At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Stateless human detection for real-time messaging systems
Stateless human detection for real-time systems allows a real-time message system to challenge incoming messages suspected of being generated by an automated...
To allow down-level devices to participate in a network controlled by a protocol including CGAS or ECGAs, the CGA or ECGA authentication may be made optional to...
Using delete notifications to free related storage resources
A storage stack delete notification can be received at a storage stack filter. The delete notification can indicate deletion of primary data in a primary...
Cache enumeration and indexing
In response to a request including a state object, which can indicate a state of an enumeration of a cache, the enumeration can be continued by using the state...
Data transmission queuing using fault prediction
In a distributed computer system, data to be communicated is assigned to one of a plurality of virtual queues. The plurality of virtual queues includes a first...
Multi-rate peer-assisted data streaming
The described implementations relate to distributed network management and more particularly to enhancing distributed network utility. One technique selects...
Rate-controllable peer-to-peer data stream routing
Difficulties associated with choosing advantageous network routes between server and clients are mitigated by a routing system that is devised to use many...
Push mechanism for efficiently sending aggregated data items to client
A server push model for client/server communications. The push architecture operates on top of a non-push (e.g., request/response) protocol (e.g., HTTP) to...
One to many data projection system and method
The system and method of information or presentation projection allows a user to present information to single or multiple screens without need of additional...
Voice-based search processing
Architecture for completing search queries by using artificial intelligence based schemes to infer search intentions of users. Partial queries are completed...
System and method for authority value obtained by defining ranking
functions related to weight and confidence value
Concepts and technologies are described herein for authority ranking for real time and social search. An authority index configured to store data relating to...
Computer-readable media and a computing device are described for providing geotemporal search and a search interface therefor. A search interface having a...
Forecasting by blending algorithms to optimize near term and long term
Described is time-weighted blending of the results of time series algorithms in a manner that changes their relative weights based on the prediction time. The...
Online pricing and buyback
A seller may sell advertisements, such as banner ads, to a buyer pursuant to a request made by the buyer to the seller. Each request has a value. The seller may...
Providing time-sensitive information for purchase determinations
A method, system, and medium are provided that are directed to providing a user with time-sensitive information that is usable to determine when to purchase a...
Extensible framework for supporting different modes of payments
A method and system for providing an extensible framework for a POS application is provided. A POS application may be extended using a payment format add-in, a...
Semantic advertising selection from lateral concepts and topics
Advertisements are selected for presentation on search result pages and web pages based on phrases generated from lateral concepts and topics identified for the...
Health-related opportunistic networking
A wireless opportunistic network that can facilitate data transfer by way of interconnected devices is disclosed. In accordance with this opportunistic network,...
In differential and non-differential analyses, composite images derived from replicates of liquid-chromatography/mass-spectrometry processes can provide...
The disclosure relates to communication devices which monitor an audio environment at a remote location and convey to a user a representation of that audio...
Computing modular polynomials modulo large primes
Systems and methods for computing modular polynomials modulo large primes are described. In one aspect, the systems and methods generate l-isogenous elliptic...
Method and apparatus for reducing timestamp noise in audio echo
A communication end device of a two-way communication system is shown. The device includes an audio signal capture device for capturing local audio to be...
Multimedia stream compression
A computer may be remotely accessed. At a first location, display commands are generated. The display commands are covered into a compressed video data stream....
Data-driven model implemented with spreadsheets
Visual items may each be constructed and placed in position using logic defined by a view component corresponding to each visual item, where that logic may...
Dynamic search result highlighting
A dynamic highlighting system initially applies a high-level highlight to occurrences of one or more keywords in a search result that fades to a low-level...
Display screen with graphical user interface
Display screen with animated graphical user interface
Providing access to a data item using access graphs
An approach is described for controlling access to a data item using one or more access graphs. The approach entails distributing a compact package of...
Real-time network malware protection
A Network State Database (NSD) can comprise information regarding the network-centric state of one or more computing devices connected to a network. The...
One or more techniques and/or systems are disclosed for providing recommendations for an add-on to a base program operating on a computing device, thus allowing...
Anti-virus scanning of partially available content
A client device transmits requests via a gateway to a server in a network environment. The requests indicate specific portions of a file on a server to be...
Direct peripheral communication for restricted mode operation
A computer that self-administers operating in restricted and unrestricted operating modes boots from a main processor and operates normally in the unrestricted...
Communication abuse prevention
Communication abuse prevention techniques are described. In an implementation, a reputation level for a communication is determined based on relation...
In a virtualization environment, there is often a need for an application to access different resources (e.g., files, configuration settings, etc.) on a...
Multi-threaded processes for opening and saving documents
Tools and techniques are described for multi-threaded processing for opening and saving documents. These tools may provide load processes for reading documents...
Translating late bound LINQ expressions into database queries
There is alteration of a late-bound expression produced by a compiler into an early-bound structure. Alteration of the late-bound expression can occur at...
Handling external content in web applications
A media and method for detecting third-party content in web pages is provided. Computer software operates on a server or a client-side computer to identify and...
Command user interface for displaying selectable software functionality
An improved user interface is provided for displaying selectable software functionality controls and for presenting logical groupings of particular ...
Dynamic feature presentation based on vision detection
Computer-readable media, computerized methods, and graphical user interfaces (GUI's) for interactively presenting features within the panes of a display area...
Content aware adaptive display
Content aware adaptive display is described. In embodiment(s), a media image can be displayed on an integrated display of a media device. The media device can...
Incorporated handwriting input experience for textboxes
Textboxes are provided to support both standard textbox operations and handwriting input. A textbox may be displayed as a standard textbox, receive input from a...
XML based form modification with import/export capability
A form user interface modification engine for use in customizing forms of an application is provided. The modification engine includes an export component which...
Dynamically mediating multimedia content and devices
Embodiments of the invention provide a communication network having a plurality of communication devices capable of transferring content wirelessly. The...
Dynamically replicated memory
Dynamically replicated memory is usable to allocate new memory space from failed memory pages by pairing compatible failed memory pages to reuse otherwise...
One-time password access to password-protected accounts
Systems and methods facilitate secure one-time-password access to an account in a remote server from an untrusted client. The system consists of an intermediary...
Non-volatile memory cache performance improvement
In order to provide a more efficient persistent storage device, one or more long-term storage media are included along with a non-volatile memory. In one...
Modifying delete notifications in a storage stack
A filter between a filesystem and a storage device in a storage stack can be configured to modify a delete notification, such as by modifying an existing delete...
Preventing access to a device from an external interface
Prior to customer use of a device, communication with the device is allowed via multiple pins of an external interface of the device. One or more pins of the...
Methods and systems for compressing data packets
Systems and methods for providing network access, e.g. Internet access, are described. An architecture includes a host organization network through which...
Peer name resolution protocol simple application program interface
An application program interface (API) for sending and receiving endpoint registration data and peer-to-peer network cloud data has a registration call for...