At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Unified data type system and method
A type system includes a dual representation for basic data types. One representation is the basic data type representation common to such basic built-in data...
Dynamic user interface for previewing live content
A dynamic user interface for previewing live content includes multiple tiles. Information for multiple pieces of live content available from a gallery is...
Discovering alternative user experiences for websites
The present invention extends to methods, systems, and computer program products for discovering alternative user experiences for Websites. Embodiments of the...
Systems and methods for defining web content navigation
The described systems and methods are directed at defining web content navigation. The disclosed technique enables the development of web content for a scenario...
Statistical debugging using paths and adaptive profiling
The method executes the application and if there are no errors from the execution of the application, the method ends. If errors exist, the errors are collected...
Obfuscated state store for rights management system and the like
A state store having state information therein is stored on a computing device. Information at least nearly unique to the computing device is obtained, and a...
Secure processor architecture for use with a digital rights management
(DRM) system on a computing device
A secure processor is operable in normal and preferred modes, and includes a security kernel instantiated when the processor enters into preferred mode and a...
Efficiently synchronizing with separated disk caches
In a method of synchronizing with a separated disk cache, the separated cache is configured to transfer cache data to a staging area of a storage device. An...
Hybrid butterfly cube architecture for modular data centers
A hybrid Butterfly Cube ("BCube") architecture is described herein. The BCube architecture is a server-centric network architectural design, and includes a...
Reciprocal public trust relationship
Publicly accessible linking information is to establish a trusted relationship between reciprocally linked entities controlling web resources, such as websites...
Method and system for supporting the communication of presence information
among computing devices of a network
A method and system for aggregating presence information generated by multiple devices associated with a single user is presented. A server acting as a presence...
Synchronizing for directory changes performed while offline
Aspects of the subject matter described herein relate to synchronizing for directory actions performed while offline. In aspects, file system objects that...
Proofs to filter spam
Embodiments of proofs to filter spam are presented herein. Proofs are utilized to indicate a sender used a set amount of computer resources in sending a message...
People-centric view of email
The subject invention provides a unique system and method that facilitates contact- or people-based organization of messages. A list of contacts can be...
Default location that may be dynamically changed
Content that is received by an application is delivered to a default location that may be dynamically updated. This default location for content may be updated...
Visualization as input mechanism
A visualization input system is provided. The system includes a visualization component that receives input gestures from a user (or users) and translates the...
Management of collections of websites
This disclosure describes techniques that enable a subscriber of a data center to manage a site collection group hosted by the data center. A site collection...
Relevance score in a paid search advertisement system
Described is a paid search advertising technology in which advertisements associated with bidding keywords are ranked by relevance when returning one or more...
Topics in relevance ranking model for web search
Described is a technology by which topics corresponding to web pages are used in relevance ranking of those pages. Topics are extracted from each web page of a...
Parsing, analysis and scoring of document content
The present invention may be used to analyze subject content, search and analyze reference content, compare the subject and reference content for similarity,...
A concept network that can be generated in response to a user query. Various embodiments include analysis of structure information, for example, where such...
Self-compacting pattern indexer: storing, indexing and accessing
information in a graph-like data structure
An indexing system uses a graph-like data structure that clusters features indexes together. The minimum atomic value in the data structure is represented as a...
Modeling recurring events in a data store
Time-related properties may be modeled independent of a base object. Rather than storing time properties with the object, they may be stored independently. A...
System and method for data migration
A method for concurrent data migration includes classifying files to be migrated into plural jobs, selecting media to which to migrate each job, and using...
Methods and apparatus for web-based research
A method and apparatus for facilitating web-based research among a community of users. Templates created by at least one user within the community may be...
Providing time-sensitive information for purchase determinations
A method, system, and medium are provided that are directed to providing a user with time-sensitive information that is usable to determine when to purchase a...
Detecting an answering machine using speech recognition
An answering machine detection module is used to determine whether a call recipient is an actual person or an answering machine. The answering machine detection...
Conveying locations in spoken dialog systems
The presentation of location information to a user that is distracted by traveling can result in the user quickly forgetting, or never even comprehending, key...
Vehicle computer system with audio entertainment system
A vehicle computer system has an audio entertainment system implemented in a logic unit and audio digital signal processor (DSP) independent from the host CPU....
User interface for wireless headset on a gaming console
A wireless headset having a user interface configured to allow the user to utilize the full functionality of the headset while minimizing the number of physical...
Methods and apparatus for transmitting power and data using the human body
Methods and apparatus for distributing power and data to devices coupled to the human body are described. The human body is used as a conductive medium, e.g., a...
Variable resolution images
In accordance with one or more aspects, a variable resolution image is displayed at an initial resolution. The variable resolution image has multiple portions,...
Apparatuses, methods, and computer-storage media provide character string templates to facilitate receiving non-prose handwriting input from a user and...
Laplacian principal components analysis (LPCA)
Systems and methods perform Laplacian Principal Components Analysis (LPCA). In one implementation, an exemplary system receives multidimensional data and...
Geometric parsing of mathematical expressions
A processing device may parse a group of strokes representing a mathematical expression. The group of strokes may be examined to determine whether the group of...
Advanced bi-directional predictive coding of interlaced video
For interlaced B-fields or interlaced B-frames, forward motion vectors are predicted by an encoder/decoder using forward motion vectors from a forward motion...
Enhancing digital images using secondary optical systems
Apparatuses and methods for enhancing a "primary" large format, digital, macro-image with "secondary" image data are provided. The secondary image data is...
Systems and methods for providing intermediate targets in a graphics
Intermediate target(s) are utilized in connection with computer graphics in a computer system. In various embodiments, intermediate memory buffers in video...
Identification of devices on touch-sensitive surface
The identification of a data storage device detected on a touch-sensitive display surface of a display device is described. In one embodiment, the presence and...
Generating audio signals based on input device position
A computer input device and computer system are provided that determine if the input device is at an edge of a pattern on a working surface based on an image of...
Solid state image wavelength converter
A method for encoding information that is encoded in spatial variations of the intensity of light characterized by a first wavelength in light characterized by...
Subscription based services for closed computing systems
A disclosure of a subscription service is provided, where this service allows for the running of unsigned content, such as games, on closed computing systems,...
Modular enterprise authorization solution
An authorization framework located external to an application may be invoked to determine user authorization for a requested application component. Small...
Security authorization queries
In an example implementation, a bifurcated security scheme has a first level that does not allow usage of negations and a second level that does permit usage of...
Security state aware firewall
A network firewall may apply policies to packets based on a security classification. Packets with an authenticated and established security connection may be...
Trusted license removal in a content protection system or the like
A digital license includes an identification of a removal service that can authorize removing such license. A client selects the license to be removed and the...
Generating and changing credentials of a service account
Technologies are described herein for generating and changing credentials of a service account. In one method, a credential schedule is retrieved. The...
Executing business logic extensions on a client computing system
Technologies are described herein for executing business logic extensions on a client computing system. A server platform exposes server-hosted application...
Management of external hardware appliances in a distributed operating
Embodiments are provided to manage external hardware appliances from a distributed operating system interface in a computer network using a driver model to...
Small barrier with local spinning
A barrier with local spinning. The barrier is described as a barrier object having a bit vector embedded as a pointer. If the vector bit is zero, the object...