At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Quasi RTP metrics for non-RTP media flows
In one embodiment, a router receives a real-time multimedia flow that comprises IP packets. The router then processes values included in the Identifier fields of...
Method and apparatus for N+1 RF switch with passive working path and
active protection path
The present disclosure relates an improved cable data switching unit that provides a fail-over system whereby one line card can protect a plurality of US...
Method of fault tolerance and synchronous failover for broadcast video
across the network
A system and a method are disclosed for detecting a multicast stream fault condition at a variety of points within a digital broadcast video distribution system....
Beamforming multiple-input multiple-output hybrid automatic repeat request
Techniques are provided for improving hybrid automatic repeat request retransmissions techniques in a beamformed multiple-input multiple-output wireless...
RFID tag management and operation
In an example embodiment, an apparatus such as an RFID tag, is configured to operate in a first mode that allows the tag to associate with the network and...
Network connection detection and throttling
In an edge network, message traffic between the edge network and a core network passes through the edge router. A port scanning attack directed to the network as...
Method and system for minimal disruption during software upgrade or reload
of a network device
A method and system for resetting a network device. Specifically, in one embodiment, a method is disclosed for upgrading and/or reloading software for a network...
Multiple password documents
An apparatus, method, and computer-readable media capable of encrypting and unencrypting secure documents with multiple passwords and/or fallback keys....
Role aware network security enforcement
Generating a binding between a source address and one or more roles of a user accessing the network and distributing the binding to a filter node. The source...
Method for checkpointing and reconstructing separated but interrelated
A method is disclosed whereby separate but interrelated data is checkpointed and reconstructed within a router. In one embodiment, each connection is...
Redundancy elimination by aggregation of multiple chunks
A data redundancy elimination system. In particular implementations, a method includes storing in a memory one or more aggregation trees, each aggregation tree...
Network address translation with gateway load distribution
Gateway and NAT services to a single host or large number of hosts on a local network using a redundancy group having gateway devices. A pool of unique IP...
Computation of a shortest inter-domain TE-LSP across a set of autonomous
A technique calculates a shortest path for a traffic engineering (TE) label switched path (LSP) from a head-end node in a local domain to a tail-end node of a...
Wirelessly-enabled identification of digital media generated at an event
A method in one embodiment includes embedding a unique event tag into media files recorded at an event by a first media recording device, which is operable to...
Apparatus and method to bridge telephone and data networks
In accordance with one embodiment, the disclosure relates to a method for initiating an online meeting over a data network between a host party with a first...
Ad-hoc mobile IP network for intelligent transportation system
A method for intelligently managing a transportation network is provided. The method may include providing a roadside apparatus 18 to communicate with nodes 14A...
Authentication of mobile stations
A method and system for authenticating a mobile station, such as a dual mode cellular telephone, for access to a wireless local area network is disclosed. The...
Facilitating mobility for a mobile station
Providing a mobility key for a communication session for a mobile station includes facilitating initiation of the communication session. A master key for the...
Method and system for handling calls at an automatic call distribution
A method for handling calls at an automatic call distribution system includes receiving a first call for connection with one of a plurality of agents and...
System and method for providing presence information to voicemail users
A method of providing telecommunication service includes receiving a call for a called party from a calling party. The method also includes determining a...
Adaptive link delay management in wireless link systems
Systems and methods for adapting IEEE 802.11 wireless communications for environments involving long propagation delays. Improved system throughput and stability...
Method and system for reducing synchronization of data in a network
In one embodiment, a method and a system for reducing synchronization of data in a network is disclosed. The method includes generating a string based on the...
System and method to process data packets in a network using stateful
A method and device to process a packet received by a network device is described. The method may comprise analyzing the packet to identify at least one set of a...
Load balancing for mobile IP home agents
In one embodiment, mobile nodes may be pre-provisioned with a static home agent address and a static home address. The home agent address may be the same for all...
Method and system for providing control plane resiliency with undisrupted
forwarding in a data network
Method and system for providing continuous data forwarding during a failure mode in a wireless data network including detecting a control plane failure mode of a...
