Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: cisco





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-7,787,607 Mobile device calls via private branch exchange
Communication systems and methods are described that enable mobile devices to route telephone calls via an enterprise telephone system. The communication system...
US-7,787,497 System for grouping attributes in packets in a radius protocol
A system for inserting data into data packets of a protocol for transmitting network information between processing systems connected to a network. The system...
US-7,787,478 Managing traffic within and between virtual private networks when using a session border controller
Methods and devices for managing traffic at a session border controller (SBC) are described. A signal portion of traffic en route from a source in a virtual...
US-7,787,465 System and method for providing source awareness in a wireless application protocol network environment
A method for communicating in a wireless application protocol (WAP) network environment is provided that includes receiving a request packet at a WAP gateway and...
US-7,787,464 Traffic monitor using leaky bucket with variable fill
An integrated circuit monitors the most active traffic flow rates on a communications network by using a leaky bucket model having a variable fill rate. As a...
US-7,787,462 Applying features to packets in the order specified by a selected feature order template
Disclosed are, inter alia, methods, apparatus, data structures, computer-readable media, mechanisms, and means for applying features to packets in an order...
US-7,787,449 Butterfly network with switches set for two node disjoint paths and method for forming the paths
In a butterfly network, a number of switches are set to provide two paths that are independent of each other, from a first switch to a second switch, and from...
US-7,787,414 Reserving network resources for a communication session
Requesting a network resource includes facilitating a communication session between a mobile node and an endpoint. A trigger event is received at a first anchor...
US-7,787,404 Method and apparatus for measuring latency of a computer network
A method for operating a computer network has a source router transmit a first message to be received by an intermediate router of the computer network, the...
US-7,787,401 Using mini-beacons in a wireless network
A method, apparatus, and software containing computer readable code to implement the method implemented in a first wireless device, e.g., an access point. The...
US-7,787,396 Automatic ORF-list creation for route partitioning across BGP route reflectors
A method, apparatus and computer program product for providing Outbound Route Filtering (ORF) is presented. An ORF list is produced and an ORF filter is built...
US-7,787,386 Method and system for self-testing a line card
According to one embodiment of the invention, a method for self-testing a portion of a line card having a digital signal processor for manipulating data received...
US-7,787,379 Integrated flow control
Described herein is a flow control scheme suitably adaptable to Transmission Control Protocol (TCP) and Stream Control Transmission Protocol (SCTP). In an...
US-7,787,373 Method and apparatus for providing secure blast calls
Various embodiments provide a method and apparatus for providing secure blast calls. An example embodiment includes a secure blast call apparatus including a...
US-7,787,363 Dual-purpose uplinks used in a fault-tolerant stack
A fault-tolerant stack of low cost switches each having only two dual-purpose uplinks is enabled by utilizing a specified topology for connecting the uplinks and...
US-7,787,361 Hybrid distance vector protocol for wireless mesh networks
A method of hybrid route discovery in a mesh network is described. The method comprises the optional designation of a root node of the mesh network and...
US-7,787,360 System and method for preserving multicast data forwarding during control failures in a router
A multicast non-stop forwarding (NSF) router architecture enhances high availability of a multicast router in a computer network. The router architecture further...
US-7,786,861 Detecting theft and disabling stolen equipment
Some implementations of the present invention provide methods and devices for detecting the theft of, and disabling, electronic devices such as computers and...
US-7,784,755 Clip assembly
A clip assembly having first and second clip members. In an example embodiment the first and second clip members are generally matching. Each clip member...
US-D622,711 Power line communication device
US-7,784,055 Method and apparatus for routing data to a load balanced server using MPLS packet labels
A method of routing data to a load-balanced server through a network having one or more load-balancing nodes is disclosed, comprising receiving a label value;...
US-7,784,036 Methods and systems for transforming a parse graph into an and/or command tree
Methods and systems for transforming a complex representation of computer code into a simplified representation of computer code are described. Parse nodes in a...
US-7,783,805 Interlocking input/outputs on a virtual logic unit number
In one embodiment, a solution is provided wherein a lock client sends lock requests to a lock manager upon receipt of an input/output (I/O) and receives back a...
US-7,783,688 Method and apparatus to scale and unroll an incremental hash function
A method and apparatus speeding up an incremental hash function is described. The method may comprise receiving a data string including a plurality of N data...
US-7,783,284 Method and apparatus for site administration at a wireless handset
A method for site administration includes receiving a user's instruction to invoke a tool at a wireless handset. The method also includes invoking execution of...
