Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: cisco





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,369,702 Context adaptive position and amplitude coding of coefficients for video
A coding method, apparatus, and medium with software encoded thereon to implement a coding method. The coding method includes encoding the position of...
US-9,369,668 Elementary video bitstream analysis
A bitstream encoded with video information is received at a first network enabled device from a second network enabled device. The bitstream is analyzed prior...
US-9,369,628 Utilizing a smart camera system for immersive telepresence
Video content is received at a computing device including camera views provided by video cameras that are aligned to capture images of participants within a...
US-9,369,491 Inspection of data channels and recording of media streams
In one implementation, two or more endpoints or client devices communication uses a peer-to-peer, browser based, real time communication protocol. One example...
US-9,369,473 Method and system for extending network resources campus-wide based on user role and location
A method, system, and computer readable medium is disclosed which utilizes the LISP control plane to increase communications and access to enterprise resources...
US-9,369,435 Method for providing authoritative application-based routing and an improved application firewall
A method for providing authoritative application-based routing and an improved application firewall, as well as a method for application classification, is...
US-9,369,388 Forwarding index based adaptive fabric load balancing
Embodiments generally provide techniques for load balancing data transmitted between line cards across a network fabric. Embodiments receive, at a first line...
US-9,369,387 Segment routing based wide area network orchestration in a network environment
An example method for segment routing based wide area network (WAN) orchestration in a network environment is provided and includes monitoring a segment routing...
US-9,369,371 Method and system for path monitoring using segment routing
A method and system are disclosed for use of segment routing in monitoring of a network path. In one embodiment, the method includes selecting a plurality of...
US-9,369,351 Using learning machine-based prediction in multi-hopping networks
In one embodiment, statistical information is collected relating to one or both of communication link quality or channel quality in a frequency-hopping network,...
US-9,369,347 Service to node resolution
An apparatus and method for resolving services to nodal segments. The method involves receiving an advertisement. The advertisement includes a service address...
US-9,369,344 Automated techniques to deploy a converged infrastructure having unknown initial component configurations
A technique to adaptively configure components of a converged infrastructure (CI). Component configuration information is collected from and representative of...
US-9,369,339 Virtual cable modem termination system
A method, a system, and an apparatus provide for a cable modem termination system (CMTS). The CMTS may include a virtual machine configured to provide a...
US-9,369,304 Subnet scoped multicast/broadcast packet distribution over a routed network
In one embodiment, a subnet-scoped multicast packet is received on an interface of a forwarding device that is connected to a host device of a subnet of a...
US-9,369,303 User-equipment-initiated framed routes on customer-premises equipment for wireless wide area networks
Systems and methods are disclosed for processing framed routes initiated by user equipment (UE) at customer-premises equipment (CPE) and gateways using protocol...
US-9,369,297 Preventing traffic flooding to the root of a multi-point to multi-point label-switched path tree with no receivers
A method is provided for pruning an MP2MP tree. The method includes, in a first node of an MP2MP LSP tree, determining whether the first node has only a single...
US-9,369,293 Compressing singly linked lists sharing common nodes for multi-destination group expansion
A multi-destination expansion table is stored that comprises a first database containing data representing all nodes in a singly linked list that is a superset...
US-9,369,186 Utilizing mobile devices in physical proximity to create an ad-hoc microphone array
According to one aspect, a method includes determining when a first device and a second device are in proximity to each other, wherein the first device includes...
US-9,369,177 Path diversity with poly-phase links in a power line communication network
In one embodiment, a node in a network receives communication channel data regarding one or more communication channels available between a particular device in...
US-9,369,176 Detection, classification and mutual recognition of 4 pair power over Ethernet
A method for verifying interconnection of a PSE and PD with 4-pair PoE capabilities includes performing a first classification event on first and second pairs,...
US-9,367,470 Bounded cache searches
Cache lines of a data cache may be assigned to a specific page type or color. In addition, the computing system may monitor when a cache line assigned to the...
US-9,367,344 Optimized assignments and/or generation virtual machine for reducer tasks
The present disclosure relates to assignment or generation of reducer virtual machines after the "map" phase is substantially complete in MapReduce. Instead of...
US-9,366,718 Detection of disassembly of multi-die chip assemblies
A multi-die chip assembly is described, the multi-die chip assembly including at least one detection apparatus which detects manipulations of the multi-die chip...
US-9,363,690 Closed-loop optimization of a wireless network using an autonomous vehicle
Embodiments herein use a real-time closed-loop system to optimize a wireless network. The system includes a drone controlled by a self-organizing network (SON)...
