At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Annotating images with instructions
A method described herein includes the acts of receiving an image captured by a mobile computing device and automatically annotating the image to create an...
Identity based network policy enablement
Enhanced network data transmission security and individualized data transmission processing can be implemented by intermediaries in a communication path between...
Conversation rights management
Conversation rights for multi-modal communications are managed and enforced in an enhanced communication system. Through physical and/or software components,...
Media content improved playback quality
Media content improved playback quality is described. In embodiments, a media content playback system stores segments of a media asset in a memory device, where...
Monitoring agent programs in a distributed computing platform
Methods, systems, and computer-readable media for monitoring information passed from instances of role(s) of a service application installed on a distributed...
Processing data obtained from a presence-based system
Functionality is described for collecting data from a presence-based system, such as an instant messaging system. The functionality can extract information from...
Routing of pooled messages via an intermediary
Message intermediation for multiple service instances, while allowing the service instance to control whether messages are processed under a transaction. The...
Adaptive streaming of conference media and data
A distributed system for distributing conferencing data such as video, audio, and other conference data. The distributed system includes a conference data...
Sub-mailbox folder hierarchy to represent a separate physical mailbox to a
Architecture that provides an abstraction of a mailbox store that allows clients to connect to multiple "alternate" mailboxes associated with a single user,...
Automated feature selection based on rankboost for ranking
A method using a RankBoost-based algorithm to automatically select features for further ranking model training is provided. The method reiteratively applies a...
Providing schedulable calendars electronically
Systems and methods are disclosed for providing schedulable calendars electronically. The disclosed systems and methods may include receiving schedulability...
Techniques to consume content and metadata
Content and metadata associated with the content may be provided to a number of users. The content may be displayed on a display device while the metadata may...
Data storage for file updates
A storage system according to one embodiment for managing a first file includes a blob storage and a handler. The blob storage may be configured to store data...
Integrated content viewing and payment
A content purchaser can freely and fluidly zoom into and out of content at a continuous range of resolutions. The price for the viewed content is calculated...
Organizational behavior monitoring analysis and influence
Approaches are provided for monitoring, analyzing, and influencing organizational behaviors through multi-modal communication systems. Desired and undesired...
Minimum classification error training with growth transformation
Hidden Markov Model (HMM) parameters are updated using update equations based on growth transformation optimization of a minimum classification error objective...
Semantic object synchronous understanding for highly interactive interface
A method and system provide a speech input mode which dynamically reports partial semantic parses, while audio captioning is still in progress. The semantic...
Physical and MAC adaptation for interference mitigation with cognitive
A communication device cognitively monitors interference signals across a communication band so that adaptations for physical and medium access control (MAC) of...
Perceptually weighted digital audio level compression
The level of an audio signal can be compressed by receiving an input audio signal, determining a measure of loudness of the signal using a perceptually derived...
Computing isogenies between genus-2 curves for cryptography
This cryptographic curve generation technique provides a faster way of constructing a genus 2 curve. The technique provides a procedure to compute isogenies...
Multimodal conversation park and retrieval
Established multimodal conversations are enabled to be parked within an enhanced communication system such that a subscriber of the system can be notified...
Resolving calling line identification information
A computing device includes a processing unit and a system memory. The processing unit creates a normalization module programmed to modify a plurality of...
Breakout rooms in a distributed conferencing environment
Architecture that facilitates management and control of sidebar sessions (or breakout rooms) in a distributed conferencing environment. Distributed frontends...
Occlusion handling in stereo imaging
The handling of occlusions in stereo imaging is disclosed. In one implementation, an association between a discontinuity in one stereo image and an occlusion in...
Techniques for detecting a display device
Techniques to detect a display device are described. An apparatus may include a video camera operative to receive video information for an image, and a...
Interactive video display system using strobed light
An interactive video display system uses strobing light to allow easy and unencumbered interaction between a person and projected video images. A camera may be...
Display screen with graphical user interface
Display screen with transitional graphical user interface
Display screen with user interface
Display screen with user interface
Display screen with user interface
Trusted platform module supported one time passwords
A Trusted Platform Module (TPM) can be utilized to implement One Time Password (OTP) mechanisms. One or more delegation blobs can be created by the TPM and the...
Over the air communication authentication using a service token
A system and method are described for securing over the air communications between a service and a communication device. For example, one embodiment of a method...
Transforming claim based identities to credential based identities
Claim based identities are transformed to a set of credentials and securely stored in a secure data store using a number of encryption schemes. The credentials...
Replicating selected secrets to local domain controllers
A domain controller hierarchy includes one or more hub domain controllers in communication with one or more local domain controllers, such as local domain...
An authorization system includes an authorization node, a storage device and a reference monitor. The authorization node executes an authorization policy, and...
Intelligent video summaries in information access
In a method for displaying video data within result presentations in information access or search systems, compressed thumbnails are computed for videos in a...
Agent-based remote function execution
A function call can be received at a remote execution module in a host environment. The call can instruct the remote execution module to remotely execute a...
Reducing persistence commands
The present invention extends to methods, systems, and computer program products for reducing persistence commands. An application host sends a persistence...
Event filtering at a performance-based interface
Architecture that facilitates performance enhancement in message-based computing across a performance-based interface. When a request from a source is...
Efficient context switching of virtual processors by managing physical
register states in a virtualized environment
Various operations are disclosed for improving the operational efficiency of register handling in a virtualized environment. Some infrequently accessed software...
Service-based endpoint discovery for client-side load balancing
A server farm includes a plurality of server devices. The plurality of server devices includes a plurality of topology service endpoints and a plurality of...
Tree-based directed graph programming structures for a declarative
Embodiments of tree-based directed graph programming structures for a declarative programming language are provided. In various embodiments, complex graph...
Automatic native generation
Various technologies and techniques are disclosed for automatically generating native images for a virtual machine environment. A virtual machine environment is...
Dynamic method selection based on declarative requirements of interaction
Various technologies and techniques are disclosed that dynamically implement method selections based on declarative requirements and interaction scope....
Using extension methods to extend COM objects
When objects are called by a program written in a strongly-typed language using an interface written in a loosely-typed manner, incompatibilities between the...
Interface for navigating interrelated content hierarchy
An interface allows navigation of a hierarchy of related content organized into a node tree. Each node may be associated with media content and navigation input...
Collapsible tabbed user interface
A tab-based collapsible user interface includes selectable user interface tabs, a ribbon area, and an editing surface. When a browse tab is selected, the ribbon...
Enabling access to rich data by intercepting paste operations
Systems and methods for enabling access to data, including data represented using a variety of "richer" data formats, are disclosed. Such systems and methods...
Accessing a menu utilizing a drag-operation
Computer-readable media, computerized methods, and computer systems for intuitively invoking a presentation action (e.g., rendering a menu) by applying a...