At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
VoIP call routing
A method of managing Voice over Internet Protocol (VoIP) calls with an Internet Protocol Private Branch Exchange (IP PBX) is provided, including: receiving at an...
Techniques for storing real-time voice messages in a caller's voicemail
Techniques for storing voicemails in real-time in a caller's voicemail system when a voicemail is left in a callee's voicemail system are provided. A connection...
Acceleration of label distribution protocol (LDP) session setup
In one embodiment, a network device executes a Label Distribution Protocol (LDP) that sends LDP Hello messages at a default rate. The rate of sending LDP Hello...
Marking keyframes for a communication session
Marking a keyframe of a media stream in a communication system involves one or more entry media switches in communication with one or more endpoints. An entry...
WiFi geolocation from carrier-managed system geolocation of a dual mode
In one embodiment, a carrier-managed system such as the cellular network or the Global Positioning System (GPS), is leveraged to directly determine or...
Method and apparatus for supporting user mobility in a communication
A method includes identifying a plurality of communication channels at a wireless device and classifying each of the communication channels into one of a...
MGCP fallback mechanism enhancement
A mechanism provides for communication of "keep-alive" messages from clients to servers in a packet telephony network environment. The servers may be call agents...
Source/destination operating system type-based IDS virtualization
Systems and methods for virtualizing network intrusion detection system (IDS) functions based on each packet's source and/or destination host computer operating...
Adaptive system for content monitoring
A content monitoring system applies policies to data transfers, and adapts the policies based on violations. Each policy includes a rule that detects violations...
Method and system for using presence information in error notification
A method for using presence information in error notification includes detecting an error associated with operation of a software system and executing a workflow...
Service licensing and maintenance for networks
A technique is disclosed that allows different computers in a network to create an identifier that uniquely identifies the network. The technique allows the...
Synchronization and auditing of zone configuration data in storage-area
Many storage-area networks (SANs) are structured so that an end-user or client-computer can access data on one or more target storage devices through a storage...
Method and system for creating an overlay structure for management
A method, a system, and an apparatus are provided for organizing management information bases (MIB) in a network. A table, associated with an overlay MIB...
Fast channel change with conditional return to multicasting
In a digital video network that is capable of distributing digital video content to a client via multicasting and unicasting, servicing a channel change request...
Providing accounting services for a communication network
Providing accounting services for a communication device includes receiving at a support node a context request to create a communication context for the...
Locally adjusted radio frequency coverage maps in wireless networks
In one embodiment, a method for adjusting a radio-frequency coverage map. The method includes receiving calibration data comprising observed received signal...
System and method for wireless network profile provisioning
A system and method to enable an access point to dynamically provision a WLAN client with a new wireless profile once an association is established based on the...
Power management for serial-powered device connections
A method and apparatus for managing an Inline Power relationship between and among a first network device acting as power sourcing equipment (PSE) to provide...
Transportation of IEEE 802.1ah frames over multiprotocol label switching
pseudowires for virtual private LAN...
Disclosed are, inter alia, methods, apparatus, computer-storage media, mechanisms, and means for transportation of IEEE 802.1ah frames over Multiprotocol Label...
Service for NAT traversal using IPSEC
Disclosed are methods and apparatus for methods and apparatus for facilitating a secure connection between a first and a second node in a computer network where...
Virtual concatenation sequence mismatch defect detection
Methods and apparatus for identifying sequence mismatch defects associated with members of a virtual concatenation (VCAT) group are disclosed. According to one...
Mechanisms for providing intelligent throttling on a NAT session border
Disclosed are apparatus and methods for managing session data in a session border controller (SBC), where the session data is sent from a first node, such as a...
Method and apparatus for updating probabilistic network routing
A method of updating probabilistic network routing information is disclosed. A "backward ant" data packet is received. The backward ant data packet contains...
