1
Andrew W Barnhart, Anders A Eklof: Optical demand assigned local loop communication system. Hughes Network Systems, Pollock Vande Sande & Priddy, August 30, 1988: US04768188 (125 worldwide citation)

A distributed, demand access local loop telephone system is disclosed. An optical fiber, or fibers, connect a central office and a plurality of remote units which are located near subscriber populations. Communications on the fiber is by high speed digital data stream which is comprised of a plurali ...


2
Peter Pardee, Douglas Dillon, John Border, Nigel Bartlett: Method and system for integrating performance enhancing functions in a virtual private network (VPN). Hughes Network Systems, Bell Boyd & Lloyd, July 8, 2008: US07398552 (97 worldwide citation)

An approach for supporting security in a communications network is disclosed. A network device includes a security peer that establishes a secure tunnel over a data network (e.g., satellite network) for transport of encrypted traffic. The device also includes a performance peer for establishing a co ...


3
Hiep V Pham, Hirotaka Namioka: Delay-locked loop circuit in spread spectrum receiver. Kenwood Corporation, Hughes Network Systems, Sixbey Friedman Leedom & Ferguson, October 29, 1991: US05062122 (83 worldwide citation)

Spread spectrum receiver includes a delay locked loop (DLL) circuit for holding the synchronization of a despread signal with a received spread spectrum signal. The DLL circuit comprises a subtracter for generating a signal representative of a subtraction between first and second correlation signals ...


4
Doug Dillon, Ricardo Belmar, Seejo Sebastine: Pre-fetching secure content using proxy architecture. Hughes Network Systems, K&L Gates, September 1, 2009: US07584500 (80 worldwide citation)

Requests for secure content are rewritten before delivering the secure content to a client. In one implementation, the rewritten requests include the information content from the original request with the addition of a predetermined domain. The domain may correspond to a trusted agent that acts as a ...


5
Douglas Dillon, John Border, Frank Kelly, Daniel Friedman: System and method for pre-fetching content in a proxy architecture. Hughes Network Systems, Bell Boyd & Lloyd, June 17, 2008: US07389330 (79 worldwide citation)

An approach is provided for supporting retrieval of a web page over a data network from a web site is disclosed. A downstream proxy communicating with a host executing a browser receives a request message from a browser to retrieve the web page. An upstream proxy parses the web page to determine an ...


6
Frank Kelly, Gabriel Olariu, Douglas Dillon, Jack Rozmaryn: Method and system for providing load-sensitive bandwidth allocation. Hughes Network Systems, Bell Boyd & Lloyd, February 26, 2008: US07336967 (52 worldwide citation)

An approach is provided for managing bandwidth in a data network. Capacity is allocated on a communication channel, which can be utilized for transporting data traffic or support network administrative functions (e.g., ranging), for a terminal to transmit data over the communication channel. In anti ...


7
Matthew Butehorn, John Border, Patrick Stevens, Robert Torres, Dennis Conti, Vaibhav Kumar, Deepak Aryee, Mangala Kannan: System and method for routing among private addressing domains. Hughes Network Systems, Bell Boyd & Lloyd, June 17, 2008: US07388869 (51 worldwide citation)

An approach for routing over a radio network is provided. A terminal receives a packet over the radio network, which supports meshed connectivity, wherein the packet is destined for a destination host. The terminal determines whether the destination host is reachable by a communication interface bas ...


8
John Border: Method and system for providing buffer management in a performance enhancing proxy architecture. Hughes Network Systems, Bell Boyd & Lloyd, May 1, 2007: US07213077 (41 worldwide citation)

A network apparatus for providing performance enhancements of a communication network is disclosed. The network apparatus includes a plurality of communication interfaces that are configured to receive and to forward messages according to a prescribed protocol. The network apparatus also includes a ...


9
Douglas M Dillon: Network system with TCP/IP protocol spoofing. Hughes Network Systems, Bell Boyd & Lloyd, February 26, 2008: US07337233 (40 worldwide citation)

A system in which a personal computer sends messages into a TCP/IP network using a conventional dial-up link and downloads data from the TCP/IP network using a high-speed one-way satellite link. A preferred embodiment uses a conventional SLIP provider to connect to the TCP/IP network and uses a comm ...


10
John Border, Matthew Butehorn: Method and device for selective transport level spoofing based on information in transport level packet. Hughes Network Systems, Craig Plastrik, July 25, 2006: US07082467 (37 worldwide citation)

A method and apparatus for enhancing the performance of a network by performing selective spoofing, i.e., determining whether or not to spoof a connection. Selective spoofing provides the ability to discriminate among different connections, only allocating TCP spoofing resources to those where spoof ...