Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: cisco





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,270,713 Mechanism for compacting shared content in collaborative computing sessions
In an example embodiment disclosed herein, there is described methods and a system for sharing of content in collaborative computing sessions. The methods and...
US-9,270,709 Integrated signaling between mobile data networks and enterprise networks
A method is provided in one example and includes receiving a request from a first network element associated with a first network for establishing a first...
US-9,270,689 Dynamic and adaptive traffic scanning
Systems and methods are provided that enable probabilistic application of data traffic scanning in an effort to catch malicious software or code being carried...
US-9,270,638 Managing address validation states in switches snooping IPv6
In one embodiment, a particular device (e.g., switch) receives a neighbor discovery (ND) message from a non-trusted non-switch device, the ND message having an...
US-9,270,614 Quality of service for SIP-based data
A method and system for providing Quality of Service (QoS) for Session Initiation Protocol (SIP)-based signaling and traffic are disclosed. The method can...
US-9,270,599 Dynamic communication link scaling
Traffic between a first device and a second device across a plurality of communication lanes of a communication link is stalled. A first device side of the...
US-9,270,598 Congestion control using congestion prefix information in a named data networking environment
An example method for congestion control using congestion prefix information in a Named Data Networking (NDN) environment is provided and includes sensing, at a...
US-9,270,594 Apparatus and method for applying network policy at virtual interfaces
Methods and apparatus are disclosed for applying network policy to communications originating at operating system virtual interfaces. In an example embodiment,...
US-9,270,588 Host route convergence based on sequence values
In an example embodiment, a method is provided that assigns a sequence value to a host. The host is identified by a host network layer address. After the...
US-9,270,584 Diverse paths using a single source route in computer networks
In one embodiment, a source device determines a source route from itself to a destination device in a computer network, and forwards a first packet on the...
US-9,270,583 Controlling distribution and routing from messaging protocol
An apparatus can include a connection manager adapter that is configured to maintain presence for each of the plurality of non-IP endpoints in an IP messaging...
US-9,270,579 Synchronization of traffic multiplexing in link aggregation
Synchronization of traffic multiplexing in link aggregation is described. In an embodiment, a first link aggregator and a second link aggregator are associated...
US-9,270,575 Service node using services applied by an application node
Packets are encapsulated and sent from a service node to an application node for applying one or more Layer-4 to Layer-7 services to the packets, with...
US-9,270,560 Session layer for monitoring utility application traffic
Techniques are provided to facilitate monitoring of utility application traffic streams. At a network device that routes utility application traffic for utility...
US-9,270,544 Method and system to identify a network device associated with poor QoS
A method and apparatus to analyze real-time data transmissions across a network is described. The method may comprise transmitting a sample data stream between...
US-9,270,536 BGP slow peer detection
In one embodiment, a router selects a particular peer from an original update group used with an Exterior Gateway Protocol (EGP) such as Border Gateway Protocol...
US-9,270,474 Endpoint initiation of multipart conferences
A method establishes a conference through a Multipoint Control Unit, MCU. The method includes pre-assigning and storing in the MCU one or more conference...
US-9,270,397 Cascaded communication of serialized data streams through devices and their resulting operation
In one embodiment, an apparatus cascades groups of serialized data streams through devices, and performs operations based on information communicated therein. A...
US-9,270,384 Sub-sampled carrier phase recovery
Presented herein are sub-sampled carrier phase recovery techniques. In accordance with one example, a plurality of consecutive symbols associated with a...
US-9,270,040 Systems and methods for providing a seamless electrical signal between electrical components
In an embodiment, an apparatus (e.g., for selectively contacting a plurality of electrical contacts on a printed circuit board (PCB)), comprises a support...
US-9,264,895 Network infrastructure validation of network management frames
A detection-based defense to a wireless network. Elements of the infrastructure, e.g., access points or scanning-only access points, detect intruders by...
US-9,264,766 Receiving and processing multiple video streams associated with a video program
Methods and systems for the efficient and non-redundant transmission of a single video program in multiple frame rates, optionally employing a combination of...
US-9,264,585 Enriched digital photographs
A method for enriching digital photographs, the method comprising: receiving a digital photograph and video data captured before a time at which the digital...
US-9,264,495 Apparatus and methods for handling network file operations over a fibre channel network
Disclosed are methods and apparatus for facilitating transmission of file access type messages over a Fiber Channel (FC) network. In one embodiment, at a file...
