Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: cisco





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,398,586 Almost blank subframe based orthogonal resource allocation in a wireless network environment
An example method for facilitating almost blank sub-frame (ABS) based orthogonal resource allocation in a wireless network environment is provided and includes...
US-9,398,553 Technique for improving LDP-IGP synchronization
A technique may improve LDP-IGP synchronization in a MPLS network when an interface of a router coupled to a communications link along a shortest path between a...
US-9,398,486 Conveying subscriber information to service chain services using tunnel protocol header encapsulation for...
A method provided in one embodiment includes receiving, at a first network element, a first data packet of a data flow, wherein the data flow is associated with...
US-9,398,473 System and method for load based optimization in communication networks
Systems and methods for providing load based optimizations in communication networks are provided. A network device that provides network management and...
US-9,398,258 Method and system for video conferencing units
In one embodiment a system and method is described, the system and method including a first camera, which, when activated, captures a first video of a first...
US-9,398,035 Attack mitigation using learning machines
In one embodiment, techniques are shown and described relating to attack mitigation using learning machines. A node may receive network traffic data for a...
US-9,397,946 Forwarding to clusters of service nodes
Systems, methods, and computer-readable storage media for forwarding traffic to clusters of nodes. A system can group nodes in a network fabric into a cluster...
US-9,397,940 System and method for providing a translation mechanism in a network environment
An example method is provided and includes receiving a packet associated with a flow, determining a tunnel identifier for the flow, and determining a flow...
US-9,397,918 Real time and high resolution buffer occupancy monitoring and recording
Presented herein are techniques for detection and characterization of buffer occupancy of a buffer in a network device. Packets are received at a network...
US-9,397,858 Detecting VLAN registration protocol capability of a switch in a computer network
In particular embodiments, a first switch implementing a first virtual local area network (VLAN) registration protocol and connected to a first end of the trunk...
US-9,397,847 Managing router advertisement messages to support roaming of wireless mobile client devices
Techniques are provided to manage how router advertisement messages are forwarded for ultimate wireless transmission in a wireless network. In one embodiment, a...
US-9,397,687 Monotonic segmented digital to analog converter
In one implementation, a digital analog converter (DAC) is monotonic because the output moves only in the direction of the input and segmented because a more...
US-9,392,526 Protection against fading in a network ring
A method provided in one example embodiment includes detecting a first current bandwidth of a first link in a network ring, where the first current bandwidth...
US-9,392,337 Wireless TCP link state monitoring based video content adaptation and data delivery
Systems and methods are used for receiving a video request from a user equipment for video to be downloaded; determining a link bandwidth status associated with...
US-9,392,226 Generating and rendering synthesized views with multiple video streams in telepresence video conference sessions
Techniques are provided for establishing a videoconference session between participants at different endpoints, where each endpoint includes at least one...
US-9,392,066 Connection persistence across server farms in a network environment
An example method for connection persistence across server farms in a network environment is provided and includes associating a first real server with a first...
US-9,392,050 Automatic configuration of external services based upon network activity
System, computer program product, and method to configure an external network based on internal network conditions, by monitoring a load attribute of one or...
US-9,392,025 Subscriber dependent redirection between a mobile packet core proxy and a cell site proxy in a network environment
A method is provided in one example embodiment and includes receiving, by a first proxy within an access network, a first request for content associated with a...
US-9,391,959 Automated control plane for limited user destruction
To avoid user error and breaking operations, administration and management (OAM), the control plane for implementing OAM is automatically generated by network...
US-9,391,910 Smart pause for distributed switch fabric system
Techniques for improving the performance of flow control mechanisms such as Pause are provided. The techniques provide for maintaining a fair distribution of...
US-9,391,878 Reliable packet delivery with overlay network (RPDON)
In one embodiment, a device in a computer network establishes a reliable map that defines a set of packet criteria for which reliability is desired over an...
US-9,391,799 Multicast handling in a transparent interconnect of lots of links based data center interconnect
In some embodiments, a global tree structure identifying rendezvous points between a layer 1 network area and a layer 2 network area may be created. When the...
US-9,391,784 Computing risk-sharing metrics in shared-media communication networks
In one embodiment, a routing node determines a risk-sharing metric between pairs of nodes in a shared-media communication network, and may then compute a...
US-9,391,704 Replacing an existing network communications path with a new path using some exclusive physical resources of...
In one embodiment, a replacement network communications path is determined using dedicated resources of an existing path. One or more network elements in a...
