Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: cisco





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,413,713 Detection of a misconfigured duplicate IP address in a distributed data center network fabric
Presented herein are techniques to detect a misconfigured duplicate Internet Protocol (IP) address in a distributed data center network fabric. A network...
US-9,413,666 Reporting radio access network congestion information in a network sharing environment
A method is provided in one example embodiment and includes detecting user plane congestion at an eNodeB in connection with subscribers of a first one of a...
US-9,413,659 Distributed network address and port translation for migrating flows between service chains in a network...
An example method for distributed network address and port translation (NAPT) for migrating flows between service chains in a network environment is provided...
US-9,413,658 System for conversational link aggregation resolution in a network switch
Some implementations provide a method that includes: (i) receiving a list of logic link aggregations (LAGs) within a computer network, the list identifying a...
US-9,413,655 Providing virtual private service chains in a network environment
A method provided in one embodiment includes receiving a first data packet of a data flow at a first classifier in which the first data packet includes a first...
US-9,413,648 Pure control-plane approach for on-path connection admission control operations in multiprotocol label...
The embodiments described herein present methods and apparatuses for on-path CAC operations in a MPLS-VPN environment. In an example embodiment, an ingress PE...
US-9,413,643 Seamless multipath retransmission using source-routed tunnels
In one embodiment, a device receives a destination unreachable message originated by a particular node along a first source route, the message carrying an...
US-9,413,642 Failover procedure for networks
In an example embodiment, there is disclosed an apparatus comprising a plurality of ports and routing logic coupled with the plurality of ports. The routing...
US-9,413,638 Generating a loop-free routing topology based on merging buttressing arcs into routing arcs
In one embodiment, a method comprises creating, in a computing network, a loop-free routing topology comprising a plurality of routing arcs for reaching a...
US-9,413,636 Network topologies for energy efficient networks
One embodiment identifies all one-hop neighbor nodes and two-hop neighbor nodes of a node; determines an active set of one-hop neighbor nodes for the node,...
US-9,413,612 Automatic resolution of virtual network instance to VLAN mapping conflicts in dual-homed deployments in a...
In accordance with one example embodiment, there is provided a system configured for virtual local area network (VLAN) blocking on a virtual port channel (vPC)...
US-9,413,560 Differentiated quality of service using security as a service
Various embodiments are disclosed for prioritizing network flows and providing differentiated quality of service in a telecommunications network. In some...
US-9,413,536 Remote secure device management in smart grid ami networks
Presented herein are techniques for securely configuring or managing devices in a variety of geographic locations. At a device manager for a device, a first...
US-9,413,479 Intelligent wiring in a low power and lossy network
In one embodiment, the locations of a plurality of network devices in a low power and lossy network (LLN) are determined along an intelligent wire. One or more...
US-9,411,985 Passing hidden information using attack detectors
An electronic device (22) includes a communication interface (36) and a processor (30), which is configured to store and process secret information and to...
US-9,411,916 Distributed approach for feature modeling using principal component analysis
In one embodiment, techniques are shown and described relating to a distributed approach for feature modeling on an LLN using principal component analysis. In...
US-9,411,383 Faceplate for a computing device
In one embodiment, an apparatus includes a faceplate for a computing device. The faceplate includes a first side and a second side. The faceplate also includes...
US-9,411,105 Multi-axis graded-index photonic coupling
An optical coupling may involve orienting a waveguide and a lens such that light rays are focused on a surface. The lens may involve the use of a material...
US-9,408,335 ICM optimization and standardization for automation
An apparatus may be provided. The apparatus may comprise a circuit board. In addition, the apparatus may comprise an integrated connector mounted to the circuit...
US-9,408,249 Wireless mesh network including resilient backhaul links and WLAN traffic local switching
A wireless mesh network includes mesh APs and a root AP forming a root of a tree of the mesh APs in which the mesh APs are linked back to the root AP over...
US-9,408,177 System and method for resource management for operator services and internet
A method is provided in one example embodiment and includes maintaining geographical information for a plurality of WiFi access points; and managing radio...
US-9,408,036 Managing wireless beacon devices
Wireless transmissions from beacon devices are received at a plurality of receiver devices. The wireless transmissions comprise packets that carry information...
US-9,407,941 Distributing audio video content
A method of distributing audio video content is described. The method includes: receiving configuration data for a plurality of devices; for each device in the...
US-9,407,935 Reconstructing a multi-latticed video signal
An apparatus for facilitating reception of multiple representations of a video signal. In one embodiment, the apparatus includes a mechanism for receiving...
