At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Detecting address spoofing in wireless network environments
Methods, apparatuses and systems directed to detecting address spoofing in wireless networks by, after receiving a wireless management frame, transmitting...
Methods and systems for differential billing of services used during a
mobile data service session
Methods and systems for differential billing of services used during a mobile data service user session are disclosed. A method includes identifying a mobile...
End-to-end chromatic dispersion characterization of optically amplified
An economic way of determining the chromatic dispersion along a link of a DWDM network is provided. A transmitter modulates the output signals of two lasers...
Integrated optical service channel and quantum key distribution channel
A method for integrating an Optical Service Channel (OSC) with a Quantum Key Distribution (QKD) channel across a DWDM network having a single mode optical fiber...
Proxy server for internet telephony
An apparatus and a method are provided for proxying communications between devices on an IP telephony network. In a preferred embodiment, an appliance comprising...
Start of packet detection for multiple receiver combining and multiple
input multiple output radio receivers
A method and an apparatus for detecting the start-of-packet in a wireless receiver operating in a packetized wireless network. One method embodiment includes...
Pipelined packet switching and queuing architecture
An architecture for a line card in a network routing device is provided. The line card architecture provides a bi-directional interface between the routing...
Disconnected transport protocol connectivity
In an embodiment, an existing transport protocol connection though a mobile device is recognized as having entered a state of disconnect. A lowest received...
Bidirectional multicast protocol with upstream and downstream join
Systems and methods for implementing a bidirectional multicast protocol with two types of join messages are disclosed. The two types of join messages, upstream...
Platform independent implementation of private VLANS
A PVLAN having a primary and secondary VLAN's where the primary and secondary VLAN's have ports and the users connected to those ports. The MAC addresses of...
Network device architecture for centralized packet processing
A method and system for centralized packet processing is disclosed. The method includes transferring a packet received at a port interface of a network device to...
Packet telephony across the public switched telephone network
A network device that allows packet relay across a public switched telephone network. The network device has a converter operable to convert a packet data stream...
Managing network service access
Managing network service access includes receiving a packet data service request. The packet data service request is associated with a mobile subscriber and a...
Dynamic multipoint tree rearrangement
A mechanism to dynamically map a multicast session to a transport tree to reduce flooding of egress routers on the transport tree is provided. A mechanism to...
Technique to automatically deaggregate an optimum set to prevent
suboptimal routing or routing failures within...
In one embodiment, information is signaled between aggregating routers indicating the components of aggregated addresses. This information is used to dynamically...
Apparatus and method for preventing disruption of fibre channel fabrics
caused by ReConfigure Fabric (RCF) messages
An apparatus and method for preventing the disruption of Fiber Channel Fabrics caused by ReConfigure Fabric (RCF) messages is disclosed. The apparatus includes a...
Network monitoring using a proxy
A method and apparatus for network monitoring using a proxy are disclosed. In one embodiment, a method generally comprises receiving at a proxy, path information...
Devices, softwares and methods for incorporating burstiness of packet loss
metric in QoS based network routing
Devices, software, and methods quantify a burstiness quality of the packet loss in the node of a path. The quantified burstiness becomes a metric for determining...
Method of performance measurement for a scalable network
Systems and methods for measuring the performance of a scalable network are disclosed. In one embodiment, a system configured in accordance with this disclosure...
Forwarding data in a data communications network
An apparatus for forwarding data in a data communications network having as components nodes and links there between, the apparatus being arranged to forward...
Network fault correlation in multi-route configuration scenarios
A method and network device are shown that include identifying at least one fault identifier to be a member of a first fault set, and identifying at least one...
Measurement of optical fiber length and determination of chromatic
dispersion over the optical fiber
In one embodiment, first optical signal can be generated at a first end of an optical fiber segment at a first time. The first optical signal can be detected at...
Integration of authentication authorization and accounting service and
A single database maintained centrally hosts both proxy service data and authentication, authorization and accounting (AAA) data. Data is then copied to storage...
Method and system for reducing the false alarm rate of network intrusion
According to one embodiment of the invention, a computerized method for reducing the false alarm rate of network intrusion detection systems includes receiving,...
