Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: cisco





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,271,663 System and method for multiple address of record registration using a single implicit SIP request
A method for registering multiple addresses of record comprises receiving a session initiation protocol register request, the session initiation protocol...
US-8,271,543 Creation of context for communications based on previous interactions
In one embodiment, an identification (ID) of a person involved in a current communication is utilized to access a communication log to determine an active time...
US-8,270,831 Use of pre-validated paths in a WDM network
Various example embodiments are disclosed. According to an example embodiment, a method may include receiving a resource request for optical resources within a...
US-8,270,593 Call routing using voice signature and hearing characteristics
In an example embodiment, a system that appropriately routes calls to an agent at a contact center based on the agent's voice and/or hearing characteristics....
US-8,270,495 Reduced bandwidth off-loading of entropy coding/decoding
Techniques are provided herein to produce encoded video bitstreams and to similarly decode encoded video bitstreams according to a coding standard not supported...
US-8,270,488 Using black detection to improve video splicing
In one embodiment, a network device analyzes an encoded video stream using black detection before splicing video into the encoded video stream. When black data...
US-8,270,413 Method and apparatus for self-learning of VPNS from combination of unidirectional tunnels in MPLS/VPN networks
A technique is provided for implementing deep-packet inspection (DPI) services in a MPLS/VPN configured computer network. The technique employs a novel...
US-8,270,401 Packet routing and switching device
A method for routing and switching data packets from one or more incoming links to one or more outgoing links of a router. The method comprises receiving a data...
US-8,270,399 Crossbar apparatus for a forwarding table memory in a router
A router including a lookup execution unit including a plurality of stages, a forwarding table memory arranged in hierarchy including addressable sectors,...
US-8,270,382 System and method for securing mesh access points in a wireless mesh network, including rapid roaming
Authentication in a mesh network controlled by a central controller, including using standard IEEE 802.11i mechanisms between a potential child mesh access...
US-8,270,381 Method for a simple 802.11e HCF implementation
A Hybrid Coordination Function (HCF) implementation wherein an access point's existing (E)DCF transmit queues are augmented by at least one strict priority HCF...
US-8,270,329 Method for low power radio operation in a wireless packet network
A system and method allows devices to send and receive packets while using power to do so to the extent needed, thereby conserving power.
US-8,270,314 Synthetic frame loss ratio
An endpoint for determining a frame loss ratio is provided. The endpoint includes a processor and a memory coupled with the processor. The memory stores...
US-8,270,307 Network-adaptive preemptive repair in real-time video
A network-adaptive error recovery method for real-time video transmission based on sending repair frames preemptively with a frequency that is based on observed...
US-8,270,171 Cooling arrangement for a rack mounted processing device
To increase air flow, an air intake/outtake (i.e., intake, outtake, or both) is positioned on a front surface of a housing, such as a rack-mounted computer...
US-8,269,817 Floor control in multi-point conference systems
In one embodiment, a conference with multiple end points is provided. At the locations, multiple screens may be configured to display video from a portion of...
US-8,269,814 System and method for single action initiation of a video conference
A method is provided for configuring a video conference endpoint. The method comprises receiving session data that comprises endpoint connection data for remote...
US-8,266,696 Techniques for network protection based on subscriber-aware application proxies
Techniques for responding to intrusions on a packet switched network include receiving user data at a subscriber-aware gateway server between a network access...
US-8,266,472 Method and system to provide high availability of shared data
A data storage system and method are described. The system may comprise a data repository to store data, and first and second storage controllers. The first and...
US-8,266,466 Globally synchronized timestamp value counter
The present invention relates to a synchronized timestamp mechanism in a packet processing system. This synchronized timestamp mechanism provides a globally...
US-8,266,463 Negotiating power between power sourcing equipment and powerable devices
The present invention provides a power negotiation protocol that enables PDs and PSEs to negotiate the amount of inline power that a PD consumes and the...
US-8,266,452 System and method for communicating confidential messages
A method of recording messages includes recording audio data in a first file structured in accordance with a file format that defines a first portion and a...
US-8,266,431 Method and apparatus for performing encryption of data at rest at a port of a network device
Methods and apparatus for performing encryption for data at rest at a port of a network device such as a switch are disclosed. Specifically, when data is...
US-8,266,427 Secure mobile IPv6 registration
In one embodiment, a method comprises receiving by an agent a request from a network node for generation of a secure IPv6 address for use by the network node,...
