Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: cisco





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,082,340 Technique for distinguishing between link and node failure using bidirectional forwarding detection (BFD)
A technique distinguishes between link and node failure using bidirectional forwarding detection (BFD) in a computer network. According to the novel technique,...
US-8,082,333 DHCP proxy for static host
A DHCP proxy agent is provided to send on behalf of a static host a DHCP request so that an access layer security feature such as DHCP snooping/IPSG can be...
US-8,082,304 Guaranteed delivery of application layer messages by a network element
A method is disclosed by which network elements such as packet routers and packet switches guarantee the delivery of application layer messages within a...
US-8,081,771 Automobile personal radio recorder
In one embodiment, an audio recorder is disclosed that interfaces with an automobile radio. The audio recorder includes a radio tuner that receives radio...
US-8,081,749 System and method for integrated queue management
A system and method for integrated queue management are provided. The method may include receiving, from a user, a request for a connection to one of a...
US-8,081,659 Map message expediency monitoring and automatic delay adjustments in M-CMTS
An M-CMTS compatible UEQAM device implements circuitry to identify and analyze MAP message in the data stream sent from the M-CMTS Core with respect to timing...
US-8,081,582 Method for routing information over a network employing centralized control
A method and apparatus for centralized control of a network is described. The network includes a number of nodes. The method includes creating a database and...
US-8,081,568 Role determination for network devices
Techniques for selecting authentication roles when establishing a link between devices in a secure network are provided. By assigning role levels to devices,...
US-8,081,563 Protecting multi-segment pseudowires
The protection of multi-segment pseudowires by utilizing pre-computed backup paths is disclosed herein. Disclosed embodiments include methods that establish at...
US-8,081,484 Method and apparatus for supporting a computer chip on a printed circuit board assembly
A printed circuit board assembly and method of assembly in which underfill is placed between a chip and substrate to support the chip. A trench is formed in the...
US-8,081,205 Dynamically switched and static multiple video streams for a multimedia conference
An end station for a videoconference/multimedia conference is disclosed, where the end station requests, receives and displays multiple video streams. Call...
US-8,079,076 Detecting stolen authentication cookie attacks
In one embodiment, an apparatus comprises logic for detecting stolen authentication cookie attacks. A first transport connection is established between a client...
US-8,079,062 Method and system using presence information to manage network access
In accordance with a particular embodiment of the present invention, a method using presence information to manage network access includes maintaining presence...
US-8,078,903 Automatic load-balancing and seamless failover of data flows in storage media encryption (SME)
Methods and apparatus for encrypting data are disclosed. In accordance with one embodiment, data path information identifying a data path is provided to one or...
US-8,078,889 Method and apparatus for negotiating power between power sourcing equipment and powerable devices
The present invention provides a power negotiation protocol that enables PDs and PSEs to negotiate the amount of inline power that a PD consumes and the...
US-8,078,756 Computing a path for an open ended uni-directional path protected switched ring
Methods and apparatus for enabling a protected circuit path to be created efficiently are disclosed. In accordance with one embodiment of the present invention,...
US-8,078,739 Solution for handling URL-substitution for data access in a private network architecture
Disclosed are methods and apparatus for handling requests for data from a private network. In general terms, a client who wishes access to secure data, such as...
US-8,078,721 Dynamic host configuration protocol (DHCP) initialization responsive to a loss of network layer connectivity
Disclosed are, inter alia, methods, apparatus, computer-storage media, mechanisms, and means associated with loss of network layer connectivity triggering...
US-8,078,715 Automatic hardware failure detection and recovery for distributed max sessions server
A Max Sessions Server (MSS) automatically detects hardware and communications failures. Upon detection, counters are adjusted accordingly to maintain an...
US-8,078,706 Method and system for faster device learning
Method and system for faster device learning are provided. The invention provides a method of sending multiple object identifiers in a single Get Next Request,...
US-8,078,679 Method and system for automating collateral configuration in a network
In one embodiment of the invention, a method for automating collateral configuration in a network is provided. A service is configured on a network device...
US-8,078,676 System and method for managing remote computer training labs
An educational and training system allows organization and management of computers and course material used in teaching and administering classes of computer...
US-8,078,578 Sharing of presence-based time-zone information
A system for sharing presence-based time-zone information includes a database, and a controller. The database includes a plurality of presence profiles, each...
US-8,078,231 Device, methods, and user interface for providing optimized entry of alphanumeric text
The present invention includes a device, method, and user interface for providing optimized entry of alphanumeric text. In one form, a method for providing...
