At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
System and method for providing a compatibility feature in a session
initiation protocol (SIP) environment
According to an embodiment of the present invention, an apparatus for addressing compatibility in a session protocol environment is provided that includes a...
Method and apparatus for prioritized processing of routing information
A method is disclosed for prioritized processing of routing information in a network element. A priority is assigned to routing information received at the...
Compression of a routing header in a packet by a mobile router in an ad
Each mobile router in a mobile ad hoc network is configured for identifying routes to nearby nodes that are within a prescribed distance, based on storage of...
Local provisioning of bandwidth and other network resources
A system for local allocation or provisioning of resources in a network. Allocation rules are defined based on one or more factors of user identity, device...
Optimized IP address use in a mobile IP environment
Methods and apparatus for initiating the release of an IP address allocated for use by a Mobile Node supporting Mobile IP are disclosed. The IP address may be a...
Method to loadbalance among mobile IPv6 home agents
The invention relates to load balancing the binding creation on a home agent with a mobile node in an IPV6 network. A home agent serving a prefix learns about...
Method for computing a downlink beamforming weighting vector based on up
link channel information
Described herein is a method for obtaining a downlink beamforming weighting vector in a wireless communications system based on channel information about an...
Method and system for providing a conference service using speaker
A method for providing a conference service using speaker selection includes hosting a conference between a plurality of endpoints and receiving from the...
System and method for implementing virtual ports within ring networks
Various systems and methods for implementing virtual ports within ring networks are disclosed. For example, one method involves allocating a logical port that...
Techniques for customer self-provisioning of edge nodes for a virtual
Techniques for configuring a particular network interface on a particular node at an edge of a provider network to support a particular virtual private network...
Dynamic multi-hop negotiations
Negotiation of RSVP reservations prior to the setup of a call, rather than negotiating reservation parameters during the call. RSVP reservation parameters are...
Clock recovery algorithm for remultiplexing MPEG-2 SPTSs and/or MPTSs in
the presence of network jitter
A method and apparatus for clock recovery for constant bit rate MPEG-2 compliant single program transport stream and multiple program transport stream delivered...
Packetizing media for a time slotted communication system
Media that is normally packetized into many separate individual packets and then queued for individual transmission during a transmit window is combined together...
Redundant power supply with pulse width modulation soft start feature
Various systems and methods for providing a pulse width modulation soft start feature in a redundant power supply are disclosed. One method involves comparing an...
CRPTO envelope around a CPU with DRAM for image protection
In one embodiment, a Central Processing Unit having a processing core. The processing core connects to an internal memory bus having N address lines and X data...
Dynamic, on-demand storage area network (SAN) cache
Disclosed are apparatus and methods for facilitating caching in a storage area network (SAN). In general, data transfer traffic between one or more hosts and one...
Systems and methods for alleviating client over-subscription in ring
Systems, methods, devices and techniques can be used in networks including resilient packet ring networks and other types of ring topology networks to adjust the...
Methods and apparatus for trusted application centric QoS provisioning
A security agent extends the trust barrier, or trust point, from network gateway nodes to end user devices. A security agent operable to scrutinize network...
Supporting a community of subscribers in an environment using a service
selection gateway (SSG)
A service policy manager may be used to enable a first subscriber in a community to administer rules on another subscriber in the same community. A service...
Performance profiling for improved data throughput
A computer-implemented system and method for performance profiling on a target device. The computer-implemented method includes configuring the target device to...
Performing simplified troubleshooting procedures to isolate connectivity
A method and apparatus for implementing troubleshooting of a network connectivity problem between a client computer coupled to a local switch and an end point on...
Providing navigation directions
In one embodiment, a navigation system provides navigation directions within particular locations within a facility, such as within a corporate campus, airport,...
Method and apparatus for packet loss detection
Conventional network packet traffic loss/drop monitoring mechanisms, such as that employed for pseudowire, IP flow and tunnel traffic monitoring, do not process...
