At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Locating and provisioning devices in a network
Methods and devices are provided for locating, identifying and provisioning devices in a network. According to some implementations of the invention, a...
Techniques for providing security protection in wireless networks by
Techniques for security protection of a wireless network are provided. An access point is operated in a first mode. The first mode is a mode of operation that...
Authentication for transmission control protocol
An embodiment of the invention incorporates, or encapsulates, authentication mechanisms into an initiation phase of a transmission protocol session. In a...
Method and system for secure connection of peripheral device to processing
A method, system and apparatus are provided for securely connecting a peripheral device to a processing device in a wireless network. The peripheral device makes...
Methods and systems for generating and storing computer program execution
Methods and systems for generating and storing computer program execution trace data are disclosed. A method includes receiving a signal that enables the...
Bidirectional inline power port
A method and apparatus for bidirectional provision of inline power over data telecommunications cabling permits power to be received at a local powered device...
Facilitating 802.11 roaming by pre-establishing session keys
A method and system for pre-authenticating a pre-establishing key management on a roaming device prior to re-association to facilitate fast hand-off in a...
Protected dynamic provisioning of credentials
A method and implementation is disclosed for secure communication between two or more parties. A secure tunnel is established between parties using an encryption...
Intelligent allocation of programmable comparison operations for reducing
the number of associative memory...
Intelligent allocation of programmable comparison operations may reduce the number of associative memory entries required for programming an associative memory...
Apparatus and methods for providing an application level gateway for use
An application level gateway allows computers on a local area or "internal" network to serve data (e.g., web pages, files or other constructs) to computer...
Switching a client from unicasting to multicasting by increasing the
unicast stream rate to the client
Switching a client from unicasting back to multicasting involves accumulating enough digital video content at the client to bridge the time it takes to...
Communicating a selection of a potential configuration
A first streaming media device, such as a Voice over Internet Protocol (VoIP) phone initiates a communication session with a second streaming media device. An...
Exporting management information base data using IPFIX
In one embodiment, a networking device includes logic encoded in one or more tangible media for execution and when executed operable to cause performing...
Resource allocation and reclamation for on-demand address pools
A method for on-demand management of Internet Protocol (IP) address pools includes allocating an unused IP address from a local IP address pool designated for a...
Advanced signaling for multi-stage transceivers
Systems and methods for advanced signaling between stages of transmitters and/or receivers in a digital communication system. One or more intermediate frequency...
Method for up-link transmit power management in a wireless broadband
A method is disclosed for optimizing up-link transmit powers of a wireless broadband terminal operating in a predetermined frequency band in a multi-carrier...
Packet telephony bridging server
A bridging server instantiates virtual packet telephones that emulate physical packet telephone instruments, and includes a switch operative to establish...
Mobile device calls via private branch exchange
Communication systems and methods are described that enable mobile devices to route telephone calls via an enterprise telephone system. The communication system...
System for grouping attributes in packets in a radius protocol
A system for inserting data into data packets of a protocol for transmitting network information between processing systems connected to a network. The system...
Managing traffic within and between virtual private networks when using a
session border controller
Methods and devices for managing traffic at a session border controller (SBC) are described. A signal portion of traffic en route from a source in a virtual...
System and method for providing source awareness in a wireless application
protocol network environment
A method for communicating in a wireless application protocol (WAP) network environment is provided that includes receiving a request packet at a WAP gateway and...
Traffic monitor using leaky bucket with variable fill
An integrated circuit monitors the most active traffic flow rates on a communications network by using a leaky bucket model having a variable fill rate. As a...
Applying features to packets in the order specified by a selected feature
Disclosed are, inter alia, methods, apparatus, data structures, computer-readable media, mechanisms, and means for applying features to packets in an order...
Butterfly network with switches set for two node disjoint paths and method
for forming the paths
In a butterfly network, a number of switches are set to provide two paths that are independent of each other, from a first switch to a second switch, and from...
