At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Mobile device calls via private branch exchange
Communication systems and methods are described that enable mobile devices to route telephone calls via an enterprise telephone system. The communication system...
System for grouping attributes in packets in a radius protocol
A system for inserting data into data packets of a protocol for transmitting network information between processing systems connected to a network. The system...
Managing traffic within and between virtual private networks when using a
session border controller
Methods and devices for managing traffic at a session border controller (SBC) are described. A signal portion of traffic en route from a source in a virtual...
System and method for providing source awareness in a wireless application
protocol network environment
A method for communicating in a wireless application protocol (WAP) network environment is provided that includes receiving a request packet at a WAP gateway and...
Traffic monitor using leaky bucket with variable fill
An integrated circuit monitors the most active traffic flow rates on a communications network by using a leaky bucket model having a variable fill rate. As a...
Applying features to packets in the order specified by a selected feature
Disclosed are, inter alia, methods, apparatus, data structures, computer-readable media, mechanisms, and means for applying features to packets in an order...
Butterfly network with switches set for two node disjoint paths and method
for forming the paths
In a butterfly network, a number of switches are set to provide two paths that are independent of each other, from a first switch to a second switch, and from...
Reserving network resources for a communication session
Requesting a network resource includes facilitating a communication session between a mobile node and an endpoint. A trigger event is received at a first anchor...
Method and apparatus for measuring latency of a computer network
A method for operating a computer network has a source router transmit a first message to be received by an intermediate router of the computer network, the...
Using mini-beacons in a wireless network
A method, apparatus, and software containing computer readable code to implement the method implemented in a first wireless device, e.g., an access point. The...
Automatic ORF-list creation for route partitioning across BGP route
A method, apparatus and computer program product for providing Outbound Route Filtering (ORF) is presented. An ORF list is produced and an ORF filter is built...
Method and system for self-testing a line card
According to one embodiment of the invention, a method for self-testing a portion of a line card having a digital signal processor for manipulating data received...
Integrated flow control
Described herein is a flow control scheme suitably adaptable to Transmission Control Protocol (TCP) and Stream Control Transmission Protocol (SCTP). In an...
Method and apparatus for providing secure blast calls
Various embodiments provide a method and apparatus for providing secure blast calls. An example embodiment includes a secure blast call apparatus including a...
Dual-purpose uplinks used in a fault-tolerant stack
A fault-tolerant stack of low cost switches each having only two dual-purpose uplinks is enabled by utilizing a specified topology for connecting the uplinks and...
Hybrid distance vector protocol for wireless mesh networks
A method of hybrid route discovery in a mesh network is described. The method comprises the optional designation of a root node of the mesh network and...
System and method for preserving multicast data forwarding during control
failures in a router
A multicast non-stop forwarding (NSF) router architecture enhances high availability of a multicast router in a computer network. The router architecture further...
Detecting theft and disabling stolen equipment
Some implementations of the present invention provide methods and devices for detecting the theft of, and disabling, electronic devices such as computers and...
A clip assembly having first and second clip members. In an example embodiment the first and second clip members are generally matching. Each clip member...
Power line communication device
Method and apparatus for routing data to a load balanced server using MPLS
A method of routing data to a load-balanced server through a network having one or more load-balancing nodes is disclosed, comprising receiving a label value;...
Methods and systems for transforming a parse graph into an and/or command
Methods and systems for transforming a complex representation of computer code into a simplified representation of computer code are described. Parse nodes in a...
Interlocking input/outputs on a virtual logic unit number
In one embodiment, a solution is provided wherein a lock client sends lock requests to a lock manager upon receipt of an input/output (I/O) and receives back a...
Method and apparatus to scale and unroll an incremental hash function
A method and apparatus speeding up an incremental hash function is described. The method may comprise receiving a data string including a plurality of N data...
Method and apparatus for site administration at a wireless handset
A method for site administration includes receiving a user's instruction to invoke a tool at a wireless handset. The method also includes invoking execution of...
