At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Dynamic network allocation for mobile router
Methods and apparatus for implementing a Home Agent supporting Mobile IP and being capable of allocating one or more networks to a mobile router which registers...
Transporting multi-basic service set (BSS) frames over wired medium
A method for retaining network address of a wireless client device as the device roams between different access points operably connected to a single gateway is...
Scaling enhancement for PIM control messages in multicast VPNs
A mechanism by which PIM network traffic can be aggregated is provided, thereby reducing the number of PIM messages transmitted by routers in a multicast...
Method and apparatus for transporting broadcast video over a packet
network including providing conditional access
A method, an apparatus and a carrier medium for securely distributing multimedia while still retaining compatibility with existing CA systems. The method...
Directed echo requests and reverse traceroute
In one embodiment, a first node may send an out-of-band message to a second node to request that the second node initiate an in-band echo request for a specified...
Consistency between MPLS forwarding and control planes
Systems and methods for assuring consistency between MPLS forwarding and control planes. The control plane can be made aware of forwarding plane anomalies and...
Method and apparatus for securely exchanging cryptographic identities
through a mutually trusted intermediary
A method of securely exchanging cryptographic identities through a mutually trusted intermediary is disclosed. Data, which specifies a petitioner's cryptographic...
Dual utilization of a physical port of an electronic device
An electronic device has a physical port, and a control circuit coupled to the physical port. The control circuit is arranged to electrically sense the physical...
Controlling access of concurrent users of computer resources in a
distributed system using an improved...
A method of controlling concurrent users of a distributed resource on a network is disclosed. In one aspect, there are one or more local lock managers executing...
Reducing round trips across a wide area network for resource locking by
extended locking and delayed unlocking
A locking mechanism for a data resource is disclosed, which can operate across LANs and a WAN. The technique temporarily imposes an extended lock on the...
Techniques for providing caller ID of participants in a conference call
In one embodiment, techniques for sending a conference invite that provides access to a list of participants in an existing conference are provided. A...
Mobile device calls via private branch exchange
Communication systems and methods are described that enable mobile devices to route telephone calls via an enterprise telephone system. The communication system...
DSP voice buffersize negotiation between DSPs for voice packet end devices
A packet switching network system for use in transferring information that is in the form of packets and including an originating device and a destination device...
Method and apparatus for dynamic network address reassignment employing
interim network address translation
An edge router termed a "service gateway" operates to reassign network addresses such as Internet Protocol (IP) addresses to a subscriber, such as when the...
Interconnectivity between autonomous systems
A method, apparatus and computer program product each provides interconnectivity between autonomous systems. A control plane and a data plane are included in a...
Techniques for distributing replication points for traffic using
Techniques for dynamically distribute replication points based on routing metrics are provided. A receiver list may be split based on the routing metrics. For...
Distributed network communication system which enables multiple network
providers to use a common distributed...
In one embodiment, a wireless access point wirelessly receives identification information from a portable computing device, determines a particular communication...
CSNP cache for efficient periodic CSNP in a router
A networking device such as a router may include, in one embodiment, a database storing a plurality of link state entries, and a cache operatively coupled with...
Selectively sending link state messages in a network link state protocol
based on interest of network nodes
In a link state protocol such as an interior gateway protocol (IGP), link state advertisements or link state packets (LSA/LSPs) are sent only to network nodes...
Control of preemption-based beat-down effect
In one embodiment, a node determines a ratio of traffic that is to be marked at an output. The node also determines if an input feeding the output has less...
Methods and apparatus for using gap packets to create a bandwidth buffer
over which packets can be sent to...
Methods and apparatus are disclosed for using gap packets to create a bandwidth buffer over which packets can be sent to reduce or eliminate overflow conditions....
Descriptor transfer logic
A processing engine includes descriptor transfer logic that receives descriptors generated by a software controlled general purpose processing element. The...
