Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: cisco





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-7,949,734 Method and apparatus for re-generating configuration commands of a network device using an object-based approach
A method is disclosed for re-generating a configuration command of a network device. A method includes receiving a request to re-generate a configuration...
US-7,949,195 Per block breakpoint determining for hybrid variable length coding
A method, and apparatus, and logic encoded in one or more computer-readable tangible medium to carry out a method. The method is to code an ordered sequence of...
US-7,949,115 Providing a service framework at an endpoint
A method for providing telephony features at an endpoint includes accessing a service framework at an endpoint. The service framework is operable to provide one...
US-7,949,052 Method and apparatus to deliver a DVB-ASI compressed video transport stream
A method and apparatus to compress a DVB-ASI bit stream including accepting the stream containing packets of compressed media, sync words, and stuffing words,...
US-7,948,991 Broadcast and multicast transmissions with acknowledgement scheduling
In one embodiment, a method includes scheduling acknowledgements from a plurality of receivers in a wireless network, transmitting an acknowledgement schedule...
US-7,948,984 Detecting an identifier change of an endpoint
Detecting an identifier change of an endpoint includes dialing an identifier associated with an endpoint to initiate a call to the endpoint. A network indicator...
US-7,948,922 Blocked redundant link-aware spanning tree protocol enhancement
An exemplary embodiment provides for a method for use in a network device of a plurality of network devices configured to implement a link management protocol...
US-7,948,920 Trunking with port aggregation for fabric ports in a fibre channel fabric and attached devices
Trunking with port aggregation for fabric ports in a Fiber Channel (FC) fabric and attached devices is described. In some examples, a method of establishing a...
US-7,948,910 Monitoring quality of a packet flow in packet-based communication networks
A communication system includes multiple routers interconnected by a packet-based communication network. Each of the routers includes a monitoring application...
US-7,948,905 Troubleshooting voice over WLAN deployments
A voice over WLAN diagnostic system. In particular implementations, a method includes simulating, in response to a triggering event, Voice over Internet...
US-7,948,883 Applying router quality of service on a cable modem interface on a per-service-flow basis
In one embodiment, a cable modem determines network backpressure per service-flow, and transmits the network backpressure per service-flow to a router (e.g.,...
US-7,948,876 Method of detecting non-responsive network flows
A network device identifies a non-adaptive flow as follows. The network device drops packets on a random basis using a Random Early Detection (RED) algorithm. A...
US-7,948,873 Method for recovery of a controlled failover of a border gateway protocol speaker
A method and apparatus for recovering from a controlled failover of a BGP speaker is provided. A user sends, to a network element, a request to switch a...
US-D638,376 Passive cooling element
US-7,945,941 Flexible access control policy enforcement
A method and system for applying access-control policies. In particular implementations, a method includes determining one or more policies, and a...
US-7,945,696 Differentiated routing using tunnels in a computer network
In one embodiment, one or more tunnel mesh groups may be established in at least a portion of a computer network, where each tunnel mesh group corresponds to a...
US-7,945,695 Smart secretary
A message-processing agent receives an object from a space in a Scalable Infrastructure System. The message-processing agent determines the destination of the...
US-7,945,656 Method for determining round trip times for devices with ICMP echo disable
A method and apparatus for determining reachability of a device connected to a computer network by receiving from a requesting device at least one ICMP echo...
US-7,945,651 Method and system for network configuration
Methods and systems have been provided for pushing critical configuration to a set of network devices. According to various embodiments of the invention, a...
US-7,945,650 Identifying modular chassis composition by using network physical topology information
A method and apparatus for identifying internal occupants of a communications system apparatus with an Ethernet backplane and at least one internal occupant....
US-7,945,164 Multiple fiber optic gigabit ethernet links channelized over single optical link
A method, an apparatus, and a system where multiple lower bandwidth optic Ethernet (e.g. 1000Base-FX) signals can be interleaved or encoded onto a single fiber...
US-7,945,042 Method for switching active calls
A method and apparatus for switching active calls from one entity to another on a network device. The method includes the steps of collecting the call...
US-7,944,930 Memory buffering with fast packet information access for a network device
A networking device employing memory buffering in which a first memory is logically configured into blocks, and the blocks are logically configured into...
US-7,944,925 System and method for grouping multiple VLANs into a single 802.11 IP multicast domain
A system and method for identifying and grouping multiple virtual local area networks into a single multicast domain is provided. The system and method may be...
US-7,944,889 System and method for rate shifting for wireless VoIP
A method of rate shifting specially suited for the voice traffic, which differentiates poor channel conditions from a heavily loaded channel of a WLAN and...
