Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: cisco





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,996,653 Techniques for optimizing dual track routing
The subject technology provides a method and apparatus for performing dual track routing. A pair of signal traces is routed in between two rows of contacts and...
US-9,996,546 Systems and methods for automatically disseminating content based on contextual information
A content-dissemination system distributes, publishes, or makes available a content item to one or more target entities based on contextual information...
US-9,996,335 Concurrent deployment in a network environment
Particular embodiments described herein provide for a communication system that can be configured to receive a request for an update to a plurality of devices...
US-9,996,137 Enabling deep sleep and power saving through L1 signaling on stack interface
Embodiments generally provide techniques for waking up a plurality of network devices from a power saving mode via layer 1 (L1) signaling. Embodiments include...
US-9,995,881 TSV compatible fiber array coupler for silicon photonics
Embodiments herein describe an apparatus for coupling a photonic chip with a plurality of optical fibers. In one embodiment, the apparatus comprises a first...
US-9,992,705 Wi-Fi calling quality of service on trusted WLAN networks
Techniques are presented that ensure Quality of Service (QoS) for Wi-Fi.RTM. calling and other Internet Media Services (IMS) when a user connects from a...
US-9,992,703 Insertion of management packet into a deterministic track
In one embodiment, a method comprises: a first network device in a deterministic network identifying first and second slots for transmission of a data packet...
US-9,992,625 System and method for location reporting in an untrusted network environment
An example method is provided and may include retrieving by a user equipment (UE) an access point (AP) Media Access Control (MAC) address for an AP to which the...
US-9,992,492 Providing a common set of parameters for sub-layers of coded video
Systems and methods disclosed herein may describe methods and systems for generating, receiving, and/or processing a bitstream comprising at least a first coded...
US-9,992,346 Temporary user associations based on call state
A system for temporary user association based on call state, comprising: a communication device; a call state engine; and a user association service. The...
US-9,992,310 Multi-hop Wan MACsec over IP
An egress frame processing method, an Ethernet frame is received. Information defining an Internet Protocol (IP) tunnel between the network device and a peer...
US-9,992,281 Accountable content stores for information centric networks
A set of Content Store nodes of an information-centric network (ICN) can cache data, and can processes an Interest for this data based on a domain assigned to...
US-9,992,251 Segment routing support in MPEG dash
According to one aspect, a method includes identifying a request for a piece of content, and obtaining a Moving Picture Expert Group (MPEG) Dynamic Adaptive...
US-9,992,232 Policy block creation with context-sensitive policy line classification
Presented herein are techniques for creating a policy block comprised of a group of lines of rules/statements across configuration files for network devices. An...
US-9,992,216 Identifying malicious executables by analyzing proxy logs
Identifying malicious executables by analyzing proxy logs includes, at a server having connectivity to the Internet, retrieving sets of proxy logs from a...
US-9,992,187 Single sign-on authentication via browser for client application
In one embodiment, a method includes initiating at a client application at a client device, a single sign-on authentication with a security device, receiving at...
US-9,992,142 Messages from absent participants in online conferencing
In one embodiment, a method includes displaying, by a participant processor on a display device and during an online conference, a list of invited participants...
US-9,992,111 Router table scaling in modular platforms
In one embodiment an approach is provided to efficiently program routes on line cards and fabric modules in a modular router to avoid hot spots and thus avoid...
US-9,992,103 Method for providing sticky load balancing
Presented herein are techniques to reduce the number of redirected subscriber packet flows while performing sticky hierarchical load balancing. An Nth head end...
US-9,992,099 Protocol independent multicast designated router redundancy
In one embodiment, a method includes transmitting a packet from a router located in a communication path between a source and a receiver, the packet having one...
US-9,992,097 System and method for piggybacking routing information in interests in a content centric network
One embodiment provides a system that facilitates routing updates outside of a routing protocol. During operation, the system receives, by an intermediate node,...
US-9,992,091 Performing network topology traces with minimal data collection
In one embodiment, a device in a network receives privatized network trace data that comprises round trip time information for hops along a communication path....
US-9,992,081 Scalable generation of inter-autonomous system traffic relations
In one embodiment, a method includes: obtaining network flow information from devices in a network, where the network flow information from a respective device...
US-9,992,076 Dynamic cache allocating techniques for cloud computing systems
Techniques are presented herein to allow a tenant application in a cloud computing environment to automatically adjust storage infrastructure cache allocation...
US-9,992,056 Triggered in-band operations, administration, and maintenance in a network environment
Embodiments of the disclosure pertain to activating in-band OAM based on a triggering event. Aspects of the embodiments are directed to receiving a first...
