Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: cisco





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,023,5226 System and method for message management across a network
Systems, methods, and computer-readable media for managing service calls over a network may include a signal routing engine with a maintained forwarding table...
US-1,023,4291 Collaborative localization between phone and infrastructure
A methodology includes determining coarse location coordinates for a mobile device, anchoring the coarse location coordinates to a map, receiving inertial...
US-1,023,1253 Per-packet, time slotted channel hopping (TSCH), meta-timeslot
In one embodiment, a device in a network receives a time-slotted channel hopping (TSCH) communication schedule. The TSCH communication schedule is divided into...
US-1,023,1140 Self optimizing residential and community WiFi networks
A method for improving performance in a residential/community WiFi network is implemented on a self-optimizing network (SON) server and includes: receiving...
US-1,023,1120 Offloaded security as a service
In one implementation, traffic in a mobile network is offloaded to a security as a service server or a cloud server. A mobile access gateway (MAG) in the mobile...
US-1,023,0970 Decoded picture buffer size management
In one embodiment a method of video processing is disclosed. The method may include receiving by a processing device a first portion of compressed pictures of a...
US-1,023,0747 Explaining network anomalies using decision trees
In an embodiment, the method comprises receiving an identification of an anomaly associated with a false positive identification of a security threat by the...
US-1,023,0703 Providing multiple levels of group access to partial data objects
A first data item is encrypted at a client device using a first encryption key. The encrypted first data item is included in a data object. A second encryption...
US-1,023,0694 Content inspection in privacy enhanced cloud conferencing
A media distribution network device connects to an online collaborative session between a first participant network device, a second participant network device,...
US-1,023,0642 Intelligent data paths for a native load balancer
In an example, there is disclosed a network apparatus for providing native load balancing within a switch, including: a first network interface operable to...
US-1,023,0628 Contract-defined execution of copy service
Systems, methods, and computer-readable storage media for executing a copy service. A copy service engine can monitoring network data flow in a network, detect...
US-1,023,0623 End point scaling on segment routing fabrics
Disclosed are systems and methods for scaling Massively Scalable Data Center (MSDC) networks with a large number of end-point tunnels utilizing Equal-cost...
US-1,023,0611 Dynamic baseline determination for distributed business transaction
The present technology may determine an anomaly in a portion of a distributed business application. Data can automatically be captured and analyzed for the...
US-1,023,0605 Scalable distributed end-to-end performance delay measurement for segment routing policies
The present technology is directed to a scalable solution for end-to-end performance delay measurement for Segment Routing Policies on both SR-MPLS and SRv6...
US-1,023,0597 Optimizations for application dependency mapping
Application dependency mapping can be automated in a network. The network can capture traffic data for flows passing through the network using a sensor network...
US-1,023,0543 Reducing data transmissions in a virtual private network
A source node can append a unique identifier to an outbound client packet, transmit the outbound client packet to a recipient node via a port, and create a...
US-1,023,0519 Full duplex resource allocation in cable network environment
An example apparatus comprises a processor, a memory element, and a media access control (MAC) scheduler. The MAC scheduler is configured to implement a...
US-1,023,0212 Method and apparatus to prevent laser kink failures
Systems, devices, methods, and computer-readable media for preventing laser kink failures. A laser diode device can include one or more laser diodes configured...
US-1,022,8841 Indicators for relative positions of connected devices
Various embodiments utilize a portable electronic device determining the relative physical location of a connected device and displaying a location indicator on...
US-1,022,2986 Tenant-level sharding of disks with tenant-specific storage modules to enable policies per tenant in a...
Embodiments include receiving an indication of a data storage module to be associated with a tenant of a distributed storage system, allocating a partition of a...
US-1,022,0167 Mechanisms to prevent anomaly detectors from learning anomalous patterns
In one embodiment, a device in a network detects an anomaly in the network by analyzing a set of sample data regarding one or more conditions of the network...
US-1,021,9178 Channel aggregation using Wi-Fi
Data to be transmitted to a user device may be received at a network device. It may be determined that the user device has network connectivity to the network...
US-1,021,8992 Encoding, transmission and decoding of combined high motion and high fidelity content
Provided are systems, methods, and computer-readable media for encoding, transmitting and decoding content having high fidelity and high motion content. In one...
US-1,021,8979 Entropy coding state segmentation and retention
Video coding and decoding techniques are provided in which entropy coding states are stored for regions of video frames of a sequence of video frames, upon...
US-1,021,8781 Controlling latency in multi-layer fog networks
In one embodiment, an intermediate node, of a multi-stage process path through a computer network, receives a workload message with an associated latency budget...
