Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: cisco





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,019,3912 Warm-start with knowledge and data based grace period for live anomaly detection systems
In one embodiment, a device in a network loads an anomaly detection model for warm-start. The device filters input data for the model during a warm-start grace...
US-1,019,3907 Intrusion detection to prevent impersonation attacks in computer networks
In an embodiment, a central computer performs a data processing method. The central computer receives telemetry data from intrusion sensors. The central...
US-1,019,3879 Method and system for software application deployment
A method and system for deploying applications. The method includes deploying an application image of an application to a computing device, where the...
US-1,019,3809 Load balancing methods based on transport layer port numbers for a network switch
In one embodiment, a network element that performs network traffic bridging receives load balancing criteria comprising an indication of at least one transport...
US-1,019,3784 Tracking virtual IP connection changes
Systems and methods are disclosed for designating a network device as a primary device for probing a virtual IP address and designating a second network device...
US-1,019,3750 Managing virtual port channel switch peers from software-defined network controller
Systems, methods, and computer-readable storage media for configuring a virtual port channel (VPC) domain. The disclosed technology involves determining that a...
US-1,019,2047 Provisioning of identity information
In one embodiment, a file comprising a disk image and a key blob is prepared. The file is attached to a virtual machine configuration. A virtual machine based...
US-1,019,1844 Automatic garbage collection thrashing monitoring
The system identifies objects that cause thrashing behavior in garbage collection. A garbage collection process may be monitored for a period of time. Over that...
US-1,019,1800 Metric payload ingestion and replay
In one aspect, a method for metric payloads ingestion and playback is disclosed. The method includes receiving time series of metric payloads for a plurality of...
US-1,018,7801 Mobile application specific networks
One embodiment provides a system that facilitates a large-scale mobile ad hoc network to adapt to specific needs of wireless nodes in a mobile wireless network....
US-1,018,7680 Adaptive bit rate system architectures using named domain networking
In one implementation, a method includes obtaining a plurality of representations of a digital video asset. The plurality of representations may include a...
US-1,018,7460 Peer-to-peer sharing in a content centric network
The system receives a list of one or more name prefixes associated with an original name, wherein the original name corresponds to an original root manifest...
US-1,018,7435 Queued sharing of content in online conferencing
In one embodiment, a method includes sharing first content from a first computer of a first participant in an online conference. The first content is shared on...
US-1,018,7429 Selective redundancy for media sessions
In one embodiment, a device in a network maintains a plurality of network paths for a media session. The device identifies a subset of data for the media...
US-1,018,7414 Differential malware detection using network and endpoint sensors
A method is disclosed in which a system compares a first set of reports characterizing network traffic flows originating from an endpoint device with a second...
US-1,018,7413 Network-based approach for training supervised learning classifiers
In one embodiment, a supervisory device in a network receives traffic data from a security device that uses traffic signatures to assess traffic in the network....
US-1,018,7412 Robust representation of network traffic for detecting malware variations
Techniques are presented that identify malware network communications between a computing device and a server based on a cumulative feature vector generated...
US-1,018,7401 Hierarchical feature extraction for malware classification in network traffic
In one embodiment, a method includes receiving packet flow data at a feature extraction hierarchy comprising a plurality of levels, each of the levels...
US-1,018,7354 DHCP client lease time based threat detection for authorised users
Methods and systems are provided for determining a leased time for an address leased for a first user device. The determined leased time and leased address may...
US-1,018,7321 Dynamic VPN policy model with encryption and traffic engineering resolution
High-level network policies that represent a virtual private network (VPN) as a high-level policy model are received. The VPN is to provide secure connectivity...
US-1,018,7306 System and method for improved service chaining
There is disclosed an apparatus having logic elements to: receive an incoming packet associated with a first service function chain; identify a next hop service...
US-1,018,7302 Source address translation in overlay networks
Systems, methods, and non-transitory computer-readable storage media for translating source addresses in an overlay network. An access switch in an overlay...
US-1,018,7270 Approach to visualize current and historical access policy of a group based policy
Systems, methods, and non-transitory computer-readable storage media for visualizing current and historical access policy of a group based policy. A first group...
US-1,018,7252 Configuring heterogeneous computing environments using machine learning
In one embodiment, a device receives data regarding a plurality of heterogeneous computing environments. The received data comprises measured application...
US-1,018,7249 Distributed metric data time rollup in real-time
In one aspect, a system for distributed consistent hash backed time rollup of performance metric data is disclosed. The system includes a plurality of...
