At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Removal of rayleigh scattering from images
Visual atmospheric effects, colloquially often referred to as "haze", are filtered from images while taking into account the directional component of such...
Orientation-based generation of panoramic fields
A field sensor may be capable of generating a panoramic field, e.g., by instructing the user to capture a sequence of fields of the panorama, performing a field...
Routing for video in conferencing
Methods and systems for routing video in conferencing are disclosed. A device receives one or more data streams from a media source, where each data stream...
Parallelized generation of substantially seamless image mosaics
Many computing services incorporate large mosaics of geo-located images. For example, a user may access and interact with a digital image map comprising...
Dynamic virtual device failure recovery
Exemplary techniques for recovering from a graphics processor reset are herein disclosed. In an exemplary embodiment, a 3D graphics service manager 404 can...
Display and interaction with multidimensional data
Providing for graphical display of multidimensional data that improves user consumption of graphically rendered data is described herein. By way of example, the...
Alternative inputs of a mobile communications device
In an implementation, a mobile communications device includes a display device having touchscreen functionality, a keyboard having a plurality of physical keys...
Remote session control using multi-touch inputs
Accessing and controlling a remote desktop of a remote computing system using a multi-touch display of a local computing system. The remote desktop is displayed...
Human tracking system
An image such as a depth image of a scene may be received, observed, or captured by a device. A grid of voxels may then be generated based on the depth image...
Scalable real-time motion recognition
Human body motion is represented by a skeletal model derived from image data of a user. The model represents joints and bones and has a rigid body portion. The...
Pressure sensor linearization
One or more techniques and/or systems are disclosed for generating a linearized pressure sensor pattern for a pressure sensor. Force may be applied to a...
Automatic fraudulent digital certificate detection
A computing device analyzes digital certificates received from various different sites (e.g., accessed via the Internet or other network) in order to...
Campaign detection techniques are described. In implementations, a signature is computed for each of a plurality of emails to be communicated by a service...
Leveraging biometrics for authentication and touch differentiation
Biometric authentication and touch differentiation embodiments are described which use a handheld mobile computing device having a signal injection site that...
Multi-frame depth image information identification
Embodiments of the present invention relate to systems, methods, and computer storage media for identifying, authenticating, and authorizing a user to a device....
Virtual switch extensibility
An extensible virtual switch allows virtual machines to communicate with one another and optionally with other physical devices via a network. The extensible...
Distributed multi-phase batch job processing
A distributed job-processing environment including a server, or servers, capable of receiving and processing user-submitted job queries for data sets on backend...
Eliminating redundant function calls
A computer-implemented method for removing redundant function calls in a computer program includes identifying a first set of equivalent function calls...
Repository based development using project development tools in enterprise
An integrated system for seamless code development using Application Development Environments (ADEs) for Enterprise Management Application (EMA) environments...
Time intelligence for application programs
Techniques to implement time intelligence for application program are described. An apparatus may include a calendar application module. The calendar...
Providing summary view of documents
As part of a document summary view system, a miniaturized version of a document is provided that presents a summary overview of the document over a user...
Integrity protected smart card transaction
Systems, methods, and technologies for configuring a conventional smart card and client machine, and for performing a smart card authorization using the...
System and method for assigning quality to cryptographic identities used
in a digital transaction
A method of assessing risk in an electronic transaction involves assignment of quality attributes to cryptographic identities presented in a digital...
Dynamically redirecting boot to another operating system
Various embodiments provide an ability to automatically boot a computing device with an operating system stored on a portable storage device when the portable...
Message passing in a cluster-on-chip computing environment
Technologies pertaining to cluster-on-chip computing environments are described herein. More particularly, mechanisms for supporting message passing in such...
Lightweight random memory allocation
In response to a memory allocation request received from an application thread, a random number is obtained (e.g., from a random number list previously...
Shared and managed memory unified access
A managed memory in which multiple computing entities each have a corresponding entity-specific portion that is subject to garbage collection. An immutable...
Client-side management of domain name information
An exemplary method includes booting a computing device, in response to the booting, accessing a file that includes domain names and resolving at least one of...
Unauthenticated redirection requests with protection
A redirection object may be obtained, based on a current request of a current requestor. The redirection object request may be associated with a response to a...
Device-pairing by reading an address provided in device-readable form
A system is described for allowing a user, operating a trusted device, to remotely log into a server via a potentially untrustworthy client. A first secure...
Operating a sleep management service
The claimed subject matter provides a method for operating a sleep management service. The method include identifying a set of guardians based on a local state...
Cached data detection
A service assigns session identifiers to usage sessions of a program on a computing device, and maintains records in a log of received page requests and...
Aggregation and re-ordering of input/output requests for better
performance in remote file systems
A method and system for managing remote file system requests between client and server redirectors where a set of data request packets may be aggregated and/or...
Changes to documents are automatically summarized in electronic messages
Changes made to a document are automatically summarized within an electronic message. The changes may be made to a document that is being collaborated on. For...
File fetch from a remote client device
Techniques for an electronic file fetch system are described. A method may comprise sending a request for a roaming file list to a file fetch server from a...
Decoupled mechanism for managed copy client applications and e-commerce
servers to interoperate in a...
Request data is generated at a client device having at least one managed copy client application. The request data includes an identifier (e.g., a uniform...
Imitation of file embedding in a document
A container document can include a file node indicating a file and pointing to a location for the file that is separate from the container document on a server....
Techniques for managing persistent document collections
Various technologies and techniques are disclosed for creating and managing persistent document collections. A data store is used for storing one or more...
Assisted filtering of multi-dimensional data
Interactive and dynamic exploring of filter criteria for large amounts of numerical data having multiple dimensions is described. Exploration occurs without...
Automatic selection of media representations
Technologies for selecting a media representation out of a plurality of representations of the same media offered by a media provider wherein the selected...
Unique join data caching method
Enterprise systems, methods and computer program products are disclosed for providing caching of data retrieved from joined tables and an inheritance table...
Identifying query formulation suggestions for low-match queries
Systems, methods and computer-storage media are provided for identifying low-match search queries and determining comparable item matches to suggest to the user...
Current file systems may implement opportunistic locks on files that allow clients to locally cache file data, while promoting data consistency when multiple...
Automatic synchronization conflict resolution
A determination is made at a first computing device of whether there is a synchronization conflict between a change to a first synchronized item at the first...
Structured models of repetition for speech recognition
Described is a technology by which a structured model of repetition is used to determine the words spoken by a user, and/or a corresponding database entry,...
Providing multi-lingual translation for third party content feed
Multi-lingual translation for third party content feed applications is provided in social network and similar environments in an independent manner from the...
Context aware surface scanning and reconstruction
A system for generating and updating a 3D model of a structure as the structure is being constructed or modified is described. The structure may comprise a...
Analyzing power consumption in mobile computing devices
Techniques pertaining to analyzing power consumed by a processing unit in a mobile computing device caused by execution of certain modules are described herein....