Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: cisco





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,990,916 System and method for supporting web authentication
A method is provided in one example embodiment and includes receiving a discover message over a network; determining that the discover message is associated...
US-8,990,892 Adapting extensible authentication protocol for layer 3 mesh networks
Techniques are provided for adaptive routing of authentication packets in a network, such as a wireless mesh network. At an authenticated device in the network,...
US-8,990,885 Zone-based firewall policy model for a virtualized data center
Techniques are provided for implementing a zone-based firewall policy. At a virtual network device, information is defined and stored that represents a security...
US-8,990,754 Optimizing application specific integrated circuit pinouts for high density interconnect printed circuit boards
Techniques for optimizing application specific integrated circuit (ASIC) and other IC pin assignment corresponding to a high density interconnect (HDI) printed...
US-8,990,619 Method and systems to perform a rolling stack upgrade
Stackable Layer 2 switches may be upgraded through a stateless upgrade procedure that minimizes software upgrade complexity while leveraging the intrinsic...
US-8,990,582 Virtual machine memory compartmentalization in multi-core architectures
Techniques for memory compartmentalization for trusted execution of a virtual machine (VM) on a multi-core processing architecture are described. Memory...
US-8,990,430 Interface bundles in virtual network devices
A virtual network device includes several different virtual network device sub-units, which collectively operate as a single logical network device. An...
US-8,990,395 Controlling access to managed objects in networked devices
Controlling access to managed objects associated with a networked device. A method comprises receiving a request from a principal for access to a managed object...
US-8,990,390 Remote monitoring and controlling of network utilization
A non-transitory computer-readable storage medium storing instructions which, when executed by processors, cause the processors to perform: at a management...
US-8,990,314 System and method for utilizing instant messaging to schedule conference calls
In one embodiment, a method includes engaging in real-time communications using a first application, and dynamically granting permissions that enable a second...
US-8,990,292 In-network middlebox compositor for distributed virtualized applications
Techniques are provided for using a middlebox to composite displays from multiple hosted virtualized applications (HVAs) for transmission to a client endpoint...
US-8,990,248 Peer-to-peer network image distribution hierarchy
In one embodiment, network devices such as IP phones may be upgraded with a set of files. A master network device in the set of network devices is identified....
US-8,990,247 Apparatus, systems, and methods for client transparent video readdressing
Network operators are striving to find ways to provide stable video services amid a rapid increase in video traffic. In order to provide stable video services...
US-8,990,083 System and method for generating personal vocabulary from network data
A method is provided in one example and includes receiving data propagating in a network environment, and identifying selected words within the data based on a...
US-8,989,954 System and method for applications management in a networked vehicular environment
A method in one example embodiment includes identifying a power state and a battery level of a vehicle. The method also includes allocating power to critical...
US-8,989,589 Method and apparatus for testing using a transceiver module
An apparatus in one embodiment includes a transceiver housing operable to be inserted into a port of a host system, the port comprising at least a first channel...
US-8,989,388 Distribution of storage area network encryption keys across data centers
Efficient mechanisms are provided for transferring key objects associated with disk logical unit numbers and tape cartridges from one data center to another...
US-8,989,276 Video encoder/decoder, method and computer program product
A video encoder/decoder device, method, and computer program product combine to enhance entropy encoding by using different calculation approaches for assessing...
US-8,989,221 System and method for discovering and verifying a hybrid fiber-coaxial topology in a cable network environment
A method in an example embodiment can include polling a first cable modem in a cable network and receiving a first response message from the first cable modem...
US-8,989,189 Scaling IPv4 in data center networks employing ECMP to reach hosts in a directly connected subnet
Systems and methods are provided for scaling IPv4 networks for large data centers to reach hosts in a directly connected subnet. ToRs may be dynamically...
US-8,989,188 Preventing leaks among private virtual local area network ports due to configuration changes in a headless mode
Techniques are provided for hosting a first virtual switch and one or more virtual machines (VMs) configured to be part of a virtual LAN (VLAN). The first...
US-8,989,049 System and method for virtual portchannel load balancing in a trill network
An example method includes storing a portion of virtual PortChannel (vPC) information in a TRansparent Interconnect of Lots of Links network environment,...
US-8,988,984 Designated forwarder election for VPLS with BGP-based MAC learning
In one embodiment, a network device may participate in an election process to elect one of two or more Provider Edge devices of a Redundancy Group to be a...
US-8,988,519 Automatic magnification of data on display screen based on eye characteristics of user
In one embodiment, a method includes receiving an image of a user's eye at a device having a screen and a camera operable to input the image, processing the...
