Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: cisco





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,923,728 System and method for associating an end user for billing in a network environment
In one embodiment, a method includes receiving one or more packets of a communication session from one or more interfaces, such that the interface is a...
US-9,923,576 Decoding techniques using a programmable priority encoder
A system, computer-readable media, and methods are disclosed for building a decoding table. The system may include one or more registers configured to store a...
US-9,922,255 Video count to improve wireless analytics estimates
Systems, methods, and computer program products to perform an operation comprising receiving, from a video monitoring system, a count of people detected at a...
US-9,922,196 Verifying network attack detector effectiveness
In one embodiment, a device receives a classifier tracking request from a coordinator device that specifies a classifier verification time period. During the...
US-9,922,116 Managing big data for services
Techniques are presented herein to monitor a plurality of big data sources in order to dynamically identify keywords. The big data sources are analyzed to...
US-9,918,111 System and method for simultaneously recording multiple media assets using a single tuner
A method for facilitating multiple recordings via a single tuner includes isolating data packets associated with recording candidate media assets from at least...
US-9,917,437 Hot swap controller with individually controlled parallel current paths
An apparatus comprises an input node, a power rail to power a circuit load, and multiple current paths coupled in parallel with each other between the input...
US-9,916,457 Decoupled name security binding for CCN objects
A data-hosting system facilitates binding a decoupled name to a data object. During operation, the system can receive a command to generate a decoupled name...
US-9,913,102 Operating unmanned aerial vehicles to maintain or create wireless networks
Embodiments herein use a real-time system to conduct a line of sight (LOS) survey between radio sites. The system includes a drone controlled by a UAV LOS...
US-9,912,777 System, method, and logic for generating graphical identifiers
An example method is provided and includes establishing, by one or more servers, a communication session that provides an endpoint with access to at least one...
US-9,912,776 Explicit content deletion commands in a content centric network
One embodiment provides a system that deletes cached content. During operation, the system generates, by a content producing device, a content object packet...
US-9,912,598 Techniques for decreasing multiprotocol label switching entropy label overhead
A method is provided in one embodiment and includes receiving at a network element an encapsulated packet and determining whether both an ECMP/LAG Existing...
US-9,912,584 Data center inbound routing optimization in the event of virtual machine mobility
Methods and apparatus for optimizing data center routing in the event of virtual machine (VM) mobility are provided. In one embodiment, a first gateway router,...
US-9,912,577 Segment routing--egress peer engineering (SP-EPE)
In one embodiment, a controller device in a computer network domain learns border gateway protocol (BGP) egress peering segments from one or more border routers...
US-9,912,566 Method and apparatus for tracing paths in service function chains
In one embodiment, a method includes receiving a trace request packet at a service node in a service chain, the trace request packet comprising a service path...
US-9,912,522 Automatic task tracking
The present technology correlates tasks between multiple threads of an application. A payload consisting of a task object may be identified as part of a method....
US-9,912,494 Distributed application hosting environment to mask heterogeneity
In one embodiment, a device in a network receives data from one or more other devices in the network via one or more protocol adaptors. The device transforms...
US-9,912,480 Network service packet header security
A network service packet (NSP) header security method includes receiving an NSP on a communication interface, analyzing, by a processor, the NSP in order to...
US-9,912,464 Interference relationship characterization in full duplex cable network environments
An example method for characterizing interference relationships in full duplex cable network environments is provided and includes generating a global...
US-9,910,896 Suspending and resuming continuous queries over data streams
In an embodiment, a method comprises processing an input data stream as the data stream is streamed and producing a derived stream therefrom; storing the input...
US-9,910,811 Hot swap circuit
In one embodiment, a hot swap circuit is disclosed. The hot swap circuit includes a capacitor in parallel with an input line to a power system. The hot swap...
US-9,910,642 Optimal rule generation from a digraph representation
In one embodiment, a computing system identifies one or more terminal nodes in a digraph, and then back-walks primitives up the digraph from each terminal node...
US-9,906,939 Detection of nearby points of interest
Particular embodiments described herein provide for a communication system that can be configured for receiving, at an electronic device, data related to one or...
US-9,900,209 Techniques for YANG model version control validation
In one embodiment, a method is provided for using a server computer, creating and storing a first module name, a first indication of a first version, and a...
US-9,894,795 Electrical hardware module retention interlock
According to one aspect, an apparatus includes a body and a toggle-interlock assembly. The body has an opening defined therein. The toggle-interlock assembly is...
