Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: cisco





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,294,330 System and method for computer originated audio file transmission
A system and method for computer originated audio file transmission includes a server having a communications module operable to communicate with a terminal...
US-9,294,292 Optimized multicast routing in a Clos-like network
Techniques are provided for optimizing multicast routing in a network. At a router device, a message is sent to one or more physical devices. The message is...
US-9,294,270 Detection of stale encryption policy by group members
Various techniques that allow group members to detect the use of stale encryption policy by other group members are disclosed. One method involves receiving a...
US-9,293,187 Methods and apparatus for refreshing digital memory circuits
Dynamic memory systems require each memory cell to be continually refreshed. During a memory refresh operation, the refreshed memory cells cannot be accessed by...
US-9,292,834 Messaging system with content-based dynamic menu generation
A unified messaging system for an enterprise includes a messaging module operable to store a message sent by a first user to a second user in a first media...
US-9,288,804 Almost blank subframe based orthogonal resource allocation in a wireless network environment
An example method for facilitating almost blank sub-frame (ABS) based orthogonal resource allocation in a wireless network environment is provided and includes...
US-9,288,763 Battery consumption monitoring
In one embodiment, a method for battery monitoring on a computing device includes: estimating a battery consumption estimate for an event scheduled on the...
US-9,288,331 System and method for muting audio associated with a source
In one embodiment, a method includes receiving audio at a plurality of microphones, identifying a sound source to be muted, processing the audio to remove sound...
US-9,288,290 Interactive dynamic ordering of deep packet inspection rules
A network device processes packets transiting the device using successive deep packet inspection (DPI) rules. For each rule, the device attempts to apply the...
US-9,288,231 Web caching with security as a service
In one implementation, Web-Cache deployed in the Enterprise premises and cloud-based SecaaS are combined such that similar identity-based polices are enforced...
US-9,288,186 Network security using encrypted subfields
In one embodiment, a method includes receiving from a secure device, an encrypted rule at a first network device, receiving at the first network device, a...
US-9,288,162 Adaptive infrastructure for distributed virtual switch
In one embodiment, a method includes identifying at a network device, characteristics of a distributed virtual switch comprising a control plane component and a...
US-9,288,136 Method and apparatus for in-band channel change for multicast data
In one embodiment, a method includes transmitting media from a source to a plurality of receivers in a first source-specific multicast (SSM) channel and...
US-9,288,069 Loop avoidance technique for the multicast control plane
The present disclosure provides for a loop avoidance technique that implements an upstream neighbor check to detect any forwarding inconsistencies. When a...
US-9,288,067 Adjacency server for virtual private networks
Devices, methods and instructions encoded on computer readable medium are provided herein for creation of an overlay network on a non-multicast or source...
US-9,288,066 Dynamic multicast mode selection in a communication network
In one embodiment, a network device selectively operates according to a sparse multicast mode where the network device stores individual devices interested in...
US-9,286,473 Quarantine-based mitigation of effects of a local DoS attack
In one embodiment, techniques are shown and described relating to quarantine-based mitigation of effects of a local DoS attack. A management device may receive...
US-9,286,469 Methods and apparatus providing computer and network security utilizing probabilistic signature generation
A system receives information from at least one security interceptor associated with at least one computer system. The information identifies details associated...
US-9,286,047 Deployment and upgrade of network devices in a network environment
A method for deployment and upgrade of network devices in a network environment includes receiving (for example, at a switch being activated in the network...
US-9,285,267 Optical communication reception system
A system configured to maintain a consistent local-oscillator-power-to-primary-signal-power ratio (LO/SIG ratio). The system may be configured to: receive the...
US-D751,525 Handset with cradle
US-9,282,649 Stand-off block
An apparatus may be provided. The apparatus may comprise a substrate and a circuit board. A ball grid array structure may be disposed between the substrate and...
US-9,282,465 Multi-operator core network shared small cell deployment in a non-multi-operator macro network environment
A method provided in one embodiment includes receiving a resource list including a first core network identifier identifying a first core network, at least a...
US-9,282,284 Method and system for facial recognition for a videoconference
Videoconferencing may be provided. A participant may be identified from audio information and in video information. From the video information, a plurality of...
US-9,282,164 Application hints for network action
A user application may provide a hint which may be used by a compute device to select a tag to be inserted into the packets generated by the user application....
US-9,282,110 Cloud-assisted threat defense for connected vehicles
In an example embodiment herein, there is provided methods and a system for cloud-assisted threat defense for connected vehicles. A vehicle suitably includes an...
