At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Automatic construction of human interaction proof engines
Human Interaction Proofs ("HIPs", sometimes referred to as "captchas"), may be generated automatically. An captcha specification language may be defined, which...
Home realm discovery in mixed-mode federated realms
The authentication of identities within a realm in which some identities are authenticated using direct authentication, and some identities are authenticated...
Programming, verifying, visualizing, and deploying browser extensions with
fine-grained security policies
An environment is described which enables the generation, analysis, and use of secure browser extensions. Each browser extension includes an extension body and...
Protecting content from third party using client-side security protection
Architecture that employs encryption and storage of encryption keys to protect trusted client message content from an untrusted third-party hosted service. Each...
Service virtualization container
Service virtualization containers to aggregate service functionality from a plurality of services into an apparent service exhibiting the aggregated...
Transactional multi-package installation
Described is installing multiple software packages to a computing device in a single transaction, whereby the multiple package installation commits if...
Static metadata in dynamic programs
A dynamic programming environment includes a dynamic runtime infrastructure configured to receive static metadata as source text in a source code written in a...
Method and system for creating temporary visual indicia
The present invention relates to new and improved embodiments of systems and methods for using a "pen" input as a temporary pointer to highlight a portion of a...
Rules for navigating to next content in a browser
In one or more embodiments, a flip ahead input, such as a gesture, provides touch users with an ability to easily navigate various websites. The flip ahead...
Community-based software application help system
A framework for enabling a community of users to share help information about an application program. The framework includes a mechanism for users to generate...
Sequential layout builder architecture
Layout processing techniques have been described that allow processing of structured documents to be conducted, and for associated layout to be accomplished in...
Techniques for selection and manipulation of table boarders
Techniques to select and manipulate table borders as discrete objects are described. In particular, a table border may be selected without having to select a...
Leveraging chip variability
Embodiments are described that leverage variability of a chip. Different areas of a chip vary in terms of reliability under a same operating condition. The...
Corralling virtual machines with encryption keys
A virtual machine comprises a unique identifier that is associated with one or more encryption keys. A management server encrypts the virtual machine's virtual...
Data encryption conversion for independent agents
The re-encryption of data can be performed with independent cryptographic agents that can automatically encrypt and decrypt data in accordance with ...
SWAN: achieving high utilization in networks
Greater network utilization is implemented through dynamic network reconfiguration and allocation of network services and resources based on the data to be...
An invention is provided for creating logical network abstractions of physical networks, and deploying computer services to physical networks based on a...
Website redevelopment wrapper
Existing network-based services can be reused by a new network service providing an updated interface to the existing services. A client request directed to the...
Distributed routing table interface
Application programming interface (API) for starting and accessing distributed routing table (DRT) functionality. The API facilitates bootstrapping into the DRT...
Throttling usage of resources
A computing device provides a first server. The first server receives a primary request associated with a client. In response to receiving the primary request,...
Automating evolution of schemas and mappings
Aspects of the subject matter described herein relate to automating evolution of schemas and mappings. In aspects, mappings between a conceptual model and a...
Dynamic asset monitoring and management using a continuous event
The disclosed architecture leverages realtime continuous event processing (CEP) to address using a general input interface framework to import a dynamic set of...
Travelogue locating mining for travel suggestion
A location extraction component analyzes a set of travelogues to identify all of the locations mentioned therein. A co-occurrence extraction component computes...
Methods, systems, and media are provided for facilitating generation of an inference index. In embodiments, a canonical entity is referenced. The canonical...
Enhancing search-result relevance ranking using uniform resource locators
for queries containing non-encoding...
Computer-readable media, computer systems, and computing devices facilitate enhancing a web index with uniform resource locator (URL)/non-encoding character...
Synchronization framework that restores a node from backup
Architecture for restoring nodes. After restoring a node, fix-up occurs to make the node appear as a different node than before the restore operation. The node...
Hierarchical models for language modeling
The described implementations relate to natural language processing, and more particularly to training a language prior model using a model structure. The...
Estimating time remaining for an operation
Techniques for estimating time remaining for an operation are described. Examples operations include file operations, such as file move operations, file copy...
Extensible phone application
The present invention provides an extensible phone application that uses extensions to interact with other applications executing in a mobile communication...
Tracking data usage under a schematized data plan
Embodiments provide a schema for representing data usage plans and data usage statistics. The data usage plan describes threshold values associated with network...
Transform space difference compression
An invention is disclosed for performing differencing of graphical data in post-transform space for a remote presentation session. Graphical data is transformed...
Motion stabilization and detection of articulated objects
The techniques and systems described herein are directed to isolating part-centric motion in a visual scene and stabilizing (e.g., removing) motion in the...
Rotation-free recognition of handwritten characters
A character recognition system receives an unknown character and recognizes the character based on a pre-trained recognition model. Prior to recognizing the...
Volume adjustment based on listener position
Volume adjustment based on listener position is disclosed. A position of one or more speakers is identified, and a position of a listener is tracked. For each...
Quality-based video compression
Various embodiments are disclosed herein that relate to quality-based video encoding. For example, one disclosed embodiment provides a video compression system...
Gateway advertisement in a wireless mesh
A computing environment containing a mesh network that is adapted to provide a reliable transport mechanism over which services may be delivered. Nodes of the...
Controlled three-dimensional communication endpoint
A controlled three-dimensional (3D) communication endpoint system and method for simulating an in-person communication between participants in an online meeting...
Drawing operations using multiple graphics interfaces
Various embodiments provide techniques for enabling multiple graphics interfaces to be accessed to perform graphics-related operations. In at least some...
Mesh generation from depth images
Systems and methods for mesh generation from depth images are provided. According to one aspect, a method executable by a compression device for sending...
Ad-hoc user and device engagement platform
A local engagement system is described herein that leverages devices people commonly carry with them to dynamically engage them based on their locations and/or...
Trust level activation
An isolation execution environment provides an application with limited resources to execute an application. The application may require access to secured...
Selectively scanning objects for infection by malware
Techniques are described herein that are capable of selectively scanning objects for infection by malware (i.e., to determine whether one or more of the objects...
Search result presentation
A data presentation system for a search engine may use classified or tagged elements in a resulting document to create a search result document that has...
Aspects of the subject matter described herein relate to identity technology. In aspects, a user device requests access to a service provided by a relying...
Integrating account selectors with passive authentication protocols
Described is using a client-side account selector in a passive authentication protocol environment (such as OpenID) in which a relying party website trusts the...
Work item processing in distributed applications
A system for organizing messages related to tasks in a distributed application is disclosed. The system includes a work-list creator to create a work list of...
Systems and methods for exposing processor topology for virtual machines
The present invention is directed to making a guest operating system aware of the topology of the subset of host resources currently assigned to it. At virtual...
Systems and methods for providing seamless software compatibility using
Certain embodiments of the present invention are directed to a system for and method of providing seamless software compatibility by using virtual machines to...