At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Integrity protected smart card transaction
Systems, methods, and technologies for configuring a conventional smart card and client machine, and for performing a smart card authorization using the...
System and method for assigning quality to cryptographic identities used
in a digital transaction
A method of assessing risk in an electronic transaction involves assignment of quality attributes to cryptographic identities presented in a digital...
Dynamically redirecting boot to another operating system
Various embodiments provide an ability to automatically boot a computing device with an operating system stored on a portable storage device when the portable...
Message passing in a cluster-on-chip computing environment
Technologies pertaining to cluster-on-chip computing environments are described herein. More particularly, mechanisms for supporting message passing in such...
Lightweight random memory allocation
In response to a memory allocation request received from an application thread, a random number is obtained (e.g., from a random number list previously...
Shared and managed memory unified access
A managed memory in which multiple computing entities each have a corresponding entity-specific portion that is subject to garbage collection. An immutable...
Client-side management of domain name information
An exemplary method includes booting a computing device, in response to the booting, accessing a file that includes domain names and resolving at least one of...
Unauthenticated redirection requests with protection
A redirection object may be obtained, based on a current request of a current requestor. The redirection object request may be associated with a response to a...
Device-pairing by reading an address provided in device-readable form
A system is described for allowing a user, operating a trusted device, to remotely log into a server via a potentially untrustworthy client. A first secure...
Operating a sleep management service
The claimed subject matter provides a method for operating a sleep management service. The method include identifying a set of guardians based on a local state...
Cached data detection
A service assigns session identifiers to usage sessions of a program on a computing device, and maintains records in a log of received page requests and...
Aggregation and re-ordering of input/output requests for better
performance in remote file systems
A method and system for managing remote file system requests between client and server redirectors where a set of data request packets may be aggregated and/or...
Changes to documents are automatically summarized in electronic messages
Changes made to a document are automatically summarized within an electronic message. The changes may be made to a document that is being collaborated on. For...
File fetch from a remote client device
Techniques for an electronic file fetch system are described. A method may comprise sending a request for a roaming file list to a file fetch server from a...
Decoupled mechanism for managed copy client applications and e-commerce
servers to interoperate in a...
Request data is generated at a client device having at least one managed copy client application. The request data includes an identifier (e.g., a uniform...
Imitation of file embedding in a document
A container document can include a file node indicating a file and pointing to a location for the file that is separate from the container document on a server....
Techniques for managing persistent document collections
Various technologies and techniques are disclosed for creating and managing persistent document collections. A data store is used for storing one or more...
Assisted filtering of multi-dimensional data
Interactive and dynamic exploring of filter criteria for large amounts of numerical data having multiple dimensions is described. Exploration occurs without...
Automatic selection of media representations
Technologies for selecting a media representation out of a plurality of representations of the same media offered by a media provider wherein the selected...
Unique join data caching method
Enterprise systems, methods and computer program products are disclosed for providing caching of data retrieved from joined tables and an inheritance table...
Identifying query formulation suggestions for low-match queries
Systems, methods and computer-storage media are provided for identifying low-match search queries and determining comparable item matches to suggest to the user...
Current file systems may implement opportunistic locks on files that allow clients to locally cache file data, while promoting data consistency when multiple...
Automatic synchronization conflict resolution
A determination is made at a first computing device of whether there is a synchronization conflict between a change to a first synchronized item at the first...
Structured models of repetition for speech recognition
Described is a technology by which a structured model of repetition is used to determine the words spoken by a user, and/or a corresponding database entry,...
Providing multi-lingual translation for third party content feed
Multi-lingual translation for third party content feed applications is provided in social network and similar environments in an independent manner from the...
Context aware surface scanning and reconstruction
A system for generating and updating a 3D model of a structure as the structure is being constructed or modified is described. The structure may comprise a...
Analyzing power consumption in mobile computing devices
Techniques pertaining to analyzing power consumed by a processing unit in a mobile computing device caused by execution of certain modules are described herein....
Split billing for a mobile device
The claimed subject matter provides a method for split billing. The method includes receiving a requested token. The requested token specifies conditions under...
A system for updating a network accessible address book for a user is disclosed. The system includes a network address reference detection agent that detects a...
Incremental valuation based network capacity allocation
A bid-based network sells network capacity on a transaction-by-transaction basis in accordance with bids placed on transactions. A transaction is the...
Uplink MIMO transmission from mobile communications devices
Uplink transmission from a mobile device having multiple antennas to a base station having multiple antennas includes transmitting in an open-loop single-user...
Motion-compensated prediction of inter-layer residuals
Techniques and tools are described for scalable video encoding and decoding. In some embodiments, an encoding tool encodes base layer video and outputs encoded...
Merge mode for motion information prediction
In one embodiment, for a current block of a first frame of digital image data, a list of motion vector prediction information for the current block is populated...
Techniques to perform fast motion estimation
Techniques to perform fast motion estimation are described. An apparatus may comprise a motion estimator operative to receive as input a current frame and a...
Network assisted power management
Embodiments of the claimed subject matter provide an approach to managing the power state of wireless network devices in a wireless network. Embodiments include...
Wireless synchronization testing
A testing sequence is disclosed for testing a wireless media synchronization connection between a computing device and a mobile device. A first test message...
Switchable magnetic lock
This document describes techniques using, and apparatuses including, switchable magnetic locks. These techniques and apparatuses can enable low or no power...
Video display modification based on sensor input for a see-through
This disclosure concerns a near field communication (NFC) device which includes a wrist-worn NFC-enabled electronics device, wherein the wrist-worn NFC enabled...
Image blur detection
Among other things, one or more techniques and/or systems are provided for quantifying blur of an image. Blur may result due to motion of a camera while the...
Volumetric video presentation
Various embodiments are disclosed that relate to the presentation of video images in a presentation space via a head-mounted display. For example, one disclosed...
Non-linguistic signal detection and feedback
Non-linguistic signal information relating to one or more participants to an interaction may be determined using communication data received from the one or...
Location based skins for mixed reality displays
The technology provides embodiments for providing a location-based skin for a see-through, mixed reality display device system. In many embodiments, a...
Vertex-baked three-dimensional animation augmentation
A method for controlling presentation of three dimensional (3D) animation includes rendering a 3D animation sequence including a 3D vertex-baked model which is...
Ray tracing on graphics hardware using kd-trees
Described is a technology by which a ray tracer incorporates a GPU-based kd-tree builder for rendering arbitrary dynamic scenes. For each frame, the ray tracer...
Methods and systems for determining and tracking extremities of a target
An image such as a depth image of a scene may be received, observed, or captured by a device. A grid of voxels may then be generated based on the depth image...
Executable virtual objects associated with real objects
Embodiments for interacting with an executable virtual object associated with a real object are disclosed. In one example, a method for interacting with an...
Crowd-sourced parking advisory
Architecture that employs crowd-sourced parking-related information to compute the probability of finding parking spots at specific road segments, parking lots,...
Management of gaming data
Systems and methods for managing gaming data are provided. The system may include at least one computing device coupled to a gaming service. The computing...
Embodiments of the present invention allow players to instantly access and begin playing games through an online service. To make the games instantly available,...