Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: cisco





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,402,195 Operation of base station in a cellular communications network
In one embodiment, a method of forming a neighbor cell list in a base station of a cellular communications network comprises, at periodic intervals, and for...
US-9,402,114 System and method for providing randomization in adaptive bitrate streaming environments
A method is provided in one example embodiment and includes receiving video data at an adaptive bitrate (ABR) client that includes a buffer; determining whether...
US-9,401,933 Classification of security policies across multiple security products
A management entity connects with multiple security devices across a network. Each security device operates in accordance with one or more security policies....
US-9,401,871 RFID for available resources not connected to the network
Disclosed are apparatus and techniques for providing presence and location information from available media resources to participants in a media conference so...
US-9,401,863 Dynamic source route computation to avoid self-interference
In a multiple interface, low power and lossy network comprising a plurality of devices, interface options for a source route to minimize self-interferences are...
US-9,401,858 Loop avoidance during network convergence in switched networks
Various techniques can be used to avoid loops during network convergence after a topology change such as a failure. For example, a method can involve detecting...
US-9,401,848 Stateless flexible boot control
Techniques are provided herein for optimizing boot order for devices in a data center environment. These techniques may be embodied as a method, apparatus and...
US-9,400,975 Evaluating user contacts on an electronic communication network
A system for evaluating network users comprises one or more processors communicatively coupled to one or more memories operable to receive, over a network...
US-9,398,586 Almost blank subframe based orthogonal resource allocation in a wireless network environment
An example method for facilitating almost blank sub-frame (ABS) based orthogonal resource allocation in a wireless network environment is provided and includes...
US-9,398,553 Technique for improving LDP-IGP synchronization
A technique may improve LDP-IGP synchronization in a MPLS network when an interface of a router coupled to a communications link along a shortest path between a...
US-9,398,486 Conveying subscriber information to service chain services using tunnel protocol header encapsulation for...
A method provided in one embodiment includes receiving, at a first network element, a first data packet of a data flow, wherein the data flow is associated with...
US-9,398,473 System and method for load based optimization in communication networks
Systems and methods for providing load based optimizations in communication networks are provided. A network device that provides network management and...
US-9,398,258 Method and system for video conferencing units
In one embodiment a system and method is described, the system and method including a first camera, which, when activated, captures a first video of a first...
US-9,398,035 Attack mitigation using learning machines
In one embodiment, techniques are shown and described relating to attack mitigation using learning machines. A node may receive network traffic data for a...
US-9,397,946 Forwarding to clusters of service nodes
Systems, methods, and computer-readable storage media for forwarding traffic to clusters of nodes. A system can group nodes in a network fabric into a cluster...
US-9,397,940 System and method for providing a translation mechanism in a network environment
An example method is provided and includes receiving a packet associated with a flow, determining a tunnel identifier for the flow, and determining a flow...
US-9,397,918 Real time and high resolution buffer occupancy monitoring and recording
Presented herein are techniques for detection and characterization of buffer occupancy of a buffer in a network device. Packets are received at a network...
US-9,397,858 Detecting VLAN registration protocol capability of a switch in a computer network
In particular embodiments, a first switch implementing a first virtual local area network (VLAN) registration protocol and connected to a first end of the trunk...
US-9,397,847 Managing router advertisement messages to support roaming of wireless mobile client devices
Techniques are provided to manage how router advertisement messages are forwarded for ultimate wireless transmission in a wireless network. In one embodiment, a...
US-9,397,687 Monotonic segmented digital to analog converter
In one implementation, a digital analog converter (DAC) is monotonic because the output moves only in the direction of the input and segmented because a more...
US-9,392,526 Protection against fading in a network ring
A method provided in one example embodiment includes detecting a first current bandwidth of a first link in a network ring, where the first current bandwidth...
US-9,392,337 Wireless TCP link state monitoring based video content adaptation and data delivery
Systems and methods are used for receiving a video request from a user equipment for video to be downloaded; determining a link bandwidth status associated with...
US-9,392,226 Generating and rendering synthesized views with multiple video streams in telepresence video conference sessions
Techniques are provided for establishing a videoconference session between participants at different endpoints, where each endpoint includes at least one...
US-9,392,066 Connection persistence across server farms in a network environment
An example method for connection persistence across server farms in a network environment is provided and includes associating a first real server with a first...
US-9,392,050 Automatic configuration of external services based upon network activity
System, computer program product, and method to configure an external network based on internal network conditions, by monitoring a load attribute of one or...