US-8,984,631 Processor with differential power analysis attack protection
A device including a processor to perform an operation yielding a result, the processor including a register including bit storage elements and including a...
US-8,984,478 Reorganization of virtualized computer programs
In an embodiment, a data processing method comprises obtaining access to computer program code; identifying a plurality of code segments in the computer program...
US-8,984,277 Reduced authentication times in constrained computer networks
In one embodiment, a capable node in a low power and lossy network (LLN) may monitor the authentication time for one or more nodes in the LLN. The capable node...
US-8,984,191 Automated data center network patching system
In one embodiment, a computer implemented method is provided for generating a network patch plan. The method can include selecting at least two devices to be...
US-8,984,148 Method and apparatus for signaling post-ring reservations
In one embodiment, a method includes obtaining a request from a first endpoint to establish a session, determining whether a resource reservation may be...
US-8,983,987 System and method for a service metering framework in a network environment
A method is provided in one example embodiment and includes causing generation of a metered record associated with a metering event of an application executed...
US-8,983,433 Network based on demand wireless roaming
In one embodiment, a method includes receiving at a network device, a request from a mobile device to connect to a wireless local area network, inserting mobile...
US-8,983,066 Private pairwise key management for groups
In an example embodiment, a key generation system (KGS) is used to generate private pairwise keys between peers belonging to a group. Each member of the group...
US-8,982,910 Fixed generic mapping of client data to optical transport frame
A fixed Generic Mapping Procedure (GMP) apparatus and method are provided to map client data to an optical transport frame. Client data to be mapped into a...
US-8,982,881 Upstream label allocation on ethernets for MP2MP LSPS
An apparatus or method for upstream label allocation on LANs for multipoint (MP) label switched paths (LSPs). In one embodiment of the method, a first router...
US-8,982,785 Access point assisted direct client discovery
A wireless access point device configured to serve wireless client devices in a wireless network monitors transmissions sent by direct clients capable of...
US-8,982,757 Nonlinear power state transitioning
In nonlinear power state transitioning, temporal intervals of inactivity in network traffic traversing a network node are determined from transport control data...
US-8,982,733 System and method for managing topology changes in a network environment
A method is provided in one example embodiment and includes receiving a spanning tree protocol topology change notification (STP TCN) in a network; removing...
US-8,982,719 Dynamically troubleshooting voice quality
In an example embodiment, a method for dynamically troubleshooting voice quality. The method comprises generating a request to intercept a predetermined data...
US-8,982,707 Interoperability of data plane based overlays and control plane based overlays in a network environment
Technologies are provided in example embodiments for intercepting a packet being multicast from a first tunnel endpoint in a network, determining first address...
US-8,982,702 Control of rate adaptive endpoints
An apparatus may receive a plurality of data streams for transmission over a network. The apparatus may adjust packet drop rates in proportion to differences...
US-D724,567 Remote control unit
US-8,978,137 Method and apparatus for retroactively detecting malicious or otherwise undesirable software
A system for retroactively detecting malicious software on an end user system without performing expensive cross-referencing directly on the endpoint device. A...
US-8,977,733 Configuring host network parameters without powering on a host server
Techniques are provided to adjust network settings for network connectivity resources used by a host server. A network card device, coupled to the host server,...
US-8,977,698 Tagging content within a networking environment based upon recipients receiving the content
A networking environment accessible by a plurality of computing devices is established to facilitate communications between participants associated with the...
US-8,977,321 Device, methods, and user interface for providing optimized entry of alphanumeric text
The present invention includes a device, method, and user interface for providing optimized entry of alphanumeric text. In one form, a method for providing...
US-8,977,249 Customized ring tones for mobile phones based on context information
A method in one embodiment includes receiving, by a mobile client device, an incoming call sent by a caller, a caller ID being associated with the incoming...
US-8,976,968 Intercepting a communication session in a telecommunication network
Intercepting a secure communication session includes distributing a key from a key distribution point to establish a secure communication session between a...
US-8,976,807 Dynamically determining hostnames of network devices
Techniques are disclosed for dynamically determining or learning hostnames. According to embodiments described herein, a solicitation message is received at a...
US-8,976,792 OTV scaling: site virtual MAC address
Techniques for providing an extended layer 2 network. Embodiments receive, at a first network device in a first layer 2 network within the extended layer 2...
US-8,976,761 High density deployment using transmit or transmit-receive interference suppression with selective channel...
In a wireless local are network, each of multiple access points, in a high density deployment, are configured to suppress co-channel interference. A first...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.