Prioritized call admission control for internet key exchange
A method for communication includes predefining two or more client profiles applicable to clients of a communication network. Virtual Private Network (VPN)...
Method and system for reprogramming instructions for a switch
The method and system for reprogramming instructions for a switch includes programming a redirection memory to associate a routing parameter set in a routing...
Method and apparatus for flooding link state packets to achieve faster
Disclosed are methods and apparatus for flooding link state packets or packet data units (LSP's) from a first node to one other LSP receiving node, where the...
System and method for load balancing a communications network
The invention relates to a system and method for load-balancing multiple servers in a communications network. Instead of using round robin or other predetermined...
Pre-emptive roaming mechanism allowing for enhanced QoS in wireless
A preemptive roaming mechanism in wireless network environments. In one implementation, the present invention provides a wireless client that implements a...
System and method for generating a unified accounting record for a
A method for creating an accounting record in a policy server in a communication network. The method also includes receiving policy data from one or more...
Hardware-based encryption/decryption employing dual ported key storage
A system for the encryption and decryption of data employing dual ported RAM for key storage to accelerate data processing operations. The on-chip key storage...
System and method for improving transrating of MPEG-2 video
The present invention discloses how a transcoder may be used to reduce the bit rate of an MPEG-2 stream by transmitting only the visible area of the movie...
Setting a forwarding address in an internet protocol version 6 (IPv6)
routing protocol domain at a boundary...
In one embodiment, a method includes receiving a neighbor discovery message and a border routing message through an interface at a particular router. The...
Method and system for simplified network wide traffic and/or flow
monitoring in a data network
Method and system for providing dynamic network data traffic monitoring including monitoring a data network, detecting a change in the data network, initiating a...
Upstream data rate estimation
In one embodiment, a device includes: a transceiver operable to transmit packets to and receive packets from a modem; and a logic engine configured to transmit...
Method and system of providing an integrated reputation service
Reputation information, associated with a source that utilizes different communication formats, is accessed. First reputation information for one of the...
Method and system for identifying and processing secure data frames
A method and system has been provided for identifying and processing secure data frames flowing between a source port and a switch port in a network. A data...
Approach for facilitating analysis of computer software errors
An approach for facilitating the analysis of computer software errors generally involves logging status data in a volatile memory, such as a random access memory...
Fallback key retrieval
An apparatus, method, and computer-readable media capable of encrypting and decrypting secure documents with multiple passwords and/or fallback keys. Embodiments...
Fast re-authentication with dynamic credentials
A proxy server that is inserted between a plurality of network access servers, typically an access points, and an authentication server. When an original...
Method and system for class-based management of dynamic content in a
A system and method to create a base file for a document class is described. In one example embodiment, the system comprises a monitor to maintain a list of...
Estimating traffic values or intervals for network topology and network
A method of estimating traffic values or intervals in a communications network, the network comprising a plurality of nodes being interconnected by links, the...
Diagnostic/remote monitoring by email
A network device for use in a communication system having a technical support center operated by a technical support staff, the technical support center being in...
Distributing configuration parameters in a high density network
A set of new information elements are defined that are to be used between an access point and a client that allow an access point to advertise its capabilities,...
Caching content at a cell site
Caching content includes receiving at a cell site a content request for content. The cell site is associated with a cell, and the content request is received...
Methods and apparatuses for generating compressed data representing a
The methods and apparatuses detect a color of each of a plurality of pixels within a frame; group a portion of the plurality of pixels having a common color into...
Method and system for providing agent training
A method for providing training to agents of an automatic call distribution center includes determining whether an agent is idle and, in response to determining...
System and method for improving the robustness of spatial division
multiple access via nulling
The present invention discloses a base transceiver station (BTS) equipped with a plurality of antennas for improving the robustness of spatial division multiple...
Receiver-based construction of point-to-multipoint trees using path
computation elements in a computer network
In one embodiment, a trigger to add a leaf node to a multicast group of a computer network is detected, and the leaf node may determine a root node of the...