At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method and system for prioritizing security operations in a communication
A method, system and apparatus for filtering data packets through an integrated network security device are provided. Various security operations are performed...
Technique for enabling bidirectional forwarding detection between edge
devices in a computer network
A technique enables bidirectional forwarding detection (BFD) between first and second edge devices in a computer network, wherein the second edge device is not...
Automated management of network addresses in a broadband managed access
Automatically managing network addresses in a managed access environment is described. A managed access environment is defined as one in which a service provider...
Network provisioning in a distributed network management architecture
A method for provisioning a service request in a computer network, the method including a) determining a service path within a model of the computer network from...
Method and system for migrating content on a network
A method and system for migrating content on a network. In one method embodiment, the present invention accesses a directory having a network address. A business...
Methods and apparatuses for selectively providing privacy through a
dynamic social network system
In one embodiment, the methods and apparatuses initiate a collaboration session from a presenter participant; select an available profile from a plurality of...
Diagnostic functionality for wireless client connectivity problems in
A troubleshooting system. In particular implementations, a method includes collecting, from a first wireless network element, PEM state associated with a...
Detection and enforcement of version compatibility in network devices
Methods and apparatus are provided for detecting and maintaining version compatibility in network devices. Interfaces associated with network devices and...
Hierarchical tree of deterministic finite automata
A hierarchical tree of deterministic finite automata (DFA) is traversed and/or generated based on a set of regular expressions. The hierarchical DFA includes a...
Linear associative memory-based hardware architecture for fault tolerant
A programmable logic unit (e.g., an ASIC or FPGA) having a feedforward linear associative memory (LAM) neural network checking circuit which classifies input...
Controlling playback of recorded media in a push-to-talk communication
In one embodiment a method is provided which comprises recording a push-to-talk communication session comprising media segments, each media segment being...
GW coupled SIP proxy
In one embodiment, a method can include: (i) performing an initial authentication with a mobile device in an access gateway, the access gateway being a point of...
System and method for communication using a wireless handset in wireless
and wired networks
A method for providing communication service includes detecting that a wireless handset has been decoupled from a base, wherein the base is associated with a...
Techniques for tracking communication frequency across communication
In on embodiment, techniques for providing alerts to a user when a communication frequency pattern between a user and a contact has not occurred during a...
Method and apparatus for token distribution in session for future polling
A system and a method are disclosed for authenticating a subsequent callback from a public safety answering point (PSAP) in response to a user agent's initial...
Method and system using shared configuration information to manage network
access for network users
In accordance with a particular embodiment of the present invention, a method using shared configuration information to manage network access for externally...
Bypass of routing protocol filtering in a multi-subnet network
In one embodiment, an apparatus may replace a first address included in a source address of a first routing protocol packet with a second address. The first...
Migration to IPv6 using combination of globally significant and locally
significant IPv4 addresses
Flexible migration from IPv4 to IPv6 is facilitated for the Internet and other data networks employing Internet Protocol. In one implementation, certain IPv4...
System and method for implementing a variable size codebook for
compression in a communications environment
A method for communicating data is provided that includes receiving a plurality of bits associated with a communications flow and applying a variable size...
System and method providing for interoperability of session initiation
protocol (SIP) and H.323 for secure...
To provide for interoperability of Session Initiation Protocol (SIP) and H.323 for Secure Realtime Transport Protocol session establishment, a transmit key is...
Techniques for determining communication state using accelerometer data
Techniques for communicating with a user on a network include receiving acceleration data that indicates acceleration of a mobile network node associated with a...
Method and apparatus for automatic inter-domain routing of calls
A method and apparatus for inter-domain routing of calls in a network, where the network represents a first wide area network. A routing node of the network...
Method for restoring a virtual path in an optical network using dynamic
A method for restoring a virtual path, provisioned between a source and a target node, in a mesh optical network is described. The method, in one embodiment,...
Adaptive sampling of radio frequency channels for radar detection
Described in an example embodiment herein is a procedure that comprises sampling one or more channels that are not in use for a short time at certain intervals....
