Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: cisco





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,134,922 Reducing flooding in a bridged network
Disclosed are, inter alia, methods, apparatus, computer-storage media, mechanisms, and means associated with loss of reducing flooding in a bridged network,...
US-8,134,921 CMTS upstream channel bandwidth scheduler
In one embodiment, a Cable Modem Termination System (CMTS) generates a bandwidth grant message corresponding to a time segment. The CMTS identifies a portion of...
US-8,134,915 Method and apparatus for providing network redundancy
According to one embodiment, providing network redundancy includes configuring a session registrant database to have one or more virtual standby states. Each...
US-8,134,503 Open-loop beamforming MIMO communications in frequency division duplex systems
Techniques are provided for wireless communication between a first wireless communication device and a second wireless communication device. At a plurality of...
US-D655,737 Digital video camera with built-in connector and lens
US-8,131,994 Dual cryptographic keying
A dual cryptographic keying system. In particular implementations, a method includes responsive to an initial session key negotiation, storing security...
US-8,131,873 Technique for selecting a path computation element
A technique efficiently selects a Path Computation Element (PCE) to compute a path between nodes of a computer network. The PCE selection technique is...
US-8,131,871 Method and system for the automatic reroute of data over a local area network
A method and system for rerouting data over a local area network is provided. The method comprises defining at least one port group associated with a bridging...
US-8,131,870 Method and apparatus for registering a mobile object on a foreign network
A method and apparatus for registering a mobile object on a foreign network includes a first virtual machine at a first router on a foreign network executing a...
US-8,131,857 Fibre channel intelligent target management system
In one embodiment, a network device receives a port login directed to a target from a first host. The network device determines whether at least one other host...
US-8,131,828 Selectively joining clients to meeting servers
In an embodiment, a hosted-on-premises meeting exchange server operates seamlessly with web meeting servers. For example, one computer-implemented method...
US-8,131,096 Variable length coding for clustered transform coefficients in video compression
Coding quantized transform coefficients as occur in image compression combines a position identifying method to identify the relative position of clusters of...
US-8,130,965 Retrieval and transfer of encrypted hard drive content from DVR set-top boxes to a content transcription device
A system and method for the retrieval and transfer of encrypted content from a failed set-top box by a content transcription device. When content is recorded to...
US-8,130,949 Partially reversible key obfuscation
Techniques are provided to obfuscate seed values to produce a decryption key for a simplified content protection scheme. A first repeatable sequence is...
US-8,130,927 Enhanced directory for communications devices
In one embodiment, a method includes establishing a call, and continuously monitoring the call from or using a first endpoint associated with the call....
US-8,130,875 Method for estimating channel response in a wireless communications network based on pilot signals
The present invention discloses a method for estimating a channel response of data subcarriers in a wireless communications network. The method comprises...
US-8,130,767 Method and apparatus for aggregating network traffic flows
A method of aggregating network traffic flows for network traffic elements is described. The traffic elements are characterized by a plurality of...
US-8,130,675 Carrier ethernet service discovery, correlation methodology and apparatus
In an example embodiment, a method of service discovery and correlation is provided. In example embodiments, a network management system discovers, categorizes,...
US-8,130,643 System and method for controlling a data transfer over a network
A method is provided in one example and includes querying for a total capacity for data transmissions for a local network segment, and identifying an available...
US-8,130,638 Method and apparatus to elect ABRs dynamically and intelligently
The present invention elects an area border router from a plurality of potential area border routers by determining a full set of all areas attached to a...
US-8,130,001 System and method for detecting a protective device has limited or interrupted current it carries
A system and method monitors indicators including other-than-current indicators of protective devices such as cutouts and reclosers, to determine whether the...
US-8,127,412 Network context triggers for activating virtualized computer applications
A computer system, comprising at least one controlled execution space hosting an operating system and an application program; a vulnerability monitoring agent...
US-D655,300 Graphical user interface on a display of an electronic device
US-D655,279 Video unit with integrated features
US-8,127,270 Abstracting transformation for model driven architecture
An example embodiment of the present invention provides a process for abstracting an implementation-independent model to an implementation-specific model during...
US-8,127,062 Interlocking input/outputs on a virtual logic unit number
In one embodiment, a solution is provided wherein a lock client sends lock requests to a lock manager upon receipt of an input/output (I/O) and receives back a...
US-8,127,008 Method and apparatus for managing proxy and non-proxy requests in telecommunications network
A method is disclosed for determining a location of a client session in a telecommunications network by comparing attributes of the client session connection to...
