Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: cisco





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,363,048 Downlink OFDMA for service sets with mixed client types
Techniques are provided herein to allow a wireless network access point (AP) to more fully use its bandwidth in order to leverage the different bandwidth...
US-9,362,746 Communication network topology management based on an associated electric grid topology
In one embodiment, a computer determines a grid topology of an electric grid based on one or more electric grid configuration description files, and also...
US-9,361,334 Addressing cache coherence in updates to a shared database in a network environment
Example embodiments are provided that may include receiving a request to update a particular object based on a modified object, where the particular object is...
US-9,360,688 Electro-optical modulators with folded gate layers
An optical modulator may include a lower waveguide, an upper waveguide, and a dielectric layer disposed therebetween. In one embodiment, the lower waveguide may...
US-9,357,524 Subscriber-aware paging
This disclosure relates to systems and methods for paging devices in a communication network. A network device providing mobility management through control...
US-9,357,519 Probe response suppression using angle-of-arrival in a high density environment
A first wireless device (e.g., an access point) receives a message from a second wireless device (e.g., a client device). The first device determines an...
US-9,357,410 Wireless network flow monitoring
Techniques are presented herein for enabling performance monitoring of flows within a management and provisioning tunnel used for communicating packets between...
US-9,357,172 Video conference virtual endpoints
A method and a device providing one virtual endpoint dedicated to serve one particular real endpoint, and the virtual endpoint is typically installed on a...
US-9,357,164 Establishing a remotely hosted conference initiated with one button push
A method includes registering with a first remote conference manager operated by a first entity and a request to enable conferencing with a second entity. The...
US-9,357,076 Load balancing of distributed media agents in a conference system
A load balancer controls a cluster of media agents each configured to perform media packet processing operations in a conference session. The load balancer...
US-9,356,928 Mechanisms to use network session identifiers for software-as-a-service authentication
Techniques are provided for authenticating a subject of a client device to access a software-as-a-service (SaaS) server. A network access device receives a...
US-9,356,886 Techniques for scalable and foolproof virtual machine move handling with virtual port channels
Techniques are provided for managing movements of virtual machines in a network. At a first switch, a virtual machine (VM) is detected. The VM is hosted by a...
US-9,356,884 MSDC scaling through on-demand path update
In one embodiment, a copy of an original packet of a traffic flow is created at an ingress leaf node of a cloud switch. The ingress leaf node forwards the...
US-9,356,876 System and method for classifying and managing applications over compressed or encrypted traffic
System and methods for identifying and managing applications over compressed or encrypted traffic in a network are described. The first and second embodiments,...
US-9,356,875 Using statistical and historical information of topology metrics in constrained networks
Statistical and historical values of performance metrics are actively used to influence routing decisions for optimum topologies in a constrained network....
US-9,356,871 Programmable management engine for networks
A network node may contain a virtual software-defined networking (SDN) switch and a local a management engine (e.g., a software application) for generating...
US-9,356,858 Redirecting traffic via tunnels to discovered data aggregators
In one embodiment, a data aggregator discovery (DAD) message may be distributed by an associated data aggregator, the DAD message identifying the initiating...
US-9,356,856 Apparatus and method to hide transit only multi-access networks in OSPF
In one embodiment, a first router determines whether a network coupling the first router to one or more second routers is transit-only, wherein transit-only...
US-9,356,803 Field aware virtual connection discovery
A method for field aware virtual connection discovery is described. In an embodiment, a set of virtual connection domains and a set of virtual connection...
US-9,356,759 Reassignment of unused portions of a transmission unit in a network
One embodiment includes signaling, by a first network node to a transmission unit owner node, identifying one or more remaining wireless time slot-frequency...
US-9,354,697 Detecting active region in collaborative computing sessions using voice information
In an example embodiment disclosed herein, there is described methods and a system for sharing of content in collaborative computing sessions. The methods and...
US-D757,697 Router
US-9,351,207 System and method for providing small cell gateway redundancy in a network environment
An example method is provided in one example embodiment and may include configuring a Home eNode B (HeNB) with plurality of tracking area identities (TAIs),...
US-9,351,024 Managing the bandwidth of a communication session
A system includes a processor operable to identify each of a plurality of first video packets from a communication session with a first identifier designating...
US-9,350,822 Distributed web object identification for web caching
In some embodiments, a request for a content object may be received as a data packet. Upon determining that the content object is not cached, an element of the...
US-9,350,817 Recording a hyper text transfer protocol (HTTP) session for playback
In one embodiment, a method includes recording a sequence of online activities of a first user. The online activities include online consumption of online...
