At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
US-8,156,309 |
Translation look-aside buffer with variable page sizes Multiple pipelined Translation Look-aside Buffer (TLB) units are configured to compare a translation address with associated TLB entries. The TLB units operated... |
US-8,156,244 |
Software client control of digital picture frames In one embodiment, a method can include: determining a topology of digital picture frames in a frame network; identifying a lead picture frame from among the... |
US-8,156,233 |
Streaming of templates and data records in individual streams using a
multistream protocol In one embodiment, a method includes determining a first template defining a data format for one or more first data records and a second template defining a... |
US-8,156,230 |
Offload stack for network, block and file input and output An apparatus for offloading network, block and file functions from an operating system comprises a network interface coupled to a network for receiving packet... |
US-8,156,209 |
Aggregation devices processing keep-alive messages of point-to-point
sessions Several keep-alive messages of point to point (PPP) sessions received from a remote system are aggregated into a single packet in an aggregation device (e.g.,... |
US-8,155,650 |
Method and system for selective buffering A method for selective buffering includes establishing a first connection with a mobile endpoint. The first connection provides for an exchange of data with the... |
US-8,155,619 |
Interoperability and collaboration system with emergency interception
monitoring Methods and apparatus for automatically connecting an emergency caller with appropriate responders within an interoperability and collaboration system.... |
US-8,155,482 |
Selecting wider bandwidth channels in a wireless network Techniques are provided for selecting channels for a wider bandwidth operation mode of a wireless network, such as wireless network that operates in accordance... |
US-8,155,207 |
Processing and managing pictures at the concatenation of two video streams Systems and methods that receives a video stream in a transport stream, the first video stream comprising a plurality of compressed pictures, and that receives... |
US-8,155,151 |
Secure combined interoperable multiplexing Systems and methods for combining a plurality of transport streams into a single transport stream for transmission to, e.g., a single frequency network via a... |
US-8,155,147 |
Techniques for ensuring synchronized processing at remote fibre channel
and fibre connectivity networks Techniques described use Generic Framing Procedure (GFP) to transport data across an optical transport network between near and far Fiber Channel (FC) or Fiber... |
US-8,155,130 |
Enforcing the principle of least privilege for large tunnel-less VPNs Techniques for secure communication in a tunnel-less VPN are provided. A key server generates and provides, to each VPN gateway, different, yet ... |
US-8,155,129 |
Suspending operation of border gateway protocol A checkpointing approach enables BGP peers to reduce the number of UPDATE messages that are exchanged and processed after a router restarts and to pause and... |
US-8,155,125 |
Apparatus and method for utilizing aggregate network links for multicast
switching A method, system, and apparatus to transmit replicated multicast packets over a plurality of physical network links that are combined into one logical channel... |
US-8,155,077 |
Active mode internet protocol gateway relocation in a partial meshed
deployment Methods, apparatuses and systems directed to facilitating optimized routing and mobility for communication sessions in partial mesh network deployments.... |
US-8,155,014 |
Method and system using quality of service information for influencing a
user's presence state In accordance with a particular embodiment of the present invention, a method using Quality of Service (QoS) information to influence a user's presence state is... |
US-8,155,007 |
Path optimization for mesh access points in a wireless mesh network In one embodiment, a method includes, in each of a plurality of mesh access points, connecting to one of a plurality of mesh controllers in a mesh network and... |
US-8,155,003 |
Aggregate policing applying max-min fairness for each data source based on
probabilistic filtering In one embodiment, a method comprises calculating a corresponding data packet arrival rate for each of a plurality of data sources supplying data packets... |
US-8,155,000 |
Technique for enabling traffic engineering on CE-CE paths across a
provider network In one embodiment, Traffic Engineering (TE) is configured on a provider edge device to customer edge device (PE-CE) link extending from a provider edge device... |
US-8,154,990 |
Less loss in-order delivery protocol for fibre connection architecture Methods and apparatus for providing in-order delivery in Fibre Channel (FC) fabric are disclosed. A topological change between a first switch and a second... |
US-8,154,988 |
Delivery of streams to repair errored media streams in periods of
insufficient resources In one embodiment, a method includes ingesting a program stream from a program source on a first channel. The method also includes storing the program stream,... |
US-D657,362 |
Electronic device |
US-8,151,365 |
Filtering access to data objects In one embodiment, a code server and edit server are provided. The code server stores the source code. Users do not access the code server directly. Rather, an... |
US-8,151,348 |
Automatic detection of reverse tunnels Presently disclosed are methods and apparatus for analyzing packets and packet flows to detect covert communications channels (including reverse tunnels) in... |
US-8,151,338 |
Method and system for continuously serving authentication requests A method and system for continuously serving the authentication requests of networked computers is disclosed. The authentication requests of computers are... |
US-8,151,318 |
Method and apparatus for reliably and asymmetrically distributing security