Backup BGP paths for non-multipath BGP fast convergence
A technique institutes backup Border Gateway Protocol (BGP) paths for non-multipath BGP Fast Convergence in a computer network. According to the novel technique,...
Method of controlling network access that induces consumption of merchant
goods or services
A method of controlling access to a computer network, the method comprising the steps of receiving a request for network access from an end station device;...
A method of provisioning a device through a command interface is described. A command interface capable of displaying a plurality of outputs is generated. A...
Neighbor discovery using address registration protocol over ELMI
A system and method for mapping a network to facilitating configuration is disclosed. Address registration information is appended to an enhanced local...
Method and system for providing information about a push-to-talk
A method for providing information about a push-to-talk communication session includes facilitating a push-to-talk communication session among a plurality of...
Detecting address spoofing in wireless network environments
Methods, apparatuses and systems directed to detecting address spoofing in wireless networks by, after receiving a wireless management frame, transmitting...
Methods and systems for differential billing of services used during a
mobile data service session
Methods and systems for differential billing of services used during a mobile data service user session are disclosed. A method includes identifying a mobile...
End-to-end chromatic dispersion characterization of optically amplified
An economic way of determining the chromatic dispersion along a link of a DWDM network is provided. A transmitter modulates the output signals of two lasers...
Integrated optical service channel and quantum key distribution channel
A method for integrating an Optical Service Channel (OSC) with a Quantum Key Distribution (QKD) channel across a DWDM network having a single mode optical fiber...
Proxy server for internet telephony
An apparatus and a method are provided for proxying communications between devices on an IP telephony network. In a preferred embodiment, an appliance comprising...
Start of packet detection for multiple receiver combining and multiple
input multiple output radio receivers
A method and an apparatus for detecting the start-of-packet in a wireless receiver operating in a packetized wireless network. One method embodiment includes...
Pipelined packet switching and queuing architecture
An architecture for a line card in a network routing device is provided. The line card architecture provides a bi-directional interface between the routing...
Disconnected transport protocol connectivity
In an embodiment, an existing transport protocol connection though a mobile device is recognized as having entered a state of disconnect. A lowest received...
Bidirectional multicast protocol with upstream and downstream join
Systems and methods for implementing a bidirectional multicast protocol with two types of join messages are disclosed. The two types of join messages, upstream...
Platform independent implementation of private VLANS
A PVLAN having a primary and secondary VLAN's where the primary and secondary VLAN's have ports and the users connected to those ports. The MAC addresses of...
Network device architecture for centralized packet processing
A method and system for centralized packet processing is disclosed. The method includes transferring a packet received at a port interface of a network device to...
Packet telephony across the public switched telephone network
A network device that allows packet relay across a public switched telephone network. The network device has a converter operable to convert a packet data stream...
Managing network service access
Managing network service access includes receiving a packet data service request. The packet data service request is associated with a mobile subscriber and a...
Dynamic multipoint tree rearrangement
A mechanism to dynamically map a multicast session to a transport tree to reduce flooding of egress routers on the transport tree is provided. A mechanism to...
Technique to automatically deaggregate an optimum set to prevent
suboptimal routing or routing failures within...
In one embodiment, information is signaled between aggregating routers indicating the components of aggregated addresses. This information is used to dynamically...
Apparatus and method for preventing disruption of fibre channel fabrics
caused by ReConfigure Fabric (RCF) messages
An apparatus and method for preventing the disruption of Fiber Channel Fabrics caused by ReConfigure Fabric (RCF) messages is disclosed. The apparatus includes a...
Network monitoring using a proxy
A method and apparatus for network monitoring using a proxy are disclosed. In one embodiment, a method generally comprises receiving at a proxy, path information...
Devices, softwares and methods for incorporating burstiness of packet loss
metric in QoS based network routing
Devices, software, and methods quantify a burstiness quality of the packet loss in the node of a path. The quantified burstiness becomes a metric for determining...
Method of performance measurement for a scalable network
Systems and methods for measuring the performance of a scalable network are disclosed. In one embodiment, a system configured in accordance with this disclosure...
Forwarding data in a data communications network
An apparatus for forwarding data in a data communications network having as components nodes and links there between, the apparatus being arranged to forward...