Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: cisco





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,088,415 Authentication of cache DNS server responses
A response to a Domain Name System (DNS) query can be protected with authentication information to be used by a host that originated the query. In one example,...
US-9,088,354 Power save mode for lightpaths
A method for communicating optically between nodes of an optical network, including forming, between a first node and a second node of the network, a set of...
US-9,088,179 Adaptive control of power grid operations based on energy profiles
In one embodiment, an energy manager determines respective energy profiles of one or more local end-devices for which the energy manager is responsible. Through...
US-9,086,267 Real time strain sensing solution
Strain sensing may be provided. First, a strain threshold for a circuit board may be determined. Then a strain capacitor may be selected that will fail when the...
US-9,084,005 Two-dimensional barcode system
An end-user device, including a processor to prepare barcode-input data including (a) at least one of an identification of a user of the end-user device, and an...
US-9,083,776 Echo mitigation in a conference call
In an example embodiment, an example method is provided for echo mitigation in a conference call. In this method, a test audio signal is transmitted to a...
US-9,083,751 Method for cloud-based access control policy management
A Web-based management server includes an ACP manager to manage access control rules (ACRs) and access control policies (ACPs). The ACRs and ACPs are configured...
US-9,083,737 Mitigating threats in a network
Mitigating threats in a network includes receiving a message at a network device. The message includes device-independent parameters generated in response to a...
US-9,083,709 Virtual internet protocol migration and load balancing
A system for virtual internet protocol (VIP) address migration. The system comprises serving one or more clients connected via a switch router over a network to...
US-9,083,636 System and method for multipoint label distribution protocol node protection using a targeted session in a...
A method is provided in one example and includes receiving first address information from a protected node over a first label switched path having a first...
US-9,083,633 System and method for distributed netflow exporter with a single IP endpoint in a network environment
An example method for a distributed NetFlow exporter with a single IP endpoint in a network environment is provided and includes configuring a network protocol...
US-9,083,632 Method to transport bidir PIM over a multiprotocol label switched network
A method, system and an apparatus to transport bidir PIM over a multiprotocol label switched network are provided. The method may comprise receiving a multicast...
US-9,083,627 Assisted traffic engineering for minimalistic connected object networks
In one embodiment, a distributed intelligence agent (DIA), hosted on a border router that provides access for a computer network to a global computer network,...
US-9,083,613 Detection of cabling error in communication network
In one embodiment, a method at a network device includes receiving a link layer advertisement, comparing information in the link layer advertisement with...
US-9,083,587 Port chunk allocation in network address translation
A system and method for providing network and port address translation is provided. A global IP address and a block (chunk) of ports are allocated for each...
US-9,083,586 Verifying availability and reachability through a network device
In an embodiment, in response to receiving from a client computer a client request to connect to a server: processing the client request in a network protection...
US-9,083,585 Retransmission-based stream repair and stream join
The Real-time Transport Protocol (RTP) and its related standards define a retransmission packet format and a way to give feedback via Negative ACKnowledge...
US-9,083,581 System and method for providing resource sharing, synchronizing, media coordination, transcoding, and traffic...
A method in one embodiment includes maintaining a list of authorized devices; creating an association between a wireless device being operated by an end user...
US-9,083,566 System and method for communicating with an applet using an inline web frame in a network environment
A method in an example embodiment includes modules for identifying an applet for a local network and providing instructions in a parent container file to enable...
US-9,083,553 Signaling co-routed and non co-routed LSPs of a bidirectional packet TE tunnel
Particular embodiments may enable setup and signaling of co-routed and non co-routed label switched paths (LSPs) of a bidirectional packet traffic engineering...
US-9,083,516 Securing virtual lane physical layers
A data stream with a given data rate is distributed into a plurality of virtual lanes or streams, each with a lower data rate than the data stream. Virtual...
US-9,083,458 Self-tuning an optical network at an operating point
Techniques are presented for automatic tuning of operating parameters, e.g., amplifier gain, in an optical network. A section of an optical network comprises a...
US-9,082,297 System and method for verifying parameters in an audiovisual environment
A method is provided in one example embodiment and includes communicating a code to initiate cycling through a plurality of potential audiovisual inputs. The...
US-9,081,990 Preventing unauthorized data extraction
An electronic device (22, 48, 50) includes an array (26) of memory cells, which are configured to store data values. One or more sense amplifiers (40) have...
US-9,081,603 Packet forwarding optimization with virtual machine mobility by comparing device identifiers to determine VM...