US-8,126,814 Method and system for installing software and hardware feature licenses on devices
A method and system for installing software and hardware licenses on electronic devices supporting licensable features. Specifically, a method is disclosed for...
US-8,126,494 System and method for providing a trunked radio and gateway
A method is provided in one example and includes receiving a first channel release notification from a communication network at a trunked radio network gateway...
US-8,126,160 Use of non-audible band to relay information for echo cancellation in a distributed media system
Particular embodiments provide for attenuating one or more microphone signals in a teleconferencing system upon detecting a non-audible signal. A far end voice...
US-8,126,136 Method and system for automatic supervisor intervention in problematic calls in a call center
According to one embodiment of the invention, a method for processing a call in a call center includes monitoring a characteristic of at least a portion of the...
US-8,126,062 Per multi-block partition breakpoint determining for hybrid variable length coding
A method, and apparatus, and logic encoded in one or more computer-readable tangible medium to carry out a method. The method is to code a plurality of ordered...
US-8,125,920 System and method for exporting structured data in a network environment
An apparatus is provided in one example embodiment and includes a network element configured to receive a plurality of packets. The network element is...
US-8,125,915 Remote management of a bridge device
A method and system for remotely managing a bridge device, such as a modem, are disclosed. Management traffic from a service provider can be communicated to a...
US-8,125,911 First-hop domain reliability measurement and load balancing in a computer network
In one embodiment, probe messages may be transmitted from a local domain to a set of one or more responding probe targets located beyond a plurality of probed...
US-8,122,482 Cryptographic peer discovery, authentication, and authorization for on-path signaling
A method is disclosed for cryptographic peer discovery, authentication, and authorization. According to one embodiment, a data packet, which is addressed to a...
US-8,122,271 System, method, and device for providing secure operating environments for computer systems
The present invention includes a system, method, and device for providing secure operating environments for computer systems. In one form, a method for...
US-8,122,266 Powered communications interface providing low-speed communications between power-sourcing equipment and...
A powered communications interface in a power-over-Ethernet (POE) system has a non-powered operating mode in which it withholds operating power from a powered...
US-8,122,136 Methods and apparatus for providing security to a computerized device
When establishing a communications channel to a wireless network, through a wireless connection, a computerized device receives an Internet protocol (IP)...
US-8,122,113 Dynamic host configuration protocol (DHCP) message interception and modification
In an embodiment, a method includes intercepting a configuration message from a first network node addressed to a third network node, and modifying the...
US-8,121,598 Scrambling code allocation and hand-in for wireless network radio access points
Techniques are provided herein to allow more than a fixed number of radio access point devices to be deployed within a macro cell. At a controller apparatus, a...
US-8,121,474 Standby broadband light source for passive optical networks
Techniques are disclosed for a broadband service provider to maintain continuity of service in the event that a broadband light source fails in a passive...
US-8,121,427 Breakpoint determining for hybrid variable length coding and encoding the determined breakpoint
A method, and apparatus, and logic encoded in one or more computer-readable tangible medium to carry out a method of determining a breakpoint position in an...
US-8,121,282 Call park/retrieve using SIP
In one embodiment, a method can include: when performing a park operation: (i) receiving a first message from a park call phone; (ii) providing a second message...
US-8,121,277 Catch-up playback in a conferencing system
In one embodiment, a method includes receiving input indicating that an endpoint is dropping out of a real-time mode of attending an on-going conference...
US-8,121,211 Adaptive switching techniques for hybrid automatic repeat request systems
An adaptive transmission selection technique is provided. A retransmission scheme is selected for a multiple-input-multiple-output wireless system. A plurality...
US-8,121,136 Dynamic discovery mechanisms via inter-domain routing protocol
In an embodiment, a method is provided at which it is used in a device. In this method, a logical identifier assigned to the device is identified and...
US-8,121,133 Stream regulation in a peer to peer network
Techniques for regulating streams in a Peer-to-Peer (P2P) network are provided. By establishing a priority of a stream, certain users may have some level of...
US-8,121,130 Determining an optimal route advertisement in a reactive routing environment
In an example embodiment, a method is provided. In this method, a network address query is received. A first network address of a known apparatus is retrieved...
US-8,121,116 Intra channel video stream scheduling
In one embodiment, a gateway between a variable delay network and a constant delay network receives over the variable delay network a plurality of data streams...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.