Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

4625 results about "Router" patented technology

A router is a hand tool or power tool that a worker uses to rout (hollow out) an area in relatively hard material like wood or plastic. Routers are mainly used in woodworking, especially cabinetry. Routers are typically handheld or fastened cutting end-up in a router table.

System providing internet access management with router-based policy enforcement

A computing environment with methods for monitoring access to an open network such as the Internet, is described. The system includes one or more client computers, each operating applications (e.g., Netscape Navigator or Microsoft Internet Explorer) requiring access to an open network, such as a WAN or the Internet, and a router or other equipment that serves a routing function (e.g., a cable modem) for the client computers. A centralized security enforcement module on the router maintains access rules for the client computers and verifies the existence and proper operation of a client-based security module on each client computer. The router-side security module periodically sends out a router challenge via Internet broadcast to the local computers on the network. If the client-side security module is installed and properly operating, the client-side security module responds to the router challenge. The responses received by the router-side security module are maintained in a table. Each time the router receives a request from a client computer to connect to the Internet, the router-side security module reviews the table and analyzes whether or not the computer requesting a connection to the Internet properly responded to the most recent router challenge. If it determines that the computer has properly responded to the router challenge, then it permits the computer to connect to the Internet. If a computer has not properly responded or if a computer has not answered the router challenge, then the computer is not allowed to connect to the Internet as requested.
Owner:CHECK POINT SOFTWARE TECH INC

Method and apparatus for simple IP-layer bandwidth allocation using ingress control of egress bandwidth

The present invention relates to a switch for processing data units, such as IP data packets. The switch can be implemented as a router that includes a plurality of input ports, a plurality of output ports and a switch fabric capable of establishing logical pathways to interconnect a certain input port with a certain output port. A characterizing element of the router is its ability to control bandwidth usage on a basis of a logical pathway. This prevents congestion to occur in the switch fabric and also at the level of the output ports. For every active logical pathway the router sets-up a bandwidth control mechanism including at least one queue to hold data units received at an input port. The bandwidth control mechanism performs an accounting operation to determine the average bandwidth usage and if less than a threshold requests for releasing data units in the switch fabric are sent to the switch fabric controller. When the threshold is exceeded the bandwidth control mechanism stops sending requests for service to the switch fabric controller. The system also supports priorities. Instead of stopping the issuance of signals requesting release of data packets the priority level of the queue (reflected in a priority field in the signal requesting release of a data packet) changes from HI to LO. The switch fabric controller is designed to recognize priority requests and will accept LO priority requests only when there are no other HI priority requests pending. The present invention also provides a data transport device which includes a plurality of nodes interconnected by a physical link that establishes two ring-shaped paths on which data is transported on opposite directions. Each node is capable of sending a control message to the upstream node to advise the upstream node of the data carrying requirements of the node at which the message has originated. The upstream node can then throttle the introduction of data in the paths to preserve capacity that can be used by the downstream nodes.
Owner:NORTEL NETWORKS LTD

Mobile robotic router with web server and digital radio links

The invention is a computerized mobile robotic router with an onboard internet web server, and a capability of establishing a first connection to a remote web browser on the internet for robotic control purposes, and a capability of establishing a second short range bi-directional digital radio connection to one or more nearby computerized digital radio equipped computers or devices external to the robot. The short-range bi-directional digital radio connection will typically have a maximum range of about 300 feet. In a preferred embodiment, this short-range wireless digital connection will use the 2.4 gHz band and digital protocols following the IEEE 802.11, 802.15, or other digital communications protocol. By employing the proper set of external short-range digital radio devices capable of interfacing with the robot (such as sensors, mechanical actuators, appliances, and the like), a remote user on the internet may direct the robot to move within range of the external devices or computers, and connect these devices or computers to the internet.
Owner:ZWEIG STEPHEN ELIOT

Method and system for transparent in-line protection of an electronic communications network