US-9,391,515 Buck circuit
An apparatus may be provided. The apparatus may comprise a first circuit portion, a second circuit portion, and a third circuit portion. The first circuit...
US-9,390,754 Video trick mode system
A method for producing an auxiliary video stream arranged for reverse trick mode playback from a video stream including a plurality of uni-directional predicted...
US-9,390,212 Methods and apparatus for synthesizing multi-port memory circuits
Multi-port memory circuits are often required within modern digital integrated circuits to store data. Multi-port memory circuits allow multiple memory users to...
US-9,389,993 System and method for whitelist management
A method is provided in one embodiment and includes receiving a request for a session at a network element; communicating a query for whitelist data to a...
US-9,386,308 Quality optimization with buffer and horizon constraints in adaptive streaming
Techniques are provided for optimizing quality in adaptive streaming, where information is obtained relating to encoding bitrates and content quality scores for...
US-9,386,304 Digital video compression system, method and computer readable medium
A video decoding method including: receiving an encoded block of data; decoding the encoded block of data to generate decoded data; and performing a sample...
US-9,386,277 Generating a video pane layout
A first video conferencing device determines pane sizes of a plurality of video content to be displayed at a second video conferencing device, where the pane...
US-9,386,270 Displaying information about at least one participant in a video conference session
In one embodiment, a method is provided in a video conference session which has a video stream, an audio stream and an information stream between at least one...
US-9,386,097 Using values represented as internet protocol (IP) addresses to access resources in a non-internet protocol...
Non-Internet Protocol (IP) centric resources are accessed based on a value in the form of an IP address. This value (represented as the IP address) is converted...
US-9,386,086 Dynamic scaling for multi-tiered distributed systems using payoff optimization of application classes
In one embodiment, a method is described. The method includes: monitoring workloads of a plurality of application classes, each of the application classes...
US-9,385,995 Anonymous authentication
A method and system for anonymous purchase by a first user device, is described, the method and system including sending R from the first user device to a...
US-9,385,969 Merging fibre channel fabrics
A Fiber (Fiber) Channel (FC) switch and related methods are provided for merging FC fabrics. During a merger process of two separate FC fabrics, a principal...
US-9,385,950 Configurable service proxy local identifier mapping
Presented herein are techniques in which a service proxy in a service node is configured to receive a packet encapsulated in a service header that includes a...
US-9,385,945 Identifying, translating and filtering shared risk groups in communications networks
A method, apparatus, and computer-readable storage medium are disclosed for processing shared risk group (SRG) information in communications networks. The...
US-9,385,933 Remote probing for remote quality of service monitoring
In one embodiment, a targeted node in a computer network receives a probe generation request (PGR), and in response, generates a link-local multicast PGR...
US-9,385,930 Method to detect suboptimal performance in boundary clocks
In one example embodiment, a method to detect suboptimal boundary clocks is described for a node in a communications network. The method can include determining...
US-9,385,929 Methods and devices for performing dynamic droop compensation
Provided herein are systems, methods and devices for performing droop compensation. In particular, systems, methods and devices for performing droop...
US-9,385,918 System and method for secure provisioning of virtualized images in a network environment
An example method includes setting up a secure channel between a blade and a provisioning server in a network environment, downloading an image of a virtual...
US-9,385,779 Acoustic echo control for automated speaker tracking systems
A processing system can include a tracking microphone array; audio tracker circuitry connected to the tracking microphone array to track an audio source based...
US-9,380,517 Adjusting number of discovery frames sent based on access point deployment
Techniques are provided for determining, for at least one wireless access point in a wireless network, a number of first-time associations created with one or...
US-9,380,347 Hypertext service guide menu display
The present invention provides a method and system for accessing services in a television system. In one implementation, a DHCT presents a user a menu...
US-9,380,261 Multi-camera access for remote video access
In one embodiment, multiple cameras are logically associated in a guest registry with a mobile device. One of the cameras may be internal to the mobile device,...
US-9,380,070 Intrusion detection mechanism
In one embodiment, a method implemented on a node connected to a network bus includes: storing one or more message identifiers, the one or more identifiers...
US-9,380,061 Service protection
A method and system for determining whether user accounts in a client-server architecture are legitimate is described, the method and system including...
US-9,380,044 Supporting differentiated secure communications among heterogeneous electronic devices
A gateway apparatus supports differentiated secure communications among heterogeneous electronic devices. A communication port communicates via communication...
US-9,380,025 Method and apparatus for ingress filtering
An example method is provided and, in an example embodiment, includes receiving a data packet at an ingress switch function, the data packet associated with a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.