Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: cisco





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,300,642 Restarting network reachability protocol sessions based on transport layer authentication
In an embodiment, a method comprises establishing a first data communications session with a first router. In response to receiving a first request to establish...
US-9,300,589 Increasing transmission rate to a remote device in response to attributing information loss as not being a...
In response to a detected loss of previously transmitted information by an apparatus communicating with a remote device (e.g., using TCP), the rate of...
US-9,300,585 Shortening of service paths in service chains in a communications network
A method is provided in one example embodiment and includes receiving at a network element a flow offload decision for a first service node that includes a...
US-9,300,584 Expanded quality of service processing of multiprotocol label switching (MPLS) packets
In one embodiment, a packet switching device provides more than eight behavior aggregates of Quality of Service (QoS) processing based on a service type of a...
US-9,300,582 Method and apparatus for forwarding information base scaling
In one embodiment, a method includes receiving a packet at an edge device in a first network site in communication with a second network site through a...
US-9,300,579 Packet metadata channels carrying infrastructure metadata in networks
In one embodiment, an apparatus in a network determines particular metadata to communicate infrastructure information associated with a particular packet to...
US-9,300,569 Compressing data packet routing information using bloom filters
In one embodiment, a Transit Information Bloom Filter (TIBF) signal component is generated for use with a routing protocol control message, the TIBF signal...
US-9,300,564 Ordered flooding requests for path computation elements
In one embodiment, a stateful path computation element (PCE) in a computer network determines a need to route at least a threshold number of tunnels, and in...
US-9,300,563 Technique for efficiently and dynamically maintaining bidirectional forwarding detection on a bundle of links
In one embodiment, a plurality of links between a network node and another network node are configured as a link bundle. The network node establishes one or...
US-9,300,538 On-demand bandwidth provisioning in a network environment
An example method for facilitating on-demand bandwidth provisioning in a network environment is provided and includes receiving a request from a client at a...
US-9,300,453 Providing in-line services through radio access network resources under control of a mobile packet core in a...
A method is provided in one example embodiment and includes sending, by a first entity associated with an access network, a first request message including a...
US-9,300,165 Systems, methods and media for location reporting at a charging area level granularity
Systems, methods, and media for location reporting at a charging area level granularity are provided. The method includes detecting at a mobility management...
US-9,300,110 Multi-wavelength distributed raman amplification set-up
Techniques are presented herein to set power levels for multiple Raman pump wavelengths in a distributed Raman amplification configuration. A first receive...
US-9,299,195 Scanning and tracking dynamic objects with depth cameras
A video conference server receives a plurality of video frames including a current frame and at least one previous frame. Each of the video frames includes a...
US-9,298,923 Software revocation infrastructure
In one implementation, software components include an identity of a revocation authority. Prior to loading of the software in a given platform, the revocation...
US-9,298,342 Classes of meeting participant interaction
A technology for interacting with a collaborative videoconferencing environment is disclosed. A display having a substantially "L-shaped" configuration allows...
US-9,294,982 System and method for robust multiple access network mobility in a network environment
An example method is provided in one example embodiment and includes establishing a mobility context associated with a user equipment that includes a...
US-9,294,981 Distributed load management on network devices
This disclosure relates to a system and method for dynamically managing load on network devices in a distributed manner. As the proliferation of data rich...
US-9,294,584 Transporting serially over TCP/IP using raw TCP encapsulation
In one embodiment, a router establishes a serial-over-TCP/IP (Transmission Control Protocol/Internet Protocol) communication session between terminal units...
US-9,294,530 Producing equivalent content across encapsulators in a network environment
A method is provided in one example and includes receiving first synchronization information associated with a first encapsulated output, receiving second...
US-9,294,523 Automatic future meeting scheduler based upon locations of meeting participants
In a network that supports communications between client devices and at least one meeting server, a meeting request that includes one or more meeting...
US-9,294,520 Entitlement for call routing and denial
In one embodiment, a network device enforces entitlement rules based on call control traffic received. The call control traffic is received at the network...
US-9,294,488 Control loop control using broadcast channel to communicate with a node under attack
In one embodiment, a control loop control using a broadcast channel may be used to communicate with a node under attack. A management device may receive data...
US-9,294,480 Tracking and tracing information theft from information systems
In one embodiment, a processing device receives, from an accessing system, an access request for stored information. In response, the device generates unique...
US-9,294,462 Redirect to inspection proxy using single-sign-on bootstrapping
An authentication request is generated when a user of a client device attempts to initiate a user session with an application managed by a service provider. An...
