At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Display screen with icon
Display screen with icon
Matching client device to appropriate data package
One or more techniques and/or systems are disclosed for matching a client device with an appropriate network service provider data package. A device ID for the...
Custom data indicating nominal range of samples of media content
A media processing tool adds custom data to an elementary media bitstream or media container. The custom data indicates nominal range of samples of media...
Ambulatory presence features
A system facilitates managing one or more devices utilized for communicating data within a telepresence session. A telepresence session can be initiated within...
Echo removal techniques are described. As part of the echo removal, an adaptive model estimate of the echo in a received audio signal is determined using an...
Embodiments are configured to provide reminders associated with communications and other events. In an embodiment, components of a communication system can...
Above-lock camera access
Apparatus and methods are disclosed for allowing smart phone users to "capture the moment" by allowing easy access to a camera application when a mobile device...
Action processing in information exchange services
Provided herein are systems, methods, and software for facilitating information exchange services. In at least one implementation, an information exchange...
Proof of possession for web browser cookie based security tokens
In one embodiment, a user device 110 may access a network service 122 using a secure cookie 300. A high trust process may create an authentication proof 360...
Remote access of digital identities
A system and method for controlling distribution and use of digital identity representations ("DIRs") increases security, usability, and oversight of DIR use. A...
Secure computation using a server module
A server module evaluates a circuit based on concealed inputs provided by respective participant modules, to provide a concealed output. By virtue of this...
Extensible access control architecture
Software for managing access control functions in a network. The software includes a host that receives access control commands or information and calls one or...
Filtering non-actionable alerts
Handling alerts in a system to reduce to the number of non-actionable alerts that are provided to an alert handling portion of the system. A method includes...
Supply modulation for radio frequency power amplification
The subject matter described herein relates to supply modulation for power amplification. In one embodiment, the voltage level of the envelope with a tunable...
Shared hidden layer combination for speech recognition systems
Providing a framework for merging automatic speech recognition (ASR) systems having a shared deep neural network (DNN) feature transformation is provided. A...
Image rendering filter creation
One or more techniques and/or systems are disclosed for creating an image rendering filter that can be used to produce a desired view of an image. Monitor...
Virtual place-located anchor
A method is disclosed that may include, in a creating phase: receiving an instruction to generate a virtual place-located anchor at a virtual location that is...
Visual representation expression based on player expression
Using facial recognition and gesture/body posture recognition techniques, a system can naturally convey the emotions and attitudes of a user via the user's...
Systems and methods for detecting a tilt angle from a depth image
A depth image of a scene may be received, observed, or captured by a device. A human target in the depth image may then be scanned for one or more body parts...
Automatic project content suggestion
Automatically suggesting content, for example, documents, contacts information, tasks, calendar items, and the like, for inclusion into an electronic...
Power regulation of power grid via datacenter
One or more techniques and/or systems are provided for regulating an amount of power on a power grid using a datacenter. This allows demand to be more closely...
Multi-environment configuration of data integration projects
A system and method for facilitating execution of one or more data integration projects in multiple environments or an environment that undergoes changes. Each...
Weighting dictionary entities for language understanding models
A dictionary used by a spoken language understanding (SLU) system is improved by providing weightings for entities in the dictionary that represent the...
Semi-supervised random decision forests for machine learning using
mahalanobis distance to identify geodesic paths
Semi-supervised random decision forests for machine learning are described, for example, for interactive image segmentation, medical image analysis, and many...
Domains for knowledge-based data quality solution
The subject disclosure relates to a knowledge-driven data quality solution that is based on a rich knowledge base. The data quality solution can provide...
Deep structured semantic model produced using click-through data
A deep structured semantic module (DSSM) is described herein which uses a model that is discriminatively trained based on click-through data, e.g., such that a...
Feature-augmented neural networks and applications of same
A system is described herein which uses a neural network having an input layer that accepts an input vector and a feature vector. The input vector represents at...
Isolate extraneous motions
A system may receive image data and capture motion with respect to a target in a physical space and recognize a gesture from the captured motion. It may be...
Secure creation of encrypted virtual machines from encrypted templates
Booting a machine in a secure fashion in a potentially unsecure environment. The method includes a target machine beginning a boot process. The method further...
Managing policy and permissions profiles
Systems, methods, and computer-readable storage media are provided for managing policy and permissions profiles. Individuals or organizations are permitted to...
Content customization with security for client preferences
Techniques for content customization with security for client preferences are described herein. The techniques describe the customization of content provided by...
Presenting list previews among search results
Systems, methods, and computer storage media having computer-executable instructions embodied thereon that facilitates the presentation of list previews among...
Multiple concurrent audio modes
Embodiments described herein include devices and processes for concurrently processing different audio streams with different hardware-based audio processing...
Machine map label translation
Map label translation implementations described herein transliterate and translate map labels in a first language, even those written in a non-Latin script,...
Intelligent translations in personal see through display
A see-through, near-eye, mixed reality display apparatus for providing translations of real world data for a user. A wearer's location and orientation with the...
Semantic diff and automerge
Resolving conflicting changes to structured data files. A method includes for a structured data file which has both a generic structure and dialects built on...
Hyperlink destination visibility
Various embodiments utilize page scripting and parsing to identify the target destination of a hyperlink and provide a visual indication of the destination to...
Driver shimming techniques are described. In one or more implementations, an identification is made as to which interfaces and callbacks are utilized by a shim...
Latch-free, log-structured storage for multiple access methods
A data manager may include a data opaque interface configured to provide, to an arbitrarily selected page-oriented access method, interface access to page data...
Dynamic content access window loading and unloading
A computing device includes a primary content storage machine configured to selectively store one or more content portions of a digital content item, such as...
Compliance testing through sandbox environments
A compliance user or auditor is enabled to inject failures into a sandbox environment, which may be similar to a production service. The sandbox environment may...
Synchronous replication in a distributed storage environment
Embodiments of the present invention relate to synchronously replicating data in a distributed computing environment. To achieve synchronous replication both an...
Recovery processing for database in persistent system
The recovery of one or more transactions in a computing system in which one or more persistent systems are coupled via a bus to one or more processors. As an...
Message communication of sensor and other data
A service may be provided that reads sensors, and that communicates information based on the sensor readings to applications. In one example, an operating...
Providing lock-based access to nodes in a concurrent linked list
A method of providing lock-based access to nodes in a concurrent linked list includes providing a plurality of striped lock objects. Each striped lock object is...
Application activation framework
Techniques for application activation are described herein. An operating system (OS) can be configured to incorporate various extension points that are...
Offering network performance guarantees in multi-tenant datacenters
Methods of offering network performance guarantees in multi-tenant datacenters are described. In an embodiment, a request for resources received at a datacenter...
Virtual machine assurances
Briefly, aspects of the subject matter described herein relate to virtual machines. In aspects, when a host is reset or powered on, a measured boot is...
Detecting and preventing virtual disk storage linkage faults
In an exemplary embodiment, a virtual disk file can be assigned an identifier and a virtual disk files that is dependent on the virtual disk file can include a...