At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Multitenant-aware protection service
Implementing a data protection service. One method includes receiving a request to provision a first tenant among a plurality of tenants managed by a single...
Secure credential unlock using trusted execution environments
Computing devices utilizing trusted execution environments as virtual smart cards are designed to support expected credential recovery operations when a user...
Securing passwords against dictionary attacks
Described herein are various technologies pertaining to constructions of a password-based authentication protocol that are configured to allow a user to...
Memory usage scanning
A memory scanning system may scan memory objects to determine usage frequency by scanning each memory object using a mapping of the processes stored in memory....
Crisscross cancellation protocol
Technologies, systems, and methods for ordered message delivery that avoid message races or crisscrosses between communicating nodes. For example, if Node A...
API supporting server and key based networking
An application programming interface (API) supporting server and key based networking is described. In an embodiment, the API receives either a key or a server...
Hierarchically disassembling messages
The present invention extends to methods, systems, and computer program products for hierarchically disassembling messages. The functionality of disassemblers...
Intercepting file transfers in multi-node topologies
A system and method for intercepting and processing a payload sent between clients. A home server determines the roles that are intermediate to the clients by...
Message queue behavior optimizations
Network and storage calls are reduced by batching messages. Messages are collected from a client and sent to the gateway or backend application in one round...
Roaming profiles and application compatibility in multi-user systems
Systems, methods, and computer-readable storage media are disclosed for roaming profiles and application compatibility in multi-user systems. In an embodiment,...
Identity management user experience
Upon requesting to share one or more types of identity information, a user is automatically presented with an interface through which the user can interact in...
Dynamically splitting multi-tenant databases
An online service includes managed databases that include one or more tenants (e.g. customers, users). A multi-tenant database may be split between two or more...
A plurality of web documents that include indicators corresponding to one or more selectable like objects may be obtained. A corresponding web domain associated...
Suggesting related search queries during web browsing
Described is the presenting of suggested queries for web pages that are not search engine results pages, based upon the URL and/or content of a currently...
Storing temporary state data in separate containers
A temporary state service protocol is utilized by clients to temporarily store and access data within rows of a database between different requests made by end...
Media library synchronizer
A system and method is disclosed for selectively synchronizing, with a media library, media files within folders of a filing system. This system and method can...
Predicting escalation events during information searching and browsing
Escalations in users' goals or concerns in web-based searching and browsing may be predicted. An escalation feature is extracted from a webpage and run through...
Mobile device which automatically determines operating mode
A mobile device such as a cell phone is used to remotely control an electronic appliance such as a television or personal computer. In a setup phase, the mobile...
Enforcing device settings for mobile devices
The present invention extends to methods, systems, and computer program products for enforcing device settings for mobile devices. Generally, a computer system...
Adaptive action detection
Described is providing an action model (classifier) for automatically detecting actions in video clips, in which unlabeled data of a target dataset is used to...
Techniques to manage presence information based on routing rules
Techniques to manage presence information based on routing rules are described. An apparatus may comprise a presence management component operative to manage...
Rendering global light transport in real-time using machine learning
Some implementations disclosed herein provide techniques and arrangements to render global light transport in real-time or near real-time. For example, in a...
Generation of avatar reflecting player appearance
Systems, methods, and computer media for generating an avatar reflecting a player's current appearance. Data describing the player's current appearance is...
An apparatus and method is provided for controlling a display device for displaying a user interface associated with an application. A processor for controlling...
Touch input data handling
A system for enabling a tablet input object is described. A tablet input object can take various inputs from touch, a mouse, and a pen and sends their...
Touch-scrolling pad for computer input devices
In embodiments of a touch-scrolling pad for computer input devices, a touch sensor strip detects touch contacts on a touch-scrolling pad that is implemented for...
Display environment for a plurality of display devices
A display environment for a plurality of display devices is described. In one or more implementations, a display environment of an operating system of a...
Extended and editable gamer profile
A user profile for an online gaming service is created. The user profile contains user gaming information received from a first location. The user profile is...
Generating developer license to execute developer application
One or more techniques and/or systems are disclosed for generating a developer license that allows a developer application to run on developer machine. A user...
Communication between web applications
In an embodiment, communication is controlled between a service provider web application executed in a first web browser instance on a device platform of the...
Measurement and reporting of set top box inserted AD impressions
Methods are disclosed for measuring ad impressions and receiving feedback on local ad assets inserted into a video transport stream at the set top box level....
Device identification using device functions
Device identification techniques using identifiable device functions are described. In one or more implementations, data is obtained that describes functions of...
Deterministic sharing of data among concurrent tasks using pre-defined
deterministic conflict resolution policies
A "Concurrent Sharing Model" provides a programming model based on revisions and isolation types for concurrent revisions of states, data, or variables shared...
Processing singleton task(s) across arbitrary autonomous server instances
Large scale internet services may be implemented using multiple discrete server instances. Some tasks of the large scale internet services may be singleton...
Out-of-band framework libraries within applications
An enhanced binder provides flexibility and certainty when selecting a version of a software library to load, and an enhanced loader prevents a library version...
Application testing and analysis
Application testing and analysis may include performing perturbations to affect an environment associated with the application executing on a user device...
Automated testing of application program interfaces using genetic
Various embodiments enable automated testing of Application Program Interfaces (APIs) by abstracting API call signatures and processing the abstracted API call...
Component-oriented architecture for web mashups
A component-oriented web mashup system and method for communicating between component-oriented Web gadgets to facilitate secure Web mashups. Embodiments of the...
A note-capture application is disclosed that allows notes to be displayed on the lock screen. In one embodiment, a note-capture application can be invoked when...
Interactive scrollbars for unknown data size
Scrollbar control is utilized for manually scanning for displayed/available information while controlling the amount of information that is actually...
Portal for submitting business metadata for services
A user interface display provides access to an analysis portal that receives customized code for a business data system. The code is provided through the user...
Content gestures are described. In implementations, one or more controls are output to control output of content and for display in a user interface by a...
Population of lists and tasks from captured voice and audio content
Automatic capture and population of task and list items in an electronic task or list surface via voice or audio input through an audio recording-capable mobile...
User-specified phrase input learning
Architecture that enables a user to perform manual word-breaking by phrase input. Phrase input is where the user inserts a phrase-key (or separator) as a...
Creating cross-tabular reports
Cross-tabular reports may be automatically created by a computer from received source data. After receiving the source data, the computer may determine...
Virtual machine memory management in systems with asymmetric memory
A system is described herein that includes a predictor component that predicts accesses to portions of asymmetric memory pools in a computing system by a...
Platform for enabling terminal services virtualization
Disclosed are techniques for providing a platform and application program interface (API) that leverages a terminal services session broker infrastructure to...
Offline resource allocation algorithms
Various embodiments provide offline algorithms for resource allocation. A known set of "offline" requests may be matched to available resources using an online...
Dynamic control of an electronic message system
Methods of dynamic control of an electronic message system are described. In an embodiment, a system which is separate from a messaging service within the...
Generating activities based upon social data
A method described herein includes acts of receiving data from a social networking application, wherein the data is generated by a first individual, and...