At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Operating system supporting cost aware applications
A mobile computing device that supports cost-aware application components for operation over a metered network. A current basis for computing usage charges over...
Interactive concept learning in image search
An interactive concept learning image search technique that allows end-users to quickly create their own rules for re-ranking images based on the image...
Automatic depth camera aiming
Automatic depth camera aiming is provided by a method which includes receiving from the depth camera one or more observed depth images of a scene. The method...
Role-based distributed key management
Implementations for providing role-based distributed key management (DKM) replication are described. A server node receives a request from a requester node to...
Catching up with an ongoing conference call
Various technologies described herein pertain to retaining content of a conference call for accelerated replay. The content of the conference call can be...
Communication signal decoding and soft demapping
Symbol detection and soft demapping methods and systems are provided. Individual subset symbol detection according to one or more embodiments involves...
A method of generating a compressed video stream, comprising: providing a plurality of display commands which represents a display; generating a plurality of...
Data packet routing
Among other things, one or more techniques and/or system are provided for routing a data packet. Because the data packet may correspond to a source device...
One-to-many and many-to-one communications on a network
Some implementations include routing and/or delivering communications within a network system. In one example, a packet source may be configured to recursively...
Updating old media with configurable entities
The claimed subject matter relates to an architecture that can provide configurable entities in connection with electronic archival of print-based media. In...
A depth image of a scene may be received, observed, or captured by a device. The depth image may then be analyzed to determine whether the depth image includes...
Transparent display assembly
In embodiments of a transparent display assembly, a display device includes a display panel system that is located between a first display surface and a second...
Physical characteristics based user identification for matchmaking
One or more physical characteristics of each of multiple users are detected. These physical characteristics of a user can include physical attributes of the...
Providing a security boundary
In order to enable potentially conflicting applications to execute on the same computer, application programming interface (API) calls are intercepted when an...
Isolation and presentation of untrusted data
Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application....
Secure push and status communication between client and server
Systems and methods of authentication and authorization between a client, a server, and a gateway to facilitate communicating a message between a client and a...
Model for managing hosted resources using logical scopes
A hosted resource management system is described herein that provides systems and methods whereby a cloud-based tenant can define a logical model that allows...
Efficient resumption of co-routines on a linear stack
Unsuspended co-routines are handled by the machine call stack mechanism in which the stack grows and shrinks as recursive calls are made and returned from. When...
Device flag techniques are described. In one or more implementations, responsive to detection by a computing device that a device has been communicatively...
Entering technical formulas
The claimed subject matter provides a method for entering technical formulas. The method includes receiving a sequence of inputs on a computing device. The...
Web page application controls
A web page behavior control (WPBC) menu is provided on a rendered web page for enabling a user to perform actions on a portion of the web page content such as...
Private pinning including task bar pinning and jump list task and item
Various embodiments provide a mechanism to allow end users to install web applications and websites onto their desktop. In accordance with one or more...
Generation and application of a sub-codebook of an error control coding
There is provided a method of encoding and decoding data using an error control code having a codebook G. The codebook G is a sub-codebook of a codebook P. Each...
Power regulation of power grid via datacenter
One or more techniques and/or systems are provided for regulating an amount of power on a power grid using a datacenter. This allows demand to be more closely...
Power-aware thread scheduling and dynamic use of processors
Techniques and apparatuses for providing power-aware thread scheduling and dynamic use of processors are disclosed. In some aspects, a multi-core system is...
I/O co-processor coupled hybrid computing device
An apparatus and method provide power to perform functions on a computing device. In one example, the apparatus contains multiple processors that may operate at...
Protocol for protecting third party cryptographic keys
A protocol is provided that permits a third-party key issuing entity to have its issued keys protected by an unrelated key protecting entity. In at least some...
Token-based authentication using middle tier
An intermediary system facilitates a connection request from a client to a server. The intermediary system may participate in either or both of a token creation...
Multi-OS (operating system) boot via mobile device
A system that facilitates different levels of operating system (OS) boot so as to provide users with rapid access to certain mobile device functionalities,...
Structuring storage based on latch-free B-trees
A request to modify an object in storage that is associated with one or more computing devices may be obtained, the storage organized based on a latch-free...
Nonvolatile media dirty region tracking
A storage set (e.g., an array of hard disk drives) may experience a failure, such as a loss of power, a software crash, or a disconnection of a storage device,...
Running applications in an online or offline mode based on the
availability of the connection to the remote web...
Systems and methods for implementing online and offline applications are described. Such systems and methods may in some cases provide the same programming...
Compressing null columns in rows of the tabular data stream protocol
Systems and methodologies that enhance a Tabular Data Stream (TDS) protocol by enabling efficient transmission of a row(s) with null columns(s). An...
A computer assigns networks to network zones based on predefined properties for each zone and/or the properties of the networks. An application program...
Efficient port management for a distributed network address translation
A central NAT manager efficiently allocates ports to endpoints of a tenant application in a hosting environment for NAT purposes. In some instances, the central...
Web feed presence
Web feed presence techniques are described herein. In an implementation, a method includes obtaining a web feed describing content of the user and presence data...
Contextual based information aggregation system
A system automatically and continuously finds and aggregates the most relevant and current information about the people and things that a user cares about. The...
Aspected interfaces and methods for synchronized containers and other data
The subject disclosure is directed towards an object (e.g., an aspected vector, queue, map, stack and so forth) container having an exclusive interface, a...
Assembling streamed content for on-demand presentation
Assembling streamed content for on-demand presentation is described. In embodiments, a media asset can be requested from a content distributor, and cacheable...
Methods, systems, and computer-readable media for generating feed schemas and validating feeds are provided. A user interface may be provided that displays the...
Checksum and hashing operations resilient to malicious input data
A resilient hashing system leverages a fast, non-cryptographic hash/checksum function that has good diffusion properties while remaining reasonably efficient on...
Ranking for inductive synthesis of string transformations
Ranking technique embodiments are presented that use statistical and machine learning techniques to learn the desired ranking function for use in inductive...
Adaptive input language switching
Techniques and solutions are provided for adaptive input language switching. Automatic switching of a current input language can be performed by receiving an...
Phone content service
A phone content service is described. In embodiment(s), content that is associated with a mobile phone can be stored by a phone content service that is...
Antenna structure for a near-field communication device
A near field communication (NFC) communicator includes a housing, an NFC controller and an antenna circuit located in the housing. The antenna circuit enable...
Semantic zoom for related content
Among other things, one or more techniques and/or systems are provided for displaying a related content view within a search interface. That is, a search...
Communication transport optimized for data center environment
Methods and apparatus for congestion control in computer networks achieve high burst tolerance, low latency and high throughput with shallow-buffered switches....
Customized head-mounted display device
A head-mounted display device includes a modular frame assembly including one or more different components. Each of the different components may be selected...
Multiple sensor input data synthesis
New systems and methods are hereby provided that inherently and naturally resolve the challenges of synthesizing coordinated inputs from multiple cameras. For...
Computer vision system and method using a depth sensor
A robot is provided that includes a processor executing instructions that generate an image. The robot also includes a depth sensor that captures depth data...