Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: cisco





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,165,043 Multiple instance spanning tree protocol
A multiple instance spanning tree protocol (MI-STP) creates a plurality of active topologies (i.e., loop-free paths) within a computer network. These active...
US-8,165,023 Methods for the secured interconnection of VNET sites over WAN
One embodiment provides a method to interconnect virtual network segments (VNETs) defined for a local-area network (LAN) infrastructure separated by a wide-area...
US-8,165,021 Policy-based resource management
In one embodiment, a network device receives a request from a client in association with a connection, where the request indicates an amount of one or more...
US-8,164,617 Combining views of a plurality of cameras for a video conferencing endpoint with a display wall
A telepresence apparatus, a method of operating a telepresence apparatus, and a tangible computer readable storage medium in a telepresence apparatus that is...
US-8,164,488 Apparatus and method for generating a message based on traffic flow
A method includes determining a first flow characteristic of a flow, the flow comprising at least one targeted user. The method also includes generating for...
US-D658,223 Digital video camera with a retractable data connector
US-8,161,554 System and method for detection and mitigation of network worms
An intrusion detection system for a computer network includes a knowledge database that contains a baseline of normal host behavior, and a correlation engine...
US-8,161,547 Monitoring traffic to provide enhanced network security
A communication system includes a traffic monitoring element that monitors network traffic between network components. The network traffic monitoring element...
US-8,161,538 Stateful application firewall
A method and system to protect web applications from malicious attacks is described. A stateful means of distinguishing between valid (e.g., harmless) and...
US-8,161,395 Method for secure data entry in an application
A method and device for entering data in an application is disclosed. The method may comprise displaying a graphical user interface (GUI) keyboard within the...
US-8,161,386 Method and apparatus for remote web-based technical support
A system provides task-oriented enhancement of a software application that allows for remote, Web-based, technical support. The system observes user-interactive...
US-8,161,185 Method and apparatus for assigning IPv6 link state identifiers
In one embodiment, a technique is used by a routing system to generate a link state identifier for a link state advertisement message. The routing system...
US-8,161,182 Managing network congestion using dynamically advertised congestion status
A method and apparatus are described for managing congestion in a network. For a receiving node, a congestion status associated with a node in the network is...
US-8,161,167 Highly scalable application layer service appliances
A highly scalable application layer service appliance is described herein. According to one embodiment, a network element includes a plurality of application...
US-8,161,134 Smart zoning to enforce interoperability matrix in a storage area network
The present invention describes various mechanisms which may be used for improving SAN device interoperability enforcement techniques implemented in SAN or...
US-8,161,119 Network device provided spam reporting button for instant messaging
In one embodiment, a system can comprise an interface that receives a portion of a messaging communication associated with a client and a tagging component that...
US-8,160,979 Method and apparatus for providing a virtual service agent that receives queries, compares questions to a set...
A virtual agent is disclosed. The virtual agent may receive a question from a user, and compare the question against a list of queries contained in a database....
US-8,160,638 Controlling multi-mode devices
In an example embodiment, a technique for automatically controlling radio interfaces of a multi-mode device. Wireless interfaces are enabled or disabled based...
US-8,160,579 Performing deep packet inspection for a communication session
Performing deep packet inspection (DPI) includes facilitating a communication session for an access terminal. The access terminal is associated with a home...
US-8,160,255 System and method for encrypted group network communication with point-to-point privacy
Various embodiments of the disclosed subject matter provide methods and systems for improved efficiency and security in secure gateway-to-secure gateway network...
US-8,160,227 System and method for establishing roaming line numbers
A method is provided for establishing a roaming line number in a communication network. The method includes receiving information from a telephony device...
US-8,160,112 Buffering a media stream
An apparatus and method of buffering a media stream is provided. The method may comprise receiving a plurality of IP packets of the media stream, each packet...
US-8,160,098 Dynamically allocating channel bandwidth between interfaces
In one example, a bandwidth allocation device allocates physical channel bandwidth between local interfaces. Thereafter, at a polling time, the bandwidth...
US-8,160,094 Fibre channel over ethernet
The present invention provides methods and devices for implementing a Low Latency Ethernet ("LLE") solution, also referred to herein as a Data Center Ethernet...
US-8,160,093 Timing system for modular cable modem termination system
A modular Cable Modem Termination System (CMTS) includes a packet shelf operating a Data Over Cable Service Interface Specifications (DOCSIS) Media Access...
