Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: cisco





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-7,346,059 Header range check hash circuit
A technique efficiently searches a hash table containing a plurality of "ranges." In contrast with previous implementations, the technique performs fewer...
US-7,346,058 Multiprotocol encapsulation system and method
A multiprotocol encapsulation method and system for transporting different protocols over Ethernet are disclosed. The method includes receiving frames from an...
US-7,346,057 Method and apparatus for inter-layer binding inspection to prevent spoofing
A method for inspecting packets is disclosed. The method includes processing a packet by determining if the packet is an inter-layer binding protocol packet and...
US-7,346,053 Methods and apparatus for supporting IP multicast for a mobile router
Methods and apparatus for supporting a Mobile IP mobile router are disclosed. A method of establishing a multicast session, thereby enabling multicast IP data...
US-7,346,047 Method and apparatus for backhaul of telecommunications signaling protocols over packet-switching networks
A generic backhaul protocol is provided for passing telecommunication signaling messages according to multiple signaling protocols between a gateway and a media...
US-7,345,994 Transparent re-routing of MPLS traffic engineering LSPs within a link bundle
Local rerouting around a failed component link of a link bundle is provided by immediately substituting one or more other component links of the same link...
US-7,345,897 Error protected ternary content-addressable memories and lookup operations performed thereon
Ternary content-addressable memory (TCAM) entries are disclosed for use in performing error-protected lookup operations by allowing an error budget of u...
US-7,345,585 Network based device for providing RFID middleware functionality
Some embodiments of the present invention provide middleware functionality integrated into a module of a network device, such as a router or switch, that is...
US-D564,521 Wireless notebook adapter
US-D564,496 Speaker
US-7,343,485 System and method for maintaining protocol status information in a network device
A method may involve: maintaining protocol status information for a network protocol, where the protocol status information includes protocol information...
US-7,343,423 Enhanced switchover for MPLS fast reroute
A Fast Reroute implementation where switchover time to backup tunnels upon failure of a protected network element is independent of a number of entries...
US-7,343,406 Proactive call and contact center system
A proactive call center which detects problems, resolves the problems, and then contacts the customers before customers initiate calls themselves. In the present...
US-7,343,404 Efficient representation of system network management object identifiers
Systems and methods for efficient storage of network management object identifiers are provided. Object identifiers such as SNMP MIB object identifiers are...
US-7,342,929 Weighted fair queuing-based methods and apparatus for protecting against overload conditions on nodes of a...
An improved network device that controls throughput of packets received thereby, e.g., to downstream devices or to downstream logic contained within the same...
US-7,342,922 Multi-stage switching for networks
Techniques for multi-stage switching in network elements are provided. The switching fabric can include three stages and as connections are being made through...
US-7,342,902 Two stage loss-less compressor for a clear channel over a packet network
A two stage compression sub-system for clear channel data. The front stage of the compressing sub-system is an octet based repeat compressor (for example a flag...
US-7,342,897 Network verification tool
A network verification tool is presented that allows a user to easily create tasks for a collection of task types. The collection of task types are hosted by...
US-7,342,877 Method and system for providing a loop-free ring topology
A method for preventing loops in a ring topology of a computer network is disclosed. The method includes receiving a packet at a node on a shared packet ring and...
US-7,342,872 Differential OFDM using multiple receiver antennas
Systems and methods for optimally receiving differential encoded OFDM signals via multiple antennas. These techniques may exploit spatial diversity without...
US-D563,994 Network attached storage
US-7,340,769 System and method for localizing data and devices
Methods and devices controlling access to content are described. For example, a request to enroll a device is received at a localization hub. The localization...
US-7,340,744 System and method for optimizing sessions and network resources in a loadbalancing environment
A method for loadbalancing in a network environment is provided that includes receiving a create request from an end user for a communications link provided by a...
US-7,340,597 Method and apparatus for securing a communications device using a logging module
A logging module is disclosed. A communications device can include, and so be made secure through the use of, the logging module. The logging module is...
US-7,340,510 Content delivery network (CDN) replication status reporter
Conventional replication status reporting techniques in a Content Delivery Network (CDN) tend to produce large, unwieldy reports which are difficult to transmit,...
US-7,340,386 Method and system for quantifying the quality of diagnostic software
A method, a system, and an apparatus for quantification of the quality of diagnostic software by applying a coverage tool are provided, wherein the diagnostic...
