Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: cisco





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,156,309 Translation look-aside buffer with variable page sizes
Multiple pipelined Translation Look-aside Buffer (TLB) units are configured to compare a translation address with associated TLB entries. The TLB units operated...
US-8,156,244 Software client control of digital picture frames
In one embodiment, a method can include: determining a topology of digital picture frames in a frame network; identifying a lead picture frame from among the...
US-8,156,233 Streaming of templates and data records in individual streams using a multistream protocol
In one embodiment, a method includes determining a first template defining a data format for one or more first data records and a second template defining a...
US-8,156,230 Offload stack for network, block and file input and output
An apparatus for offloading network, block and file functions from an operating system comprises a network interface coupled to a network for receiving packet...
US-8,156,209 Aggregation devices processing keep-alive messages of point-to-point sessions
Several keep-alive messages of point to point (PPP) sessions received from a remote system are aggregated into a single packet in an aggregation device (e.g.,...
US-8,155,650 Method and system for selective buffering
A method for selective buffering includes establishing a first connection with a mobile endpoint. The first connection provides for an exchange of data with the...
US-8,155,619 Interoperability and collaboration system with emergency interception monitoring
Methods and apparatus for automatically connecting an emergency caller with appropriate responders within an interoperability and collaboration system....
US-8,155,482 Selecting wider bandwidth channels in a wireless network
Techniques are provided for selecting channels for a wider bandwidth operation mode of a wireless network, such as wireless network that operates in accordance...
US-8,155,207 Processing and managing pictures at the concatenation of two video streams
Systems and methods that receives a video stream in a transport stream, the first video stream comprising a plurality of compressed pictures, and that receives...
US-8,155,151 Secure combined interoperable multiplexing
Systems and methods for combining a plurality of transport streams into a single transport stream for transmission to, e.g., a single frequency network via a...
US-8,155,147 Techniques for ensuring synchronized processing at remote fibre channel and fibre connectivity networks
Techniques described use Generic Framing Procedure (GFP) to transport data across an optical transport network between near and far Fiber Channel (FC) or Fiber...
US-8,155,130 Enforcing the principle of least privilege for large tunnel-less VPNs
Techniques for secure communication in a tunnel-less VPN are provided. A key server generates and provides, to each VPN gateway, different, yet ...
US-8,155,129 Suspending operation of border gateway protocol
A checkpointing approach enables BGP peers to reduce the number of UPDATE messages that are exchanged and processed after a router restarts and to pause and...
US-8,155,125 Apparatus and method for utilizing aggregate network links for multicast switching
A method, system, and apparatus to transmit replicated multicast packets over a plurality of physical network links that are combined into one logical channel...
US-8,155,077 Active mode internet protocol gateway relocation in a partial meshed deployment
Methods, apparatuses and systems directed to facilitating optimized routing and mobility for communication sessions in partial mesh network deployments....
US-8,155,014 Method and system using quality of service information for influencing a user's presence state
In accordance with a particular embodiment of the present invention, a method using Quality of Service (QoS) information to influence a user's presence state is...
US-8,155,007 Path optimization for mesh access points in a wireless mesh network
In one embodiment, a method includes, in each of a plurality of mesh access points, connecting to one of a plurality of mesh controllers in a mesh network and...
US-8,155,003 Aggregate policing applying max-min fairness for each data source based on probabilistic filtering
In one embodiment, a method comprises calculating a corresponding data packet arrival rate for each of a plurality of data sources supplying data packets...
US-8,155,000 Technique for enabling traffic engineering on CE-CE paths across a provider network
In one embodiment, Traffic Engineering (TE) is configured on a provider edge device to customer edge device (PE-CE) link extending from a provider edge device...
US-8,154,990 Less loss in-order delivery protocol for fibre connection architecture
Methods and apparatus for providing in-order delivery in Fibre Channel (FC) fabric are disclosed. A topological change between a first switch and a second...
US-8,154,988 Delivery of streams to repair errored media streams in periods of insufficient resources
In one embodiment, a method includes ingesting a program stream from a program source on a first channel. The method also includes storing the program stream,...
US-D657,362 Electronic device
US-8,151,365 Filtering access to data objects
In one embodiment, a code server and edit server are provided. The code server stores the source code. Users do not access the code server directly. Rather, an...
US-8,151,348 Automatic detection of reverse tunnels
Presently disclosed are methods and apparatus for analyzing packets and packet flows to detect covert communications channels (including reverse tunnels) in...
US-8,151,338 Method and system for continuously serving authentication requests
A method and system for continuously serving the authentication requests of networked computers is disclosed. The authentication requests of computers are...
