Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: cisco





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-7,789,308 Locating and provisioning devices in a network
Methods and devices are provided for locating, identifying and provisioning devices in a network. According to some implementations of the invention, a...
US-7,788,720 Techniques for providing security protection in wireless networks by switching modes
Techniques for security protection of a wireless network are provided. An access point is operated in a first mode. The first mode is a mode of operation that...
US-7,788,715 Authentication for transmission control protocol
An embodiment of the invention incorporates, or encapsulates, authentication mechanisms into an initiation phase of a transmission protocol session. In a...
US-7,788,704 Method and system for secure connection of peripheral device to processing device
A method, system and apparatus are provided for securely connecting a peripheral device to a processing device in a wireless network. The peripheral device makes...
US-7,788,543 Methods and systems for generating and storing computer program execution trace data
Methods and systems for generating and storing computer program execution trace data are disclosed. A method includes receiving a signal that enables the...
US-7,788,518 Bidirectional inline power port
A method and apparatus for bidirectional provision of inline power over data telecommunications cabling permits power to be received at a local powered device...
US-7,788,492 Facilitating 802.11 roaming by pre-establishing session keys
A method and system for pre-authenticating a pre-establishing key management on a roaming device prior to re-association to facilitate fast hand-off in a...
US-7,788,480 Protected dynamic provisioning of credentials
A method and implementation is disclosed for secure communication between two or more parties. A secure tunnel is established between parties using an encryption...
US-7,788,445 Intelligent allocation of programmable comparison operations for reducing the number of associative memory...
Intelligent allocation of programmable comparison operations may reduce the number of associative memory entries required for programming an associative memory...
US-7,788,407 Apparatus and methods for providing an application level gateway for use in networks
An application level gateway allows computers on a local area or "internal" network to serve data (e.g., web pages, files or other constructs) to computer...
US-7,788,393 Switching a client from unicasting to multicasting by increasing the unicast stream rate to the client
Switching a client from unicasting back to multicasting involves accumulating enough digital video content at the client to bridge the time it takes to...
US-7,788,383 Communicating a selection of a potential configuration
A first streaming media device, such as a Voice over Internet Protocol (VoIP) phone initiates a communication session with a second streaming media device. An...
US-7,788,371 Exporting management information base data using IPFIX
In one embodiment, a networking device includes logic encoded in one or more tangible media for execution and when executed operable to cause performing...
US-7,788,345 Resource allocation and reclamation for on-demand address pools
A method for on-demand management of Internet Protocol (IP) address pools includes allocating an unused IP address from a local IP address pool designated for a...
US-7,787,900 Advanced signaling for multi-stage transceivers
Systems and methods for advanced signaling between stages of transmitters and/or receivers in a digital communication system. One or more intermediate frequency...
US-7,787,897 Method for up-link transmit power management in a wireless broadband terminal
A method is disclosed for optimizing up-link transmit powers of a wireless broadband terminal operating in a predetermined frequency band in a multi-carrier...
US-7,787,611 Packet telephony bridging server
A bridging server instantiates virtual packet telephones that emulate physical packet telephone instruments, and includes a switch operative to establish...
US-7,787,607 Mobile device calls via private branch exchange
Communication systems and methods are described that enable mobile devices to route telephone calls via an enterprise telephone system. The communication system...
US-7,787,497 System for grouping attributes in packets in a radius protocol
A system for inserting data into data packets of a protocol for transmitting network information between processing systems connected to a network. The system...
US-7,787,478 Managing traffic within and between virtual private networks when using a session border controller
Methods and devices for managing traffic at a session border controller (SBC) are described. A signal portion of traffic en route from a source in a virtual...
US-7,787,465 System and method for providing source awareness in a wireless application protocol network environment
A method for communicating in a wireless application protocol (WAP) network environment is provided that includes receiving a request packet at a WAP gateway and...
US-7,787,464 Traffic monitor using leaky bucket with variable fill
An integrated circuit monitors the most active traffic flow rates on a communications network by using a leaky bucket model having a variable fill rate. As a...
US-7,787,462 Applying features to packets in the order specified by a selected feature order template
Disclosed are, inter alia, methods, apparatus, data structures, computer-readable media, mechanisms, and means for applying features to packets in an order...
US-7,787,449 Butterfly network with switches set for two node disjoint paths and method for forming the paths
In a butterfly network, a number of switches are set to provide two paths that are independent of each other, from a first switch to a second switch, and from...
US-7,787,414 Reserving network resources for a communication session
Requesting a network resource includes facilitating a communication session between a mobile node and an endpoint. A trigger event is received at a first anchor...