Apparatus and method for restoring traffic during failover in a cable head
Disclosed are methods and apparatus for guaranteeing restoration of traffic between one or more cable modems and a backup cable modem termination system upon...
Method and apparatus for achieving optimal transfer times in a
Apparatus and methods are disclosed for optimizing the transfer time of files in a peer-to-peer network. In disclosed embodiments, a requesting peer desires to...
Explicit locking of resources in devices accessible on a network
An agent locking a resource in a device in response to receiving an explicit request to lock the resource. Once in a locked state, access to entities...
Method and apparatus for browsing a management information base
A method and apparatus are disclosed for browsing one or more Management Information Base (MIB) objects that are stored in a network device, such as a router or...
Methods and apparatus for secure cable modem provisioning
Methods and apparatus are provided for enhancing security and features during cable modem configuration. According to various embodiments, a cable network head...
Aggregation of user usage data for accounting systems in dynamically
A method and apparatus for providing an aggregated account metering system to a computer network service provider resulting in comprehensive detailed subscriber...
Wireless network management with antenna control
A method and apparatus for managing a wireless local area network are disclosed. The network includes one or more wireless access points, each including a radio...
Method and system for triggering handoff of a call between networks
A method for handing off a call between networks includes monitoring a quality of a first link between a mobile station and a wireless local area network (WLAN)...
Optical connection adaptors for a data communications device and methods
A data communications system includes optic adaptors that provide an interface between multiple line card chassis and a fabric card chassis. Optic adaptors can...
Method of determining a maximum transmission unit value of a network path
using transport layer feedback
A network element implementing a method for determining an optimal maximum transmission unit (MTU) value on a path between two nodes in a network is described. A...
Methods and devices for transmitting data between storage area networks
Methods and devices are provided for efficient transmission of data between storage area networks. According to some aspects of the invention, a "slim" TCP stack...
Techniques to map switch and router ports to physical locations
Techniques for associating a physical location with a network interface on an intermediate network node include receiving a data packet from a device connected...
Techniques for load balancing subscriber-aware application proxies
Techniques for distributing network traffic from an access server to a service gateway include receiving, at a load balancer, sticky table data that indicates an...
ITU H450.1-based ITU H.323 SCP method and apparatus
A method for providing advanced intelligent network (AIN) supplementary services between an ITU H.323 endpoint and a service control point (SCP) having service...
Method for determining the operations performed on packets by a network
Methods and systems for determining the operations performed on packets by a network device are described. A simulated packet is input into a network device. The...
Traceroute using address request messages
In one embodiment, an endpoint sends messages containing Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs) (STUN)...
Hierarchical multi-rate multi-precedence policer
A hierarchical multi-rate multi-precedence policer is disclosed. The policer discards packets based on assigned precedence levels. When traffic exceeds an...
Digital video camera with built-in connector
Set-top box remote control
Method and apparatus providing unified compliant network audit
Information flow between network elements in a network enables a management system to capture a security knowledge base and to perform a static analysis of the...
System and method for controlling push to talk interruptions while
The present invention relates generally to a system and method of managing a Push To Talk (PTT) conversation while the recipient is watching television. PTT...
System allowing users to embed comments at specific points in time into
A method and system for linking a web page to a portion of a video is provided. Users can enter comments into a video that include a start and end time index for...
ARQ for point to point links
An automatic retransmission system offering good latency and overhead characteristics combined with programmable tradeoffs among overhead, latency, and error...
Query data packet processing and network scanning method and apparatus
A method for detecting within a networked computer a target vulnerability such as a Trojan Horse residing therein is disclosed, wherein the vulnerability is...
Apparatus and methods for forwarding data between public networks via a
Disclosed are methods and apparatus for handling data sent from a first public network to a second or same public network via a private network. In general...
Method and apparatus for redirecting network traffic
Methods and apparatus are described for intelligently redirecting and/or processing traffic. In one embodiment, a method of facilitating redirection of traffic...