Integrated audit and configuration techniques
Techniques for integrated audit and configuration are provided. The techniques include receiving a request from a user to analyze first configuration information...
Method and apparatus for distributing group data in a tunneled encrypted
virtual private network
A packet forwarding process, on a data communications device, forwards a packet to a plurality of destinations within a network from that data communications...
Proximity as an aid to caching and secondary serving of data
A proximity-based content control method "propagates" or positions content based upon "proximity" between various nodes on a network. The nodes between which the...
Technique for determining multi-path latency in multi-homed transport
The present invention describes various techniques which may be used for determining multi-path latency in data networks which utilize a multi-homed transport...
Access device-based fragmentation and interleaving support for tunneled
Link fragmentation and interleaving at an access device located between a point to point link and a tunneled connection is provided. A method of access...
Methods and apparatus for providing data distribution that supports
The invention is directed to techniques for providing data distribution that supports auditing. Accordingly, a data communications device receives data from a...
URL based communication protocol from a client computer to a network
A method of signaling in a computer network uses interception by a network device of a message transmitted by a client computer to a server. The message contains...
Floor control templates for use in push-to-talk applications
A processor-implemented method of operation for managing a push-to-talk (PTT) session involving a plurality of participants includes applying a first floor...
Constant time signature methods for scalable and bandwidth-efficient
A method, computer program product, system and apparatus are presented for reducing wasted bandwidth due to supercasting multicast cells through a router switch...
Translating native medium access control (MAC) addresses to hierarchical
MAC addresses and their use
Different mechanisms are disclosed for translating native Media Access Control (MAC) addresses to and from corresponding hierarchical MAC addresses, and the use...
Taxonomy based multiple ant colony optimization approach for routing in
mobile ad hoc networks
In one embodiment, an apparatus comprises route management logic. The logic is operable to send a plurality of forward-route packets over a route to a...
Rogue access point detection
A method of detecting a rogue access point is disclosed. A message is directed from a supplicant to a network through a first access point. A response message is...
Arrangement in a router for distributing a routing rule used to generate
routes based on a pattern of a...
A router is configured for sharing routing rules with other routers, the routing rules defining aggregated routes according to a prescribed topology. Each...
Performance optimization for wireless networks with mixed modulation types
Significant improvements in throughput of networks employing disparate physical layer standards are provided. Different physical layer standards are segregated...
Out of band flow control
In one embodiment, a flow control module aggregates indications of queuing resource utilization at devices attached to a switching fabric within a router and...
System and method for handling network overload
A system and method for handling network overload includes receiving one or more requests, wherein an originating client originates the one or more requests. It...
Retransmission and flow control in a logical network tunnel
A system includes a network tunnel, an ingress network device coupled to send packets via the network tunnel, and an egress network device coupled to receive...
Transmission control protocol (TCP) congestion control using transmission
According to the present invention, methods and apparatus are provided to improve the Transmission Control Protocol (TCP) for data such as delay sensitive or...
Aggregate data frame generation
In an example embodiment, an aggregate frame, such as a A-MSDU aggregate is generated from interleaved frames addressed to various receiver addresses. The...
System and method for increasing accuracy of transmitter power detection
over a larger range of output power levels
A system and method for increasing accuracy of transmitter power detection over a larger range of output power levels wherein a diode detector is followed by a...
Method for verifying configuration changes of network devices using
A method and apparatus for verifying configuration changes for network devices using digital signatures are disclosed. In one approach, a method comprises the...
Optimizing application specific integrated circuit pinouts for high
density interconnect printed circuit boards
Techniques for optimizing application specific integrated circuit (ASIC) and other IC pin assignment corresponding to a high density interconnect (HDI) printed...
Computed client identifier in DHCP
A method performed by a DHCP server. The method involves receiving a transformation instruction from a user or other command source. The method further involves...
System for power savings in server farms
A threshold-based approach is used to assign tasks to servers in a server farm. A "number of connections" count or "connection rate" is maintained for an active...
Method and apparatus for monitoring responses of configuration commands
A method is disclosed for monitoring responses of configuration commands using MIB-based and event-based approaches. According to one embodiment, a network...