US-1,018,7209 Cumulative schemes for network path proof of transit
A system and methods are provided for verifying proof of transit of network traffic through a plurality of network nodes in a network. In one embodiment, each...
US-1,018,7149 Downstream node setup
Per-port performance optimization may be provided. First, performance data may be received corresponding to each of a plurality of ports. Then it may be...
US-1,018,6839 Laser with pre-distorted grating
In one embodiment, an apparatus includes a carrier and a semiconductor laser bonded to the carrier, the semiconductor laser comprising a grating extending...
US-1,018,6823 Apparatus for facilitating the separation of mated printed circuit board assemblies
According to one aspect, an apparatus includes an expansion element, an expandable element, and a frame. The expandable element is configured to have an...
US-1,018,5761 Domain classification based on domain name system (DNS) traffic
Techniques are provided herein for classifying domains based on DNS traffic so that domains that are malicious or associated with malicious activity can be...
US-1,018,5628 System and method for prioritization of data file backups
Systems, methods, and computer-readable media for prioritizing backups of data on cameras. In some examples, a camera records media content items captured by...
US-1,018,3834 Tool-less cable retainer
Example embodiments relate to an apparatus comprising a first flange part; a second flange part comprising a hole and one of a male portion or a female portion;...
US-1,018,2496 Spanning tree protocol optimization
Systems and approaches are provided for optimizing the Spanning Tree Protocol (STP) in a switched network. STP port type for a network infrastructure device can...
US-1,018,2318 Integration of enterprise voicemail in mobile systems
An integrated voicemail system is described that provides "visual voicemail" that overcomes the shortcomings associated with a user having to dial into a...
US-1,018,2248 Keyframe mitigation for video streams with multiple receivers
In one embodiment, a video encoder generates an encoded bitstream representing a sequence of video frames including a keyframe. The encoder generates...
US-1,018,2233 Quality metric for compressed video
Methods and systems are disclosed for calculating and applying a VQ metric which operates during the decoding of compressed video. As such, this metric is...
US-1,018,2085 Integrated user interface for unified communications applications
Techniques are provided for establishing a Unified Communications (UC) session between a client endpoint device and remote endpoint devices, the client endpoint...
US-1,018,2066 Cold start mechanism to prevent compromise of automatic anomaly detection systems
In one embodiment, a device in a network analyzes data indicative of a behavior of a network using a supervised anomaly detection model. The device determines...
US-1,018,2055 Security policy efficacy visualization
A management entity communicates over a network with devices on which security rules are configured to control network access. Data that indicates a hit count...
US-1,018,2039 Encrypted and authenticated data frame
At a source network device, data is compiled into a plurality of data blocks for transmission in a data frame over a network to a destination network device....
US-1,018,2011 System and method to analyze congestion in low latency network
Intelligent packet analysis may be provided to determine congestion problems and lead to fast solutions in low latency networks. Specifically, a congestion...
US-1,018,2000 Loop detection and avoidance for segment routed traffic engineered paths
A method is described and in one embodiment includes receiving a packet of a traffic flow at an ingress node of a communications network; routing the packet to...
US-1,018,1987 High availability of collectors of traffic reported by network sensors
Systems, methods, and computer-readable media for collector high availability. In some embodiments, a system receives, from a first collector device, a first...
US-1,018,1688 Quick disconnect electrical cable connector
A hermaphroditic electrical connector having a first connector half and a second connector half configured to mate with one another. Each of the connector...
US-1,018,0914 Dynamic domain name service caching
In one aspect, a system for controlling domain name service (DNS) caching is disclosed, the system includes a processor; a memory; and one or more modules...
US-1,018,0851 Detection of unauthorized use of virtual resources
In one implementation, an original physical profile file and a configuration baseline are stored for a virtual machine. The physical profile file includes...
US-1,017,8646 System and method to facilitate slice management in a network environment
A method is provided in one example embodiment and may include receiving, by a mobility management frontend, an attach request for a user equipment (UE) to...
US-1,017,8181 Interposer with security assistant key escrow
An interposer is provided that is configured to interpose into an application security protocol exchange by obtaining application session security state. The...
US-1,017,8131 Entity identification for enclave segmentation in a network
In one embodiment, a device in a network identifies a set of network entities. The device determines characteristics of the network entities. The device assigns...
US-1,017,8107 Detection of malicious domains using recurring patterns in domain names
In one embodiment, a security device identifies, from monitored network traffic of one or more users, one or more suspicious domain names as candidate domains,...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.