At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Binding users to a gesture based system and providing feedback to the
Techniques for managing a set of states associated with a capture device are disclosed herein. The capture device may detect and bind to users, and may provide...
Floating command object
A floating command object is provided for offering a set of commonly or frequently used commands in close proximity to a selected text, data or other object in...
Command user interface for displaying multiple sections of software
To increase command-access efficiency and to optimize a user's available user interface work space, an improved user interface is provided for displaying...
Virtual keyboard text replication
Text that is selected at a virtual keyboard is submitted to and displayed at an application data field another data field, such as a keyboard data field, that...
Presenting an application change through a tile
This document describes techniques and apparatuses for presenting an application change through a tile. These techniques enable a user to see content associated...
Calendaring between user profiles
Calendar items can be scheduled with a joined group of user profiles. Scheduling calendar items can include, for each of the calendar items, sending a calendar...
Dynamic visualization generation and implementation
Embodiments are directed to selecting and applying data-specific presentations, to adaptively selecting visual presentations based on historical data and to...
Dynamic optimization of available display space
Embodiments provide for systems, methods, and computer program products for optimizing content rendered at a display unit by dynamically formatting the content...
Content flow through containers
Content can be flowed through one or more containers that can be laid out analogously to printed material. Content is flowed into the first specified container...
Informed partitioning of data in a markup-based document
One or more techniques and/or systems are provided for displaying a first portion of a markup language document on a first device and displaying a second...
MIME handling security enforcement
A model restricts un-trusted data/objects from running on a user's machine without permission. The data is received by a protocol layer that reports a MIME type...
Multitenant-aware protection service
Implementing a data protection service. One method includes receiving a request to provision a first tenant among a plurality of tenants managed by a single...
Secure credential unlock using trusted execution environments
Computing devices utilizing trusted execution environments as virtual smart cards are designed to support expected credential recovery operations when a user...
Securing passwords against dictionary attacks
Described herein are various technologies pertaining to constructions of a password-based authentication protocol that are configured to allow a user to...
Memory usage scanning
A memory scanning system may scan memory objects to determine usage frequency by scanning each memory object using a mapping of the processes stored in memory....
Crisscross cancellation protocol
Technologies, systems, and methods for ordered message delivery that avoid message races or crisscrosses between communicating nodes. For example, if Node A...
API supporting server and key based networking
An application programming interface (API) supporting server and key based networking is described. In an embodiment, the API receives either a key or a server...
Hierarchically disassembling messages
The present invention extends to methods, systems, and computer program products for hierarchically disassembling messages. The functionality of disassemblers...
Intercepting file transfers in multi-node topologies
A system and method for intercepting and processing a payload sent between clients. A home server determines the roles that are intermediate to the clients by...
Message queue behavior optimizations
Network and storage calls are reduced by batching messages. Messages are collected from a client and sent to the gateway or backend application in one round...
Roaming profiles and application compatibility in multi-user systems
Systems, methods, and computer-readable storage media are disclosed for roaming profiles and application compatibility in multi-user systems. In an embodiment,...
Identity management user experience
Upon requesting to share one or more types of identity information, a user is automatically presented with an interface through which the user can interact in...
Dynamically splitting multi-tenant databases
An online service includes managed databases that include one or more tenants (e.g. customers, users). A multi-tenant database may be split between two or more...
A plurality of web documents that include indicators corresponding to one or more selectable like objects may be obtained. A corresponding web domain associated...
Suggesting related search queries during web browsing
Described is the presenting of suggested queries for web pages that are not search engine results pages, based upon the URL and/or content of a currently...
Storing temporary state data in separate containers
A temporary state service protocol is utilized by clients to temporarily store and access data within rows of a database between different requests made by end...
Media library synchronizer
A system and method is disclosed for selectively synchronizing, with a media library, media files within folders of a filing system. This system and method can...
Predicting escalation events during information searching and browsing
Escalations in users' goals or concerns in web-based searching and browsing may be predicted. An escalation feature is extracted from a webpage and run through...
Mobile device which automatically determines operating mode
A mobile device such as a cell phone is used to remotely control an electronic appliance such as a television or personal computer. In a setup phase, the mobile...
Enforcing device settings for mobile devices
The present invention extends to methods, systems, and computer program products for enforcing device settings for mobile devices. Generally, a computer system...
Adaptive action detection
Described is providing an action model (classifier) for automatically detecting actions in video clips, in which unlabeled data of a target dataset is used to...
Techniques to manage presence information based on routing rules
Techniques to manage presence information based on routing rules are described. An apparatus may comprise a presence management component operative to manage...
Rendering global light transport in real-time using machine learning
Some implementations disclosed herein provide techniques and arrangements to render global light transport in real-time or near real-time. For example, in a...
Generation of avatar reflecting player appearance
Systems, methods, and computer media for generating an avatar reflecting a player's current appearance. Data describing the player's current appearance is...
An apparatus and method is provided for controlling a display device for displaying a user interface associated with an application. A processor for controlling...
Touch input data handling
A system for enabling a tablet input object is described. A tablet input object can take various inputs from touch, a mouse, and a pen and sends their...
Touch-scrolling pad for computer input devices
In embodiments of a touch-scrolling pad for computer input devices, a touch sensor strip detects touch contacts on a touch-scrolling pad that is implemented for...
Display environment for a plurality of display devices
A display environment for a plurality of display devices is described. In one or more implementations, a display environment of an operating system of a...
Extended and editable gamer profile
A user profile for an online gaming service is created. The user profile contains user gaming information received from a first location. The user profile is...
Generating developer license to execute developer application
One or more techniques and/or systems are disclosed for generating a developer license that allows a developer application to run on developer machine. A user...
Communication between web applications
In an embodiment, communication is controlled between a service provider web application executed in a first web browser instance on a device platform of the...
Measurement and reporting of set top box inserted AD impressions
Methods are disclosed for measuring ad impressions and receiving feedback on local ad assets inserted into a video transport stream at the set top box level....
Device identification using device functions
Device identification techniques using identifiable device functions are described. In one or more implementations, data is obtained that describes functions of...
Deterministic sharing of data among concurrent tasks using pre-defined
deterministic conflict resolution policies
A "Concurrent Sharing Model" provides a programming model based on revisions and isolation types for concurrent revisions of states, data, or variables shared...
Processing singleton task(s) across arbitrary autonomous server instances
Large scale internet services may be implemented using multiple discrete server instances. Some tasks of the large scale internet services may be singleton...
Out-of-band framework libraries within applications
An enhanced binder provides flexibility and certainty when selecting a version of a software library to load, and an enhanced loader prevents a library version...
Application testing and analysis
Application testing and analysis may include performing perturbations to affect an environment associated with the application executing on a user device...
Automated testing of application program interfaces using genetic
Various embodiments enable automated testing of Application Program Interfaces (APIs) by abstracting API call signatures and processing the abstracted API call...
Component-oriented architecture for web mashups
A component-oriented web mashup system and method for communicating between component-oriented Web gadgets to facilitate secure Web mashups. Embodiments of the...
A note-capture application is disclosed that allows notes to be displayed on the lock screen. In one embodiment, a note-capture application can be invoked when...