At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Detection of frequent and dispersed invariants
A scalable method and apparatus that detects frequent and dispersed invariants is disclosed. More particularly, the application discloses a system that can...
Replenishing a user account with more access resources needed for
accessing network services
A network access server (NAS) determines the status of availability (e.g., how much more quota is unused) of an access resource, and sends a notification...
Use of per-flow monotonically decreasing TTLs to prevent IDS circumvention
Systems detect maliciously formed TCP/IP retransmit packets attempting to pass through an intrusion detection system (IDS) and prevent them from reaching their...
System and method to distribute emergency information
A system and method that enables efficient distribution of public warning information using a network infrastructure. Public warning messages are received by a...
Method and apparatus for configuring network devices
A method for authenticating a network device includes determining that a network link that uses a primary signaling technology and a secondary signaling...
Network device that determines application-level network latency by
monitoring option values in a transport...
A data processing apparatus in a network receives packet flows that are communicated between a first network node and a second network node, and comprises a...
CAPWAP/LWAPP multicast flood control for roaming clients
A method, an apparatus, a system, and logic encoded in one or more computer-readable tangible medium to carry out a method. The method includes maintaining the...
Multiple receiver aggregation
A technique for multiple receiver aggregation that allows for multiple immediate responses of acknowledgements or block acknowledgements. The technique uses a...
SIP out-of-dialog REFER mechanism for handoff between front-end and
In one embodiment, a method includes steps of verifying, by a first server, that a user associated with an endpoint is authorized to access a service provided by...
Methods and apparatus to configure network nodes supporting virtual
A computer system includes functionality enabling a provider edge router to determine whether network data such as VRF information is properly associated with a...
Method and apparatus for automatic filter generation and maintenance
A method is disclosed for automatic filter generation and maintenance. From information transmitted on a network, a first device identifier and a second device...
Apparatus and method for secure configuration of shared powerline devices
Client adapter and method simplify security deployment in an EPN, including the shared services electrical power lines of a premises. With direct coupling,...
System and method for fast start-up of live multicast streams transmitted
over a packet network
A system for multicast streaming of programs over a packet network includes a node having a processor that conditions a video bitstream such that packets...
Method and apparatus for managing patchable software systems
A method or corresponding apparatus manages deployment of a software patch ("patch") by creating a given patch comprising at least one file and associating...
Methods and apparatus for authenticating mobility entities using kerberos
Methods and apparatus for generating and transmitting dynamically generated session keys are disclosed. A key distribution center generates a session key between...
Shared memory message switch and cache
A method and apparatus are described to provide shared switch and cache memory. The apparatus may comprise a message switch module, a cache controller module,...
Mitigating subscriber side attacks in a cable network
In one embodiment, a Cable Modem Termination System (CMTS) identifies an endpoint originating undesired traffic. Instead of dropping a bandwidth request for the...
Media sharing network
A computer-readable medium has a computer program stored thereon. The computer program senses the presence of a physical medium loaded on a media-sharing network...
Optimized dynamic multipoint virtual private network over IPv6 network
Method and apparatus including registering a first spoke router with a hub router, forwarding an Internet Protocol version Four (IPv4) data packet from the first...
Methods and apparatus for connecting to virtual networks using non
A system allows a device to communicate using a virtual network the method by assigning a network address to the device. The network address is selected from a...
Method and system for in-band signaling of multiple media streams
Methods and systems are provided for in-band signaling of at least two simultaneous digital media streams in a network, the two simultaneous streams being a part...
Point-controlled contention arbitration
In an example embodiment, there is described herein a method for providing quality of service during a contention period. A tiered access protocol enables an...
Medium access control protocol for OFDM wireless networks
A medium access contention protocol that is highly beneficial in wireless networks and particularly in wireless networks that employ a fixed minimum burst size...
Method and system for conveying media source location information
A method for conveying media source location information includes receiving a first communication from a first endpoint and receiving location information...
Communication techniques and generic layer 3 automatic switching
In one embodiment, software code in a respective computer system such as one or more data communication devices establishes multiple layer 2 network links...
Method and apparatus for determining a data communication network repair
A method is disclosed for determining a repair strategy for a data communication network. The data communication network has as components nodes and links. The...