US-7,340,046 Providing telephony services using intelligent end points
A system includes telephony devices that provide services and applications through the execution of scripts in web pages.
US-7,340,000 Decision feedback equalizer in an OFDM WLAN receiver
In an OFDM radio receiver for a wireless packet network, an apparatus to equalize a presently received OFDM signal containing subcarriers using an equalizing...
US-7,339,927 Method and system for providing an accurate address of a device on a network
A method, system and reporting arrangement for providing an accurate address of a device which receives media are described. In particular, these method, system...
US-7,339,924 Method and apparatus for providing ringing timeout disconnect supervision in remote telephone extensions using...
A Multiservice Access Concentrator (MAC) provides a time limit for a first ringing voltage signal in response to an attempted call. The call is attempted via a...
US-7,339,915 Virtual LAN override in a multiple BSSID mode of operation
Methods, apparatuses and systems directed to the integration of VLANs and wireless access points operating in a Multiple BSSID mode of operation. According to...
US-7,339,893 Pre-empting low-priority traffic with high-priority traffic on a dedicated link
A method and system for pre-empting a low-priority traffic with high-priority traffic over a serial link utilizes special codes to delimit a high-priority...
US-D563,389 Sub-woofer
US-7,337,224 Method and apparatus providing policy-based determination of network addresses
A method is disclosed for policy-based determination of a network address for a client in a network. A request for a network address is received from a client. A...
US-7,337,222 System and method for suppressing out-of-order side-effect alarms in heterogenoeus integrated wide area data...
A method of suppressing a side-effect alarm in a network management system that includes a plurality of managed network elements, wherein the side-effect alarm...
US-7,336,960 Method and apparatus for balancing wireless access based on centralized information
A method and apparatus for managing and balancing wireless access based on centralized information is provided. A request to provide service to a wireless client...
US-7,336,665 Polling scheme for controlling traffic through a networking system
A method is described that associates a first plurality of logical ports with a first bandwidth group and that associates a second plurality of ports with a...
US-7,336,660 Method and apparatus for processing packets based on information extracted from the packets and context...
A context vector, typically used in a lookup operation of an associative memory, is generated based on a context of a received packet and the packet itself. In...
US-7,336,622 Method and system for resolving switch number conflicts in a stackable switch system
A method for resolving switch number conflicts in a stackable switch system includes communicating a message between switches in the stackable switch system and...
US-7,336,175 Methods and devices for locating and uniquely provisioning RFID devices
Methods and devices are provided for identifying, locating and provisioning individual RFID devices in a network. According to some implementations of the...
US-7,335,033 Coupling a small form factor transceiver to a circuit board module using a form factor converter
A system includes a circuit board module having a device mounting section. The system further includes a small form factor transceiver and a form factor...
US-D562,814 Wireless home router
US-7,334,258 Configuration file download enforcement
Methods and devices are provided for detecting or preventing unauthorized upgrades to a customer's quality of service in an access data network. Several aspects...
US-7,334,252 Rapid cable modem re-provisioning in a cable network
Methods, systems, and computer program products are disclosed for allowing rapid re-provisioning of a cable modem at the MAC/physical layer in a cable modem...
US-7,334,229 Mutual exclusion at the record level with priority inheritance for embedded systems using one semaphore
A method for providing mutual exclusion at a single data element level for use in embedded systems. Entries for tasks that are currently holding a resource are...
US-7,334,125 Facilitating secure communications among multicast nodes in a telecommunications network
An approach for facilitating secure communications among multicast nodes in a telecommunications network is disclosed. A source node sends an encryption key and...
US-7,334,119 Method, system, apparatus, and program product for temporary personalization of a computer terminal
A method, system, and program product that enables a computer user to access their own complete computer environment and software on a separate and distinct host...
US-7,334,065 Multiple data bus synchronization
Disclosed is a method and circuit for synchronizing dual data buses. In one embodiment, the method includes a receiving circuit receiving first and second...
US-7,334,049 Apparatus and methods for performing network address translation (NAT) in a fully connected mesh with NAT...
Disclosed are methods and apparatus for performing network address translation (NAT) in a fully connected mesh with NAT virtual interface (NVI). In general...
US-7,334,047 Method and system for selective link state advertisement blocking over a data network area
Method and system for efficiently handling hub and spoke area topologies in a data network under Open Shortest Path First (OSPF) routing protocol which provides...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.