US-9,992,039 Activating mobile backup link based on wired customer edge-provider edge (CE-PE) link status
A method is provided in one embodiment and includes establishing a primary wired access link between a first routing device and a second routing device, and...
US-9,991,972 Remote radio head calibration
Embodiments herein describe calibrating a plurality of radio heads having a plurality of wireless antennas. In one embodiment, the plurality of radio heads...
US-9,991,953 Transmitter self-calibration of time delay and frequency response for high baud-rate QAM transceivers
A self-calibration procedure for an optical transmitter is provided. During the self-calibration procedure, a phase bias of an optical modulator of the optical...
US-9,986,509 Advance remote failure notification (ARFN)
In one embodiment, circuitry on a device is configured to detect a power failure of the device, inform a cellular modem of the device of the power failure, and...
US-9,986,360 Auto-calibration of relative positions of multiple speaker tracking systems
A system that automatically calibrates multiple speaker tracking systems with respect to one another based on detection of an active speaker at a collaboration...
US-9,986,034 Transferring state in content centric network stacks
One embodiment of the present invention provides a system that facilitates the transfer of the state of a stack in a content centric network. During operation,...
US-9,985,982 Method and apparatus for aggregating indicators of compromise for use in network security
In one embodiment, a method includes receiving at a security analysis device a plurality of indicators of compromise (IOCs) associated with an entity, sorting...
US-9,985,906 Estimating time duration of bandwidth availability
In one embodiment, a device in an access network receives network condition data regarding the access network and requested flow characteristic data. The...
US-9,985,894 Exclude filter for load balancing switch
In an example, there is disclosed a computing apparatus for providing load-balanced switching, including a switching network; one or more logic elements...
US-9,985,867 Optimizing EVPN for data centers with redundant top-of-rack deployments
Presented herein are methods for advertising an IP prefix to address the connectivity problem in multi-chassis link aggregation scenario. A peer switch will...
US-9,985,861 SGT feature trace using netflow
Tracing of networking feature data may be provided for networking features running on network devices such as routers and switches. Examples of this feature...
US-9,985,837 Refresh of the binding tables between data-link-layer and network-layer addresses on mobility in a data center...
A method for assisting communication of a source host upon movement from a first Data center (DC) to a second DC is disclosed. The method includes identifying...
US-9,985,794 Traceroute in a dense VXLAN network
Systems, methods and non-transitory computer-readable storage media for determining interconnectivity in dense networks. The method includes generating, at a...
US-9,980,417 Magnetic electromagnetic interference gasket
An electromagnetic interference (EMI) gasket is provided that includes a resiliently-flexible and conductive outer shell, a cushioning element disposed in the...
US-9,980,367 Stand-off block
An apparatus may be provided. The apparatus may comprise a substrate and a circuit board. A ball grid array structure may be disposed between the substrate and...
US-9,980,303 Establishing a private network using multi-uplink capable network devices
Various implementations disclosed herein include systems, methods and apparatuses of a first device, that obtain contact point information of a second device...
US-9,980,220 Low power wireless communication device and remote management techniques
According to one embodiment, a beacon device is configured to provide power in the beacon device in response to a signal from a clock to enter a wake state from...
US-9,980,199 Dominating set identification for path computation based on repeating a transmission within randomized...
In one embodiment, a method comprises: receiving, by a network device in a data network, a wireless data packet containing new data; responding to the wireless...
US-9,980,179 Managing computational resources in a network environment
The present disclosure describes approaches for managing computational resources in a network environment. A computational resource may include any resource...
US-9,980,155 Upgrading mesh access points in a wireless mesh network
A method, system, and logic for upgrading mesh points of a wireless mesh network. One method includes maintaining a mesh topology data structure containing...
US-9,979,748 Domain classification and routing using lexical and semantic processing
Domain classification based on lexical and semantic processing of target domains is provided. A target domain name or URL may undergo a lexical analysis to...
US-9,979,711 Authentication for VLAN tunnel endpoint (VTEP)
A first network device configured as a first Virtual Local Area Network (VLAN) Tunnel Endpoint (VTEP) may receive a packet from a second network device. The...
US-9,979,647 Periodic advertisements of host capabilities in virtual cloud computing infrastructure
The present disclosure describes a distributed, advertisement-based, solution for scheduling virtual resources in cloud infrastructures such as the OpenStack....
US-9,979,644 Linking to content using information centric networking
In one implementation, a method includes receiving, from a link owner, a first interest message for an authorized link object, wherein the authorized link...
US-9,979,629 Distribution of segment identifiers in network functions virtualization and software defined network environments
A method and system are disclosed for distributing (advertising) segment identifiers in network functions virtualization and/or software defined networking...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.