Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: cisco





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,094,916 System and method for adjusting power used in reception in a wireless packet network
A system and method allows devices to send and receive packets while using power to do so in a manner that responds to events, such as receipt or other...
US-9,094,520 Reconferencing capability for networked phones
In one embodiment, a method comprises storing information associated with a conference call that has previously been terminated. The method also comprises...
US-9,094,422 System and method for multiple address of record deregistration using a single SIP request
One embodiment of the present invention is a method for deregistering multiple addresses of record. The method comprises receiving a session initiation protocol...
US-9,094,373 Method and apparatus to scale authenticated firewall traversal using trusted routing point
A Trusted Routing Point (TROP) generates a signaling message that includes an authorization token used to authorize a firewall to open a pinhole. The signaling...
US-9,094,344 Establishing a bidirectional forwarding detection (BFD) asynchronous mode session without knowing a Prior...
In one embodiment, a Bidirectional Forwarding Detection (BFD) asynchronous mode session is established between two packet switching devices interconnected by...
US-9,094,339 Computer system communication channel diagnostics
A method provided in one example includes inserting a first common-mode signal into a first communication channel from a communication node, monitoring...
US-9,094,335 Packet switching label assignment across multiple packet switching forwarding groups
In one embodiment, a packet switching device assigns a same particular packet switching label to each particular route of a plurality of particular routes...
US-9,094,329 Avoiding micro-loops in a ring topology of a network
In one embodiment, micro-loops are avoided in ring topologies of packet switching devices by changing the order of propagation of link state information...
US-9,094,327 Prioritization and preemption of data frames over a switching fabric
Network switching and/or routing devices can use multiple priority data streams and queues to support prioritized serial transmission of data from line cards...
US-9,094,324 Diverse path forwarding through trial and error
In one embodiment, a node determines an intention to transmit a diversely forwarded packet through a computer network, and as such, transmits a first version of...
US-9,094,323 Probe packet discovery of entropy values causing specific paths to be taken through a network
In one embodiment, probe-packet discovery of entropy values causing specific paths to be taken through a network is performed. One embodiment sends, from a...
US-9,094,307 Measuring latency within a networking device
Presented herein are techniques to measure latency associated with packets that are processed within a network device. A packet is received at a component of a...
US-9,094,287 System and method for providing a topology path
A method, apparatus, computer readable medium, and system that includes receiving a request for a topology path for a designated device, the request comprising...
US-9,094,237 Packet routing and switching device
A network device routes data packets by storing the packets in a switching memory as a function of a destination address of the packet. The switching memory...
US-9,094,224 Acknowledged multicast convergence
In one embodiment, a device connected to a network as part of a multicast tree receives a revised unicast routing and distributes the revised unicast routing...
US-9,094,223 Predictive caching and tunneling for time-sensitive data delivery to roaming client devices
Techniques are provided for delivering data to a wireless client device in a wireless network via a plurality of access points as the wireless client device...
US-9,093,794 Spoon shaped electromagnetic interference fingers
An integrated connector may be provided. The integrated connector may comprise a top portion, a front portion, and a side portion. The top portion may comprise...
US-9,092,688 Assisted OCR
A method including determining a position of each glyph in an image of a text document, identifying word boundaries in the document thereby implying the...
US-D735,222 Display screen with a graphical user interface
US-D735,167 Remote control unit
US-D735,166 Remote control for video management
US-9,089,063 Method of reducing solder wicking on a substrate
This invention relates to a substrate with via and pad structure(s) to reduce solder wicking. Each via and pad structure connects a component to conductive...
US-9,088,983 Interleaving low transmission power and medium transmission power channels in computer networks
In a multiple interface, low power and lossy network comprising a plurality of nodes, a low transmission power and medium transmission power topology are...
US-9,088,688 System and method for collaboration revelation and participant stacking in a network environment
A method is provided in one example embodiment and includes receiving video data associated with a meeting in a video conferencing environment; and displaying a...
US-9,088,669 Scalable system and method for DSL subscriber traffic over an Ethernet network
A system and method for identifying and forwarding traffic to/from Digital Subscriber Line Access Multiplexer (DSLAM) devices and feature servers without...
US-9,088,658 Intelligent overload control for contact center
Particular embodiments provide intelligent overload control for contact centers. In one embodiment, an overload condition at a contact center is determined....