information within a fibre channel... A reliable asymmetric method for distributing security information within a Fiber Channel Fabric. The Switching Fabric includes a set of security servers, which... |
US-8,151,076 |
Mapping memory segments in a translation lookaside buffer In one embodiment, a method includes identifying first and second memory segments associated with a process in virtual memory, allocating memory for the first... |
US-8,150,951 |
System and method for communicating in a loadbalancing environment A method for communicating in a loadbalancing environment is provided that in a particular embodiment includes receiving a request packet from a network access... |
US-8,150,792 |
System and method for performing activities based on proximity A system and method applies events to a set of rules, and such rules can produce still other events that can be provided to the same or different set of rules.... |
US-8,150,018 |
System and method for provisioning connections as a distributed digital
cross-connect over a packet network A method includes receiving a request to provision a path associated with at least a portion of a packet network and determining whether a router is associated... |
US-8,149,942 |
Method and system for selecting a transmission scheme in a
multiple-input-multiple-output wireless... The present invention discloses a method for selecting a transmission scheme in a multiple-input-multiple-output (MIMO) wireless communications system. The... |
US-8,149,871 |
Pointer offset mechanism enabling cost effective SONET/SDH
mapping/demapping over ethernet In one embodiment, a SONET/SDH over Ethernet demapping point utilizes a pointer offset mechanism for clock recovery and timing. The pointer offset is determined... |
US-8,149,843 |
Capability exchange between network entities in WiMAX Techniques for exchanging capabilities in a wireless network are provided. In one embodiment, a first device receives a capability message over a communication... |
US-8,149,842 |
Automated discovery of network devices supporting particular transport
layer protocols Disclosed are, inter alia, methods, apparatus, computer-storage media, mechanisms, and means associated with automated discovery of network devices supporting... |
US-8,149,833 |
Wideband cable downstream protocol A network device has a communications port to provide communication with a data network and a cable port to provide communication with a cable network across... |
US-8,149,731 |
Technique for transferring data over a packet switched network A technique transfers data over a packet-switched network (PSN), comprising a plurality of intermediate nodes, in a manner that does not require that the... |
US-8,149,713 |
Forwarding of packets based on a filtered forwarding information base A filtered Forwarding Information Base (FIB) (the "complete local FIB") is used to determine how to forward packets, typically on line cards. The complete local... |
US-8,149,710 |
Flexible and hierarchical dynamic buffer allocation In one embodiment, a method comprises the following steps: receiving a first set of inputs comprising a first plurality of entities and a first traffic... |
US-8,149,708 |
Dynamically switching streams of packets among dedicated and shared queues Streams of packets are dynamically switched among dedicated and shared queues. For example, when a packet stream is in a maintenance mode (such as to keep a... |
US-8,149,683 |
Fail-safe inline power in a wired data telecommunications network A dynamic fuse element is provided in an inline power circuit to provide an electrical current protection level that varies in accordance with allocated current... |
US-8,149,261 |
Integration of audio conference bridge with video multipoint control unit In one embodiment, a system includes a video multipoint control unit (MCU) and an audio conferencing bridge, the audio conferencing bridge being operable to... |
US-8,146,148 |
Tunneled security groups A method for providing security groups based on the use of tunneling is disclosed. The method includes assigning a security group identifier (SGI) to a packet... |
US-8,145,789 |
Method providing a single console control point for a network device
cluster A cluster console user interface provides a single console control point for a network device cluster comprising a first switch device, a plurality of active... |
US-8,145,787 |
Adaptive bandwidth utilization over fabric links Disclosed is a method and apparatus for adapting bandwidth utilization over fabric links. In one embodiment of the method, a transmitting device transmits data... |
US-8,145,778 |
Method and system for transitioning streamed digital video content between
stream servers in a digital video... A technique for transitioning streamed digital video content between stream servers involves identifying a transition identifier that indicates a point at which... |
US-8,145,659 |
Real-time communications enhanced search One embodiment disclosed relates to a method of providing a real-time communications enhanced search service. When a search request from a client application, a... |
US-8,145,272 |
Pilot-based two-dimensional channel estimation Techniques are provided herein to estimate channel information based a received burst that is comprises of consecutive transmissions. Each transmission... |
US-8,145,249 |
Method and system for providing a proxy media service A method for providing a push-to-talk proxy media service includes receiving a plurality of monitored push-to-talk communication streams over a high bandwidth... |
US-8,145,184 |
Protected data capture In one embodiment, a method includes receiving disposition data from a subscriber. The disposition data indicates a first particular condition predicate for... |
US-8,144,784 |
Position coding for context-based adaptive variable length coding Particular embodiments include a method, an apparatus, and logic embodied in tangible computer-readable medium that when executed carries out a method of... |