US-8,160,055 System and methods for identifying network path performance
A pseudowire verification framework gathers and maintains status of individual pseudowires by aggregating the state of the individual node hops defining the...
US-8,159,977 Point-controlled contention arbitration in multiple access wireless LANs
A power management method that divorces multicast frames for power save stations from DTIM beacons. An access point associates power save stations with a...
US-8,159,937 Seamless tree creation and movement
In an example embodiment, a beacon is sent on all available interfaces of a device comprising data indicating the operating parameters of all interfaces of the...
US-8,159,932 Initial timing estimation in a wireless network receiver
An apparatus for and a method of wirelessly receiving a signal, and detecting a start of packet (SOP) from the received signal using at least one SOP detection...
US-D657,810 Digital video camera with a retractable data connector
US-D657,809 Camera assembly
US-8,156,557 Protection against reflection distributed denial of service attacks
A method includes monitoring outgoing request packets transmitted by a node in a protected network over a link connecting the protected network to an external...
US-8,156,554 Method and system for verifying identification of an electronic mail message
A method and system for verifying identification of an electronic mail message. An electronic mail message including a signature and a key is received, the...
US-8,156,542 Conditional data delivery to remote devices
In one embodiment a method comprises enrolling a mobile device in a local area network by setting a variable to a mobile device identifier and authenticating...
US-8,156,536 Establishing secure communication sessions in a communication network
In one embodiment, a method for establishing a session between a first party and a second party in a communication network comprises issuing a request to...
US-8,156,504 Scalable resources in a virtualized load balancer
In one embodiment, a load balancing system may include a first physical device that provides a resource. The first physical device may have a first virtual...
US-8,156,325 Role aware network security enforcement
Generating a binding between a source address and one or more roles of a user accessing the network and distributing the binding to a filter node. The source...
US-8,156,319 Self-restarting network devices
A method and apparatus for self-monitoring to identify an occurrence of a threshold and rebooting in response to the occurrence of the threshold is provided. In...
US-8,156,309 Translation look-aside buffer with variable page sizes
Multiple pipelined Translation Look-aside Buffer (TLB) units are configured to compare a translation address with associated TLB entries. The TLB units operated...
US-8,156,244 Software client control of digital picture frames
In one embodiment, a method can include: determining a topology of digital picture frames in a frame network; identifying a lead picture frame from among the...
US-8,156,233 Streaming of templates and data records in individual streams using a multistream protocol
In one embodiment, a method includes determining a first template defining a data format for one or more first data records and a second template defining a...
US-8,156,230 Offload stack for network, block and file input and output
An apparatus for offloading network, block and file functions from an operating system comprises a network interface coupled to a network for receiving packet...
US-8,156,209 Aggregation devices processing keep-alive messages of point-to-point sessions
Several keep-alive messages of point to point (PPP) sessions received from a remote system are aggregated into a single packet in an aggregation device (e.g.,...
US-8,155,650 Method and system for selective buffering
A method for selective buffering includes establishing a first connection with a mobile endpoint. The first connection provides for an exchange of data with the...
US-8,155,619 Interoperability and collaboration system with emergency interception monitoring
Methods and apparatus for automatically connecting an emergency caller with appropriate responders within an interoperability and collaboration system....
US-8,155,482 Selecting wider bandwidth channels in a wireless network
Techniques are provided for selecting channels for a wider bandwidth operation mode of a wireless network, such as wireless network that operates in accordance...
US-8,155,207 Processing and managing pictures at the concatenation of two video streams
Systems and methods that receives a video stream in a transport stream, the first video stream comprising a plurality of compressed pictures, and that receives...
US-8,155,151 Secure combined interoperable multiplexing
Systems and methods for combining a plurality of transport streams into a single transport stream for transmission to, e.g., a single frequency network via a...
US-8,155,147 Techniques for ensuring synchronized processing at remote fibre channel and fibre connectivity networks
Techniques described use Generic Framing Procedure (GFP) to transport data across an optical transport network between near and far Fiber Channel (FC) or Fiber...
US-8,155,130 Enforcing the principle of least privilege for large tunnel-less VPNs
Techniques for secure communication in a tunnel-less VPN are provided. A key server generates and provides, to each VPN gateway, different, yet ...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.