Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: cisco





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,139,566 System and method for establishing a communication session between two endpoints that do not both support...
A method for establishing a communication session between two endpoints that do not both support secure media includes receiving a registration from a first...
US-8,139,538 Methods and apparatus for achieving route optimization between mobile networks and a correspondent node using a...
Methods and apparatus for establishing an optimized route between a node and a Correspondent Node are disclosed. In a Mobile Router supporting Mobile IP, the...
US-8,139,488 Cooperative flow locks distributed among multiple components
Disclosed are, inter alia, methods, apparatus, computer-storage media, mechanisms, and means associated with cooperative flow locks distributed among multiple...
US-8,139,101 Pre-processing of video data
A method including: obtaining, with the video processing apparatus, video frames, the video frames including macroblocks; comparing, with a video processing...
US-8,135,771 Digital signal processor clustering in integrated media-services gateways
A Digital Signal Processor (DSP) cloud architecture for clustering DSP resources across multiple integrated media-services gateways. The control plane...
US-8,135,414 Method and system for mobile trajectory based services
In accordance with one embodiment of the present disclosure, a method for mobility profiling includes collecting a plurality of locations of a mobile electronic...
US-8,135,412 Wireless network self-adaptive load balancer
A load balancer is provided for balancing distribution of wireless clients among wireless access points. The load balancer includes a tracking implementation...
US-8,135,071 Breakpoint determining for hybrid variable length coding using relationship to neighboring blocks
A method, and apparatus, and logic encoded in one or more computer-readable tangible medium to carry out a method. The method is to code an ordered sequence of...
US-8,135,028 Neighbor discovery in cable networks
A network device has a communications link to allow the device to communicate with customer devices and a processor. The processor is to receive neighbor...
US-8,134,999 Generic provisioning of voice over internet protocol (VoIP)
In accordance with an embodiment of the invention, a provisioning method for establishing a telecommunications service including the operations of sending a...
US-8,134,951 Framework for managing network data processing elements
In one embodiment an apparatus comprises a transceiver in data communication with an associated network and control logic coupled to the transceiver. The...
US-8,134,922 Reducing flooding in a bridged network
Disclosed are, inter alia, methods, apparatus, computer-storage media, mechanisms, and means associated with loss of reducing flooding in a bridged network,...
US-8,134,921 CMTS upstream channel bandwidth scheduler
In one embodiment, a Cable Modem Termination System (CMTS) generates a bandwidth grant message corresponding to a time segment. The CMTS identifies a portion of...
US-8,134,915 Method and apparatus for providing network redundancy
According to one embodiment, providing network redundancy includes configuring a session registrant database to have one or more virtual standby states. Each...
US-8,134,503 Open-loop beamforming MIMO communications in frequency division duplex systems
Techniques are provided for wireless communication between a first wireless communication device and a second wireless communication device. At a plurality of...
US-D655,737 Digital video camera with built-in connector and lens
US-8,131,994 Dual cryptographic keying
A dual cryptographic keying system. In particular implementations, a method includes responsive to an initial session key negotiation, storing security...
US-8,131,873 Technique for selecting a path computation element
A technique efficiently selects a Path Computation Element (PCE) to compute a path between nodes of a computer network. The PCE selection technique is...
US-8,131,871 Method and system for the automatic reroute of data over a local area network
A method and system for rerouting data over a local area network is provided. The method comprises defining at least one port group associated with a bridging...
US-8,131,870 Method and apparatus for registering a mobile object on a foreign network
A method and apparatus for registering a mobile object on a foreign network includes a first virtual machine at a first router on a foreign network executing a...
US-8,131,857 Fibre channel intelligent target management system
In one embodiment, a network device receives a port login directed to a target from a first host. The network device determines whether at least one other host...
US-8,131,828 Selectively joining clients to meeting servers
In an embodiment, a hosted-on-premises meeting exchange server operates seamlessly with web meeting servers. For example, one computer-implemented method...
US-8,131,096 Variable length coding for clustered transform coefficients in video compression
Coding quantized transform coefficients as occur in image compression combines a position identifying method to identify the relative position of clusters of...
US-8,130,965 Retrieval and transfer of encrypted hard drive content from DVR set-top boxes to a content transcription device
A system and method for the retrieval and transfer of encrypted content from a failed set-top box by a content transcription device. When content is recorded to...
US-8,130,949 Partially reversible key obfuscation
Techniques are provided to obfuscate seed values to produce a decryption key for a simplified content protection scheme. A first repeatable sequence is...
