across a data communication network, the method comprising receiving a multicast message and adding to...
System and method for enforcing advertising policies using digital rights
A system and method for policy-based advertising. According to an embodiment, an advertisement server receives a request for advertising content from a user...
Automatic hardware failure detection and recovery for distributed max
A Max Sessions Server (MSS) automatically detects hardware and communications failures. Upon detection, counters are adjusted accordingly to maintain an...
A tool for managing a computer network includes a gateway service module that identifies a gateway for a network and a network information service module. The...
Method for optimizing up-link transmission power for a wireless terminal
in a multi-carrier system
Techniques are provided herein to optimize up-link transmission power from a wireless terminal to a base transceiver station in a multicarrier system. A...
Method for creating beamformed multiple-input-multiple-output channels
with partial nulling
The present invention discloses a method for generating beamformed multiple-input-multiple-output (MIMO) channels. The method comprises receiving by a base...
Techniques for simulating a decision feedback equalizer circuit
A computerized system simulates a non-linear Decision Feedback Equalizer. The computerized system includes a user interface, an output port, and a controller...
Apparatus and method for increasing reliability of data sensitive to
An apparatus and method are provided which preferably increase reliability of data sensitive to packet loss. According to principles of the invention, a quality...
Variable priority of network connections for preemptive protection
Even though network connections have priorities for reconnection and preemption of other connections upon a failure, these priorities are fixed based on the...
System and method for billing end users in a peer-to-peer transaction in a
A method for billing end users in a peer-to-peer transaction in a network environment is provided that includes a client services packet gateway operable to...
Method and apparatus for device pinout mapping
A "pinout mode" control capability incorporated into an integrated circuit device controls an internal mapping function, with the effect that the device pinout...
Upstream data rate estimation
In one embodiment, a VoIP device operable to estimate an upstream data rate for a network device is provided. The VoIP device includes a transceiver operable to...
Method for separation of packet network+optical management domains
The present invention provides a mechanism and a method for indirectly controlling a packet handling device interface from an optical management system in an...
Arrangement for preventing count-to-infinity in flooding distance vector
Each router in a network is configured for generating router advertisement messages according to a flooding distance vector routing protocol. Each router...
Forwarding packets to a directed acyclic graph destination using link
selection based on received link metrics
Each network node having at least one destination-oriented link toward a directed acyclic graph (DAG) destination can receive a corresponding set of path...
Method and apparatus for controlling the operation of a flexible
The present invention discloses a method and apparatus for cross-connecting high-speed telecommunications signals at a flexible cross-connect system. A method...
Fly-forward converter power supply
A fly-forward converter topology for a switched-mode power supply (SMPS) that may incorporate the advantages of both a forward converter and a flyback converter...
Highly scalable architecture for application network appliances
A highly scalable application network appliance is described herein. According to one embodiment, a network element includes a switch fabric, a first service...
Techniques for allocating computing resources to applications in an
Techniques for allocating computing resources to tasks include receiving first data and second data. The first data indicates a limit for unblocked execution by...
Method, apparatus and computer program product for borrowed-virtual-time
A scheduling mechanism that fairly allocates a resource to a number of schedulable elements, of which some are latency-sensitive, is disclosed. Each element's...
Providing power over ethernet cables
A method for power delivery comprises coupling an Ethernet cable comprising four wire pairs to a power delivery system and providing power to a powered device...
Methods and apparatus providing advanced classification for power over
A system conducts a plurality of cycles on the powered device. Each cycle has a detection phase and a classification phase. A classification voltage is applied...
Maintaining protocol adjacency state with forwarding failure
In one embodiment, a method generally includes establishing a routing protocol peer relationship and a Bidirectional Forwarding Detection (BFD) session with a...
Method and apparatus for optimizing and prioritizing the creation of a
large number of VPN tunnels
There is provided a communications network including a server forming part of a virtual private network, a plurality of client computers operative to request...
Policy system throttling and load balancing
A method and system to control call admissions into data networks is disclosed. A network device has a port to receive a pre-authentication request associated...
Method and system for interactively configuring a network device
A method and system for interactively configuring a network device is disclosed. A computer based method interactively configures a network device such as a...
Method and system to protect the privacy of presence information for
In accordance with a particular embodiment of the present invention, a method for providing privacy protection to network users includes receiving a...
Modifying operation of peer-to-peer networks based on integrating network
A data processing method comprising establishing a first node in a peer-to-peer data communications network, wherein the node is configured as a supernode in...
Forwarding data in a data communication network
An apparatus for forwarding data in a data communications network having as components nodes and links therebetween is described. The apparatus is arranged to...
Transferring context information to facilitate node mobility
Facilitating node mobility includes facilitating a communication session for a mobile node communicated along a first communication path. A first anchor point...
System and method for concurrently utilizing multiple system identifiers
System and method for providing access to multiple wireless service providers (WSPs) on a shared network infrastructure. The system includes a plurality of...
Devices, softwares and methods for redundantly encoding a data stream for
network transmission with adjustable...
Devices, softwares and methods are provided for redundantly encoding a data stream into frames for network transmission as packets. A main encoder encodes a...
Cost minimization of services provided by multiple service providers
In one embodiment, a plurality of connections couple to a plurality of service providers (SPs) that each provide services at a cost. The cost of the services of...
Method and system for constraint-based traffic flow optimisation system
A method of calculating traffic values in a communications network (1), the communications network comprising a plurality of nodes (2,4), the nodes being...
Protection of hierarchical tunnel head-end nodes
In one embodiment, a point of local repair (PLR) for a child tunnel establishes a backup tunnel to a hierarchical tunnel head-end node's (grooming node's)...
Method and apparatus for dynamically securing voice and other
delay-sensitive network traffic
A method comprises receiving a request for secure network traffic from a device having a private network address at a source node, obtaining the private network...
System and method for providing security in a network environment
A method for providing security in a network environment is provided that includes receiving a flow that propagates through an access gateway, the flow being...
Method and system for providing improved URL mangling performance using
Method and system for providing improved uniform resource locator (URL) mangling performance using fast re-write including scanning a web page, detecting an...
Method and apparatus for controlling a quiet zone for wireless units
In one embodiment, a device in an IP-based cellular wireless communication system includes a monitoring arrangement and a sender arrangement. The monitoring...
Methods, apparatuses and systems facilitating client handoffs in wireless
Methods, apparatuses, and systems directed to facilitating roaming and client handoffs in wireless networks. In one implementation, the present invention is...
System and method for storing and restoring communication dialog
Storing and restoring a communication session includes establishing a communication session by exchanging dialog. Dialog from the communication session is stored...