In one embodiment, a method includes tracking at a network device in communication with a plurality of virtual machines, virtual machine movement based on a...
US-9,081,567 Method and apparatus to control routing convergence during node reboot by entering a freeze state that inhibits...
In one embodiment, a technique may enable control of routing convergence in a computer network during reboot of a node of a routing topology represented by a...
US-9,078,212 System and method for reducing power used for radio transmission and reception
A system and method allows devices to send and receive packets while using power to do so in a manner that responds to events, such as receipt or other...
US-9,077,955 Mobile personal video recorder
A method of digital television recording including receiving a content item at a first Personal Video Recorder (PVR), determining whether to transfer the...
US-9,077,772 Scalable replay counters for network security
In one embodiment, an authenticator in a communication network maintains a persistent authenticator epoch value that increments each time the authenticator...
US-9,077,739 Messaging security device
In one embodiment, a system can comprise an interface that receives data related to a communication session and a messaging security device component that...
US-9,077,730 Restricting network access while connected to an untrusted network
In an example embodiment, disclosed herein is an apparatus comprising an interface configured to communicate with at least one external device, and processing...
US-9,077,661 System and method for policy selection and switching function in a network environment
A method is provided in one example embodiment and includes receiving a request for a service for a subscriber at an access gateway; receiving a default...
US-9,077,638 System and method for providing route information
A system and method changes a rate at which routing information is sent to increase it upon the detection of one or more events, maintaining the then current...
US-9,077,619 Exporting real time network traffic latency and buffer occupancy
Techniques are presented herein to facilitate the monitoring of occupancy of a buffer in a network device. Packets are received at a network device. Information...
US-9,077,615 Global state resynchronization for path computation element failure during a reoptimization process
In one embodiment, a router initiates reroutes of one or more tunnels at the router as part of optimization of a plurality of tunnels in a computer network, and...
US-9,077,562 System and method for layer-2 multicast multipathing
An example method is provided and includes a multicast data message from a data source, the message in a first virtual local area network and being associated...
US-9,077,452 QSFP+ to SFP+ form-factor adapter with signal conditioning
Techniques are provided for sending and receiving data communications between an enhanced Quad Small Form-Factor Pluggable (QSFP+) transceiver module and an...
US-9,076,017 Hardware virtualization module for exclusive controlled access to CPU
In one embodiment, a method comprises providing an apparatus having exclusive access to each of one or more central processing units (CPUs) of a computing...
US-9,075,885 System for handling a broken uniform resource locator
A method and apparatus for receiving a request for a Uniform Resource Locator (URL), determining the URL is broken, retrieving query data from a first database...
US-9,075,594 Power negotiation protocol
In one embodiment, a method includes a first device providing a first power to a second device using a first set of conductors out of a plurality of conductors....
US-9,072,100 Sub-slotting to improve packet success rate in carrier sense multiple access networks
In one embodiment, a communication device in a frequency hopping communication network determines an intention to forward a first packet in a particular...
US-9,071,727 Video bandwidth optimization
In one embodiment, a method includes receiving at a network device, video from a first endpoint, analyzing the video received from the first endpoint,...
US-9,071,684 Media forking
In an example embodiment, a Voice over IP (VoIP) system that provides for media forking at the caller's (ingress) gateway. The gateway receives data with a...
US-9,071,611 Integration of network admission control functions in network access devices
In one embodiment, a method includes receiving a communication from an endpoint device at a network access device located within a data path between the...
US-9,071,589 Encryption key management for storage area network devices
An encryption key management system is provided for storage area network devices. A create key request is received at a storage area network switch. The key is...
US-9,071,554 Timestamp estimation and jitter correction using downstream FIFO occupancy
First, a packet may be received and a timestamp value may be placed on the packet. The timestamp value may comprise a place time value comprising a time when...
US-9,071,546 Protocol independent multicast designated router redundancy
In one embodiment, a method includes transmitting a packet from a router located in a communication path between a source and a receiver, the load balancing...
US-9,071,533 Multicast group assignment using probabilistic approximations
In one embodiment, a source node (e.g., responsible node) determines a plurality of destination nodes of a message, and generates a probabilistic data structure...
US-9,071,458 Dual adjacency between edge devices at a network site
Devices, methods and instructions encoded on computer readable medium for implementation of a dual-adjacency between edge devices of a network site. A first...
US-9,071,401 Pilot-less noise estimation
Presented herein are pilot-less noise estimation techniques that utilize a correlation between attributes of a received signal and the noise to generate...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.