At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Determining audience state or interest using passive sensor data
This document describes techniques and apparatuses for determining an audience's state or interest using passive sensor data. The techniques receive sensor data...
Displaying video call data
A device comprising: a display; an interface configured to exchange video data between the device and a network during a video call between a user of the device...
Enhanced content consumption
Enhanced content consumption is provided by establishing a pairing between two computing devices, wherein at least one of the two computing devices provides a...
Virtual machine provisioning engine
Embodiments described herein extend to methods, systems, and computer program products for setting up, configuring, and customizing one or more virtual...
Disinfecting touch-based screen automatically
A UV and visible light transparent film material is secured onto or within a touch-based screen to automatically disinfect the external surface. UV light is...
Active speaker location detection
Various examples related to determining a location of an active speaker are provided. In one example, image data of a room from an image capture device is...
Load balanced and prioritized data connections
In embodiments of load balanced and prioritized data connections, a first connection is established to communicate first data from a first server to a second...
Anonymous verifiable public key certificates
The anonymity of a user at a client computer may be preserved when authenticating with an on-line service or content provider through the use of an anonymous...
Gesture detection and recognition
A gesture detection and recognition technique is described. In one example, a sequence of data items relating to the motion of a gesturing user is received. A...
Apparatus for object information detection and methods of using same
A system for determining information regarding at least one object, comprising: a sensor sensitive to capacitive coupling; at least one object adapted to create...
Display screen with graphical user interface
Subscriber identification module pooling
Pools of cellular devices share same provisioning profiles for cellular (over-the-air) provisioning connectivity. Conceptually, a limited pool of one or more...
Determining a maximum inscribed size of a rectangle
Embodiments perform an iterative process for enlarging a rectangle having a fixed aspect ratio within a convex polygon to find the largest rectangular area...
Competitive photo rig
A specialized multi-smartphone rig is configured to simultaneously hold and operate multiple camera-equipped smartphones to enable capture of the same image by...
The disclosure pertains to a communication system for effecting a voice or video call between at least a source user speaking a source language and a target...
Managing and implementing web application data snapshots
Embodiments are directed to locally storing a snapshot of a personal information management web application, efficiently booting a personal information...
Monitoring the life cycle of a computer network connection
Monitoring of a life cycle of a connection of a network client device to a network via monitoring time synchronization traffic flowing between one or more...
Disabling prohibited content and identifying repeat offenders in service
provider storage systems
Objects in a shared storage system can be marked as including prohibited content. Incidents that result in objects being so marked can be stored in an incident...
Automatic provisioning of a device to access an account
A system for bootstrap provisioning of a device is provided. A vouching device is provisioned to access a bootstrap account of a bootstrap account provider and...
Session-based device configuration
Techniques for session-based device configuration are described. According to one or more implementations, various settings of a wireless device are configured...
Uplink MIMO transmission from mobile communications devices
Uplink transmission from a mobile device having multiple antennas to a base station having multiple antennas includes transmitting in an open-loop single-user...
Hermaphroditic electrical connector
The subject matter described herein relates to a hermaphroditic electrical connector. Embodiments of the hermaphroditic electrical connector and a method of...
Memory system with a content addressable superconducting memory
A memory system including a content addressable memory having an array of content addressable memory elements including a plurality of rows of content...
Augmented reality extrapolation techniques
Augmented reality extrapolation techniques are described. In one or more implementations, a frame of an augmented-reality display is rendered based at least in...
Photo-realistic synthesis of three dimensional animation with facial
features synchronized with speech
Dynamic texture mapping is used to create a photorealistic three dimensional animation of an individual with facial features synchronized with desired speech....
Operation chart rescaling
Techniques for operation chart rescaling are described. In at least some embodiments, an operations chart is provided that tracks various parameters for an...
Tracking using sensor data
Tracking using sensor data is described, for example, where a plurality of machine learning predictors are used to predict a plurality of complementary, or...
Shape recognition using partial shapes
Shape recognition is performed based on determining whether one or more ink strokes is not part of a shape or a partial shape. Ink strokes are divided into...
Inferring spatial object descriptions from spatial gestures
Three-dimensional (3-D) spatial image data may be received that is associated with at least one arm motion of an actor based on free-form movements of at least...
Isolation and presentation of untrusted data
Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application....
Augmenting system restore with malware detection
An anti-malware program monitors the behavior of a system after a system restore to determine the likelihood of a hidden infection of malicious code still...
A user may utilize an existing digital identity to authorize the user's access to security-enabled device operations, where the security-enabled device...
Identifying mathematical operators in natural language text for
Disclosed herein is a system and method for taking a snapshot or input from a source and identifying appropriate documents in a knowledge base that are...
Generating programs based on input-output examples using converter modules
A program generation system is described that generates a program based on a plurality of input-output examples. The input-output examples include input items...
Allocation of tenants to database services
A method to automatically allocate tenants to database services includes determining a query plan based on a workload for each tenant. A distance metric is...
Using cinematic techniques to present data
The present invention extends to methods, systems, and computer program products for using cinematic techniques to present data. Embodiments of the invention...
Managing object lifetime in a cyclic graph
The present invention extends to methods, systems, and computer program products for managing object lifetime in a cyclic graph. Embodiments of the invention...
Registering, transferring, and acting on event metadata
A technique and associated mechanism is described for registering event metadata at a first site, transferring the event metadata to a second site using a...
Filled translation for bootstrapping language understanding of
Annotated training data (e.g., sentences) in a first language are used to generate annotated training data for a second language. For example, annotated...
User-centric soft keyboard predictive technologies
An apparatus and method are disclosed for providing feedback and guidance to touch screen device users to improve text entry user experience and performance by...
Using shared virtual memory resources for performing memory-mapping
Functionality is described herein for memory-mapping an information unit (such as a file) into virtual memory by associating shared virtual memory resources...
Diagnostic workflow for production debugging
A diagnostic workflow file can be used to control the future diagnostic actions taken by a debugger without user interaction with the debugger when it executes....
Determining relevant events in source code analysis
In embodiments of determining relevant events in source code analysis, a computing device includes a key event manager that is implemented to traverse...
Dynamically scalable data collection and analysis for target device
A telemetry module integrated with an application may include a data collection and analysis engine configured to perform data collection and analysis for...
Destination list associated with an application launcher
A computer application launcher can be displayed. In response to receiving a first user input associated with the launcher while a computer application...
User-specific roaming settings
Disclosed herein is a roaming settings service that receives an update to roaming settings specific to a user that is initiated by an instance of an application...
Multiphased profile guided optimization
Multiphased profile guided optimization optimizes executable code based on data collected during multiple training runs of a training executable. In multiphased...
B-file abstraction for efficiently archiving self-expiring data
Systems and methods are provided for data processing and storage management. In an illustrative implementation an exemplary computing environment comprises at...
Low-latency touch-input device
This document describes embodiments of a low-latency touch-input device. The low-latency touch-input device receives writing as input to the device and...
Content transfer to non-running targets
Techniques and apparatuses for content transfers to non-running targets in a multi-application environment are described herein. In one or more implementations,...