Extending sso for DHCP snooping to two box redundancy
Disclosed are mechanisms for facilitating the use of DHCP (dynamic host configuration protocol) binding data. In general, certain applications include mechanisms...
System and method for selectively interfacing different types of network
A system for interfacing different types of network communications. In one embodiment, the system includes one or more gateways capable of converting messages...
Power management of a network device
In one embodiment, a method includes receiving a synchronization command to synchronize time information among each component of a set of components in a...
Topology discovery of a private network
The present invention relates to a method and system for determining devices connected to a private network through a gateway. A Network Management System (NMS)...
Technique for dynamically splitting MPLS TE-LSPs
A technique dynamically splits Traffic Engineering (TE) Label Switched Paths (LSPs) in a computer network. According to the novel technique, a head-end node may...
Unsynchronized adjacencies in OSPF
A method and apparatus for managing network communication that operate on the idea that if a new neighboring node is already reachable as represented in a...
Method and system for network traffic matrix analysis
A method and system for calculating data traffic flow in a communications network are disclosed. The communications network comprises a plurality of nodes...
BFD rate-limiting and automatic session activation
A system and method for bidirectional forwarding detection (BFD) rate-limiting and automatic BFD session activation includes tracking a total bidirectional...
Detecting unavailable network connections
A method for detecting unavailable network connections comprises, at a first data processing node that is hosting a transport protocol connection that uses a...
Ethernet switch with configurable alarms
According to one embodiment, an Ethernet switch includes a plurality of ports operable to receive and transmit Ethernet traffic. The Ethernet switch also...
Mounting socket that dissipates heat from a network device
A socket for mounting a network device is provided. The socket includes a top portion and a bottom portion. The top portion and bottom portion are sized to...
Alarm reordering to handle alarm storms in large networks
In one embodiment, one or more routing trees may be determined based on corresponding root nodes to reach a particular receiving node in a computer network. A...
Dynamic current limits
A method is provided for allocating and providing power to network devices. The method includes (i) receiving an electronic request to power a network device...
Digital video camera with a rectractable connector and lens
Digital video camera
Method and apparatus for securing a communications device using a logging
A logging module is disclosed. A communications device can include, and so be made secure through the use of, the logging module. The logging module is...
Efficient multicast packet handling in a layer 2 network
Efficient multicasting within a layer 2 network is provided. Participation by a layer 3 router is not required. The spanning tree created by common layer 2...
Service accounting in a network
A method and apparatus are disclosed for improving service accounting in a network. After a client is authorized and authenticated, an accounting record is sent...
Method and apparatus for determining a subnet mask based on presence or
absence of responses to plural...
In one embodiment, a subnet mask is automatically determined by a first network node attached to a subnet in a packet communication network. The first network...
Recording trace messages of processes of a network component
A method for tracking a process is disclosed. Requests are received from process threads according to a time order. A request requests a buffer entry operable to...
Monitoring data integrity
A method and system are described for reporting on data integrity in a data repository which is configured for synchronization with at least one other data...
System and method for providing a dial plan conversion in a session
initiation protocol (SIP) environment
A method to be executed in a session initiation protocol (SIP) environment is provided that includes initiating a conversion process that involves a change from...
Flexible billing support in a service selection gateway (SSG)
A service selection gateway (SSG) which permits multiple access quotas associated with a pre-paid service accessed by a user. For example, the user's access may...
Voicemail messaging with dynamic content
In one embodiment, a voicemail messaging system provides a user with the ability to record a voicemail message that includes at least one static portion and a...
Method and apparatus for generating and using enhanced tree bitmap data
structures in determining a longest...
Methods and apparatus are disclosed for generating and using an enhanced tree bitmap data structure in determining a longest prefix match, such as in a router,...
Methods and apparatus for minimizing duplicate traffic during point to
multipoint tree switching in a network
A method, apparatus and computer program product for minimizing or preventing duplicate traffic during point to multipoint tree switching in a network. In its...