US-9,363,675 Distributed wireless security system
A low-cost security management system for a wireless network utilizes client software having one component that runs on trusted access points and another that...
US-9,363,664 Techniques for determining communication state using accelerometer data
Techniques for communicating with a user on a network include receiving acceleration data that indicates acceleration of a mobile network node associated with a...
US-9,363,480 Obtaining replay of audio during a conference session
Presented herein are techniques for receiving media at a participant device for a conference session. The media may be transmitted to the participant device...
US-9,363,368 Configurable call recording policy
In one embodiment, a communication is established between two endpoints. The communication session may be a video call or an audio call. The communication...
US-9,363,313 Reducing virtual IP-address (VIP) failure detection time
Methods and systems are provided for global server load balancing in a communication network using a global site selector and an application control engine in...
US-9,363,275 Sampled deterministic finite automata for deep packet inspection
In one embodiment, a method includes sampling text in a received packet at a network device and analyzing the sampled text using a sampled deterministic finite...
US-9,363,243 External indexing and search for a secure cloud collaboration system
An end-to-end secure cloud-hosted collaboration service is provided with a hybrid cloud/on-premise index and search capability. This approach includes...
US-9,363,227 Multicast source in group address mapping
The present disclosure provides a source specific multicast service that maps multicast group addresses to corresponding source addresses. A boundary routing...
US-9,363,225 Connecting layer-2 domains over layer-3 networks
In one embodiment, a method includes building an address resolution cache for a layer-3 router in a first layer-2 datacenter, where the address resolution cache...
US-9,363,209 Apparatus, system, and method for resequencing packets
A method is provided in one example and includes receiving a plurality of packets; identifying whether a particular packet, of the plurality of packets, is part...
US-9,363,207 Private virtual local area network isolation
In one embodiment, a method includes obtaining addresses of end hosts at a switch, the switch configured with a primary virtual local area network and a...
US-9,363,183 Network address translation offload to network infrastructure for service chains in a network environment
An example method for network address translation (NAT) offload to network infrastructure for service chains in a network environment is provided and includes...
US-9,363,166 Source routing convergence in constrained computer networks
In one embodiment, a source routing device (e.g., root device) pre-computes diverse source-routed paths to one or more nodes in a computer network. Upon...
US-9,363,108 System for utilizing identity based on pairing of wireless devices
In one embodiment, an apparatus may include a memory and a processor. The processor may be operable to create a wireless connection to a wireless device. The...
US-9,363,048 Downlink OFDMA for service sets with mixed client types
Techniques are provided herein to allow a wireless network access point (AP) to more fully use its bandwidth in order to leverage the different bandwidth...
US-9,362,746 Communication network topology management based on an associated electric grid topology
In one embodiment, a computer determines a grid topology of an electric grid based on one or more electric grid configuration description files, and also...
US-9,361,334 Addressing cache coherence in updates to a shared database in a network environment
Example embodiments are provided that may include receiving a request to update a particular object based on a modified object, where the particular object is...
US-9,360,688 Electro-optical modulators with folded gate layers
An optical modulator may include a lower waveguide, an upper waveguide, and a dielectric layer disposed therebetween. In one embodiment, the lower waveguide may...
US-9,357,524 Subscriber-aware paging
This disclosure relates to systems and methods for paging devices in a communication network. A network device providing mobility management through control...
US-9,357,519 Probe response suppression using angle-of-arrival in a high density environment
A first wireless device (e.g., an access point) receives a message from a second wireless device (e.g., a client device). The first device determines an...
US-9,357,410 Wireless network flow monitoring
Techniques are presented herein for enabling performance monitoring of flows within a management and provisioning tunnel used for communicating packets between...
US-9,357,172 Video conference virtual endpoints
A method and a device providing one virtual endpoint dedicated to serve one particular real endpoint, and the virtual endpoint is typically installed on a...
US-9,357,164 Establishing a remotely hosted conference initiated with one button push
A method includes registering with a first remote conference manager operated by a first entity and a request to enable conferencing with a second entity. The...
US-9,357,076 Load balancing of distributed media agents in a conference system
A load balancer controls a cluster of media agents each configured to perform media packet processing operations in a conference session. The load balancer...
US-9,356,928 Mechanisms to use network session identifiers for software-as-a-service authentication
Techniques are provided for authenticating a subject of a client device to access a software-as-a-service (SaaS) server. A network access device receives a...
US-9,356,886 Techniques for scalable and foolproof virtual machine move handling with virtual port channels
Techniques are provided for managing movements of virtual machines in a network. At a first switch, a virtual machine (VM) is detected. The VM is hosted by a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.