Wideband cable system
A wideband cable modem system increases available bandwidth of a single channel by encoding a data stream into wideband packets. The wideband packets are...
System and method for queue management using queue sets
The disclosure describes queue management based on queue sets. A queue set comprises a group of packets or packet references that are processed as a single...
Method and apparatus for traffic quality and billing authorization by
request token insertion
Internet services are differentiated by including user-reflexive data with a user request. The user-reflexive data may specify a quality of service to be...
Enhanced packet classification
A method for classifying a data packet containing a header is provided. The method may comprise parsing the header of a data packet into header elements. Rules...
Validating internal routing protocol information passed through an
external routing protocol
In one embodiment, a method includes receiving authenticated site data that includes site ID data and address data. The site ID data indicates a unique site ID...
Method and system for transporting data using pseudowire circuits over a
A method for data communication across a layer 2 bridged network having two or more edge nodes configured for receiving and transmitting multiprotocol data...
Method and system for handling a mobile endpoint in a wireless network
A method of handling a mobile endpoint in a wireless network includes routing data for a mobile endpoint through a first base station. The mobile endpoint is...
Extensions to the path verification protocol to support link bundling
To reveal link bundles' component links in an MPLS network, transmit a sequence of request and reply packets. For a router receiving a request packet, the packet...
Technique for providing dynamic modification of application specific
policies in a feedback-based, adaptive...
A feedback-based adaptive network is described wherein at least a portion of the network elements report operating information relating to network conditions to...
Port analyzer adapter
Methods and devices are provided for encapsulating FC frames from a network device as Ethernet frames. Preferably, the FC frames represent traffic for a...
TCP optimized single rate policer
An extension to the conventional single rate microflow policer that provides dual rate policing with a minimum of extra resource utilization. Using the extended...
Ethernet connectivity fault management (CFM) area boundary translator
An Ethernet Connectivity Fault Management (CFM) Area Boundary Translator is configured to translate incompatible CFM messages being sent between networks...
Method and system for preventing DOS attacks
A method, system and apparatus for preventing Denial of Service (DOS) attacks on a device are provided. The method includes determining that the device is...
Verifying information stored on a managed network device
A method and mechanism for verifying information on a managed device is provided. A request is received at a managed device that contains one or more values that...
Managing network device configuration using versioning and partitioning
Configuration versioning and partitioning are provided as methods for managing large configuration for a network element such as a router or switch. In one...
Methods and systems for extracting information from computer code
Methods and systems for manipulating information represented by computer code are described. Macroinstructions that are used to analyze an input are accessed....
Targeted regression testing
A software testing method. In particular implementations, a method includes accessing a first database of one or more bug entries, wherein each bug entry...
Using modem profiles to improve connectivity, connect timing, and
compression performance on a modem relay (MR)...
Cached or predictive negotiation of compression parameters over a modem relay network connection involves method and apparatus for determining at a gateway the...
System and method for propagating filters
A method and system for propagating filters to an upstream device. The method includes generating a filter at a first network device and sending information on...
Proxy for network address allocation
This invention provides a method and apparatus for issuing or renewing a host address. The apparatus has an input device to receive a data packet having a host...
Unidirectional drop and continue using bidirectional transponder
Systems and methods for unidirectional communication in an optical network employing bidirectional transponders are provided. The modulation and amplification...
Enabling cisco legacy power to support IEEE 802.3 AF standard power
An apparatus and method for enabling Cisco legacy power to support IEEE 802.3af standard power. A network power system capable of delivering data terminal...
System and method for providing a dial plan conversion in a session
initiation protocol (SIP) environment
A method to be executed in a session initiation protocol (SIP) environment is provided that includes initiating a conversion process that involves a change from...
System and method for end-to-end communications tracing
A method for tracing communications includes receiving trace criteria from a first remote element and determining whether a call signaling message matches the...
System and method for implementing dynamic suppression and recreation of
suppressed data in a communications...
A method for communicating data is provided that includes receiving a plurality of bits associated with a communications flow and determining whether one or more...