At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
SECURITY DEVICE IMPLEMENTING FLOW LOOKUP SCHEME FOR IMPROVED PERFORMANCE
A security device performing flow classification and storing flow information in a flow table includes a flow engine generating a flow key identifying a flow...
METHOD TO OPTIMIZE FLOW-BASED NETWORK FUNCTION CHAINING
In a forwarding network comprising a function chain network controller, a plurality of intermediate network functions (NFs) and flow-based chain selectors...
METHOD, APPARATUS AND SYSTEM FOR DETERMINING CONTENT ACQUISITION PATH AND
The present disclosure provide a method for determining a content acquisition path, a method for processing a content request and a corresponding apparatus and...
DATA COMMUNICATION METHOD BETWEEN A ROAMING RADIO EQUIPMENT ITEM AND A
NETWORK ACCESS GATEWAY
A data communication method between a mobile radio communications equipment and a gateway connected to a network, the data being organized in the form of...
VxLAN Security Implemented using VxLAN Membership Information at VTEPs
A network device stores a Virtual Extensible Local Area Network (VxLAN) Tunnel Endpoint (VTEP) membership information that associates VxLANs each with a...
SYSTEM FOR THE ROUTING OF DATA TO COMPUTER NETWORKS
The system (S) for the routing of data to computer networks comprises: a server unit (SRV) connected to a public network (I); a local area network (Prop. LAN...
SOFTWARE-DEFINED NETWORK (SDN) SYSTEM USING HOST ABSTRACTION, AND METHOD
FOR IMPLEMENTING THE SAME
A software-defined network (SDN) system and method for implementing the same can construct a network having flexible network topology by abstracting switches...
UTILIZING REMOTE STORAGE FOR NETWORK FORMATION IN IOT NETWORKS
In one embodiment, a device that is protected against a power outage event in a network receives metrics used by a first node in the network to select a...
PARALLEL MULTIPATH ROUTING ARCHITECTURE
Disclosed are various embodiments for a parallel multipath routing architecture. An edge node of an overlay network receives packets to be communicated to a...
Route Advertisement Method, System and Controller
Embodiments of the present invention provide a route advertisement method, and controller, where the method is applied to a BGP-based routing network, a...
APPARATUS AND METHOD FOR PROTECTION SWITCHING IN SHARED MESH NETWORK
A communication terminal performing protection switching in a shared mesh network is provided. The communication terminal configured to transmit and receive...
APPARATUS AND METHOD FOR FAILOVER OF DEVICE INTERCONNECT USING REMOTE
MEMORY ACCESS WITH SEGMENTED QUEUE
A first remote memory access link is established between a first communications interface card on the first computing device and a second communications...
Routing Loop Determining Method and Device
A routing loop determining method and a device. The method includes: acquiring, by a forwarding device in a layer 3 network, a first packet, where a time to...
Loop Avoidance Method, Device and System
A loop avoidance method, device and system. The system includes a first network device and a second network device in an internal network, a first Ethernet...
MESSAGE TRANSMISSION SYSTEM, MESSAGE TRANSMISSION SERVER, USER TERMINAL
APPARATUS, METHOD FOR TRANSMITTING...
A message transmission system, a message transmission server, a user terminal apparatus, a method for transmitting a message, and a method for receiving a...
METHOD FOR GENERATING ROUTE ENTRY, AND BORDER GATEWAY PROTOCOL SPEAKER
Embodiments of the present disclosure provide a method for generating a route entry, including: receiving, by a first BGP speaker, a first route message and a...
Mapping Virtual Machines from a Private Network to a Multi-Tenant Public
A method for creating a set of virtual machines on a public datacenter. The method, from a first network controller of a private network, commands a second...
OVERLAY NETWORK-BASED ORIGINAL PACKET FLOW MAPPING APPARATUS AND METHOD
An original packet flow mapping apparatus and method based on an overlay network. The original packet flow mapping apparatus may include a packet-in message...
AUTOMATIC NETWORK ROUTING ENGINE AGNOSTIC OF UNDERLYING INVENTORY OR
NETWORK MANAGEMENT SYSTEM
A method of system for finding routes between network elements across a communication network, each network element having network equipment and connectivity...
SYSTEM FOR EVALUATING A COMPUTER NETWORK'S OPERATION CONTINUITY
The invention is directed to determining a readiness of a computer network to operate under adverse conditions. Once an adverse condition scenario is selected...
Systems and methods for controlling applications on a network are provided. According to one embodiment, a network security device intercepts network traffic...
Tracing Logical Network Packets Through Physical Network
Some embodiments provide a method for a network controller that manages several managed forwarding elements. The method receives a request to trace a specified...
NON-INTRUSIVE IT DEVICE MONITORING AND PERFORMING ACTION BASED ON IT
Infrastructure management device(s) may monitor IT device(s) communicatively connected over a network. IT device state(s) may be determined for at least one of...
INTEGRATING A COMMUNICATION BRIDGE INTO A DATA PROCESSING SYSTEM
Integrating a further communication bridge into a running data processing system. The data processing system includes a communication client running a first...
