Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: cisco





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,214,635 Transparent proxy of encrypted sessions
In one embodiment, a server and a client are configured to trust a certificate of an intermediate proxy device. The proxy device may then intercept a...
US-8,214,466 Virtualization of scalable role-based command line interface views
Providing for virtualization of a role-based command line interface (CLI) view that enables highly scalable association of such a view with an inter-networking...
US-8,213,936 System and method for executing a seamless handoff in a network environment
A method for providing a handoff in a network environment is provided that includes a mobile station operable to conduct a call. The mobile station is further...
US-8,213,913 Providing location based services for mobile devices
Systems and methods are provided that allow the delivery of location based services within a communication network. The location information can be retrieved...
US-8,213,759 System for retaining optical devices
A system for organizing and retaining optical devices and fiber optic cable includes a housing, at least one module, and a tray coupled to the housing and...
US-8,213,592 Call management using call routing engine
A telephone call management system first receives a call over a telephone network from a calling device. The calling device is connected to a first called...
US-8,213,527 Channel variation detection of wireless channel for adaptive transmission schemes
A first wireless communication device recovers data from a transmission received over a wireless channel from a second wireless communication device and...
US-8,213,460 Method and system for processing traffic in an access network
A method and system for processing traffic in an access network includes receiving a plurality of ingress traffic streams from customer premise equipment (CPE)....
US-8,213,435 Comprehensive model for VPLS
A VPLS model is implemented in a network-facing provider edge (n-PE) device configured to receive a packet from an access network; the packet having a first...
US-8,213,388 Wireless hand-over in mobile deployments
The network communication system includes a wireless interface to exchange wireless signals during at least one network connection, and a handover controller...
US-8,213,336 Distributed data center access switch
In one embodiment, an apparatus includes a processor configured for operation in a control plane in a distributed virtual switch in communication with a...
US-8,212,854 System and method for enhanced teleconferencing security
A method and system with means for preventing unauthorized monitoring of a local conference room in which a local conferencing system is located comprising...
US-8,212,674 Inventory devices and methods
In one implementation, a method includes reading first component data from a first tag associated with a first component of a device. The device may be powered...
US-8,209,747 Methods and systems for correlating rules with corresponding event log entries
Methods and systems for associating an event log entry with the rule that triggered its creation are described. In one embodiment, an apparatus is described....
US-8,209,435 Virtual server recirculation
In one embodiment, a method can include: (i) classifying a packet in a server load balancer (SLB) for determining if the packet is destined for a virtual...
US-8,209,323 Methods and apparatuses for dynamically searching for electronic mail messages
In one embodiment, an original search input entered is detected. A plurality of stored terms in a record are detected. The original search input is modified to...
US-8,208,630 Encryption and utilization of hard drive content
Examples of a system, method, and apparatus for encrypting and recording content are presented. When content is recorded to storage media, the content is...
US-8,208,615 Calculating a fully qualified number
A teleconference server may calculate a fully qualified number (FQN), which specifies a string of numbers that, if dialed by an calling party, will establish a...
US-8,208,481 Determination of packet loss locations
In one embodiment, a system may determine receiver identifiers to identify affected receivers, where each of affected receivers failed to receive a packet...
US-8,208,479 Apparatus and method for a generic service locking mechanism for a fibre channel switching fabric of a storage...
An apparatus and method for a Generic Service locking mechanism that enables a Host to lock the Fibre Channel Switching Fabric of a storage area network while...
US-8,208,463 Subnet scoped multicast / broadcast packet distribution mechanism over a routed network
In one embodiment, receiving a data packet in a data forwarding domain, encapsulating a header to the received data packet, and routing the encapsulated data...
US-8,208,460 Method and system for in-band signaling of multiple media streams
Methods and systems are provided for in-band signaling of at least two simultaneous digital media streams in a network, the two simultaneous streams being a...
US-8,208,407 Optimized flush operation in response to topology changes for spanning tree protocols
In one embodiment, in response to receiving a topology change notification at a network bridge having ports identified as either a network port or an edge port,...
US-8,208,389 Methods and apparatus for improved determination of network metrics
A metric measurement mechanism is used to determine network characteristics such as latency and round trip time with more precision than that available from...
US-8,208,372 Technique for fast activation of a secondary head-end node TE-LSP upon failure of a primary head-end node TE-LSP
A technique dynamically activates a secondary Traffic Engineering Label Switched Path (TE-LSP) at a secondary head-end node upon failure of a primary TE-LSP in...