US-9,407,735 Flow matching optimization in scaled environments
In one embodiment, a method includes identifying at a network device, a number of items for matching at a hash table, the number of items exceeding matching...
US-9,407,678 System and method for locating a boundary point within adaptive bitrate conditioned content
A method is provided in one example and includes determining an occurrence of an exception to a predetermined cadence associated with an input stream of a...
US-9,407,646 Applying a mitigation specific attack detector using machine learning
In one embodiment, a device in a network detects a network attack using aggregated metrics for a set of traffic data. In response to detecting the network...
US-9,407,604 Method and apparatus for best effort propagation of security group information
A method and system for best effort propagation of security group information is disclosed. The method includes determining if a reserved group identifier is...
US-9,407,547 Fibre channel over ethernet (FCoE) over virtual port channel (vPC)
In one embodiment, a method includes instantiating a virtual Fiber Channel over Ethernet (FCoE) Forwarder (FCF) at a primary FCF, the virtual FCF associated...
US-9,407,544 Network virtualization using IP map and encapsulation
In one embodiment, a method includes receiving a packet at a first provider edge device in communication with a mapping system comprising mappings of customer...
US-9,407,542 Network architecture for minimalistic connected objects
In one embodiment, a network architecture comprises minimalistic connected objects (MCOs), distributed intelligence agents (DIAs), and central intelligence...
US-9,407,540 Distributed service chaining in a network environment
An example method for distributed service chaining in a network environment is provided and includes receiving a packet belonging to a service chain in a...
US-9,407,504 Virtual links for network appliances
Creating virtual links is disclosed, including: determining a first network appliance to configure to communicate with a second network appliance using a...
US-9,407,501 Provisioning services in legacy mode in a data center network
An administrator can define or modify one or more service graphs. Next, the administrator can register service appliances along with their device package files...
US-9,407,450 Method and apparatus for providing tenant information for network flows
In one embodiment, a method includes generating at a network device comprising a virtual switch, a tenant record comprising tenant information for a context...
US-9,407,448 Notification of audio state between endpoint devices
In one embodiment, a method includes receiving at a server in communication with a plurality of user devices, a notification of a mute state change at a first...
US-9,407,434 Secrets renewability
A method, system and apparatus for deriving a secondary secret from a root secret are described, the method, system and apparatus including reserving a memory...
US-9,407,392 Dynamic bandwidth allocation in TDMA communication systems
Techniques are presented herein for use in a Time Division Multiple Access (TDMA) communication system in which devices send transmissions to each other in time...
US-9,405,881 Cycle accurate state analysis with programmable trigger logic
In one embodiment, cycle-accurate information may be collected by stopping an input clock associated with a functional block of a SoC using a programmable...
US-9,405,698 System and methods for memory expansion
This document discusses, among other things, an example system and methods for memory expansion. An example embodiment includes receiving a memory request from...
US-9,405,573 System and method for process run-time prediction
Various embodiments provide process run-time prediction for processes running on server computers. In one embodiment, process run-time of a process is...
US-9,402,470 Rack mounting kit for telecommunications equipment and rack cross brace
A rack mounting kit is configured to allow mounting of a telecommunications equipment chassis into a rack by a single person. The rack mounting kit includes two...
US-9,402,195 Operation of base station in a cellular communications network
In one embodiment, a method of forming a neighbor cell list in a base station of a cellular communications network comprises, at periodic intervals, and for...
US-9,402,114 System and method for providing randomization in adaptive bitrate streaming environments
A method is provided in one example embodiment and includes receiving video data at an adaptive bitrate (ABR) client that includes a buffer; determining whether...
US-9,401,933 Classification of security policies across multiple security products
A management entity connects with multiple security devices across a network. Each security device operates in accordance with one or more security policies....
US-9,401,871 RFID for available resources not connected to the network
Disclosed are apparatus and techniques for providing presence and location information from available media resources to participants in a media conference so...
US-9,401,863 Dynamic source route computation to avoid self-interference
In a multiple interface, low power and lossy network comprising a plurality of devices, interface options for a source route to minimize self-interferences are...
US-9,401,858 Loop avoidance during network convergence in switched networks
Various techniques can be used to avoid loops during network convergence after a topology change such as a failure. For example, a method can involve detecting...
US-9,401,848 Stateless flexible boot control
Techniques are provided herein for optimizing boot order for devices in a data center environment. These techniques may be embodied as a method, apparatus and...
US-9,400,975 Evaluating user contacts on an electronic communication network
A system for evaluating network users comprises one or more processors communicatively coupled to one or more memories operable to receive, over a network...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.