US-9,088,651 Handling incoming video calls with hunt list
In an example embodiment, when an incoming video call associated with a hunt list is received, the call is first routed to recipients in the hunt list who are...
US-9,088,619 Quality of service based on logical port identifier for broadband aggregation networks
A provider edge (PE) device provides subscribers with access to an Internet Service Provider (ISP) network. The subscribers are connected to the PE device via a...
US-9,088,608 Throttling and limiting the scope of neighbor solicitation (NS) traffic
In one embodiment, a switch in a computer network may receive a neighbor solicitation (NS) message for a target node for which no neighbor authentication (NA)...
US-9,088,601 Method and apparatus for detecting malicious software through contextual convictions, generic signatures and...
Novel methods, components, and systems that enhance traditional techniques for detecting malicious software are presented. More specifically, methods,...
US-9,088,600 System and method for implementing a session initiation protocol feature
A method for implementing a SIP feature includes, in particular embodiments, establishing a communication session via a communications platform between a first...
US-9,088,584 System and method for non-disruptive management of servers in a network environment
An example method includes disengaging a target node from a cluster, where the disengaging comprises: selecting an inheritor; migrating flows from the target...
US-9,088,530 Maximizing bottleneck link utilization under constraint of minimizing queuing delay for targeted...
In one embodiment, a system and method include determining bandwidth of a link that connects a local modem to a remote router. A first percentage of the...
US-9,088,517 Stitching multicast trees
Techniques for stitching multicast trees in a multiple data center environment. According to one embodiment, a technique for stitching multicast trees is...
US-9,088,502 Generating a loop-free routing topology using routing arcs
In one embodiment, a method comprises creating, in a computing network, a loop-free routing topology comprising a plurality of routing arcs for reaching a...
US-9,088,484 Method and apparatus for preventing loops in a network by controlling broadcasts
Methods and apparatus for eliminating loops associated with interconnects between clusters are disclosed. According to one aspect of the present invention, a...
US-9,088,482 System and method for optimizing maintenance of geographically distributed processing units
A system and method are provided for optimizing maintenance of a geographically distributed data processing system. The method comprises selecting a primary...
US-9,088,438 Using Ethernet ring protection switching with computer networks
In one embodiment, a first routing device establishes a virtual channel with a remote routing device in a G.8032 protocol Ethernet network ring. The first...
US-9,088,415 Authentication of cache DNS server responses
A response to a Domain Name System (DNS) query can be protected with authentication information to be used by a host that originated the query. In one example,...
US-9,088,354 Power save mode for lightpaths
A method for communicating optically between nodes of an optical network, including forming, between a first node and a second node of the network, a set of...
US-9,088,179 Adaptive control of power grid operations based on energy profiles
In one embodiment, an energy manager determines respective energy profiles of one or more local end-devices for which the energy manager is responsible. Through...
US-9,086,267 Real time strain sensing solution
Strain sensing may be provided. First, a strain threshold for a circuit board may be determined. Then a strain capacitor may be selected that will fail when the...
US-9,084,005 Two-dimensional barcode system
An end-user device, including a processor to prepare barcode-input data including (a) at least one of an identification of a user of the end-user device, and an...
US-9,083,776 Echo mitigation in a conference call
In an example embodiment, an example method is provided for echo mitigation in a conference call. In this method, a test audio signal is transmitted to a...
US-9,083,751 Method for cloud-based access control policy management
A Web-based management server includes an ACP manager to manage access control rules (ACRs) and access control policies (ACPs). The ACRs and ACPs are configured...
US-9,083,737 Mitigating threats in a network
Mitigating threats in a network includes receiving a message at a network device. The message includes device-independent parameters generated in response to a...
US-9,083,709 Virtual internet protocol migration and load balancing
A system for virtual internet protocol (VIP) address migration. The system comprises serving one or more clients connected via a switch router over a network to...
US-9,083,636 System and method for multipoint label distribution protocol node protection using a targeted session in a...
A method is provided in one example and includes receiving first address information from a protected node over a first label switched path having a first...
US-9,083,633 System and method for distributed netflow exporter with a single IP endpoint in a network environment
An example method for a distributed NetFlow exporter with a single IP endpoint in a network environment is provided and includes configuring a network protocol...
US-9,083,632 Method to transport bidir PIM over a multiprotocol label switched network
A method, system and an apparatus to transport bidir PIM over a multiprotocol label switched network are provided. The method may comprise receiving a multicast...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.