Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: cisco





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,208,615 Calculating a fully qualified number
A teleconference server may calculate a fully qualified number (FQN), which specifies a string of numbers that, if dialed by an calling party, will establish a...
US-8,208,481 Determination of packet loss locations
In one embodiment, a system may determine receiver identifiers to identify affected receivers, where each of affected receivers failed to receive a packet...
US-8,208,479 Apparatus and method for a generic service locking mechanism for a fibre channel switching fabric of a storage...
An apparatus and method for a Generic Service locking mechanism that enables a Host to lock the Fibre Channel Switching Fabric of a storage area network while...
US-8,208,463 Subnet scoped multicast / broadcast packet distribution mechanism over a routed network
In one embodiment, receiving a data packet in a data forwarding domain, encapsulating a header to the received data packet, and routing the encapsulated data...
US-8,208,460 Method and system for in-band signaling of multiple media streams
Methods and systems are provided for in-band signaling of at least two simultaneous digital media streams in a network, the two simultaneous streams being a...
US-8,208,407 Optimized flush operation in response to topology changes for spanning tree protocols
In one embodiment, in response to receiving a topology change notification at a network bridge having ports identified as either a network port or an edge port,...
US-8,208,389 Methods and apparatus for improved determination of network metrics
A metric measurement mechanism is used to determine network characteristics such as latency and round trip time with more precision than that available from...
US-8,208,372 Technique for fast activation of a secondary head-end node TE-LSP upon failure of a primary head-end node TE-LSP
A technique dynamically activates a secondary Traffic Engineering Label Switched Path (TE-LSP) at a secondary head-end node upon failure of a primary TE-LSP in...
US-8,208,370 Method and system for fast link failover
A method and system for fast link failover is disclosed. According to one embodiment, a method is provided in which a failure of a first link between a network...
US-8,208,368 Method and apparatus to enable a hybrid synchronous/asynchronous routing protocol
A hybrid routing protocol may be provided. A disruption tolerant mechanism may be provided for analyzing a network, detecting a disruption between nodes of the...
US-8,208,003 Minimizing fast video update requests in a video conferencing system
In one embodiment, a method includes dropping an initial series of video frames received by a video conferencing system from a first endpoint that has entered a...
US-D662,496 Electronic device
US-8,205,255 Anti-content spoofing (ACS)
A system to prevent content spoofing by detecting phishing attacks is provided. The system checks each webpage visited by a user and determines if the page is...
US-8,205,246 User sensitive filtering of network application layer resources
In one embodiment, a method includes receiving authorization data at a local node of a network. The authorization data indicates a particular network address of...
US-8,205,163 Integrated out-of-office assistant reminder tool
In one embodiment, a method includes scanning, by an automated tool, a set of application programs and/or systems associated with a user, the set including one...
US-8,205,072 Method and apparatus for electronically configuring a secured user desktop
A method of providing endpoint security for a session on an untrusted computer accessing data on a networked server is disclosed. A virtual secure desktop is...
US-8,204,967 Dynamic chain creation and segmentation of the packet-forwarding plane
A method is disclosed for dynamically creating encapsulation and decapsulation chains and segmenting the packet-forwarding plane. A distributed router may...
US-8,204,512 Wireless node location mechanism featuring definition of search region to optimize location computation
A wireless node location mechanism that defines a search region to optimize the computations associated with estimating the location of a given wireless node....
US-8,204,327 Context adaptive hybrid variable length coding
A coding method for an ordered series of quantized transform coefficients of a block of image data, including a context adaptive position coding process to...
US-8,204,228 Group key management re-registration method
In an embodiment, a fast group key management re-registration is described. One computer-implemented method comprises, at a key server: receiving a registration...
US-8,204,178 Method to prevent TTY/TDD probing and unwanted TTY/TDD tone generation on voice gateways
A method to prevent TTY/TDD (teletypewriter/telecommunications device for the deal) probing and unwanted TTY/TDD tone generation on voice gateways comprises...
US-8,204,080 Techniques for encapsulating point to point (PPP) over Ethernet frames
Techniques for negotiating Point-to-Point Protocol (PPP) sessions over an Ethernet network include receiving configuration data that indicates a first node is...
US-8,204,061 Virtual port channel switches with distributed control planes
In one embodiment, an apparatus includes one or more ports for connection to one or more links in communication with a network device, a multi-chassis trunk...
US-8,204,047 Using PSTN reachability to verify caller ID information in received VoIP calls
A system for verifying caller ID information in received VoIP calls. In particular implementations, a method includes receiving a caller identification (ID)...