US-8,266,327 Identity brokering in a network element
A network infrastructure element such as a router or switch performs brokering network user identity and credential information. An application or...
US-8,266,286 Dynamic key management server discovery
Various systems and method are disclosed for automatically disseminating key server contact information in a network. For example, one method (e.g., performed...
US-8,266,282 System and method for enforcing advertising policies using digital rights management
A system and method for policy-based advertising. According to an embodiment, an advertisement server receives a request for advertising content from a user...
US-8,266,224 Application gateway device
In an embodiment, a data processing system comprises application workflow optimizing logic and which when executed is operable to receive first workflow data...
US-8,266,088 Tracking policy decisions in a network
An apparatus is disclosed for creating and storing policy data records comprising data identifying network policy decisions. After a data packet is received, a...
US-8,265,490 Transamplifier, system and method for amplification of optical signals at plural wavelengths
Disclosed herein are embodiments of a device, method of use and system for an analog multi-wavelength transamplifier. The transamplifier embodiments described...
US-8,265,238 Triggering call-handling events
In one embodiment, a method includes identifying a call from a first endpoint to a second endpoint as originating while the second endpoint is connected to a...
US-8,265,162 Context adaptive position and amplitude coding of coefficients for video compression
A coding method, apparatus, and medium with software encoded thereon to implement a coding method. The coding method includes encoding the position of...
US-8,265,139 Packet comparator
A packet comparator includes a match packet buffer and a first in first out (FIFO) buffer that stores a reference packet stream. Once a packet in the reference...
US-8,265,076 Centralized wireless QoS architecture
A QoS mechanism that evaluates congestion in one or more network nodes along the wireless delivery path to optimize the processing priority at the centralized...
US-8,265,074 Collecting network performance data from multiple autonomous systems
A computer apparatus comprises first Border Gateway Protocol (BGP) logic comprising BGP route table data; a network interface to communicatively couple to a...
US-8,265,009 Systems and methods for selecting tracking areas and reducing tracking area updates
Some embodiments provide methods for selecting tracking areas in a network, comprising: receiving messages from a plurality of base transceiver stations, the...
US-8,264,985 Locally unique node port identifiers
In one embodiment, a method includes selecting a locally unique node port identifier at a Fiber Channel over Ethernet (FCoE) node in communication with at least...
US-8,264,962 System and method for dynamically responding to event-based traffic redirection
A technique dynamically resizes Traffic Engineering (TE) Label Switched Paths (LSPs) at a head-end node of the TE-LSPs in preparation to receive redirected...
US-8,264,957 Control of preemption-based beat-down effect
In one embodiment, a node receives packets from one or more input interfaces, and may place the packets in an appropriate output queue for a corresponding...
US-8,264,956 Service redundancy in wireless networks
This disclosure relates to an apparatus and method for providing service redundancy among devices in a communication network. The devices can be, for example, a...
US-8,264,521 Media detection and packet distribution in a multipoint conference
A method for distributing media packets in a multipoint conference includes receiving a plurality of audio signals. Each of the plurality of audio signals...
US-8,264,519 Telepresence system, method and computer program product
A video conferencing system provides realistic presence of participants in a videoconference by way of standards-based communication. The system includes three...
US-8,264,518 Gesture-based actions in a video communication session
In one embodiment, a method for transferring a communication session detects a transfer indication generated by a user of a first video conference system, where...
US-8,264,402 Radiolocation using path loss data
Determining the location of a station in a wireless network including determining path losses between the wireless station of unknown location and at least some...
US-8,264,344 Remote surveillance and intervention using wireless phone
A mobile surveillance appliance receives sensed data over a wireless link from a remote sensing post which monitors a remotely monitored space having a...
US-8,264,210 Interface to regulate voltage for ASIC power management
A method and apparatus to regulate voltage used to power an ASIC comprising an ASIC having a signal source and a modulator. The modulator establishes a...
US-8,262,407 Active copper cable extender
Methods and apparatus for reducing distortion in signals propagating through cables at data rates of at least 10 gigabits per second (Gbps) are provided. By...
US-8,261,355 Topology-aware attack mitigation
Techniques are disclosed for preventing malicious attacks or other exploits on a computer server. A network manager may be configured to determine a topology of...
US-8,261,318 Method and apparatus for passing security configuration information between a client and a security policy server
Techniques for passing security configuration information between a security policy server and a client includes the client forming a request for security...
US-8,261,312 Linear hint video streaming
A streaming file is constructed with a file header section that includes a file header object, a media data file descriptor, and an index descriptor. A hinting...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.