At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Detecting and preventing session hijacking
A security device may receive a response associated with a request. The response may include original session information. The request may be associated with a...
System and method for monitoring network communications originating in
A method of monitoring network communications originating in monitored jurisdictions includes a step of identifying a monitored jurisdiction within a computer...
System and method for scalable geographic addressing framework
A bridge device at a first tier receives a geographic addressing packet destined for a target region containing a plurality of devices. The bridge device...
Domain name resolution for a hybrid cloud cluster
Embodiments of the present invention provide a method, system and computer program product for domain name resolution for a hybrid cloud cluster. In an...
Apparatus and method of peer-to-peer communication
An apparatus and method of communication include establishing, by a first peer device, a proximity-based connection with a second peer device, transmitting a...
Multicast source in group address mapping
The present disclosure provides a source specific multicast service that maps multicast group addresses to corresponding source addresses. A boundary routing...
Method for double IP address recovery
A computer-implemented method, computer program product, and computer system for double IP address recovery. Double IP address is a situation of a same IP...
Connecting layer-2 domains over layer-3 networks
In one embodiment, a method includes building an address resolution cache for a layer-3 router in a first layer-2 datacenter, where the address resolution cache...
System and methods for communicating in a telecommunication network using
common key routing and data locality...
A combination of a common key routing (CKR) method and a data locality table (DLT) method may be used to route communication messages in a telecommunication...
Optimizing messages to users of a social network using a message that
includes a user's performance of a...
Techniques to optimize messages sent to a user of a social networking system. In one embodiment, information about the user may be collected by the social...
System and method for selective user moderation of social media channels
Approaches for facilitating selective user moderation of social media channels are disclosed. In certain implementations, one or more posts from a user for...
System, method, and computer program product for providing temporal
A system, method, and computer program product are provided for receiving a selection of at least one contact from a user. In operation, a selection of at least...
Context-sensitive help for image viewing and editing application
Some embodiments provide an image-viewing application. The application receives a selection of a help activation item in a graphical user interface (GUI) of the...
Methods and systems for providing an electronic account to a customer
An electronic account is provided to a customer to enable the customer to access electronic services, such as e-mail and electronic transactions. The electronic...
Information processing device, information processing system and
computer-readable storage medium
An information processing device of the present invention includes a connecting section which connects application modules capable of performing application...
Indicating in an electronic message whether a user has previously accessed
content provided by a resource
Arrangements described herein relate to indicating in an electronic message whether a user has previously accessed content provided by a resource. An electronic...
Systems and methods to secure restricted information in electronic mail
Systems and methods are provided to secure restricted information in electronic mail messages. According to some embodiments, it is determined at a client...
Video mail through peer to peer network
A system and method to record a message to be transmitted to a recipient user is disclosed herein. In some embodiments, the method includes executing a...
Network appliance architecture for unified communication services
A system and method for implementing a service oriented architecture that supports complex event processing and business activity monitoring. An enterprise...
E-mail integrated instant messaging
A system and method supporting instant messaging which removes many of the problems and harriers to the use of instant messaging through the use of universally...
Method and system for messaging across cellular networks and a public data
A method, system and computer program product for instant message communication in a wireless and non-wireless environment. A message is sent from a mobile unit...
Automatically populating recipients in an instant messaging or other
computer communication system
A system and a method for automatically populating chat recipients in an instant messaging system in which chat recipients are automatically populated from...
Distributed network control system with one master controller per logical
A network control system for managing a plurality of managed switching elements that implement a plurality of logical datapath sets. The network control system...
Apparatus, system, and method for resequencing packets
A method is provided in one example and includes receiving a plurality of packets; identifying whether a particular packet, of the plurality of packets, is part...
The deployment and scaling of a network of electronic devices can be improved by utilizing one or more network transpose boxes. Each transpose box can include a...
Private virtual local area network isolation
In one embodiment, a method includes obtaining addresses of end hosts at a switch, the switch configured with a primary virtual local area network and a...