US-1,021,8765 Content-independent evaluation of streaming media based on packet transmission performance
In one embodiment, a device in a network assigns packets from a communication transmitted via the network to time windows over a period of time. The device...
US-1,021,8757 System and methods for dynamic transcoder rate adaption for adaptive bit rate streaming
A system and methods for providing dynamic transcoder rate adaption for an adaptive bit streaming function is described. In a first embodiment, a client may...
US-1,021,8729 Specializing unsupervised anomaly detection systems using genetic programming
In one embodiment, a device in a network receives sets of traffic flow features from an unsupervised machine learning-based anomaly detector. The sets of...
US-1,021,8727 Sanity check of potential learned anomalies
In one embodiment, a device in a network receives, from a supervisory device, trace information for one or more traffic flows associated with a particular...
US-1,021,8726 Dynamic device clustering using device profile information
In one embodiment, a networking device in a network causes formation of device clusters of devices in the network. The devices in a particular cluster exhibit...
US-1,021,8718 Rapid, targeted network threat detection
Rapidly detecting network threats with targeted detectors includes, at a computing device having connectivity to a network, determining features of background...
US-1,021,8704 Resource access control using named capabilities
Aspects of the embodiments are directed to systems, methods, and computer program products embodied at a server managing a resource for providing access to a...
US-1,021,8671 Dynamic media access control address allocation and leasing for wireless network
Presented herein are systems and methods of dynamically allocating and leasing MAC addresses in a wireless network that ensures a unique MAC address is assigned...
US-1,021,8619 Proactive broadcast capacity adjustment for fast network joins
In one embodiment, a device in a network identifies an upcoming network formation event. The device instructs one or more nodes in the network to use a network...
US-1,021,8616 Link selection for communication with a service function cluster
Systems, methods, and computer-readable media for improving the reliability of service function (SF) application in a service function chain (SFC) are provided....
US-1,021,8610 MPLS segment routing
A method, communications processing device, and computer readable medium for MPLS segment routing are disclosed. One embodiment of the method comprises...
US-1,021,8605 On-demand control plane redundancy
Disclosed is a router (and method) for virtualizing a control plane of the router without redundancy. The router can include a processor, a data plane, a...
US-1,021,8596 Passive monitoring and measurement of network round trip time delay
A method is described and in one embodiment includes receiving at a first network element of a communications network a first packet corresponding to a first...
US-1,021,8593 Identifying sources of packet drops in a service function chain environment
Embodiments are directed to a service function configured to receive, from a service function forwarder, a data packet comprising a bit field to indicate that a...
US-1,021,8572 Multiprotocol border gateway protocol routing validation
Systems, methods, and computer-readable media for validating routing table information in a network. A network assurance appliance may be configured to retrieve...
US-1,021,8539 Forwarding data between an array of baseband units and an array of radio heads in distributed wireless system...
The present disclosure discloses a distributed system. The distributed system includes a plurality of radio heads and a plurality of controllers disposed in one...
US-1,021,8525 System and method to control latency of serially-replicated multi-destination flows
Exemplified systems and methods facilitate multicasting latency optimization operations for router, switches, and other network devices, for routed Layer-3...
US-1,021,8524 Bit indexed explicit replication for layer 2 networking
Various systems and methods for performing bit indexed explicit replication (BIER). For example, one method involves receiving a link layer protocol frame at a...
US-1,021,8416 MU-MIMO grouping system
Embodiments herein describe a network device (e.g., an access point) that dynamically arranges multi-user (MU) multiple input multiple output (MIMO) compatible...
US-1,021,8123 Coaxial pin connector seizure assembly
A container may be provided. The container may comprise a seizure assembly, a housing, a circuit board, and a pin connector. The seizure assembly may comprise a...
US-1,021,7466 Voice data compensation with machine learning
A method comprises: obtaining, at an apparatus, first voice data from a first user device associated with a first speaker participant in a communication...
US-1,021,6926 Isolation of untrusted code in operating system without isolation capability
Code intended to operate in an operating system without an isolation mechanism is executed in isolation. The present system enables synthetic transactions to be...
US-1,021,6601 Agent dynamic service
A dynamic service module is embedded in an agent and able to add functionality to the agent. The service module may manage .jar files for execution by the...
US-1,021,6527 Automated software configuration management
A system uses agents to monitor a distributed business transaction as well as monitor changes in software configuration. An agent may detect a file load, such a...
US-1,021,6249 Electrical power control and fault protection
A fault processing subsystem of an electronics assembly, senses an alarm state at an output of a first power distribution element of multiple power distribution...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.