At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Embedded system development platform
A modular development platform is described which enables creation of reliable, compact, physically robust and power efficient embedded device prototypes. The...
Embedding a session description message in a real-time control protocol
Embedded within at least some Real-Time Control Protocol (RTCP) messages sent from a media content source to a recipient is a session description message that...
High definition media content processing
High definition media content processing techniques are described in which enhanced media content rendering techniques may be performed to output high...
Pointing and data entry input device
An input device includes an array of adjacent capacitive sensors arranged into rows and columns. Each capacitive sensor exhibits a capacitance characteristic...
Personalization using a hand-pressure signature
A hand-held device having a body with a pressure-sensitive exterior surface. At least a portion of the pressure-sensitive exterior surface is designed to be...
Display screen with an icon
Display screen with user interface with orange colored bar
Secure content pre-distribution to designated systems
Described is a technology by which encrypted content is pre-distributed to recipients during a pre-distribution timeframe, for example to distribute protected...
Authentication and authorization of extranet clients to a secure intranet
business application in a perimeter...
Methods and systems authenticate and authorize an extranet client to a secure intranet business application with a perimeter network topology, where connections...
Two-way authentication using a combined code
An authentication process for a client and a target service to perform mutual authentication. A combined code is received that comprises a combined code hash of...
Systems and processes for managing policy change in a distributed
A method for managing changes to policies in an enterprise includes receiving a systems policy change request to change a systems policy that implements a...
Automatically generated TV favorites list
A favorite channel list for a media system is generated by observing the viewing, surfing, and recording habits of a user. The viewing habits may include the...
Queue dispatch using deferred acknowledgement
Dispatching an incoming message from a queue into message transfer session(s) from which message consumers may draw messages. The message is reversibly received...
User declarative language for formatted data processing
A user declarative language for formatted data processing is provided. The user declarative language may be used to generate constraints which can be projected...
Explicit delimitation of semantic scope
Systems and methods are provided with respect to computer programming. Program behavior can be tuned to provide a seamless mixture of semantic behavior across a...
The claimed subject matter provides techniques to effectuate and facilitate efficient and flexible selection of display objects. The system can include devices...
Resizing an editable area in a web page
Embodiments of the present invention provide for vertically and/or horizontally resizing a zone or DIV element of a Web page via a browser-based Web authoring...
Methods and systems for providing a customized user interface for viewing
and editing meta-data
Systems and methods are disclosed for providing a user interface. The disclosed systems and methods may include receiving a request to initiate an application...
Client session based debugging
Debugging operations on individual client sessions for a remotely executed shared application are enabled to be performed as the client requests are processed...
Universal secure token for obfuscation and tamper resistance
Program obfuscation is accomplished with tamper proof token including an embedded oracle. A public obfuscation function can be applied to any program/circuit to...
Stored value accessors in shared memory regions
Instruction sets in computing environments may execute within one of several domains, such as a natively executing domain, an interpretively executing domain,...
Distributing bandwidth across communication modalities
Embodiments are configured to provide communication environments to communicating participants using a number of modality control features, but are not so...
Media foundation media processor
A system and method for a media processor separates the functions of topology creation and maintenance from the functions of processing data through a topology....
System and method for applying flexible attributes to execute asynchronous
Flexible attributes are attached to network requests that may be executed asynchronously. Any number of criteria may be attached to network requests. The...
Application streaming over HTTP
Disclosed are systems and methods for application streaming over HTTP. A virtual application running on a host computing device may detect the need for a page...
Resource equalization for inter- and intra- data center operations
An exemplary component for managing requests for resources in a data center includes a service request module for receiving requests for resources from a...
Content channels for a mobile device
Various embodiments enable a user of a mobile media device to select one or more channels to load onto the device. Each channel comprises a collection of media...
Methods and devices for creating and transferring custom emoticons allow a user to adopt an arbitrary image as an emoticon, which can then be represented by a...
Modeling party identities in computer storage systems
The present invention extends to methods, systems, and computer program products for modeling party identities in computer storage systems. A federated identity...
Index optimization for ranking using a linear model
Technologies are described herein for providing a more efficient approach to ranking search results. An illustrative technology reduces an amount of ranking...
Creating business value by embedding domain tuned search on web-sites
Domain specific topics, and optionally uniform resource locators (URLs) can be received from a user, and from those domain specific topics and URLs, domain...
Unbundled storage transaction services
Systems (and corresponding methods) that unbundle the kernel or storage engine of a database system are provided. The unbundling separates transactional aspects...
Managing data across a semantic data view and a presentation data view
Managing data across a semantic data view and a presentation data view may be provided. A semantic model may be represented in a semantic data view and a...
Automated investment alerts from multiple data sources
A system and method provides investors with meaningful information extracted from large volumes of available data for a particular stock, mutual fund, bond, or...
Extensible framework for designing workflows
A user interface for building a componentized workflow model. Each step of the workflow is modeled as an activity that has metadata to describe design time...
Extracting lexical features for classifying native and non-native language
A corpus is provided of language usage by non-native users of the language. Characteristics of the corpus are measured and used to create a language usage...
Wearable electromyography-based controllers for human-computer interface
A "Wearable Electromyography-Based Controller" includes a plurality of Electromyography (EMG) sensors and provides a wired or wireless human-computer interface...
Proximity-based mobile message delivery
Proximity-based mobile message delivery is described. In an embodiment, a first user stores a message intended for a second user on a first mobile terminal,...
Image recognition of content
Techniques are described to employ image recognition techniques to content. In an implementation, one or more images are identified in content using a signature...
Acoustic echo cancellation and adaptive filters
In one embodiment, a two-way telecommunication device may perform acoustic echo cancellation on incoming signals. An audio decoding module may produce an audio...
Selectively enabled quality of service policy
A computer system that implements a quality of service policy. Information defining the quality of service policy is stored in a central location, such as a...
Leveraging active firewalls for network intrusion detection and
retardation of attack
A computer network firewall or network filter functions normally to pass data on open ports to a respective service or data source associated with an open port....
Fault-tolerant communications in routed networks
A method for providing fault-tolerant network communications between a plurality of nodes for an application, including providing a plurality of initial...
Various embodiments related to a rear projection display screen configured to reduce an intensity of light at a viewing angle at which the light is less likely...
Handling unhandled raster operations in a document conversion
The conversion of a document of a first format that supports a set of raster operations into a document of a second format that does not support one or more...
Octree construction on graphics processing units
An octree GPU construction system and method for constructing a complete octree data structure on a graphics processing unit (GPU). Embodiments of the octree...
Methods and systems for processing digital data rate and directional
Various methods and systems permit digital data, such as video data, audio/video data, audio/video/subpicture data and the like, to be processed in a manner...
Display screen with icon