US-9,894,689 System, method, and logic for identifying devices for a virtual meeting session
Example systems, methods, and logic are provided herein for detecting a numerical identifier of an endpoint. In one example, a connectivity manager establishes...
US-9,894,535 Preamble-based channel reservation and self-organized fairness mechanisms for long term evolution (LTE) over...
A wireless device accesses a shared spectrum equitably in a self-organizing manner by determining success indices and adjusting courtesy parameters. The...
US-9,894,431 Microphone rubber boot
A multi-sided microphone boot having a front side, a back side, a first lateral side, a second lateral side, and a bottom side. The front side can have a sound...
US-9,894,397 Controlling bit-rates for media streaming sessions
In one embodiment, a method includes (a) discerning whether an average packet delay in a media streaming session is increasing or decreasing over a first...
US-9,894,213 Acoustic echo cancellation for audio system with bring your own devices (BYOD)
A controller for the conference session generates a speaker signal for speakers in a conference room. The controller correlates the speaker signal with network...
US-9,894,122 Traceroute in virtual extenisble local area networks
An inner packet configured with a multicast address and configured to perform a traceroute operation through a network is encapsulated to form an encapsulated...
US-9,894,117 File transfers for virtual conferences
In an example embodiment, a virtual conference is established with a server and a plurality of endpoint devices. One endpoint device, acting as a sender, may...
US-9,894,109 Lawful intercept in an internet protocol-based telephony system
Messages sent from an initiating device to a called device to establish a telephonic communication session between the initiating device and the called device...
US-9,894,055 Redirect to inspection proxy using single-sign-on bootstrapping
An authentication request is generated when a user of a client device attempts to initiate a user session with an application managed by a service provider. An...
US-9,894,031 Source-aware technique for facilitating LISP host mobility
A method is provided in one example embodiment and includes detecting by a first network element at a first data center site a local connection of an endpoint...
US-9,894,010 Management of heterogeneous client device groups
Various implementations disclosed herein enable client devices to share a network resource in order to produce more evenly distributed perceptual playback...
US-9,893,995 Systems, methods, and apparatus for implementing agents in service appliances
The present disclosure describes several key features of an agent deployable on a service appliance: agent architecture/design, transport and channel...
US-9,893,985 Utilizing remote storage for network formation in IoT networks
In one embodiment, a device that is protected against a power outage event in a network receives metrics used by a first node in the network to select a routing...
US-9,893,979 Network topology discovery by resolving loops
Previously available network management systems fail to adequately enable discovery of a network topology that includes both compliant and non-compliant...
US-9,893,963 Dynamic baseline determination for distributed transaction
The present technology may determine an anomaly in a portion of a distributed business application. Data can automatically be captured and analyzed for the...
US-9,893,901 Method and system for establishing a combined local area network (CLAN) in a conference network (CN)
A method including: receiving, at a conference unit, a command to establish a conference call between the conference unit and another conference unit, the...
US-9,892,075 Policy driven storage in a microserver computing environment
An example method for facilitating policy-driven storage in a microserver computing environment is provided and includes receiving, at an input/output (I/O)...
US-9,888,455 Slice-based tracking areas
In one embodiment, a method for optimizing tracking areas for user equipments (UEs) is implemented in a mobile network and includes: defining network slices as...
US-9,888,405 Networking apparatuses and packet statistic determination methods employing atomic counters
Disclosed herein are methods and related apparatuses for determining statistics descriptive of packets received at a particular location on a network out of a...
US-9,888,363 System and method for applications management in a networked vehicular environment
A method in one example embodiment includes identifying a power state and a battery level of a vehicle. The method also includes allocating power to critical...
US-9,888,119 Contacts service for call center
In one implementation, a cloud service server supplements one or more call centers or data centers. The cloud service server receives a customer identification...
US-9,888,047 Efficient on-demand generation of ABR manifests
In one embodiment of the present invention, an HLS transcoder inserts a plurality of encoder boundary points (EBPs) into an HLS formatted content item, a...
US-9,888,020 Global clustering of incidents based on malware similarity and online trustfulness
In an embodiment, a method, performed by processors of a computing device for creating and storing clusters of incident data records based on behavioral...
US-9,887,936 Application identification and overlay provisioning as a service
In one embodiment, a first device in a network receives application traffic sent from a source device towards a destination address. The first device sends the...
US-9,887,881 DNS-assisted application identification
Techniques are disclosed for classifying a network flow based on a domain name system (DNS) request. Embodiments receive a first DNS request associated with...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.