QoS and fault isolation in BGP traffic, address families and routing
A method is disclosed for routing BGP traffic. In one embodiment, according to the method, an association is formed between a first process and a second process....
Efficient processing of connection control messages in managing virtual
circuits using signaling protocols
To send a connection control message associated with a first set of attributes, only a difference of the first set of attributes from a second set of attributes...
Method and system for dynamic stashing for cryptographic operations using
beginning packet information
A system, method, apparatus and machine-readable medium for stashing an information packet, received by a network interface device, are provided. The method...
Transferring DOCSIS frames using a label switching network
In one embodiment, label distribution sessions are established between a Modular Cable Modem Termination System (M-CMTS) core and one or more remote PHYs. The...
Combined interface and non-interface specific associative memory lookup
operations for processing of packets
Mechanisms for programming and performing combined interface and non-interface specific associative memory lookup operations for processing of packets are...
Multiple user telephone router
Systems and methods are disclosed herein to provide telephone communication systems. For example, in accordance with an embodiment of the present invention, a...
Method for separation of IP+optical management domains
The present invention provides a mechanism and a method for indirectly controlling a router interface from an optical management system in an IP-optical network....
Method and apparatus for estimating delay and jitter between many network
routers using measurements between a...
A method and apparatus for determining a network performance metric in a network is described. The network includes a number of network elements and a number of...
Channel estimation in a multicarrier radio receiver
A method and apparatus for estimating channel characteristics in a multicarrier wireless receiver such as an OFDM wireless receiver. The method includes...
Digital video camera with built-in connector and display screen
Digital video camera with retractable data connector and display screen
Method and system for quality of service based web filtering
Methods and systems for QoS based Web filtering are described. A network access control device either permits or denies access to a web site. The network access...
Method for protecting a firewall load balancer from a denial of service
A method for protecting firewall load balancers from a denial of service attack is provided. Packets are received by the firewall load balancer. Each packet has...
Fast software fault detection and notification to a backup unit
A method and system for quickly informing a backup unit that a primary unit has failed. Normally an exception handler is activated when a software failure occurs...
Method and apparatus for providing power to a computerized device
A data communications network that includes a data communications device and a midspan device where the data communications device directs data to computerized...
Application based active-active data center network using route health
injection and IGP
A distributed data center topology having at least a pair of active data centers that can recover from a disaster at one of the data centers and achieves load...
Controlling access to managed objects in networked devices
Controlling access to managed objects associated with a networked device. A method comprises receiving a request from a principal for access to a managed object...
Bandwidth constraint construction for overlapped logical channels
A technique determines whether configured logical bandwidth allotments for logical channels are supported by maximum available physical bandwidths of physical...
Mechanism for secure rehosting of licenses
In one embodiment, a licensing authority receives a rehost ticket indicating proof of removal of a license from a first device. The licensing authority receives...
Sharing media content assets between users of a web-based service
In one embodiment, a method comprises receiving a request for access to a media content asset from a first user of a web-based service, the request specifying a...
System and method for providing a reverse camp-on feature in a
A method for facilitating a data session in a communications environment is provided that includes receiving, at a first endpoint, a call that was initiated by a...
Technique for interfacing MAC and physical layers of access networks
According to specific embodiments of the present invention, a standardized interface is provided for enabling controlled communication between MAC and PHY...
Voice over internet protocol favoring aggregating technology in a WLAN
A system for aggregating packet in a Medium Access control layer of a router to improve effective bandwidth of transmission over a network. The system begins by...
Techniques for using first sign of life at edge nodes for a virtual
A method and apparatus for processing a signal on an intermediate network node at an edge of a provider packet-switched network to support a link-layer virtual...
Fibre channel traffic redirect scheme using access control lists
Disclosed are methods and apparatus for redirecting fiber channel data that is transmitted between a first and a second node, such as a host and target, in a...
Route re-query scheme in communication networks
A method for re-querying for routing information is disclosed. The method transmits an initial admission query to a gatekeeper or a request for routing...