US-9,264,422 Secure network deployment
In one embodiment, a Manufacturer Installed Certificate (MIC) and a personal identification number are sent to a call controller to request a configuration...
US-9,264,406 Public key cryptography with reduced computational load
A cryptographic method, comprising receiving a public key belonging to a message recipient having a private key corresponding to the public key, selecting a...
US-9,264,362 Proxy address resolution protocol on a controller device
Techniques are presented herein for reducing network congestion in data center environments. A controller device in a network receives a registration request...
US-9,264,351 System and method for utilization of a segmentation identification to support transmission of data to a...
A method is provided in one example and includes receiving, at a receiving node, a packet that comprises information indicative of an internet protocol address...
US-9,264,349 Dynamic enabling of routing devices in shared-media communication networks
In one embodiment, a non-repeated reachability probe is transmitted from a particular node into a shared-media network, where nodes that receive the probe are...
US-9,264,326 Abstract representation and provisioning of network services
A network management device connects to a device on the network, receives a trigger for an operation command, supplies to the device a command line interface...
US-9,264,312 Method and system to calculate multiple shortest path first trees
An example method is provided in accordance with one embodiment and includes identifying distances for a sub-tree of a leaf node of a plurality of leaf nodes in...
US-9,264,288 Identifying media network flows that use dynamic codec identifications
Techniques for identifying media network flows that use dynamic codec identifications are described. In an embodiment, network flow information for a network...
US-9,264,257 Dynamic ternary content-addressable memory carving
Example embodiments of the present disclosure describe mechanisms for dynamic carving (i.e., applying a revised template for ternary content addressable memory...
US-9,264,243 Flooding and multicasting in a loop-free routing topology using routing arcs
In one embodiment, a method comprises creating, in a computing network, a loop-free routing topology comprising a plurality of routing arcs for reaching...
US-9,262,986 Reference frame management for screen content video coding using hash or checksum functions
Techniques are provided for reference frame management for screen content video coding using hash or checksum functions. A video data stream including a...
US-9,262,898 System and method for validating video security information
A method is provided in one example and includes receiving video data captured by a camera at a location; comparing a portion of the video data to security...
US-9,262,639 Plaintext injection attack protection
A system including a memory having regions including a first and second region, the first region being different from the second region, and a digital rights...
US-9,262,637 System and method for verifying integrity of platform object using locally stored measurement
A method is provided in one example embodiment that includes storing a reference measurement of an object in a trusted storage and retrieving the reference...
US-9,262,489 Repository-based enterprise search with user customizations
In one embodiment, a search string is received from a user and the search type of the search is determined from the search string. Based on the search type, an...
US-9,262,391 Annotating a presentation in a telepresence meeting
A processing system can include an encoder to encode a real-time transmission of a presentation. A memory buffer can copy and store images of the presentation...
US-9,261,652 Optical components including bonding slots for adhesion stability
An opto-electronic apparatus comprises a substrate for supporting a plurality of components forming an opto-electronic assembly and an optical component...
US-9,258,724 Method and system for automatically identifying wireless signal quality of a region
A method for automatically identifying wireless signal quality of a region includes receiving signal quality information associated with wireless signals...
US-9,258,713 Rogue wireless beacon device detection
Techniques are presented for detecting rogue wireless beacon devices. Wireless transmissions from beacon devices are received at a plurality of receiver...
US-9,258,582 Secure combined interoperable multiplexing
Systems and methods for combining a plurality of transport streams into a single transport stream for transmission to, e.g., a single frequency network via a...
US-9,258,428 Audio bandwidth extension for conferencing
In one embodiment, a method includes extracting, by a processor, components from an audio signal to generate a modulating signal. The audio signal is generated...
US-9,258,370 Service assembly and delivery
A system for assembling and delivering a communications service or product is described which is flexible to accommodate the rapid introduction of new...
US-9,258,367 Technique for managing sessions with entities in a communication network
A technique for managing sessions in a communication network that does not subscribe to registration events immediately after an entity in the network is...
US-9,258,315 Dynamic filtering for SDN API calls across a security boundary
Presented herein are techniques to reduce the vulnerabilities of network elements to malicious API calls. One or more filters that validate data across an API...
US-9,258,295 Secure over-the-air provisioning for handheld and desktop devices and services
In one embodiment, a device and a services provisioning system establish an over-the-air connection with each other, and perform device posture validation to...
US-9,258,282 Simplified mechanism for multi-tenant encrypted virtual networks
The present disclosure provides protection of customer data traveling across a network. A reverse cryptographic map (also referred to herein as a reverse crypto...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.