US-7,787,404 Method and apparatus for measuring latency of a computer network
A method for operating a computer network has a source router transmit a first message to be received by an intermediate router of the computer network, the...
US-7,787,401 Using mini-beacons in a wireless network
A method, apparatus, and software containing computer readable code to implement the method implemented in a first wireless device, e.g., an access point. The...
US-7,787,396 Automatic ORF-list creation for route partitioning across BGP route reflectors
A method, apparatus and computer program product for providing Outbound Route Filtering (ORF) is presented. An ORF list is produced and an ORF filter is built...
US-7,787,386 Method and system for self-testing a line card
According to one embodiment of the invention, a method for self-testing a portion of a line card having a digital signal processor for manipulating data received...
US-7,787,379 Integrated flow control
Described herein is a flow control scheme suitably adaptable to Transmission Control Protocol (TCP) and Stream Control Transmission Protocol (SCTP). In an...
US-7,787,373 Method and apparatus for providing secure blast calls
Various embodiments provide a method and apparatus for providing secure blast calls. An example embodiment includes a secure blast call apparatus including a...
US-7,787,363 Dual-purpose uplinks used in a fault-tolerant stack
A fault-tolerant stack of low cost switches each having only two dual-purpose uplinks is enabled by utilizing a specified topology for connecting the uplinks and...
US-7,787,361 Hybrid distance vector protocol for wireless mesh networks
A method of hybrid route discovery in a mesh network is described. The method comprises the optional designation of a root node of the mesh network and...
US-7,787,360 System and method for preserving multicast data forwarding during control failures in a router
A multicast non-stop forwarding (NSF) router architecture enhances high availability of a multicast router in a computer network. The router architecture further...
US-7,786,861 Detecting theft and disabling stolen equipment
Some implementations of the present invention provide methods and devices for detecting the theft of, and disabling, electronic devices such as computers and...
US-7,784,755 Clip assembly
A clip assembly having first and second clip members. In an example embodiment the first and second clip members are generally matching. Each clip member...
US-D622,711 Power line communication device
US-7,784,055 Method and apparatus for routing data to a load balanced server using MPLS packet labels
A method of routing data to a load-balanced server through a network having one or more load-balancing nodes is disclosed, comprising receiving a label value;...
US-7,784,036 Methods and systems for transforming a parse graph into an and/or command tree
Methods and systems for transforming a complex representation of computer code into a simplified representation of computer code are described. Parse nodes in a...
US-7,783,805 Interlocking input/outputs on a virtual logic unit number
In one embodiment, a solution is provided wherein a lock client sends lock requests to a lock manager upon receipt of an input/output (I/O) and receives back a...
US-7,783,688 Method and apparatus to scale and unroll an incremental hash function
A method and apparatus speeding up an incremental hash function is described. The method may comprise receiving a data string including a plurality of N data...
US-7,783,284 Method and apparatus for site administration at a wireless handset
A method for site administration includes receiving a user's instruction to invoke a tool at a wireless handset. The method also includes invoking execution of...
US-7,782,898 Wideband cable system
A wideband cable modem system increases available bandwidth of a single channel by encoding a data stream into wideband packets. The wideband packets are...
US-7,782,885 System and method for queue management using queue sets
The disclosure describes queue management based on queue sets. A queue set comprises a group of packets or packet references that are processed as a single...
US-7,782,881 Method and apparatus for traffic quality and billing authorization by request token insertion
Internet services are differentiated by including user-reflexive data with a user request. The user-reflexive data may specify a quality of service to be...
US-7,782,859 Enhanced packet classification
A method for classifying a data packet containing a header is provided. The method may comprise parsing the header of a data packet into header elements. Rules...
US-7,782,858 Validating internal routing protocol information passed through an external routing protocol
In one embodiment, a method includes receiving authenticated site data that includes site ID data and address data. The site ID data indicates a unique site ID...
US-7,782,841 Method and system for transporting data using pseudowire circuits over a bridged network
A method for data communication across a layer 2 bridged network having two or more edge nodes configured for receiving and transmitting multiprotocol data...
US-7,782,824 Method and system for handling a mobile endpoint in a wireless network
A method of handling a mobile endpoint in a wireless network includes routing data for a mobile endpoint through a first base station. The mobile endpoint is...
US-7,782,790 Extensions to the path verification protocol to support link bundling constructs
To reveal link bundles' component links in an MPLS network, transmit a sequence of request and reply packets. For a router receiving a request packet, the packet...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.