Passive Performance Measurement for Inline Service Chaining
A method is implemented by a network device to monitor the performance of packet processing in an in-line service chain, the network device one of a plurality...
DATA TRANSMISSION SYSTEM, DATA TRANSMISSION MONITORING METHOD, AND
A method of monitoring data transmission is applied to a data transmission system which includes at least one server device and a client device, each of which...
Flexible and Safe Monitoring of Computers
Described is a server monitoring technology that is scalable to large numbers of servers, e.g., in a datacenter. Agents on servers run queries to monitor data...
SCALABLE ELASTIC CLOUD-BASED IMS SYSTEM, METHOD AND PACKAGE
The present invention is related to a scalable elastic cloud-based IMS system and method. According to the invention, a controller is used for maintaining a...
Passive Performance Measurement for Inline Service Chaining
A method is implemented by a computing device to monitor the performance of packet processing in an in-line service chain. The computing device is in...
HIERARCHICAL ANOMALY LOCALIZATION AND PRIORITIZATION
Example methods disclosed herein to prioritize anomalies in a communication network include classifying respective nodes in the communication network as...
METHOD OF DETERMINING STATUS OF SERVING NODES
A method of determining the status of serving nodes suited for a parallel data computing architecture is disclosed herein. The method comprises the following...
NETWORK NODE, A COMMUNICATION SYSTEM AND ASSOCIATED METHODS
A first network node for communicating with a second network node over a first communication network is described. The second network node is arranged to...
NOC TIMING POWER ESTIMATING DEVICE AND METHOD THEREOF
A NoC timing power estimating method includes: estimating a plurality of transmission timing of a plurality of transmission units of at least a packet, the...
SYSTEM STATE MESSAGE IN SOFTWARE DEFINED NETWORKING
A method for a network device reporting system state to a controller, the method comprising a network device: determining a system state of the network...
APPLICATION UPGRADE FEASIBILITY AND SUPPORT
Embodiments of the invention provide a method, system and computer program product for upgrade feasibility and reporting. In an embodiment of the invention, a...
SYSTEM FOR UTILITY USAGE TRIGGERING ACTION
The present disclosure relates to using sensors and measurements from sensors to trigger actions within a network. Specifically, various techniques and systems...
ANOMALY DETECTION IN PROTOCOL PROCESSES
Systems, methods and transitory computer-readable storage media for constructing a loop free multicast tree. The methods include collecting data sample points...
DETERMINING PHYSICAL LOCATION OF A NETWORKED COMPUTING DEVICE
Techniques for determining location of a networked computing device are presented herein. An association module may be configured to associate two or more...
Deep Packet Inspection Virtual Function
Concepts and technologies are disclosed herein for providing and using a deep packet inspection virtual function. A control system can detect a service...
MULTI-PARTITION NETWORKING DEVICE
A device is described for operating a multi-partition networking system, the device comprising hardware resources for the operation of a primary partition for...
DYNAMIC SERVICE LEVEL AGREEMENT (SLA) ADJUSTMENT BASED UPON APPLICATION
Embodiments of the invention provide a method, system and computer program product for the dynamic adjustment of a service level agreement (SLA) for a hosted...
TRANSPARENT ORCHESTRATION AND MANAGEMENT OF COMPOSITE NETWORK FUNCTIONS
A system that manages a network of network elements receives a network topology of the network elements, where the network elements include a first type of...
Searchable Best Fit Abstraction Framework for Catalog Driven Service
A system for a searchable best fit abstraction framework includes a network having one or more network resources, a network inventory server programmed to...
Automating Cloud Services Lifecycle Through Semantic Technologies
This invention relates to methods and systems of procuring services in the cloud and specifically procurement where the requirements are defined by the...
AUTOMATIC COMPLETION OF FAILED SELF-CARE RESOLUTION ATTEMPT FOR
A system receives a communication from a user via a first communication channel used by users to automatically resolve an issue. The system monitors, using a...
INTERNET OF THINGS DEVICE FOR REGISTERING USER SELECTIONS
A platform, apparatus and method for Internet of Things Implementations. For example, one embodiment of an apparatus comprises: a memory for storing program...
CLOUD BASED MANAGEMENT OF STORAGE SYSTEMS
Systems, methods, and computer readable storage mediums for managing multiple storage subsystems from the cloud. An organization with multiple storage...
SYSTEM AND METHOD FOR EXTRACTING PROTOCOL INFORMATION FROM A SIMULATION
ENVIRONMENT TO ANALYZE SYSTEM BEHAVIOR
A system and method for extracting protocol information from a simulated or emulated design to analyze system behavior is disclosed. The system includes a...
PROVIDING VIRTUAL NETWORKING FUNCTIONALITY FOR MANAGED COMPUTER NETWORKS
Techniques are described for providing virtual networking functionality for managed computer networks. In some situations, a user may configure or otherwise...
Systems and Methods for Providing an Administrative Framework in a Cloud
The invention is an eighth layer cloud administrative framework that provides for both monitoring users and providing needed software. The cloud framework...