The invention provides a method and system for enabling in-line communications channels between a plurality of computational systems and a switch, and / or a plurality of switches and a router. In a first version of the invention an in-line system receives uplinks of aggregated data from a plurality of switches and applies policies to the each aggregated data stream prior to transmission of the aggregated data streams from the in-line system to the router. At least one computational system provides a user identification associated with a user profile to the in-line system. The user profile informs indicates to the in-line system of the constraints imposed upon and activities permitted to the computational system originating the user identification. The constraints may include (a) one or more customized policies, (b) policies applicable to a group associated with the user identification, (c) virus / worm detection & protection, (d) a firewall, (e) virtual private network rules, and / or (f) encryption / decryption. In a second version the in-line system is configured to communicate directly with one or more computational systems as well as one or more switches.
Owner:NEVIS NETWORKS INC

Work site remote monitoring and employee time tracking system and method

A work site monitoring and employee time tracking system that includes a work site Internet connection having a broadband modem in communication with a router for transporting data to and from the work site and a work site IP camera in communication with the router for transporting images from the work site to client computers in communication with the Internet. A biometric fingerprint scanner for identifying and clocking-in and clocking-out work site workers is also included. The biometric scanner is in communication with the router for transmitting identification, clock-in and clock-out data to a server computer in communication with the Internet.
Owner:PROPERTY MONITORS

Method and apparatus for establishing and sharing a virtual change notification list among a plurality of peer nodes

A data structure has a list of event objects, one or more producers creating the event objects for the list, and a finite set of consumers accessing the object list. The structure is characterized in that the event objects are each associated with a first reference number indicating the number of consumers currently accessing the event object, and in that, as each consumer completes access the reference number is decremented, and when the reference number for an event object is zero, and the event object is at the head of the list, indicating that all consumers have accessed the object, that event object is removed from the list. A use of the structure for propagating route changes to nodes in a multiple-processor router, and to peer routers in a network is also taught.
Owner:PLURIS

Performing multicast communication in computer networks by using overlay routing

An overlay protocol and system for allowing multicast routing in the Internet to be performed at the application level. The overlay protocol uses “native” Internet multicast and multicast routing protocols to route information, according to overlay routing tables. Overlay groups are mapped to native multicast groups to exploit native multicasting in regional or local forwarding domains. Use of the overlay protocol allows overlay distribution to be handled in a more intelligent and bandwidth-managed fashion. Overlay routers are placed at each of several local area networks, Internet service provider's point of presence, enterprise, or other cohesively-managed locations. The overlay computers are configured according to bandwidth and security policies, and perform application-level multicast distribution across the otherwise disjoint multicast networks by using the overlay routing. The result is an overlay multicast network that is effectively managed according to local network management policies. Application-level control can be applied to the transferred data at the overlay routers.
Owner:GOOGLE LLC

Method and apparatus for providing multi-cast transmissions using a distributed router

A method and apparatus that includes processing for providing multi-cast transmissions within a data network begins by determining, for a source virtual network, a list of downstream virtual sub-networks for multi-cast traffic based on a multi-cast routing protocol. The processing then continues by determining multi-cast group membership on as per downstream virtual sub-network, edge device, and port basis. The process continues when a data packet is received via the source virtual network. The processing then continues by generating a multi-cast session table entry based on the list of downstream virtual sub-networks and the multi-cast group membership. The process continues by establishing virtual connections between the source virtual network and edge devices coupled to virtual sub-networks identified in the list of downstream virtual sub-networks. Having generated the virtual connections, the processing continues by downloading the multi-cast session table to the edge devices. The edge devices utilize the multi-cast session table entry to determine where the received data packets are to be forwarded.
Owner:NEWBRIDGE NETWORKS

System, method and computer program for assocating advertisements with web or wap pages

System, method and computer program for associating displayable data, such as advertisements, with Web and WAP pages being delivered from Internet or mobile services to mobile or fixed terminals via a communications network. An intermediate box, which may take the form of, or be resident in, a router, a proxy, a gateway, a server or other network element involved in routing Internet communications, analyzes communications related to Web or WAP browsing being directed to the mobile or fixed terminals and modifies part of the communications to include associated advertisements on Web or WAP pages or to add additional Web or WAP pages for information requests, e.g., interstitial pages.
Owner:APPLE INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products