US-9,294,404 Modem mode control based on flow ranking
A system can include a precondition detector configured to determine that the system has network congestion at a network link. The system can also include a...
US-9,294,393 Interconnecting virtual private networks
In one embodiment, a method includes receiving from a plurality of customer edge devices, endpoint addresses at a central mapping system operating as a control...
US-9,294,392 Identifying, translating and filtering shared risk groups in communications networks
A method, apparatus, and computer-readable storage medium for processing shared risk group (SRG) information in communications networks are disclosed. The...
US-9,294,389 Method to select interface for IP packets when destination subnet is reachable on multiple interfaces
An interface may be selected. First, it may be determined that an application is intended to use a first one of a plurality of network interfaces. Next, a first...
US-9,294,355 Adjustable data rates
Adjustable data rate data communications may be provided. First, a plurality of remote data rates at which a remote device is configured to operate may be...
US-9,294,351 Dynamic policy based interface configuration for virtualized environments
In one embodiment, a method includes receiving static profiles each comprising one or more properties of an operating environment, receiving a dynamic profile...
US-9,294,349 Host traffic driven network orchestration within data center fabric
Presented herein are techniques to handle data packets received at a top-of-rack (ToR) switch in an underlay network hosting one or more tenant networks. The...
US-9,294,330 System and method for computer originated audio file transmission
A system and method for computer originated audio file transmission includes a server having a communications module operable to communicate with a terminal...
US-9,294,292 Optimized multicast routing in a Clos-like network
Techniques are provided for optimizing multicast routing in a network. At a router device, a message is sent to one or more physical devices. The message is...
US-9,294,270 Detection of stale encryption policy by group members
Various techniques that allow group members to detect the use of stale encryption policy by other group members are disclosed. One method involves receiving a...
US-9,293,187 Methods and apparatus for refreshing digital memory circuits
Dynamic memory systems require each memory cell to be continually refreshed. During a memory refresh operation, the refreshed memory cells cannot be accessed by...
US-9,292,834 Messaging system with content-based dynamic menu generation
A unified messaging system for an enterprise includes a messaging module operable to store a message sent by a first user to a second user in a first media...
US-9,288,804 Almost blank subframe based orthogonal resource allocation in a wireless network environment
An example method for facilitating almost blank sub-frame (ABS) based orthogonal resource allocation in a wireless network environment is provided and includes...
US-9,288,763 Battery consumption monitoring
In one embodiment, a method for battery monitoring on a computing device includes: estimating a battery consumption estimate for an event scheduled on the...
US-9,288,331 System and method for muting audio associated with a source
In one embodiment, a method includes receiving audio at a plurality of microphones, identifying a sound source to be muted, processing the audio to remove sound...
US-9,288,290 Interactive dynamic ordering of deep packet inspection rules
A network device processes packets transiting the device using successive deep packet inspection (DPI) rules. For each rule, the device attempts to apply the...
US-9,288,231 Web caching with security as a service
In one implementation, Web-Cache deployed in the Enterprise premises and cloud-based SecaaS are combined such that similar identity-based polices are enforced...
US-9,288,186 Network security using encrypted subfields
In one embodiment, a method includes receiving from a secure device, an encrypted rule at a first network device, receiving at the first network device, a...
US-9,288,162 Adaptive infrastructure for distributed virtual switch
In one embodiment, a method includes identifying at a network device, characteristics of a distributed virtual switch comprising a control plane component and a...
US-9,288,136 Method and apparatus for in-band channel change for multicast data
In one embodiment, a method includes transmitting media from a source to a plurality of receivers in a first source-specific multicast (SSM) channel and...
US-9,288,069 Loop avoidance technique for the multicast control plane
The present disclosure provides for a loop avoidance technique that implements an upstream neighbor check to detect any forwarding inconsistencies. When a...
US-9,288,067 Adjacency server for virtual private networks
Devices, methods and instructions encoded on computer readable medium are provided herein for creation of an overlay network on a non-multicast or source...
US-9,288,066 Dynamic multicast mode selection in a communication network
In one embodiment, a network device selectively operates according to a sparse multicast mode where the network device stores individual devices interested in...
US-9,286,473 Quarantine-based mitigation of effects of a local DoS attack
In one embodiment, techniques are shown and described relating to quarantine-based mitigation of effects of a local DoS attack. A management device may receive...
US-9,286,469 Methods and apparatus providing computer and network security utilizing probabilistic signature generation
A system receives information from at least one security interceptor associated with at least one computer system. The information identifies details associated...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.