Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: cisco





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,259,739 Scatter and gather scheme for aggregating multiple high speed point-to-point interfaces
A mechanism for combining plurality of point-to-point data channels to provide a high-bandwidth data channel having an aggregated bandwidth equivalent to the...
US-8,259,721 Time-based authorization of internet protocol (IP) multicast subscription services
A switching device (e.g., router, bridge) provides time-based authorization of multicast services. When a message is received to request the delivery of a...
US-8,259,720 Triple-tier anycast addressing
In one embodiment, a solution is provided wherein redundant routers are treated as a single emulated switch. When a packet is received at a layer 2 edge switch...
US-8,259,717 Transparent network service enhancement
Embodiments of the disclosure may be used to optimize communications between a first routing device and a second routing device. The first routing device may...
US-8,259,683 Attribute driven mobile service control logic
The disclosed embodiments enable service policies to be provisioned for a Mobile Node dynamically. A network device receives a message including at least one of...
US-8,259,676 Methods and apparatus for securing proxy mobile IP
Various security mechanisms may be used independently, or in combination with one another, to authenticate the identity of a node during the Mobile IP...
US-8,259,635 Automatic clustering of wireless network nodes toward selected mesh access points
In one embodiment, a method comprises detecting by a mesh access point a number of wireless network nodes that are attached to the mesh access point within a...
US-8,259,624 Dynamic picture layout for video conferencing based on properties derived from received conferencing signals
A method and apparatus for conferencing dynamically determines composite image layout based on properties of received conferencing signals that include video...
US-8,259,612 Method of routing multicast traffic
A method of routing multicast traffic in a computer network is disclosed. The method comprises associating a plurality of multicast group addresses on a network...
US-8,259,584 Dynamic reroute of network traffic
In an example embodiment, a method is provided that receives a broadcast of available bandwidth from a first routing device. A congestion of traffic is detected...
US-8,259,569 Differentiated services for unicast and multicast frames in layer 2 topologies
In one embodiment, a method includes receiving information on layer 2 topologies at a network device in a core network, mapping one or more Virtual Local Area...
US-8,259,562 Wiring closet redundancy
Systems and method for providing redundancy of communications and/or inline power to a powered Ethernet device are disclosed. A redundancy device is configured...
US-8,259,221 System and method for charging rechargeable batteries in a digital camera
One embodiment of the present invention sets forth a digital camera configured to be powered by rechargeable nickel-metal hydride (NiMH) batteries. The digital...
US-8,259,177 Video fingerprint systems and methods
A method that provides identification information for a portion of a video stream includes receiving a video stream, wherein the video stream includes one or...
US-8,259,155 Providing perspective-dependent views to video conference participants
During a video conference between a local endpoint and a remote endpoint, a display at the local endpoint may be configured to provide perspective-dependent...
US-D666,659 Digital video camera
US-D666,658 Digital video camera
US-D666,657 Digital video camera with a connector
US-D666,656 Digital video camera with a connector
US-8,255,995 Methods and apparatus providing computer and network security utilizing probabilistic policy reposturing
A system defines at least one key event to be monitored by at least one agent, and creates a graphical model for the at least one key event. The system observes...
US-8,255,932 Application of an embedded instrumentation interface definition language
In one example embodiment, a system and method are illustrated that includes defining an interface that is independent of a management interface associated with...
US-8,255,792 Techniques for binding scalable vector graphics to associated information
Techniques for providing information about an object through a graphical interface include providing in a document scalable vector graphics (SVG) statements...
US-8,255,772 Adaptive memory scrub rate
In one embodiment an example apparatus includes a memory with an error detection system (EDS) that detects an error event in the memory. The error event...
US-8,255,682 Early authentication in cable modem initialization
A system that eliminates some of the security vulnerabilities in the prior art systems by using a new sequence of steps to perform initialization of the cable...
US-8,255,556 Multicast and synchronization emulation for content transformed streams
Embodiments of the present disclosure emulate multicast by generating and synchronizing multiple unicasts of a single content in different encoding formats to...
US-8,255,535 Method and system to generate execution-based scheduling signature for an application
A method and system to profile applications are provided. The system may include a capture module to capture resources consumption data for an application and a...