US-9,392,025 Subscriber dependent redirection between a mobile packet core proxy and a cell site proxy in a network environment
A method is provided in one example embodiment and includes receiving, by a first proxy within an access network, a first request for content associated with a...
US-9,391,959 Automated control plane for limited user destruction
To avoid user error and breaking operations, administration and management (OAM), the control plane for implementing OAM is automatically generated by network...
US-9,391,910 Smart pause for distributed switch fabric system
Techniques for improving the performance of flow control mechanisms such as Pause are provided. The techniques provide for maintaining a fair distribution of...
US-9,391,878 Reliable packet delivery with overlay network (RPDON)
In one embodiment, a device in a computer network establishes a reliable map that defines a set of packet criteria for which reliability is desired over an...
US-9,391,799 Multicast handling in a transparent interconnect of lots of links based data center interconnect
In some embodiments, a global tree structure identifying rendezvous points between a layer 1 network area and a layer 2 network area may be created. When the...
US-9,391,784 Computing risk-sharing metrics in shared-media communication networks
In one embodiment, a routing node determines a risk-sharing metric between pairs of nodes in a shared-media communication network, and may then compute a...
US-9,391,704 Replacing an existing network communications path with a new path using some exclusive physical resources of...
In one embodiment, a replacement network communications path is determined using dedicated resources of an existing path. One or more network elements in a...
US-9,391,515 Buck circuit
An apparatus may be provided. The apparatus may comprise a first circuit portion, a second circuit portion, and a third circuit portion. The first circuit...
US-9,390,754 Video trick mode system
A method for producing an auxiliary video stream arranged for reverse trick mode playback from a video stream including a plurality of uni-directional predicted...
US-9,390,212 Methods and apparatus for synthesizing multi-port memory circuits
Multi-port memory circuits are often required within modern digital integrated circuits to store data. Multi-port memory circuits allow multiple memory users to...
US-9,389,993 System and method for whitelist management
A method is provided in one embodiment and includes receiving a request for a session at a network element; communicating a query for whitelist data to a...
US-9,386,308 Quality optimization with buffer and horizon constraints in adaptive streaming
Techniques are provided for optimizing quality in adaptive streaming, where information is obtained relating to encoding bitrates and content quality scores for...
US-9,386,304 Digital video compression system, method and computer readable medium
A video decoding method including: receiving an encoded block of data; decoding the encoded block of data to generate decoded data; and performing a sample...
US-9,386,277 Generating a video pane layout
A first video conferencing device determines pane sizes of a plurality of video content to be displayed at a second video conferencing device, where the pane...
US-9,386,270 Displaying information about at least one participant in a video conference session
In one embodiment, a method is provided in a video conference session which has a video stream, an audio stream and an information stream between at least one...
US-9,386,097 Using values represented as internet protocol (IP) addresses to access resources in a non-internet protocol...
Non-Internet Protocol (IP) centric resources are accessed based on a value in the form of an IP address. This value (represented as the IP address) is converted...
US-9,386,086 Dynamic scaling for multi-tiered distributed systems using payoff optimization of application classes
In one embodiment, a method is described. The method includes: monitoring workloads of a plurality of application classes, each of the application classes...
US-9,385,995 Anonymous authentication
A method and system for anonymous purchase by a first user device, is described, the method and system including sending R from the first user device to a...
US-9,385,969 Merging fibre channel fabrics
A Fiber (Fiber) Channel (FC) switch and related methods are provided for merging FC fabrics. During a merger process of two separate FC fabrics, a principal...
US-9,385,950 Configurable service proxy local identifier mapping
Presented herein are techniques in which a service proxy in a service node is configured to receive a packet encapsulated in a service header that includes a...
US-9,385,945 Identifying, translating and filtering shared risk groups in communications networks
A method, apparatus, and computer-readable storage medium are disclosed for processing shared risk group (SRG) information in communications networks. The...
US-9,385,933 Remote probing for remote quality of service monitoring
In one embodiment, a targeted node in a computer network receives a probe generation request (PGR), and in response, generates a link-local multicast PGR...
US-9,385,930 Method to detect suboptimal performance in boundary clocks
In one example embodiment, a method to detect suboptimal boundary clocks is described for a node in a communications network. The method can include determining...
US-9,385,929 Methods and devices for performing dynamic droop compensation
Provided herein are systems, methods and devices for performing droop compensation. In particular, systems, methods and devices for performing droop...
US-9,385,918 System and method for secure provisioning of virtualized images in a network environment
An example method includes setting up a secure channel between a blade and a provisioning server in a network environment, downloading an image of a virtual...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.