Reserving network resources for a communication session
Requesting a network resource includes facilitating a communication session between a mobile node and an endpoint. A trigger event is received at a first anchor...
Method and apparatus for measuring latency of a computer network
A method for operating a computer network has a source router transmit a first message to be received by an intermediate router of the computer network, the...
Using mini-beacons in a wireless network
A method, apparatus, and software containing computer readable code to implement the method implemented in a first wireless device, e.g., an access point. The...
Automatic ORF-list creation for route partitioning across BGP route
A method, apparatus and computer program product for providing Outbound Route Filtering (ORF) is presented. An ORF list is produced and an ORF filter is built...
Method and system for self-testing a line card
According to one embodiment of the invention, a method for self-testing a portion of a line card having a digital signal processor for manipulating data received...
Integrated flow control
Described herein is a flow control scheme suitably adaptable to Transmission Control Protocol (TCP) and Stream Control Transmission Protocol (SCTP). In an...
Method and apparatus for providing secure blast calls
Various embodiments provide a method and apparatus for providing secure blast calls. An example embodiment includes a secure blast call apparatus including a...
Dual-purpose uplinks used in a fault-tolerant stack
A fault-tolerant stack of low cost switches each having only two dual-purpose uplinks is enabled by utilizing a specified topology for connecting the uplinks and...
Hybrid distance vector protocol for wireless mesh networks
A method of hybrid route discovery in a mesh network is described. The method comprises the optional designation of a root node of the mesh network and...
System and method for preserving multicast data forwarding during control
failures in a router
A multicast non-stop forwarding (NSF) router architecture enhances high availability of a multicast router in a computer network. The router architecture further...
Detecting theft and disabling stolen equipment
Some implementations of the present invention provide methods and devices for detecting the theft of, and disabling, electronic devices such as computers and...
A clip assembly having first and second clip members. In an example embodiment the first and second clip members are generally matching. Each clip member...
Power line communication device
Method and apparatus for routing data to a load balanced server using MPLS
A method of routing data to a load-balanced server through a network having one or more load-balancing nodes is disclosed, comprising receiving a label value;...
Methods and systems for transforming a parse graph into an and/or command
Methods and systems for transforming a complex representation of computer code into a simplified representation of computer code are described. Parse nodes in a...
Interlocking input/outputs on a virtual logic unit number
In one embodiment, a solution is provided wherein a lock client sends lock requests to a lock manager upon receipt of an input/output (I/O) and receives back a...
Method and apparatus to scale and unroll an incremental hash function
A method and apparatus speeding up an incremental hash function is described. The method may comprise receiving a data string including a plurality of N data...
Method and apparatus for site administration at a wireless handset
A method for site administration includes receiving a user's instruction to invoke a tool at a wireless handset. The method also includes invoking execution of...
Wideband cable system
A wideband cable modem system increases available bandwidth of a single channel by encoding a data stream into wideband packets. The wideband packets are...
System and method for queue management using queue sets
The disclosure describes queue management based on queue sets. A queue set comprises a group of packets or packet references that are processed as a single...
Method and apparatus for traffic quality and billing authorization by
request token insertion
Internet services are differentiated by including user-reflexive data with a user request. The user-reflexive data may specify a quality of service to be...
Enhanced packet classification
A method for classifying a data packet containing a header is provided. The method may comprise parsing the header of a data packet into header elements. Rules...
Validating internal routing protocol information passed through an
external routing protocol
In one embodiment, a method includes receiving authenticated site data that includes site ID data and address data. The site ID data indicates a unique site ID...
Method and system for transporting data using pseudowire circuits over a
A method for data communication across a layer 2 bridged network having two or more edge nodes configured for receiving and transmitting multiprotocol data...
Method and system for handling a mobile endpoint in a wireless network
A method of handling a mobile endpoint in a wireless network includes routing data for a mobile endpoint through a first base station. The mobile endpoint is...
Extensions to the path verification protocol to support link bundling
To reveal link bundles' component links in an MPLS network, transmit a sequence of request and reply packets. For a router receiving a request packet, the packet...