US-9,282,100 Privilege separation
In one implementation, an interposer library is installed on an embedded system or another type of computing system. The system may be configured to host web...
US-9,282,089 Low latency authentication of gated media relay services
Media relay services are often used to establish sufficiently direct connections in order to enable provisioning of a real-time media service and/or improve the...
US-9,282,077 System and method for providing prefixes indicative of mobility properties in a network environment
An example method includes receiving an Internet protocol (IP) address request in a network and selecting an IP address associated with a prefix that represents...
US-9,282,059 Quality of service (QoS) configuration in low-power and lossy networks
In one embodiment, a distributed intelligence agent (DIA) in a computer network performs deep packet inspection on received packets to determine packet flows,...
US-9,282,040 Smarter policy decisions based on metadata in data flows
Modern day user applications leverages new communication technologies such as WebRTC, WebEx, and Jabber allow devices to connect and exchange media content...
US-9,282,033 Intelligent handling of virtual machine mobility in large data center environments
At a physical device in a network configured to host a virtual switch and one or more virtual machines, a packet is received at the virtual switch from a source...
US-9,281,955 Interoperability of data plane based overlays and control plane based overlays in a network environment
Technologies are provided in example embodiments for intercepting a packet being multicast from a first tunnel endpoint in a network, determining first address...
US-9,281,951 Any-to any multicasting in a tunnel based virtual private network
Systems, methods, and other embodiments associated with any-to-any multicasting in a tunnel based virtual private network (VPN) are described. One example...
US-9,281,865 Efficient network discovery in frequency hopping networks
In one embodiment, a device in a frequency hopping communication network transmits responsive beacon messages based on adaptive types of responsive beacon...
US-9,280,604 Unified communication audit tool
Providing for dynamic auditing of components of a communication network is provided herein. By way of example, network components can be queried by way of...
US-9,280,487 Methods and apparatus for data processing using data compression, linked lists and de-duplication techniques
Data processing methods and apparatus for efficiently storing and retrieving data, e.g., blocks of data, to and from memory. The data processing includes, e.g.,...
US-9,280,464 System and method for simultaneously storing and reading data from a memory system
A system and method for providing high-speed memory operations is disclosed. The technique uses virtualization of memory space to map a virtual address space to...
US-9,280,359 System and method for selecting a least cost path for performing a network boot in a data center network...
A method is provided in one example embodiment and includes logging in to a multipath target via first and second boot devices instantiated on a network device,...
US-9,280,197 Battery level presentation
In one embodiment, a method implemented on a first computing device includes: receiving video conference data for a video conference session; receiving battery...
US-9,277,503 Dynamic zone routing in a mobile ad hoc network based on maximum available network device battery power
In one embodiment, a wireless network device identifies whether any other detectable network device advertises a higher advertised remaining power than a...
US-9,277,482 Adaptive reoptimization rate for unstable network topologies
In one embodiment, the network stability of a communication network is determined based on one or more network metrics related to stability, and then based on...
US-9,277,374 Delivering wireless information associating to a facility
Systems, methods, and apparatus may perform operations related to delivering wireless information associating to a facility. A message is received from a first...
US-9,277,370 System and method for internal networking, data optimization and dynamic frequency selection in a vehicular...
A system includes an on-board unit (OBU) in communication with an internal subsystem in a vehicle on at least one Ethernet network and a node on a wireless...
US-9,277,295 Securing media content using interchangeable encryption key
An embodiment of a system for securing media content includes a digital media device comprising a memory associated with a secure element. The memory contains a...
US-9,277,214 Sub-picture hierarchical QP coding
A method including: dividing a first video frame into a predetermined plurality of regions; assigning a quantization parameter to each of the predetermined...
US-9,277,166 Map your movie
A method of displaying an interactive geographical representation associated with a video content item is described. The method includes: playing the video...
US-9,277,040 Presence based connecting number search
Methods and apparatus for using a presence status to generate a list of possible contacts based on a partial entry of a contact address are disclosed. According...
US-9,276,871 LISP stretched subnet mode for data center migrations
The present disclosure describes methods and systems for enabling a migration of network elements from a first location to a second location remote from the...
US-9,276,867 Hierarchical scheduling system with layer bypass including updating scheduling information of a scheduling...
In one embodiment, a hierarchical scheduling system including multiple scheduling layers with layer bypass is used to schedule items (e.g., corresponding to...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.