US-7,944,886 Infrastructure-based enabling indication for dynamic frequency selection in wireless networks
A wireless access point selection system. In particular implementations, a method includes receiving a notification that identifies a wireless access point that...
US-7,944,875 Enforcement of user level policies from visited networks in a mobile IP environment
In one embodiment, a system for providing mobile Internet Protocol (IP) connectivity includes a memory and a processor. The memory stores one or more user level...
US-7,944,860 Preventing loss of network traffic due to inconsistent configurations within the network
In one embodiment, a method includes receiving at a processor at a node, notification of an error in a VLAN to topology mapping at the node, receiving a...
US-7,944,854 IP security within multi-topology routing
A method for IP Security within Multi-Topology Routing is disclosed. Disclosed methods may also include IKE extensions. A route eligible for IPSec protection is...
US-7,944,823 System and method for addressing dynamic congestion abatement for GSM suppression/compression
An apparatus for communicating data is provided that includes a cell site element associated with a base transceiver station and operable to receive a plurality...
US-7,944,811 Multiple multicast forwarder prevention during NSF recovery of control failures in a router
In one embodiment, a multicast router initiates non-stop forwarding (NSF) recovery. In the NDF recovery, data traffic forwarding operations continue throughout...
US-7,941,606 Identifying a flow identification value mask based on a flow identification value of a packet
Flow identification value masks are identified based on, and used to mask a flow identification value associated with packets in a router, packet switching or...
US-7,941,605 Methods and apparatus for generating a result based on a lookup result from a lookup operation using an...
Methods and apparatus are disclosed for generating a result based on a lookup result from a lookup operation using an associative memory and processing based on...
US-7,941,548 Wireless network security mechanism including reverse network address translation
Methods, apparatuses and systems directed to preventing unauthorized access to internal network addresses transmitted across wireless networks. According to the...
US-7,941,529 Periodic exporting of information over a flow protocol
In some example embodiments, a apparatus and method are shown that include receiving a subscription instruction identifying a subscription to management...
US-7,941,527 Tuning aging parameters for flows in flow-based systems
In one embodiment, flows are monitored that are open for a length of time until ending by either a distinct ending or by being silent longer than a configured...
US-7,941,515 Applying a filter set to information provided to a subscribing client
Applying a filter to state information sent from a server to a subscribing client includes receiving a subscription request from the subscribing client, where...
US-7,941,512 Use of IPv6 in access networks
An embodiment method may comprise establishing a link layer connection to an access server, obtaining a management address, wherein the management address is at...
US-7,941,502 Method and system for migrating content on a network
A method and system for migrating content on a network. In one method embodiment, the present invention accesses a directory having a network address. A...
US-7,941,435 Substring search algorithm optimized for hardware acceleration
Techniques are provided for generating a hash value for searching for substrings in a data stream without reading more than one element (e.g. one byte) at a...
US-7,941,417 Processing structured electronic document streams using look-ahead automata
In an embodiment, an XPath automaton with state look-ahead capability can efficiently determine whether XML documents, received in a stream in serialized form...
US-7,941,165 System and method for providing a proxy in a short message service (SMS) environment
According to a particular embodiment, a method for distributing messages is provided that includes receiving one or more short message service (SMS) messages....
US-7,941,140 UMA/GAN integration within a legacy location based system
In one embodiment, techniques for authorizing a mobile device are provided. A registration request is received for the mobile device. The registration request...
US-7,941,108 Method and system for automatically identifying wireless signal quality of a region
A method for automatically identifying wireless signal quality of a region includes receiving signal quality information associated with wireless signals...
US-7,940,913 System and method for improved contact center services to disabled callers
A system and method for servicing a caller at a contact center includes prompting the caller for a password associated with a certificate of disability of the...
US-7,940,787 Low-power ethernet device
In accordance with the teachings of this disclosure, an Ethernet device is provided that draws current below a predetermined voltage, and as the voltage across...
US-7,940,777 Loss-free packet networks
In one embodiment, a method can include: receiving a packet in a device; classifying the received packet as a first packet type or a second packet type; when...
US-7,940,776 Fast re-routing in distance vector routing protocol networks
In one embodiment, a method includes sending an adjacency discovery message 1 from a local router over a direct link to a first neighbor router. An adjacency...
US-7,940,769 Maintaining secrecy of assigned unique local addresses for IPV6 nodes within a prescribed site during access of...
A network includes network nodes and a gateway. Each network node has a corresponding unique in-site IPv6 address for communication within a prescribed site,...
US-7,940,765 Limiting unauthorized sources in a multicast distribution tree
Disclosed are, inter alia, methods, apparatus, data structures, computer-readable media, and mechanisms for limiting unauthorized multicast sources. One or more...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.