Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: cisco





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,473,348 Method and system for detecting changes in a network using simple network management protocol polling
In an embodiment, methods and systems have been provided for detecting changes in a network using improved Simple Network Management Protocol (SNMP) polling...
US-9,471,781 Method and apparatus for monitoring and filtering universal serial bus network traffic
In one embodiment, a method includes obtaining at least one packet from a first element on a Universal Serial Bus (USB) bus. The at least one packet is intended...
US-9,468,090 Current redistribution in a printed circuit board
In one implementation, a multilayered printed circuit board is configured to redirect current distribution. The current may be distributed by steering,...
US-9,467,918 System and method to facilitate radio access point load prediction in a network environment
A method is provided in one example embodiment and may include training a statistical model representing radio access point loads or load changes for radio...
US-9,467,818 Method and apparatus for identifying wireless access points using beacon frames
Techniques are described for identifying a wireless access point device using beacon messages and probe responses. An access point may generate and broadcast...
US-9,467,536 Shim layer abstraction in multi-protocol SDN controller
A Service Abstraction Layer (SAL) provides network level abstraction enabling applications to interface via multiple software-defined networking (SDN) protocols...
US-9,467,382 Elastic service chains
Presented herein are elastic service chain techniques. In one example, a network element receives data traffic to be processed by a service chain that specifies...
US-9,467,374 Supporting multiple IEC-101/IEC-104 masters on an IEC-101/IEC-104 translation gateway
In one embodiment, a network device, such as a router, receives a frame containing a message from a first terminal unit. The network device modifies the...
US-9,467,367 Universal labels in internetworking
In an embodiment, a method comprises: receiving a data communications packet comprising one or more labels in a label stack; determining whether a table...
US-9,467,365 Mechanism and framework for finding optimal multicast tree roots without the knowledge of traffic sources and...
The proposed methodology enables finding the most efficient roots in the network to carry multicast traffic, while further providing a theoretical basis for...
US-9,467,342 Automatic resolution of virtual network instance to VLAN mapping conflicts in dual-homed deployments in a...
In accordance with one example embodiment, there is provided a system configured for virtual local area network (VLAN) blocking on a virtual port channel (vPC)...
US-9,466,395 Methods and apparatus for testing and repairing digital memory circuits
An ActiveTest solution for memory is disclosed which can search for memory errors during the operation of a product containing digital memory. The ActiveTest...
US-9,465,795 System and method for providing feeds based on activity in a network environment
A method is provided in one example and includes receiving network traffic associated with a particular user; developing a personal vocabulary for the...
US-9,462,426 System and method for identifying talk burst sources
According to one aspect, a method includes obtaining, at a client included in a push-to-talk (PTT) system, a plurality of talk bursts including at least a first...
US-9,462,268 Output management of prior decoded pictures at picture format transitions in bitstreams
Systems and methods may be provided for determining whether or not to output the "decoded pictures yet to be output" (DPYTBO) after decoding a random access...
US-9,462,228 Distributed real-time media composer
A system and a method allowing simultaneous exchange of audio, video or data information between a plurality of units over a communication network, supported by...
US-9,462,088 Offload operations for overlay networks
Techniques are presented herein for receipt/transmission of packets to/from a host via a connected input/output (IO) device. In general, a packet is associated...
US-9,462,071 Spoofing technique for transparent proxy caching
In one embodiment, a proxy device in a computer network receives a redirected client request having a request source address as a client address and a request...
US-9,462,043 Framework for dynamically programmed network packet processing
One or more functions to be performed on a packet at one or more network nodes along a network path are determined at a network device. A packet is generated...
US-9,462,040 Network-based dynamic data management
In one embodiment, a router operating in a hierarchically routed computer network may receive collected data from one or more hierarchically lower devices in...
US-9,462,016 Viewing shared documents in a sharing session
In a sharing session between a presenter and several attendees, the presenter can share any type of document quickly and without substantial prior preparation....
US-9,462,008 Identifying threats based on hierarchical classification
A system and a method are disclosed for identifying network threats based on hierarchical classification. The system receives packet flows from a data network...
US-9,462,001 Computer network access control
Receive, at an access control node (ACN) of a first network enclave, a plurality of data packets inbound to the enclave. The characteristics of each received...
US-9,461,979 Method and system for including network security information in a frame
A method and apparatus for including network security information in a frame is disclosed. Network security information is included in a secure portion of...