Method and apparatus for selecting passive port of transparent clock node
based on PTP
Provided are a transparent clock passive port election method and device based on the PTP protocol. In the method, by extracting the TLV field of a received...
Communication apparatus and communication control program
A communication apparatus has an upper-layer evaluation parameter acquisition part configured to acquire an evaluation parameter for an upper-side layer among a...
Harmonized control planes, systems and methods
A control plane management system is disclosed for distributed or virtualized network fabrics. The system instantiates a harmonized control plane that aids in...
Modular interconnect structure
Some embodiments of the invention include an interconnect structure to transfer data among a plurality of devices. The interconnect structure includes a...
Low-latency cost-effective upstream scheduler
Systems, methods and computer readable media for providing low-latency scheduling on upstream channels. Systems and methods can include a low-latency scheduler...
Method and apparatus for allocating client resources to multiple
A quota management system for Personal Video Recorders (PVRs) in which the storage space available on connected storage devices is shared between multiple...
Transmission of data over a low-bandwidth communication channel
Disclosed herein are various systems and methods that may improve the transmission of data over low-bandwidth communication channels in an electric power...
Bandwidth management for data services operating on a local network
A bandwidth manager associated with a local network may comprise memory that stores network load data for the local network and one or more processors. The...
Load balancing in cloud-based networks
A record of computing resources for a cloud computing environment and an additional cloud computing environment may be maintained. Available computing resources...
Resource allocation in computers
A method and tangible medium embodying code for allocating resource units of an allocatable resource among a plurality of clients in a computer is described. In...
Ultra low power-data driven networking processing device for avoiding
The present invention is provided with: a data-driven processor comprising at least a firing control which determines whether or not firing conditions have been...
Configuring cloud resources
A method, system, and program product for identifying cloud resources are provided, and further a method, system, and program product for configuring cloud...
Device arrangement for implementing remote control of properties
In a remote control method and remote control system, a virtual private network (55) is established between a home control network key (42b, 41c) and a home...
Virtualized network interface for TCP reassembly buffer allocation
A method and a system embodying the method for dynamically allocating context for Transmission Control Protocol (TCP) reassembly, comprising providing a fixed...
Automatic remediation in a distributed computer system with multiple
clusters of host computers
A system and method for performing automatic remediation in a distributed computer system with multiple clusters of host computers uses the same placement...
Service access apparatus, method, computer program and computer program
product for selective initiation of...
It is presented a service access apparatus arranged to selectively initiate communication with a network node providing a service. The service access apparatus...
System, method and computer program product for energy-efficient and
service level agreement (SLA)-based...
Improving the utilization of physical resources and reducing energy consumption in a cloud data center includes providing a plurality of virtual machines in the...
Credit based flow control in lossless ethernet networks
In one embodiment, a system includes a hardware processor and logic integrated with and/or executable by the processor or media access control (MAC)...
Cable modem termination system control of cable modem queue length
Buffer bloat continues to cause latency problems for all kinds of network traffic, e.g., internet protocol traffic. Implementing network based control of packet...
Jitter buffering system and method of jitter buffering
A jitter buffering system and a method of jitter buffering. The jitter buffering system may be embodied in a quality of service (QoS) management server,...
Hierarchical shaping of network traffic
Stacked (i.e., hierarchically arranged) rate wheels schedule traffic flows in a network. A first rate wheel operates to efficiently schedule traffic flows in...
Method and system for determining sustainable throughput over wireless
Sustainable average data throughput rates for data transfer between a sender and a receiver are determined for a network in a steady-state condition. Delivery...
Token bucket-based traffic limiting method and apparatus
The embodiments of the present invention disclose a token bucket-based traffic limiting method, including: when a packet is received, triggering a filling...
Network address translation offload to network infrastructure for service
chains in a network environment
An example method for network address translation (NAT) offload to network infrastructure for service chains in a network environment is provided and includes...