US-8,208,370 Method and system for fast link failover
A method and system for fast link failover is disclosed. According to one embodiment, a method is provided in which a failure of a first link between a network...
US-8,208,368 Method and apparatus to enable a hybrid synchronous/asynchronous routing protocol
A hybrid routing protocol may be provided. A disruption tolerant mechanism may be provided for analyzing a network, detecting a disruption between nodes of the...
US-8,208,003 Minimizing fast video update requests in a video conferencing system
In one embodiment, a method includes dropping an initial series of video frames received by a video conferencing system from a first endpoint that has entered a...
US-D662,496 Electronic device
US-8,205,255 Anti-content spoofing (ACS)
A system to prevent content spoofing by detecting phishing attacks is provided. The system checks each webpage visited by a user and determines if the page is...
US-8,205,246 User sensitive filtering of network application layer resources
In one embodiment, a method includes receiving authorization data at a local node of a network. The authorization data indicates a particular network address of...
US-8,205,163 Integrated out-of-office assistant reminder tool
In one embodiment, a method includes scanning, by an automated tool, a set of application programs and/or systems associated with a user, the set including one...
US-8,205,072 Method and apparatus for electronically configuring a secured user desktop
A method of providing endpoint security for a session on an untrusted computer accessing data on a networked server is disclosed. A virtual secure desktop is...
US-8,204,967 Dynamic chain creation and segmentation of the packet-forwarding plane
A method is disclosed for dynamically creating encapsulation and decapsulation chains and segmenting the packet-forwarding plane. A distributed router may...
US-8,204,512 Wireless node location mechanism featuring definition of search region to optimize location computation
A wireless node location mechanism that defines a search region to optimize the computations associated with estimating the location of a given wireless node....
US-8,204,327 Context adaptive hybrid variable length coding
A coding method for an ordered series of quantized transform coefficients of a block of image data, including a context adaptive position coding process to...
US-8,204,228 Group key management re-registration method
In an embodiment, a fast group key management re-registration is described. One computer-implemented method comprises, at a key server: receiving a registration...
US-8,204,178 Method to prevent TTY/TDD probing and unwanted TTY/TDD tone generation on voice gateways
A method to prevent TTY/TDD (teletypewriter/telecommunications device for the deal) probing and unwanted TTY/TDD tone generation on voice gateways comprises...
US-8,204,080 Techniques for encapsulating point to point (PPP) over Ethernet frames
Techniques for negotiating Point-to-Point Protocol (PPP) sessions over an Ethernet network include receiving configuration data that indicates a first node is...
US-8,204,061 Virtual port channel switches with distributed control planes
In one embodiment, an apparatus includes one or more ports for connection to one or more links in communication with a network device, a multi-chassis trunk...
US-8,204,047 Using PSTN reachability to verify caller ID information in received VoIP calls
A system for verifying caller ID information in received VoIP calls. In particular implementations, a method includes receiving a caller identification (ID)...
US-8,204,029 Mobile intelligent roaming using multi-modal access point devices
A system and method are provided in which access point (AP) devices in a wireless local area network (WLAN) are typed or configured into one of three...
US-8,204,006 Method and system for communicating digital voice data
Methods and systems have been provided for communicating digital voice data. According to various embodiments of the invention, a user interface is provided at...
US-8,203,954 Link policy routing based on link utilization
A technique dynamically applies a link utilization based policy to traffic traversing links in a computer network. According to the novel technique, a link...
US-8,203,953 Bi-directional policer for data rate enforcement over half-duplex mediums
A bi-directional policer especially suitable for application in, but not limited to, wireless networks or other shared access or half-duplex communication...
US-8,203,950 Quality of service in a storage area network
In one embodiment, a solution is provided wherein a minimum and/or maximum bandwidth may be guaranteed for specific flows. These guarantees can be associated to...
US-8,203,943 Colored access control lists for multicast forwarding using layer 2 control protocol
In one embodiment, a method includes receiving, by an access node, multicast control parameters for white, black, and grey lists of multicast groups. The access...
US-8,203,934 Transparent automatic protection switching for a chassis deployment
Methods and apparatus for allowing a traffic level switch associated with an automatic protection switching (APS) topology to occur transparently and without...
US-8,203,591 Method and system for optimal balance and spatial consistency
A method for assigning video signals includes receiving a plurality of video signals from a plurality of cameras located at one or more remote sites, the...
US-8,203,372 Synchronous rectifier post regulator
Methods and apparatus for regulating a synchronous rectifier DC-to-DC converter by adjusting one or more existing synchronous rectifiers in the converter are...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.