US-9,350,785 Data stream classification
Systems, methods, and other embodiments associated with data stream classification are described. One example method includes identifying packets associated...
US-9,350,715 Methods and apparatus for network communications via a transparent security proxy
A data security device for providing a network transport connection via a transparent network proxy that employs different encryption security mediums along a...
US-9,350,709 Synchronizing a routing-plane and crypto-plane for routers in virtual private networks
Techniques are presented herein for optimizing secure communications in a network. A router in a virtual private network determines whether or not it has...
US-9,350,683 Reliable bulk data dissemination using rateless codes
In one embodiment, an aggregating node receives feedback messages from one or more destination nodes in the network. The destination nodes are designated to...
US-9,350,672 Performance enhancement and congestion control of multipath protocol packets in a heterogeneous network...
An example method for performance enhancement in a heterogeneous network environment with multipath transport protocols is provided and includes receiving...
US-9,350,665 Congestion mitigation and avoidance
In one embodiment, a method is provided for congestion mitigation. In this method, a congestion level of data flows along a path is monitored relative to a...
US-9,350,653 Label switching in fibre channel networks
Methods and apparatus are provided for label switched routing in fiber channel networks. Techniques are provided for implementing label switching based on...
US-9,350,645 Simultaneous acknowledgments for multicast packets
In one embodiment, a multicast communication is received at a particular node of a plurality of nodes receiving the multicast communication in a network. The...
US-9,350,639 Forwarding data in a data communications network
In an embodiment, an apparatus for forwarding data in a data communications network having as components nodes and links therebetween comprises a network...
US-9,350,635 Efficient network probing for deterministic wireless networks
In one embodiment, a device (e.g., path computation device) informs a network management device of a plurality of possible probing profiles, where nodes of a...
US-9,350,628 Dynamic management of maintenance association membership in a computer network
In one embodiment, a particular maintenance end-point (MEP) transmits, during a joining phase, one or more join announcement messages (JAMs) to other MEPs in a...
US-9,350,543 Method and system for homomorphicly randomizing an input
A fully homomorphic method and system for randomizing an input, wherein all computations are over a commutative ring is described. Equivalent methods for...
US-9,350,448 Multi-beam free space optical endpoint
Free space optics (FSO) is a wireless technology that utilizes optical frequencies. Previously available FSO transceivers are restricted to point-to-point links...
US-9,350,256 Common slot battery backup unit for network devices
An internal common slot battery backup unit (CSBBU) is provided that can be placed in a network device's power supply unit (PSU) slot. The CSBBU has the same...
US-9,348,552 Network appliance for transcoding or enriching virtual desktop infrastructure desktop images
Disclosed in an example embodiment herein is an apparatus that comprises an interface for receiving image data from a hosted virtual desktop and sending a...
US-9,344,929 Facilitating automatic neighbor relation in a wireless telecommunication network environment
An example method for facilitating automatic neighbor relation in a wireless telecommunication network environment is provided and includes initiating a fake...
US-9,344,856 Detection of false vehicle-to-vehicle emergency brake light messages
The trustworthiness of vehicle-to-vehicle (V2V) messages received from one or more associated vehicles in the vicinity of a subject vehicle is determined...
US-9,344,520 Method and system for visualizing social connections in a video meeting
A method implemented on a computing device for conducting a video conference includes identifying at least some attendees of the video conference, acquiring a...
US-9,344,515 Social-driven precaching of accessible objects
A precaching system identifies an object, such as a media file, that a user accesses and then analyzes a social graph of the user to identify social graph...
US-9,344,469 Techniques for event based queuing, ordering and time slot computation of multi-modal meeting presentations
A scheduling request to schedule an online meeting is received. The online meeting involves a plurality of participants during which multiple participants may...
US-9,344,441 Detection of malicious network connections
In one embodiment a method, system and apparatus is described for detecting a malicious network connection, the method system and apparatus including...
US-9,344,357 Label-switched path aggregation
Techniques are disclosed for aggregating label-switched paths (LPSs). One method for aggregating LSPs may include a first node comparing forwarding equivalence...
US-9,344,355 Handling unacceptable asymmetrical communication paths in computer networks
In one embodiment, a plurality of communication paths in a second direction in a communication network is determined, based on reversing communication paths...
US-9,344,350 Virtual service topologies in virtual private networks
In one embodiment, a method includes storing a service topology route at a network device interconnecting at least two zones comprising a plurality of hosts,...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.