Loop prevention techniques using encapsulation manipulation of IP/MPLS
In one embodiment, an edge device communicates with a neighboring routing domain. A failure that prevents communication between the edge device and the...
Content discovery and differential advertising in video distribution
A method and apparatus for monitoring use patterns or services available information in video distribution networks. A network termination unit receives the...
Multiprocessor core dump retrieval
In particular embodiments, a monitoring processor may receive an interrupt from status monitoring logic associated with a monitored processor that has...
Bidirectional authentication for HTML form processing
A method of posting HTML form data securely is provided. Some embodiments may use an existing security protocol to send the sensitive information as an encrypted...
Authentication for devices located in cable networks
An extensible authentication framework is used in cable networks such as Data Over Cable Service Interface Specification (DOCSIS) cable networks. The...
Multiple context single logic virtual host channel adapter
Various embodiments provide methods and systems operable to receive a work queue pair from the host application, to add the work queue pair to a scheduler queue...
Maintaining IGP transparency of VPN routes when BGP is used as a PE-CE
A technique maintains Interior Gateway Protocol (IGP) transparency of Virtual Private Network (VPN) routes when Border Gateway Protocol (BGP) is used as a...
Methods and apparatus for supporting transmission of streaming data
A gateway application in a content engine multiplexes requests for real-time content to servers that, in turn, service the requests by streaming appropriate...
Message delivery coordination among multiple messaging media
Presently disclosed are apparatus and methods for coordinating the delivery of messages and/or message notifications among multiple messaging media and message...
Rich-media instant messaging with selective rich media messaging broadcast
In one embodiment, a method for sending a video message and a text message in a communication session is provided. The method includes determining when a...
Aggregation of user usage data for accounting systems in dynamically
A method and apparatus for providing an aggregated account metering system to a computer network service provider resulting in comprehensive detailed subscriber...
Wireless communication system with signal selection and combination
Portion-by-portion selection and/or combination of signals received from multiple base transceiver stations (BTSs) is used to improve the quality of reception in...
Optimal call speed for call center agents
A system and method for handling a call from a caller to a call center includes an automatic call distributor (ACD) to receive the call and to route the call to...
Multinode symmetric load sharing
In one embodiment, a load-balancing algorithm ensures that both network nodes at endpoints of a group of physical links aggregated into a logical channel are...
Pipelined packet switching and queuing architecture
An architecture for a line card in a network routing device is provided. The line card architecture provides a bi-directional interface between the routing...
Method and apparatus for creating bundle of soft permanent virtual
A method and apparatus create a bundle of soft permanent virtual circuits (SPVCs) coupling form a source end to a destination end via a communications network....
Apparatus and methods for handling name resolution over IPV6 using NAT-PT
Methods and apparatus for processing a DNS query by a NAT device are disclosed. A NAT device (e.g., NAT-PT device) receives the DNS query from a node. The NAT...
Virtual circuit auto-configuration for customer premises equipment
The present invention pertains to a method and device for automatically configuring a virtual circuit (VC) of a Customer Premises Equipment (CPE) device and...
Parsing out of order data packets at a content gateway of a network
In one embodiment, a method includes receiving, at a local node of a network, a sequenced data packet of a flow made up of multiple sequenced data packets from a...
Routing messages in a zero-information nested virtual private network
A mechanism for generating an address of a cyphertext component of a VPN router in a nested VPN system using an address of a plaintext domain so that a PTX...
Directory number mobility utilizing dynamic network distributed dial-peer
Methods, logic, apparatus, and systems are provided to support cross cluster directory number (DN) extension mobility (EM) using dynamic network distributed...
Preventing loops in networks operating different protocols to provide
A method and system for preventing loops in a network including network devices operating different protocols for providing loop-free topology are disclosed. In...
Method and apparatus for forwarding a tunneled packet in a data
A method is described for forwarding a tunneled packet in a data communications network. A header of the tunneled packet is removed at a forwarding node...
Tunneling scheme for transporting information over a cable network
A cable network includes a Data Over Cable Service Interface Specifications (DOCSIS) set-top gateway (DSG) server connected to an Internet Protocol (IP) network...