US-8,130,927 Enhanced directory for communications devices
In one embodiment, a method includes establishing a call, and continuously monitoring the call from or using a first endpoint associated with the call....
US-8,130,875 Method for estimating channel response in a wireless communications network based on pilot signals
The present invention discloses a method for estimating a channel response of data subcarriers in a wireless communications network. The method comprises...
US-8,130,767 Method and apparatus for aggregating network traffic flows
A method of aggregating network traffic flows for network traffic elements is described. The traffic elements are characterized by a plurality of...
US-8,130,675 Carrier ethernet service discovery, correlation methodology and apparatus
In an example embodiment, a method of service discovery and correlation is provided. In example embodiments, a network management system discovers, categorizes,...
US-8,130,643 System and method for controlling a data transfer over a network
A method is provided in one example and includes querying for a total capacity for data transmissions for a local network segment, and identifying an available...
US-8,130,638 Method and apparatus to elect ABRs dynamically and intelligently
The present invention elects an area border router from a plurality of potential area border routers by determining a full set of all areas attached to a...
US-8,130,001 System and method for detecting a protective device has limited or interrupted current it carries
A system and method monitors indicators including other-than-current indicators of protective devices such as cutouts and reclosers, to determine whether the...
US-8,127,412 Network context triggers for activating virtualized computer applications
A computer system, comprising at least one controlled execution space hosting an operating system and an application program; a vulnerability monitoring agent...
US-D655,300 Graphical user interface on a display of an electronic device
US-D655,279 Video unit with integrated features
US-8,127,270 Abstracting transformation for model driven architecture
An example embodiment of the present invention provides a process for abstracting an implementation-independent model to an implementation-specific model during...
US-8,127,062 Interlocking input/outputs on a virtual logic unit number
In one embodiment, a solution is provided wherein a lock client sends lock requests to a lock manager upon receipt of an input/output (I/O) and receives back a...
US-8,127,008 Method and apparatus for managing proxy and non-proxy requests in telecommunications network
A method is disclosed for determining a location of a client session in a telecommunications network by comparing attributes of the client session connection to...
US-8,126,814 Method and system for installing software and hardware feature licenses on devices
A method and system for installing software and hardware licenses on electronic devices supporting licensable features. Specifically, a method is disclosed for...
US-8,126,494 System and method for providing a trunked radio and gateway
A method is provided in one example and includes receiving a first channel release notification from a communication network at a trunked radio network gateway...
US-8,126,160 Use of non-audible band to relay information for echo cancellation in a distributed media system
Particular embodiments provide for attenuating one or more microphone signals in a teleconferencing system upon detecting a non-audible signal. A far end voice...
US-8,126,136 Method and system for automatic supervisor intervention in problematic calls in a call center
According to one embodiment of the invention, a method for processing a call in a call center includes monitoring a characteristic of at least a portion of the...
US-8,126,062 Per multi-block partition breakpoint determining for hybrid variable length coding
A method, and apparatus, and logic encoded in one or more computer-readable tangible medium to carry out a method. The method is to code a plurality of ordered...
US-8,125,920 System and method for exporting structured data in a network environment
An apparatus is provided in one example embodiment and includes a network element configured to receive a plurality of packets. The network element is...
US-8,125,915 Remote management of a bridge device
A method and system for remotely managing a bridge device, such as a modem, are disclosed. Management traffic from a service provider can be communicated to a...
US-8,125,911 First-hop domain reliability measurement and load balancing in a computer network
In one embodiment, probe messages may be transmitted from a local domain to a set of one or more responding probe targets located beyond a plurality of probed...
US-8,122,482 Cryptographic peer discovery, authentication, and authorization for on-path signaling
A method is disclosed for cryptographic peer discovery, authentication, and authorization. According to one embodiment, a data packet, which is addressed to a...
US-8,122,271 System, method, and device for providing secure operating environments for computer systems
The present invention includes a system, method, and device for providing secure operating environments for computer systems. In one form, a method for...
US-8,122,266 Powered communications interface providing low-speed communications between power-sourcing equipment and...
A powered communications interface in a power-over-Ethernet (POE) system has a non-powered operating mode in which it withholds operating power from a powered...
US-8,122,136 Methods and apparatus for providing security to a computerized device
When establishing a communications channel to a wireless network, through a wireless connection, a computerized device receives an Internet protocol (IP)...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.