At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Photo mantel view and animation
A system and computer-implemented method for rendering images on a two-dimensional display, such as a computer, handheld device, or television screen, so that...
Precise selection techniques for multi-touch screens
A unique system and method is provided that facilitates pixel-accurate targeting with respect to multi-touch sensitive displays when selecting or viewing...
Motion based display management
A display manager is configured to handle the drawing of windows on one or more displays for an application differently based on detected motion information...
Simultaneous localization and RF modeling
The simultaneous localization and RF modeling technique pertains to a method of providing simultaneous localization and radio frequency (RF) modeling. In one...
Use of sack geometry to implement a single qubit phase gate
An implementation of a single qubit phase gate for use in a quantum information processing scheme based on the .upsilon.=5/2 fractional quantum Hall (FQH) state...
A method of enabling the playing of a game is described in which an electronic message requesting assistance is sent during a game being played by a gamer....
Display screen with user interface
Isolation of application-specific data within a user account
A mechanism is provided for isolating application-specific data in an environment where multiple applications share a same user account. This mechanism enables...
Renewable and individualizable elements of a protected environment
Systems and methods for providing a protected computing environment comprising separating out a protected environment management component from a kernel of a...
Malware detection with taint tracking
Malware may be identified based on attempts to use tainted data in certain ways, such as by attempting to execute the tainted data, by attempting to modify...
Browser security notification
Tools are described that notify a user of a security risk in a network browser. The tools can determine that a security setting of a network browser poses a...
Secure key distribution to internet clients
A server may bridge between a wide area network, such as the Internet, and a local area network and may process authentication requests from clients on the wide...
Obtaining digital identities or tokens through independent endpoint
A federated identity provisioning system includes relying parties, identity providers, and clients that obtain tokens from identity providers for access to a...
Web service platform for keyword technologies
The present web service platform includes a set of application program interfaces (APIs) and a framework for adding services that correspond to the APIs. The...
Configuration of isolated extensions and device drivers
In some implementations, the operations of a software system may include the execution of untrusted device drivers. The execution of an untrusted device driver...
Utilizing a first managed process to host at least a second managed
A system and method for utilizing a first managed process to host at least a second managed process is disclosed. The technology initially provides a first...
Systems and methods for switching internet contexts without process
Systems and methods for switching from a first Internet context to a second Internet context without process shutdown are described. Internet context data, such...
Order preservation in data parallel operations
Various technologies and techniques are disclosed for preserving input element ordering in data parallel operations. This ordering may be based on element...
Methods and systems for delivering software
Methods and systems for software delivery are described. In one embodiment, an extension definition catalog structure is defined and can be used to select one...
Extending native data types
The functionality of a core application is extended using an add-on application (module) by extending native data types on the core application with custom data...
Binary verification service
A binary is received at a binary verification service from a binary verification client agent. The binary verification service performs binary verification of...
Test automation for business applications
A test framework suited for use with distributed business applications allows developers to specify a test, or suite of tests, to be easily selected and...
Unified messaging state machine
A unified messaging (UM) application benefits from platform independence and human intelligibility of eXtended Markup Language (XML). A finite state machine...
Screen magnifier panning model with dynamically resizable panning regions
A magnifier panning system is described that creates a panning region at the edges of a magnified view. When a user moves the cursor into the panning region,...
Visual feedback display
Visual feedback may be provided. First, a continuous contact with a first point on a surface may be detected. The surface may comprise, for example, a touch...
User interface for an inkable family calendar
The subject application relates to a user interface(s), system(s), and/or methodology that facilitate improved management and coordination of activities,...
Associating input with computer based content
Notes and other input may be entered directly onto computer based content. The notes may be taken on a portable computing device that contains metadata from the...
Cross domain presence of web user interface and logic
Various technologies and techniques are disclosed that allow for repurposing content of a source web site for an external web site. The developer uses a...
XSLT/XPATH focus inference for optimized XSLT implementation
Techniques are provided for performing focus inference when compiling an Extensible Markup Language Transforms (XSLT) stylesheet into a compiled XSLT processor....
Inference of contract using declarative program definition
A declarative program definition. The definition is analyzed to produce an application contract that describes semantics for sending and receiving application...
Exception raised notification
An exception notification system is described herein that provides an early notification that a software exception has occurred before exception handling code...
Configuring processors and loads for power management
Controlling processors and processor hardware components in a computing device based on execution load and a power saving preference. The power saving...
Converting luns into files or files into luns in real time
A LUN is provided that can store multiple datasets (e.g., data and/or applications, such as virtual machines stored as virtual hard drives). The LUN is...
Multi-level read caching for multiplexed transactional logging
A transactional logging service is provided to user-mode and kernel-mode log clients by utilizing a marshalling area to buffer a set of log records that a log...
Storage systems using write off-loading
Improved storage systems which use write off-loading are described. When a request to store some data in a particular storage location is received, if the...
Enhanced network system through the combination of networking objects
Reducing the cost of framing network packets in a virtual machine environment combines certain network objects to eliminate the cost of fully framing packets...
Proximity guided data discovery
Techniques are described for sharing content among peers. Locality domains are treated as first order network units. Content is located at the level of a...
Synchronizing clocks in an asynchronous distributed system
The present invention extends to methods, systems, and computer program products for synchronizing clocks in an asynchronous distributed system. Embodiments of...
Message based network configuration of dynamic domain name services
Systems and methodologies that facilitate hosting of a domain name and access of users to the Internet, by using a well defined protocol to interact with a...
Automatically detecting whether a computer is connected to a public or
Automatically detecting whether a local network that a computer is connected to is a public or private network by utilizing a trusted online service and/or...
Multimedia communications using preferred devices
Aspects of the present invention are directed at allowing users to establish a multimedia network session in which each user is allowed to employ multiple...
Proactive load balancing
A load balancing system is described herein that proactively balances client requests among multiple destination servers using information about anticipated...
Aggregating and searching profile data from multiple services
Profile data from multiple networking services can be combined and queried from one networking service. A primary networking service may store user profile data...
Virtual machine image server
Virtual machine image files are stored in a virtual machine storage by a virtual machine image file server. Users at virtual machine clients connect to the...
Inviting a conferencing unaware endpoint to a conference
Systems and methods that enable conference unaware clients to participate in the conference. A conferencing component is aware of what protocol to employ, and...
Method and apparatus for maintaining consistency of a shared space across
multiple endpoints in a peer-to-peer...
In a peer-to-peer collaboration system, deltas containing data change commands are organized in a persistent data structure called a delta log. The delta log is...
Selecting values in a distributed computing system
A distributed computing system can operate in the face of malicious failures on the part of some of its constituent devices, and provide a minimum of message...
Non-privileged access to data independent of filesystem implementation
An application programming interface (API) module provides access to data, independent of filesystem implementation in a non-privileged user mode. A discovery...
Systems and methods that transform constructs from domain to domain
The present invention provides systems and methods that isomorphically maps constructs between domain spaces (e.g., object, markup, relational and user...
Extended user profile
A method of extending user profile. A user specific data related to an application is received and stored for integration with a user profile. A template for...