US-8,078,053 Optical link characterization
Various example embodiments are disclosed. According to one example embodiment, a method may include transmitting a semiconductor laser-generated optical signal...
US-8,078,052 Protocol-less all-optical 1+1 bidirectional revertive linear protection system
In an optical network a 1+1 bidirectional protection system is presented. Each node across a link has photodiodes to monitor the power of signals received by...
US-8,077,842 System and method for associating due dates with messages
A method for providing communication service includes determining that a call was not answered by an intended recipient of the call and determining a due date...
US-8,077,838 Method and voice communicator to provide a voice communication
A method and voice communicator to provide a voice communication is described. The method may include identifying text to be communicated and automatically...
US-8,077,809 Link adaptation based on generic CINR measurement according to log-likelihood ratio distribution
Techniques are provided to compute the carrier to interference-plus-noise ratio (CINR) in a wireless communication system using log-likelihood ratio (LLR) data...
US-8,077,772 Coding background blocks in video coding that includes coding as skipped
A method, an apparatus, and a method to encode a block in a picture of a time sequence of pictures such as video. The method includes selecting the mode for...
US-8,077,738 Default internet traffic and transparent passthrough
A method for routing packets sent from a user to the internet is provided for systems in which the user is connected to a private network. The method includes:...
US-8,077,732 Techniques for inserting internet protocol services in a broadband access network
Techniques for inserting a network service in an Ethernet access network operated by an access service provider include sending routing data to customer...
US-8,077,721 Methods and apparatus providing two stage tunneling
A system receives a packet at a first node. The packet is destined for a second node. The system identifies a full routing node from a plurality of network...
US-8,077,713 Dynamic update of a multicast tree
In an example embodiment, a multicast tree is accessed. The multicast tree defines one or more destination label switch routers and paths from a source label...
US-8,077,712 Static neighbor wake on local area network
In one embodiment, a method includes obtaining traffic that is to be forwarded to a neighboring device, and determining if the neighboring device is in a state...
US-8,077,709 Redundancy at a virtual provider edge node that faces a tunneling protocol core network for virtual private...
In one embodiment, a method includes receiving configuration data at a particular node of a first set of multiple nodes. The configuration data includes data...
US-8,077,675 Performance management of mobile intelligent roaming using mobility detail records
Techniques are provided herein to improve the manageability of handover performance of multi-mode wireless client devices when roaming between a wireless local...
US-8,077,635 Method and system for reserving facility resources for a conference
A method for reserving conference resources includes communicating a conference notification to each of a plurality of conference invitees. The conference...
US-8,077,633 Transient loop prevention in a hybrid layer-2 network
In one embodiment, a first switch at a border between a first network of a first protocol (P1 network) and a first network of a second protocol (P2 network) is...
US-8,077,618 Using burst tolerance values in time-based schedules
Schedules may use burst tolerance values to adjust the scheduling in a time-based schedule, such as, but not limited to, adjusting for accumulated but not used...
US-8,077,611 Multilevel coupled policer
A multilevel coupled policer is configured to police packets using at least two policing levels, including a first-level of class policers and a second-level...
US-8,077,607 Dynamic response to traffic bursts in a computer network
In one embodiment, a node receives traffic sent from one or more sources toward one or more destinations (e.g., Multipoint-to-Point, MP2P traffic). The node may...
US-8,077,606 Multimedia data flow dropping with notification
A method and system for correcting a congestion condition within a network, the method including notifying the sender and receiver of a multimedia data flow or...
US-8,077,604 Load sharing and redundancy scheme
Methods and apparatus for providing a device for forwarding packets in a network are disclosed. A first router and a second router having a shared set of...
US-8,077,079 Radiolocation using path loss data
Determining the location of a station or potential rogue access point in a wireless network including accepting an ideal path loss model and calibrating the...
US-8,077,033 Disaster vulnerability assessment in buildings
The number and identities of people in a building along with personal data that is useful in disaster response planning are determined from a database receiving...
US-8,075,199 Form factor adapter module
Various example embodiments are disclosed. According to an example embodiment, a form factor adapter module may include a small form factor (SFF) host connector...
US-8,074,275 Preventing network denial of service attacks by early discard of out-of-order segments
A method of preventing network denial of service attacks by early discard of out-of-order segments comprises creating a reassembly queue for a connection...
US-8,074,094 Session redundancy using a replay model
A mechanism for synchronizing states of components in a first routing engine to corresponding components in a second routing engine is provided. In order to...
US-8,074,084 Powered device classification in a wired data telecommunications network
In a wired data telecommunication network power sourcing equipment (PSE) coupled to a powered device (PD) carries out an inline power discovery process to...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.