US-8,204,029 Mobile intelligent roaming using multi-modal access point devices
A system and method are provided in which access point (AP) devices in a wireless local area network (WLAN) are typed or configured into one of three...
US-8,204,006 Method and system for communicating digital voice data
Methods and systems have been provided for communicating digital voice data. According to various embodiments of the invention, a user interface is provided at...
US-8,203,954 Link policy routing based on link utilization
A technique dynamically applies a link utilization based policy to traffic traversing links in a computer network. According to the novel technique, a link...
US-8,203,953 Bi-directional policer for data rate enforcement over half-duplex mediums
A bi-directional policer especially suitable for application in, but not limited to, wireless networks or other shared access or half-duplex communication...
US-8,203,950 Quality of service in a storage area network
In one embodiment, a solution is provided wherein a minimum and/or maximum bandwidth may be guaranteed for specific flows. These guarantees can be associated to...
US-8,203,943 Colored access control lists for multicast forwarding using layer 2 control protocol
In one embodiment, a method includes receiving, by an access node, multicast control parameters for white, black, and grey lists of multicast groups. The access...
US-8,203,934 Transparent automatic protection switching for a chassis deployment
Methods and apparatus for allowing a traffic level switch associated with an automatic protection switching (APS) topology to occur transparently and without...
US-8,203,591 Method and system for optimal balance and spatial consistency
A method for assigning video signals includes receiving a plurality of video signals from a plurality of cameras located at one or more remote sites, the...
US-8,203,372 Synchronous rectifier post regulator
Methods and apparatus for regulating a synchronous rectifier DC-to-DC converter by adjusting one or more existing synchronous rectifiers in the converter are...
US-D662,123 Digital video camera with retractable data connector
US-8,201,233 Secure extended authentication bypass
Methods and apparatus are provided to allow Internet Key Exchange (IKE) phase 1 keying materials to be periodically refreshed in a secure manner without...
US-8,201,226 Authorizing network access based on completed educational task
In one embodiment, a method comprises authentication a user of a client device by a network access device; selectively sending an education assignment request...
US-8,201,207 Apparatus and methods for moving cable modems between upstream channels
Disclosed are apparatus and methods for managing upstream channels on a per cable modem basis. In certain embodiments, one or more thresholds are defined for...
US-8,201,204 Minimizing black video segments during ad insertion
Black video segments in a video playlist may be minimized. Black detection may be utilized by a network device to identify true starting point and a true ending...
US-8,201,006 Power consumption management in a network device
A method includes buffering an initial amount of data of a data set transmitted from a MAC. When an amount of time for data associated with the data set to fill...
US-8,200,971 Method for the provision of a network service
Methods and systems provide for sharing information between computer networks in which the information to be shared is required at one location (e.g. for the...
US-8,200,959 Verifying cryptographic identity during media session initialization
An authentication agent may cryptographically identify a remote endpoint that sent a media initialization message even though intermediate devices may modify...
US-8,200,840 Method and apparatus for a generic rule based engine to perform action when an event of interest transpires
A system and method for providing a rule based engine in a routing operating system. The system includes a set of predefined events, a set of predefined...
US-8,200,830 Detecting overloads in network devices
Systems and methods are provided to allow detection of the load conditions on network devices. The load detection can occur using a mobility management device...
US-8,200,798 Address security in a routed access network
In one embodiment, providing multi-layer address security incorporating Layer 2 Media Access Control (MAC) addresses and corresponding Layer 3 Internet Protocol...
US-8,200,242 Enhanced wireless node location using differential signal strength metric
A wireless node location mechanism that employs a differential signal strength metric to reduce the errors caused by variations in wireless node transmit power,...
US-8,199,898 System and method for routing calls across call managers using a route plan
A call manager includes a first device process that controls a first telephony device and that receives a call request from the first telephony device. The call...
US-8,199,890 Camp on location
In one embodiment, a method includes obtaining a request for a notification regarding an event associated with a first party and a first location. The request...
US-8,199,764 Scalable approach to large scale queuing through dynamic resource allocation
Methods and devices are provided for the efficient allocation and deletion of virtual output queues. According to some implementations, incoming packets are...
US-8,199,746 Using PSTN reachability to verify VoIP call routing information
A system for verifying VoIP call routing information. In particular implementations, a method includes verifying one or more Voice-over-Internet-Protocol (VoIP)...
US-8,199,680 Correlating calls after a referral
In one embodiment, a network device attaches a header including an identifier for an original call to an outgoing refer message and may also modify a table...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.