US-8,255,532 Metric-based monitoring and control of a limited resource
Detecting unauthorized or excessive use of a resource is disclosed. The value of a metric is updated based at least in part on a first data associated with a...
US-8,255,519 Network bookmarking based on network traffic
A system comprises a packet data processing element; first network resource tracking logic operable to perform monitoring data packets as the packets pass...
US-8,255,461 Efficient transmission of changing images using image caching
In one embodiment, a display of a source device is shared with one or more viewer devices, e.g., of an online collaborative computing session, and the display...
US-8,254,984 Speaker activation for mobile communication device
In one embodiment, an apparatus includes a mobile communication device configured for operation in a first operating mode wherein a speaker function is off and...
US-8,254,905 Service monitoring and disconnection notification in a wireless gateway device
A gateway apparatus configured to wirelessly communicate with and provide a service to a wireless client device includes a wireless access point module, a...
US-8,254,882 Intrusion prevention system for wireless networks
In one embodiment, a method includes receiving security context information relevant to a connection between a wireless network infrastructure component and a...
US-8,254,845 Combined beamforming and nulling to combat co-channel interference
Techniques are provided to improve receive beamforming at a wireless communication device that receives energy in a frequency band at M plurality of antennas,...
US-8,254,557 Supervisor intercept for teleagent voice over internet protocol communications
A system for transferring a call from one teleagent to another in response to a loss of voice quality in a voice over Internet protocol (VoIP) communication...
US-8,254,552 System and method for providing a recovery mode in a session initiation protocol (SIP) environment
A method to be executed in a session initiation protocol (SIP) environment is provided that includes detecting, by a first agent, a potential lost connection...
US-8,254,412 Implementing priority based dynamic bandwidth adjustments
A method that includes receiving a reservation request from a first endpoint that comprises a bandwidth list identifying a plurality of bandwidth levels...
US-8,254,409 User isolation between network devices
In one embodiment, a network device may have its network interfaces identified as either network-to-network interfaces (NNIs) configured to communicate with...
US-8,254,396 Fast border gateway protocol synchronization
A checkpointing approach enables BGP peers to reduce the number of UPDATE messages that are exchanged and processed after a router restarts. A router receives...
US-8,254,394 Technique for providing constant bit rate (CBR) service over a time-slotted access channel
According to specific embodiments of the invention, a technique is described for providing constant bit rate (CBR) service over shared access channels in a...
US-8,254,357 Maintaining network availability for wireless clients in a wireless local area network
In an example embodiment, there is described herein a technique that provides network availability to wireless clients (e.g., wireless clients running mission...
US-8,254,273 Tracing connection paths through transparent proxies
In one embodiment, a method for tracing a connection path from a source node to a destination node through a network having one or more transparent proxies...
US-8,254,272 Operations administration management for path computation element chains
In one embodiment, an interested node (e.g., a path computation client or "PCC", network management node, etc.) may send a path computation element (PCE)...
US-8,254,271 Point-to-multipoint connectivity verification
Improved connectivity verification is disclosed. A root in a point-to-multipoint network can establish parameters for a connectivity-verification session with...
US-8,254,256 System and method for performing distributed policing
Various systems and methods that synchronize local copies of a variable used in a distributed algorithm, such as that used in distributed policing, are...
US-8,253,771 Video call management apparatus and associated methodology of controlling voice and video response
An video call management apparatus and associated methodology of controlling interactive voice and video responses is provided. A calling party is identified as...
US-8,250,647 Method and apparatus for automatic filter generation and maintenance
Automatic filter generation and maintenance comprises detecting, from network packets, an IP address and a first MAC address; the IP address and the first MAC...
US-8,250,634 Systems, methods, media, and means for user level authentication
In some embodiments, a gateway in a communications network is provided including a subscriber interface and a Session Initiation Protocol (SIP) registrar;...
US-8,250,630 Detecting unauthorized computer access
A machine executed method comprising at a first computer, receiving from a second computer a request to gain root-administrator access to an operating system...
US-8,250,359 Method and apparatus for distributing group data in a tunneled encrypted virtual private network
A packet forwarding process, on a data communications device, forwards a packet to a plurality of destinations within a network from that data communications...
US-8,250,175 Techniques for remapping content requests
Techniques for routing content requests are provided. In one embodiment, a first device at a network device sends a request from a first device at a first site...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.