At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Single chip red, green, blue, distance (RGB-Z) sensor
An RGB-Z sensor is implementable on a single IC chip. A beam splitter such as a hot mirror receives and separates incoming first and second spectral band...
Color packing glyph textures with a processor
A system, a method and computer-readable media for rendering text with a graphics processing unit (GPU). The system, method, and media includes a GPU that may...
Error metrics for characters
Generating an error from an error metric quantifying differences between reference objects representing characters and representations of the reference objects....
Object illumination in a virtual environment
Methods and systems for displaying an image as a virtual representation of an object based upon detected external light are described. An illustrative...
Electrical connection between devices
Concepts for forming an electrical connection between devices are disclosed. A cord for transferring electrical power and signals can be provided to connect a...
Arrangement for building and operating human-computation and other games
A game description language is provided for human computation games, as well as a game platform or generator component that can generate the code base for the...
Partitioned artificial intelligence for networked games
Partitioned artificial intelligence (AI) for networked gaming. An exemplary system splits the AI into a computationally lightweight server-side component and a...
Scaffolding support for learning application programs in a computerized
A computerized learning system is provided. The computerized learning system may include a learning application program executable on a computing device. The...
Sensing the amount of liquid in a vessel
A vessel comprising a fluid-confining surface, a basal surface disposed below the fluid-confining surface, and a light guide. The light guide includes a first...
Display screen with user interface
Display screen with user interface
Display screen with user interface
Installation of black box for trusted component for digital rights
management (DRM) on computing device
To install a black box on a computing device, an administrator has access to the computing device and queries same for machine properties thereof. The...
Manual operations in an enterprise security assessment sharing system
An enterprise-wide sharing arrangement uses a semantic abstraction, called a security assessment, to share security-related information between different...
Recording multi-stream interactive television
Detailed herein is a technology which, among other things, allows recording and playback of multi-stream interactive television. In one approach to this...
Relations in fuzzing data
A test tool is provided for testing a software component. The tool receives data structured and formatted for processing by the software component. The...
Architectural support for software-based protection
Instruction set architecture (ISA) extension support is described for control-flow integrity (CFI) and for XFI memory protection. ISA replaces CFI guard code...
Multi-application tabbing system
A method for displaying a plurality of windows on a display screen is described. The method includes steps of associating a first window with at least one...
Transparent envelope for XML messages
Transforming portions of a message to a destination via a communication protocol. A message is received. It is detected whether the received message includes an...
Collection ordering for replicated state machines
A replicated state machine with N replica servers may be configured to tolerate a count of F faults. A first operation (of a first ordering type) executes when...
Managing cache data and metadata
Embodiments of the invention provide techniques for managing cache metadata providing a mapping between addresses on a storage medium (e.g., disk storage) and...
System and method for providing infrastructure services without a
designated network manager
Infrastructure services such as addressing, directory services, performance monitoring, and diagnostic capabilities are shared among nodes of an ad-hoc mesh...
Cooperative diagnosis of web transaction failures
A client-based collaborative approach called WebProfiler is used for diagnosing Web transaction failures. The WebProfiler leverages end-host cooperation to pool...
Presence capabilities and preferences
Architecture for gathering and presentation to a remote user (watcher) of presence, preferences, and capabilities information of a local user (publisher). An...
Availability and scalability in a messaging system in a manner transparent
to the application
Methods, systems, and computer program products that provide for a runtime messaging infrastructure, which abstracts send and receive operations for exchanging...
Email safety determination
A computer implemented method for assisting email users recognizes deviations in characteristics of emails sent from a particular source identifier or "source...
Templates in a schema editor
A schema editor allows for definition, distribution, and use of schema templates. The schema editor allows schema to be edited and then saved in such a way that...
Dynamic information hierarchies
A dynamic information hierarchy may be provided. Logging data comprising a captured user event and a component ID associated with a hierarchical node may be...
Efficiently describing relationships between resources
A relationship data structure associated with a source resource enables methods to discover and describe relationships between the source resource and a...
Modifying service provider context information to facilitate locating
interceptor context information
A method and system for tracking context information of a service provider and interceptors of service provider requests is provided. An interceptor modifies a...
Online relevance engine
Information is automatically located which is relevant to source content that a user is viewing on a user interface without requiring the user to perform an...
Incremental query refinement
A method of incrementally refining queries and updating query result lists without requiring a user to provide an explicit indicator of query submission. In the...
Web document keyword and phrase extraction
Extraction analysis techniques biased, in part, by query frequency information from a query log file and/or search engine cache are employed along with machine...
Leveraging low-latency memory access
Computational units of any task may run in different silos. In an embodiment, a search query may be evaluated efficiently on a non-uniform memory architecture...
Embodiments are provided for searching for templates utilized for managing data in a computer application program. Multiple templates for managing data are...
Concurrency object classification
A method of automatically classifying a concurrency object includes intercepting a call that is configured to create the concurrency object. Concurrency type...
Information access with usage-driven metadata feedback
In a method for displaying and capturing metadata of documents within result presentations in information access or search systems, a metadata server is used...
Service composition environment
A service composition environment is used to create a collaborative application that links services, composite services as well as with other collaborative...
Key distribution for secure messaging
A transmitting gateway may utilize a retrieved domain-specific key to secure an outbound message, and a receiving gateway may utilize another retrieved...
Browsing and quality of service features
Embodiments are configured to provide browsing and other functionality that can be used to provide viewable data based in part on a current viewable space of a...
Identifying and surveying subscribers
A method for surveying and gathering user and status information from data processing devices coupled to a network. Data processing devices, such as cellular...
Position-dependent phonetic models for reliable pronunciation
A representation of a speech signal is received and is decoded to identify a sequence of position-dependent phonetic tokens wherein each token comprises a phone...
Integrated debugger simulator
Various technologies and techniques are disclosed that provide an integrated debugger simulator. A debugger is provided that allows a user to debug an...
Policy enforcement for multi-radio transmission and reception
A process for controlling radio transmission and/or reception to enforce certain constraints with either single or multiple radio communication is disclosed. In...
Head pose assessment methods and systems
Improvements are provided to effectively assess a user's face and head pose such that a computer or like device can track the user's attention towards a display...
Secure data protection during disasters
In situations, such as disasters, where the physical protection of data may be compromised, algorithmic protection of such data can be increased in anticipation...
Multi-party information analysis in a VoIP system
A system and method for collecting contextual information from several parties and generating an analyzed response to the contextual information is provided....
Communicating information pertaining to cancelling of forked call requests
Multiple instances of an incoming call in a unified communication system capable of communicating through multiple networks are provided to devices and/or...
Accelerated channel change
Channel changing can be accelerated by multicasting a bouquet of multicast burst streams from a server. In an example implementation, each multicast burst...
Asynchronous communication in an unstable network
Embodiments are directed to promptly reestablishing communication between nodes in a dynamic computer network and dynamically maintaining an address list in an...