US-7,782,898 Wideband cable system
A wideband cable modem system increases available bandwidth of a single channel by encoding a data stream into wideband packets. The wideband packets are...
US-7,782,885 System and method for queue management using queue sets
The disclosure describes queue management based on queue sets. A queue set comprises a group of packets or packet references that are processed as a single...
US-7,782,881 Method and apparatus for traffic quality and billing authorization by request token insertion
Internet services are differentiated by including user-reflexive data with a user request. The user-reflexive data may specify a quality of service to be...
US-7,782,859 Enhanced packet classification
A method for classifying a data packet containing a header is provided. The method may comprise parsing the header of a data packet into header elements. Rules...
US-7,782,858 Validating internal routing protocol information passed through an external routing protocol
In one embodiment, a method includes receiving authenticated site data that includes site ID data and address data. The site ID data indicates a unique site ID...
US-7,782,841 Method and system for transporting data using pseudowire circuits over a bridged network
A method for data communication across a layer 2 bridged network having two or more edge nodes configured for receiving and transmitting multiprotocol data...
US-7,782,824 Method and system for handling a mobile endpoint in a wireless network
A method of handling a mobile endpoint in a wireless network includes routing data for a mobile endpoint through a first base station. The mobile endpoint is...
US-7,782,790 Extensions to the path verification protocol to support link bundling constructs
To reveal link bundles' component links in an MPLS network, transmit a sequence of request and reply packets. For a router receiving a request packet, the packet...
US-7,782,786 Technique for providing dynamic modification of application specific policies in a feedback-based, adaptive...
A feedback-based adaptive network is described wherein at least a portion of the network elements report operating information relating to network conditions to...
US-7,782,784 Port analyzer adapter
Methods and devices are provided for encapsulating FC frames from a network device as Ethernet frames. Preferably, the FC frames represent traffic for a...
US-7,782,774 TCP optimized single rate policer
An extension to the conventional single rate microflow policer that provides dual rate policing with a minimum of extra resource utilization. Using the extended...
US-7,782,761 Ethernet connectivity fault management (CFM) area boundary translator
An Ethernet Connectivity Fault Management (CFM) Area Boundary Translator is configured to translate incompatible CFM messages being sent between networks...
US-7,779,471 Method and system for preventing DOS attacks
A method, system and apparatus for preventing Denial of Service (DOS) attacks on a device are provided. The method includes determining that the device is...
US-7,779,420 Verifying information stored on a managed network device
A method and mechanism for verifying information on a managed device is provided. A request is received at a managed device that contains one or more values that...
US-7,779,404 Managing network device configuration using versioning and partitioning
Configuration versioning and partitioning are provided as methods for managing large configuration for a network element such as a router or switch. In one...
US-7,779,398 Methods and systems for extracting information from computer code
Methods and systems for manipulating information represented by computer code are described. Macroinstructions that are used to analyze an input are accessed....
US-7,779,303 Targeted regression testing
A software testing method. In particular implementations, a method includes accessing a first database of one or more bug entries, wherein each bug entry...
US-7,779,134 Using modem profiles to improve connectivity, connect timing, and compression performance on a modem relay (MR)...
Cached or predictive negotiation of compression parameters over a modem relay network connection involves method and apparatus for determining at a gateway the...
US-7,779,126 System and method for propagating filters
A method and system for propagating filters to an upstream device. The method includes generating a filter at a first network device and sending information on...
US-7,779,093 Proxy for network address allocation
This invention provides a method and apparatus for issuing or renewing a host address. The apparatus has an input device to receive a data packet having a host...
US-7,778,549 Unidirectional drop and continue using bidirectional transponder
Systems and methods for unidirectional communication in an optical network employing bidirectional transponders are provided. The modulation and amplification...
US-7,778,409 Enabling cisco legacy power to support IEEE 802.3 AF standard power
An apparatus and method for enabling Cisco legacy power to support IEEE 802.3af standard power. A network power system capable of delivering data terminal...
US-7,778,404 System and method for providing a dial plan conversion in a session initiation protocol (SIP) environment
A method to be executed in a session initiation protocol (SIP) environment is provided that includes initiating a conversion process that involves a change from...
US-7,778,393 System and method for end-to-end communications tracing
A method for tracing communications includes receiving trace criteria from a first remote element and determining whether a call signaling message matches the...
US-7,778,278 System and method for implementing dynamic suppression and recreation of suppressed data in a communications...
A method for communicating data is provided that includes receiving a plurality of bits associated with a communications flow and determining whether one or more...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.