US-9,461,968 Zone-based firewall policy model for a virtualized data center
Techniques are provided for implementing a zone-based firewall policy. At a virtual network device, information is defined and stored that represents a security...
US-9,461,965 Redirecting of network traffic for application of stateful services
Techniques are presented herein for redirection between any number of network devices that are distributed to any number of sites. A first message of a flow is...
US-9,461,959 Techniques for auto assigning IP telephone extension numbers based on a port
Techniques are provided for assigning extension numbers to Internet Protocol (IP) telephony devices. The techniques include receiving a message from the IP...
US-9,461,943 Network assisted virtual machine mobility
A first addressing message is received at a first switch in a network fabric indicating that a first virtual machine has undergone migration from connection to...
US-9,461,914 Path maximum transmission unit handling for virtual private networks
Techniques are described herein for optimizing communications in a network. At a router in a virtual private network, a packet is received from a device in a...
US-9,461,887 Stateless flexible boot control
Techniques are provided herein for optimizing boot order for devices in a data center environment. These techniques may be embodied as a method, apparatus and...
US-D768,187 Display screen with a graphical interface
US-9,456,444 OAM and time slot control in a deterministic ARC chain topology network
In one embodiment, a network of nodes is configured to communicate according to a configuration of Available Routing Construct (ARC) chains as well as...
US-9,455,948 Reducing proliferation of network-to-link-layer address resolution messages
In one embodiment, the processing by a packet switching device of a received network-to-link-layer address resolution request message (e.g., Address Resolution...
US-9,455,933 Flexible deterministic binary scheduler
A method for allocating port assignments for transmitting a reserved network stream across a network node comprises determining a cycle time associated with a...
US-9,455,909 Application services based on dynamic split tunneling
One embodiment provides selectively routing Domain Name System (DNS) request for sub-domains associated with a first network through a tunnel associated with...
US-9,455,908 Bi-directional flow stickiness in a network environment
An example method for bi-directional flow stickiness in a network environment is provided and includes receiving a packet of a flow from a source address in a...
US-9,455,903 Recording packet routes using bloom filters
In one embodiment, a Bloom filter is provided in a data packet signal functional to preferably encode the identifier of each nodal device and record the nodal...
US-9,455,787 Light emitting diode (LED)-based multi-bitrate data links
In one embodiment, a method comprises receiving, by an apparatus, first data at a first bitrate and second data at a second bitrate faster than the first...
US-9,455,546 Raman-based static and dynamic tilt control in an optical system
An optical fiber carries optical channels injected into the optical fiber to a Raman amplifier. A controller determines a static tilt associated with the...
US-9,454,702 Reflection based tracking system
In one embodiment, a processor can receive data representing a view reflected by a mirror of a plurality of mirrors. The plurality of mirrors may be configured...
US-D767,548 Networking device
US-9,451,414 Automatically determining relative locations of collaboration endpoints within a building
Techniques are presented herein for a server to automatically determine the locations of collaboration endpoints and user devices throughout a building, and...
US-9,451,360 Muting a sound source with an array of microphones
A processing system can include tracking microphone array(s), audio-tracking circuitry configured to detect a location of audio sources from audio signals from...
US-9,451,179 Automatic image alignment in video conferencing
In one implementation, at least two images are captured from a respective at least two cameras of a telepresence system. The at least two cameras have...
US-9,450,978 Hierarchical event detection in a computer network
In one embodiment, network data is received at a first node in a computer network. A low precision machine learning model is used on the network data to detect...
US-9,450,975 Target-based SMB and DCE/RPC processing for an intrusion detection system or intrusion prevention system
A method performed in a processor of an intrusion detection/prevention system (IDS/IPS) checks for valid packets in an SMB named pipe in a communication...
US-9,450,972 Network attack detection using combined probabilities
In one embodiment, a device in a network receives a set of output label dependencies for a set of attack detectors. The device identifies applied labels that...
US-9,450,951 Secure over-the-air provisioning solution for handheld and desktop devices and services
In one embodiment, a device and a services provisioning system establish an over-the-air connection with each other, and perform device posture validation to...
US-9,450,914 Distributed proxy addressing operations
An addressing redirection mechanism is initiated at a first networking device in a computing network in order to enable the first networking device to perform...
US-9,450,913 CDNI request routing using flow metadata
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium for Content Delivery Networks Interconnection (CDNI) request...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.