At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Hardware-based protection of secure data
Computer-readable media, computerized methods, and computer systems for protecting secure data by writing content of the secure data to a protected memory...
Systematic approach to uncover GUI logic flaws
To achieve end-to-end security, traditional machine-to-machine security measures are insufficient if the integrity of the graphical user interface (GUI) is...
Mechanism for evaluating security risks
Described is a mechanism for collectively evaluating security risks associated with loading an application. A hosting environment associated with loading the...
Establishing secure data transmission using unsecured E-mail
In one embodiment, a host entity may create a trusted connection with a guest entity. The host entity may encrypt a trusted connection invitation for an...
Distribution of information protection policies to client machines
One embodiment includes a method which may be practiced in a computing environment where resources are distributed. The method includes acts for obtaining...
Seamless digital channel changing
Seamless channel changing in a digital-television-based entertainment network can be implemented, for example, by providing an intra frame to a client device...
User mode file system serialization and reliability
An operating system is provided. The system includes an agent component to monitor computer activities between one or more single-item access components (SIAC)...
Real-time self tuning of planned actions in a distributed environment
Automatic programming, scheduling, and control of planned activities at "worker nodes" in a distributed environment are provided by a "real-time self tuner"...
A facility for automatically processing software patches is described. The facility receives in a computing system a distinguished patch package for modifying...
Debugging support for tasks in multithreaded environments
A debugger enhancement provides a debug-task-provider interface whose implementation includes routines designed to support debugging of programs that contain...
Process language for microprocessors with finite resources
A reflective process algebra called the .rho.-calculus facilitates the serialization of processes at the level of the reflective process algebra. The reflective...
Site navigation and site navigation data source
A concept for providing hierarchical navigation information relative to one or more databases within a distributed computer system is described. In one aspect,...
Controlled interaction with heterogeneous data
A two-dimensional canvas onto which heterogenic objects of various types may be arranged side-by-side. Each type of object has an associated set of control(s),...
User interface (UI) dimensioning
Determining a total dimension of items in computer-based user interface control (e.g., non-uniform items displayed in grid-view), may be accomplished by...
Form validation with table driven error handling
Various embodiments provide a validation framework to validate whether data entered in a web application is valid. The framework includes a validation resource...
Image acquisition from dynamic content for delivery to network-enabled
static display devices
An image service uses a uniform resource locator (URL) or other location identifier to retrieve static images embedded in dynamic content presentations from the...
Terminal for exchanging electronic business cards
A terminal and a method for exchanging electronic business cards that can guarantee privacy and guarantee complete and consistent communications to the user are...
Delete notifications for an entire storage volume
A delete notification can be received at a storage stack filter in a storage stack. It can be determined whether the delete notification applies to an entire...
Smart device recordation
Valuable information can be retained upon a storage device, such as a flash memory unit. Due to the portable nature of the memory, there can be increased...
Hardware support for work queue management
The claimed matter provides systems and/or methods that effectuate utilization of fine-grained concurrency in parallel processing and efficient management of...
Using server type to obtain network address
In aspects, a gateway that sits between a single network protocol client and a server receives a request from the client for a network address of the server....
Distribution of binary executables and content from peer
Binary executables are distributed in a distributed manner by equipping a server with a bootstrap program. The server provides the bootstrap program to a client...
Dye injected request generation
Web server processes can host multiple web applications that process multiple requests from multiple clients. Recorded diagnostic information may not provide a...
Unifying discoverability of a website's services
Various embodiments provide a unified discovery control that can be incorporated as part of a web browser. The unified discovery control provides a central...
Live custom media play lists
List processing functionality (LPF) is described for creating a play list that defines an order in which video media programs are to be presented. Different...
Transaction-safe FAT files system
In one aspect, the present disclosure describes a process for maintaining file allocation tables (FATs) for a volume of storage medium. The process includes...
Techniques to manage a taxonomy system for heterogeneous resource domain
Techniques to manage vocabulary terms for a taxonomy system are described. An apparatus may comprise a managed taxonomy system having a vocabulary management...
Global metadata embedding and decoding
Global metadata, such as a document identifier, which may be a globally unique identifier, is embedded into an embedded interactive code document by combining a...
Composite nested streams
Reshaping of streams is provided to facilitate utilizing the streams without rapidly increasing memory requirements as the size of the stream increases. The...
Scalable algorithm for sharing EDI schemas
Recreating an electronic data interchange (EDI) schema from a file. The file is received from a source and the file includes a plurality of data values. The...
Metadata search interface
A system and method for implementing a metadata search interface is disclosed. The technology creates a configuration file for the metadata search interface...
Substantially similar queries
A system described herein includes analyzer component that analyzes queries submitted by users and corresponding URLs selected by the users, wherein the queries...
Smart attribute classification (SAC) for online reviews
Techniques for identifying attributes in a sentence and determining a number of attributes to be associated with the sentence are described. The techniques...
Two stage search
A two stage model identifies individuals having knowledge in a subject matter area relevant to a query. A relevance model receives a query and identifies...
Efficient navigation of search results
Systems, methods, and computer-readable media for navigating search results are provided. In response to receiving a search query, at least one individual...
Memory object sharing for just in time compiled data
Just in time compiled code and other data within a runtime environment may be shared between multiple applications by identifying common data objects and...
Linear-program formulation for optimizing inventory allocation
Computer-readable media for determining whether to accept a candidate order from a content provider, or advertiser, to display a particular number of...
Use of taxonomized analytics reference model
The composition of a data-driven analytics model that includes at least an analytical modeling component that defines analytical relationships between the model...
A mapping application that returns results for a target location as a function of at least one nearby landmark. The one or more nearby landmarks can be selected...
Portable media player having a flip form factor
A portable media player is configured with a flip form factor in which a flip cover is hingedly fixed to a main body portion of the player. The flip cover...
Self-configuring wireless network location system
Wireless adapters are installed on one or more general purpose computing devices and are connected via a network in an enterprise environment. The adapters are...
Automatic wireless device message management responsive to end user
Automatically retrieving messages by a wireless telephone based on user preferences. A method of the invention receives a notification, on a wireless device,...
Image text to character information conversion
Converting text may be provided. A user selectable element may be used to select a text. The selected text may include a first text within an electronic...
Systems and methods for securing video card output
The various methods and systems described herein are directed to supplying a secure channel for software executing on a host computer. The methods and systems...
Filter bank optimization for acoustic echo cancellation
A communications device is presented for providing bi-directional audio communications between a near-end user and a far-end user via a bidirectional...
Associating a telephone call with a dialog based on a computer protocol
such as SIP
Providing non-voice capabilities relating to a phone call at a computing device includes receiving a request to begin a telephone call from a first telephone to...
Switching distortion metrics during motion estimation
Techniques and tools for switching distortion metrics during motion estimation are described. For example, a video encoder determines a distortion metric...
Rational Z-buffer for decreasing a likelihood of Z-buffer collisions
A "Rational Z-Buffer" provides various techniques for reducing artifacts when rendering graphics using z-buffers. In particular, the Rational Z-Buffer reduces...
Physics simulation-based interaction for surface computing
The claimed subject matter provides a system and/or a method that facilitates enhancing interactive surface technologies for data manipulation. A surface...