US-8,151,318 Method and apparatus for reliably and asymmetrically distributing security information within a fibre channel...
A reliable asymmetric method for distributing security information within a Fiber Channel Fabric. The Switching Fabric includes a set of security servers, which...
US-8,151,076 Mapping memory segments in a translation lookaside buffer
In one embodiment, a method includes identifying first and second memory segments associated with a process in virtual memory, allocating memory for the first...
US-8,150,951 System and method for communicating in a loadbalancing environment
A method for communicating in a loadbalancing environment is provided that in a particular embodiment includes receiving a request packet from a network access...
US-8,150,792 System and method for performing activities based on proximity
A system and method applies events to a set of rules, and such rules can produce still other events that can be provided to the same or different set of rules....
US-8,150,018 System and method for provisioning connections as a distributed digital cross-connect over a packet network
A method includes receiving a request to provision a path associated with at least a portion of a packet network and determining whether a router is associated...
US-8,149,942 Method and system for selecting a transmission scheme in a multiple-input-multiple-output wireless...
The present invention discloses a method for selecting a transmission scheme in a multiple-input-multiple-output (MIMO) wireless communications system. The...
US-8,149,871 Pointer offset mechanism enabling cost effective SONET/SDH mapping/demapping over ethernet
In one embodiment, a SONET/SDH over Ethernet demapping point utilizes a pointer offset mechanism for clock recovery and timing. The pointer offset is determined...
US-8,149,843 Capability exchange between network entities in WiMAX
Techniques for exchanging capabilities in a wireless network are provided. In one embodiment, a first device receives a capability message over a communication...
US-8,149,842 Automated discovery of network devices supporting particular transport layer protocols
Disclosed are, inter alia, methods, apparatus, computer-storage media, mechanisms, and means associated with automated discovery of network devices supporting...
US-8,149,833 Wideband cable downstream protocol
A network device has a communications port to provide communication with a data network and a cable port to provide communication with a cable network across...
US-8,149,731 Technique for transferring data over a packet switched network
A technique transfers data over a packet-switched network (PSN), comprising a plurality of intermediate nodes, in a manner that does not require that the...
US-8,149,713 Forwarding of packets based on a filtered forwarding information base
A filtered Forwarding Information Base (FIB) (the "complete local FIB") is used to determine how to forward packets, typically on line cards. The complete local...
US-8,149,710 Flexible and hierarchical dynamic buffer allocation
In one embodiment, a method comprises the following steps: receiving a first set of inputs comprising a first plurality of entities and a first traffic...
US-8,149,708 Dynamically switching streams of packets among dedicated and shared queues
Streams of packets are dynamically switched among dedicated and shared queues. For example, when a packet stream is in a maintenance mode (such as to keep a...
US-8,149,683 Fail-safe inline power in a wired data telecommunications network
A dynamic fuse element is provided in an inline power circuit to provide an electrical current protection level that varies in accordance with allocated current...
US-8,149,261 Integration of audio conference bridge with video multipoint control unit
In one embodiment, a system includes a video multipoint control unit (MCU) and an audio conferencing bridge, the audio conferencing bridge being operable to...
US-8,146,148 Tunneled security groups
A method for providing security groups based on the use of tunneling is disclosed. The method includes assigning a security group identifier (SGI) to a packet...
US-8,145,789 Method providing a single console control point for a network device cluster
A cluster console user interface provides a single console control point for a network device cluster comprising a first switch device, a plurality of active...
US-8,145,787 Adaptive bandwidth utilization over fabric links
Disclosed is a method and apparatus for adapting bandwidth utilization over fabric links. In one embodiment of the method, a transmitting device transmits data...
US-8,145,778 Method and system for transitioning streamed digital video content between stream servers in a digital video...
A technique for transitioning streamed digital video content between stream servers involves identifying a transition identifier that indicates a point at which...
US-8,145,659 Real-time communications enhanced search
One embodiment disclosed relates to a method of providing a real-time communications enhanced search service. When a search request from a client application, a...
US-8,145,272 Pilot-based two-dimensional channel estimation
Techniques are provided herein to estimate channel information based a received burst that is comprises of consecutive transmissions. Each transmission...
US-8,145,249 Method and system for providing a proxy media service
A method for providing a push-to-talk proxy media service includes receiving a plurality of monitored push-to-talk communication streams over a high bandwidth...
US-8,145,184 Protected data capture
In one embodiment, a method includes receiving disposition data from a subscriber. The disposition data indicates a first particular condition predicate for...
US-8,144,784 Position coding for context-based adaptive variable length coding
Particular embodiments include a method, an apparatus, and logic embodied in tangible computer-readable medium that when executed carries out a method of...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.