At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Image descriptor quantization
Image descriptor quantization technique embodiments are presented which quantize an image descriptor defined by a vector of number elements. This is generally...
Migration of computer secrets
Described is a technology by which computer data secrets sealed by a trusted platform module (TPM) or like device may be securely migrated from a physical...
Video coding using spatio-temporal texture synthesis
Systems and methods for video coding using spatio-temporal texture synthesis are described. In one aspect, a video data coding pipeline portion of the codec...
Quantization and differential coding of alpha image data
Alpha images are efficiently encoded for inclusion in video bitstreams. During encoding, alpha image data is quantized as a first step before differential...
Rating effort input device
A rating mechanism may calculate a rating based on a user's effort and duration of input to an input mechanism. The more effort and time a user exerts, the more...
Selective filtering of network traffic requests
Several approaches to selectively filtering network traffic are described. One approach involves a system for selectively filtering network traffic. The system...
Method, device and system for imaging
There is provided a novel method, device and system for imaging. According to some embodiments of the present invention, a visible light image sensor array...
Embodiments that provide multi-video synthesis are disclosed. In accordance with one embodiment, multi-video synthesis includes breaking a main video into a...
Support for batching of events, and shredding of batched events in the
RFID infrastructure platform
The claimed subject matter provides a system and/or a method that facilitates receiving data from at least one device. A radio frequency identification (RFID)...
Display screen with user interface
Network accountability among autonomous systems
Accountability among Autonomous Systems (ASs) in a network ensures reliable identification of various customers within the ASs and provides defensibility...
Detection of hardware-based virtual machine environment
A method and a processing device are provided for detecting a hardware-based virtual machine environment. An execution time of a privileged instruction may be...
Automated event correlation
Events captured at an application are compared to event correlation instances, wherein an event correlation instance represents a relationship between events of...
Browser elements for communicating with other browser elements and with
A method includes executing a web script by a browser element to access a web service executing on a web server and providing access to a web application,...
Updating offline virtual machines or VM images
Methods and systems for updating a virtual machine image. The virtual machine image may be stored as a collection of one or more virtual hard disk files. The...
Graphical web browser history toolbar
The present subject matter describes a graphical web browser toolbar the stores visual representations of user-selected web pages. A saved page is included in...
Graphical user interface for multi-frame presentation
A computing device configured to execute computer code to generate a graphical user interface (GUI) for creating a multi-frame presentation is provided. The...
Enhanced find and replace for electronic documents
An enhanced find and replace feature for a spreadsheet program module is disclosed. The enhanced find and replace feature allows users to search for terms and...
Secure and usable protection of a roamable credentials store
A tool which facilitates a balancing of security with usability enabling secure user access to multiple secure sites and locations from several computing...
Secure recovery in a serverless distributed file system
Systems and methods for secure file writes after a catastrophic event are allowed over an unauthenticated channel in a serverless distributed file system if an...
Tool for digitally signing multiple documents
A software tool for digitally signing multiple documents is disclosed. When a user wishes to sign multiple documents containing embedded executable code for...
Over the air communication authentication using a device token
A system and method are described for securing over the air communications between a service and a communication device. For example, one embodiment of a method...
Efficient size optimization of visual information or auditory information
A file, including visual information or auditory information may be uploaded to a processing device. Respective portions of content of the file may be...
Contact sidebar tile
Methods, systems, and computer program products for tracking real-time communication data within a single contact tracking application for diverse communication...
Hierarchical presentation of search results
Methods, and computer-readable media for presenting search results in a folder hierarchy are provided. Embodiments of the present invention include providing a...
Media device presence management
A media player may be adapted to manage presence information distribution and access to facilitate media communication between compatible devices. Devices...
Expressing and executing semantic queries within a relational database
Semantic queries are expressed and executed within a relational database. This can be done by defining semantic rules applied to execute the semantic queries...
Leveraging constraints for deduplication
A deduplication algorithm that provides improved accuracy in data deduplication by using aggregate and/or groupwise constraints. Deduplication is accomplished...
Maintaining client data integrity in a distributed environment using
asynchronous data submission
Data processing architecture where submitters can write data and/or metadata changes to a destination through an asynchronous interface. The architecture...
A scalable clustering system is described. In an embodiment the clustering system is operable for extremely large scale applications where millions of items...
Automatic provisioning based on communication network connectivity and
A communication device and/or applications capable of facilitating communication through different networks are automatically provisioned based on recognition...
Factoring repeated content within and among images
Systems and/or methods that factor large-scale repeated content within and/or among images can include devices and components that factor received or acquired...
Feature design for HMM based Eastern Asian character recognition
An exemplary method for online character recognition of East Asian characters includes acquiring time sequential, online ink data for a handwritten East Asian...
3D content aggregation built into devices
The claimed subject matter provides a system and/or a method that facilitates capturing a portion 2-dimensional (2D) data for implementation within a...
Natural network coding for multi-hop wireless network
Described herein is technology for, among other things, natural network coding in a wireless mesh network. The technology involves wireless mesh network...
System architecture design for time-of-flight system having reduced
differential pixel size, and time-of-flight...
Embodiments of the present invention provide methods to produce a high performance, feature rich TOF system, phase-based or otherwise using small TOF pixels,...
Configuring television broadcast signals
A system and methods for configuring a television signal SourceType received by one or more tuners. Each of the tuners in the system are initially identified....
Proximity based computer display
A computer that can alter display the format or content of a computer display in response to context information indicating the proximity of a user to the...
Fixed function pipeline application remoting through a shader pipeline
Systems, methods and computer readable media are disclosed for sending a client graphics data across a remote session for an application, where the application...
Multiple-player collaborative content editing
An arrangement is provided for multiplayer collaborative content editing which allows players to edit content and enjoy a social collaborative process. The...
Performing security functions when a process is created
A method and system in a computing device for performing security related functions as part of a process created to execute a software component that may be...
Automated malware signature generation
Automated malware signature generation is disclosed. Automated malware signature generation includes monitoring incoming unknown files for the presence of...
Multi-profile interface specific network security policies
Computer-readable medium having a data structure stored thereon for defining a schema for expressing a network security policy. The data structure includes a...
Authenticated credential-based multi-tenant access to a service
Associating a computing device with a group of other computing devices. A service receives a common credential from the computing device and associates the...
Method and system for protecting user choices
A system, method, and computer-accessible medium for protecting user choice settings are provided. The system and method provide an application programming...
Strategies for securely applying connection policies via a gateway
A strategy is described for securely applying connection policies in a system that includes a first entity (e.g., a TS client) connected to a second entity...
Controlling the delegation of rights
The delegation of rights may be controlled in a number of manners. In an example implementation, a delegation authority assertion is formulated with a delegator...
Controlling access of application programs to an adaptive input device
Methods and systems for controlling access of application programs to an adaptive input device are described herein. One exemplary computing system includes an...
Device-hosted services over media transfer protocol
An arrangement for exposing self-describing device-hosted services on a client device to a host application or processes over MTP (Media Transfer Protocol) is...
COM object and managed code object interoperability
Communicating between managed add-ins and COM hosts. A computing environment includes host objects which may be one of a COM object or a managed code object....