At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Geometric parsing of mathematical expressions
A processing device may parse a group of strokes representing a mathematical expression. The group of strokes may be examined to determine whether the group of...
Advanced bi-directional predictive coding of interlaced video
For interlaced B-fields or interlaced B-frames, forward motion vectors are predicted by an encoder/decoder using forward motion vectors from a forward motion...
Enhancing digital images using secondary optical systems
Apparatuses and methods for enhancing a "primary" large format, digital, macro-image with "secondary" image data are provided. The secondary image data is...
Systems and methods for providing intermediate targets in a graphics
Intermediate target(s) are utilized in connection with computer graphics in a computer system. In various embodiments, intermediate memory buffers in video...
Identification of devices on touch-sensitive surface
The identification of a data storage device detected on a touch-sensitive display surface of a display device is described. In one embodiment, the presence and...
Generating audio signals based on input device position
A computer input device and computer system are provided that determine if the input device is at an edge of a pattern on a working surface based on an image of...
Solid state image wavelength converter
A method for encoding information that is encoded in spatial variations of the intensity of light characterized by a first wavelength in light characterized by...
Subscription based services for closed computing systems
A disclosure of a subscription service is provided, where this service allows for the running of unsigned content, such as games, on closed computing systems,...
Modular enterprise authorization solution
An authorization framework located external to an application may be invoked to determine user authorization for a requested application component. Small...
Security authorization queries
In an example implementation, a bifurcated security scheme has a first level that does not allow usage of negations and a second level that does permit usage of...
Security state aware firewall
A network firewall may apply policies to packets based on a security classification. Packets with an authenticated and established security connection may be...
Trusted license removal in a content protection system or the like
A digital license includes an identification of a removal service that can authorize removing such license. A client selects the license to be removed and the...
Generating and changing credentials of a service account
Technologies are described herein for generating and changing credentials of a service account. In one method, a credential schedule is retrieved. The...
Executing business logic extensions on a client computing system
Technologies are described herein for executing business logic extensions on a client computing system. A server platform exposes server-hosted application...
Management of external hardware appliances in a distributed operating
Embodiments are provided to manage external hardware appliances from a distributed operating system interface in a computer network using a driver model to...
Small barrier with local spinning
A barrier with local spinning. The barrier is described as a barrier object having a bit vector embedded as a pointer. If the vector bit is zero, the object...
System using backward inter-procedural analysis for determining
alternative coarser grained lock when finer...
Locks which protect data structures used within atomic sections of concurrent programs are inferred from atomic sections and acquired in a manner to avoid...
Servicing software through versioning
Software typically changes over its useful lifetime. New versions of software are created to change or improve functionality, to add functionality, to correct...
Fully capturing outer variables as data objects
Providing for read/write access to captured free variables expressed as environment data objects is disclosed herein. By way of example, free variables can be...
Build-time enforcement of architectural partitioning in computer
A computer software construct has a plurality of components and is built based on an architecture designed for the construct. The architecture includes a number...
Core object-oriented type system for semi-structured data
A type system employing structural subtyping is disclosed herein. A core type system supports several structural types, such as stream, choice, intersection and...
Artifact sharing from a development environment
An identification of a multi-component development artifact to be shared is obtained in a development environment. A remote receiver with whom to share...
Orientation free user interface
Generation and display of a dynamically orientable graphical user interface (GUI) is described. The GUI can include user input controls that are configured to...
User interface visual cue for use with literal and non-literal values
A property value associated with a property of a graphical object is retrieved. A visual cue associated with the property value is displayed, wherein the visual...
System and method for creation of an object within an object hierarchy
A system and method relating to creation of object(s) in an object hierarchy structure is provided. An object generator that in response to a command to expand...
Web page error reporting
An error in a web page displayed on a device is detected. The error is assigned to a bucket to indicate a type of the error, and a record describing the current...
Root cause problem identification through event correlation
Correlating activity events to identify a root cause of a process failure. Activity event data is received from a process executing on a computing device. The...
Digital signatures for embedded code
Generating a digital signature of an entire embedded code project while maintaining certain exclusion areas so that a productivity application can incorporate...
Interface protocol and API for a wireless transceiver
A wireless protocol may be implemented in a smart transceiver device that contains the physical (PHY) and media access control (MAC) layers of the wireless...
Combining SIP requests with SIP responses
A method and system for combining SIP requests with SIP responses is provided. When a server receives a request from a client, a message combining system of the...
Profile deployment using a generic format
A network enabled computer receives connection profile information in a generic form and creates one or more native mode profiles to establish connections. By...
Streaming operator placement for distributed stream processing
A streaming operator assignment system and method for determining a streaming operator assignment that minimizes overload in a data processing system....
Dynamic web service deployment and integration
A computer system receives registration information from a service provider registering web services with the dynamic web service configuration store. The...
Dynamic email directory harvest attack detection and mitigation
Dynamic directory harvest attack detection and mitigation system is accomplished by altering the logic surrounding how a receiving email server enforces its...
Real time update notification
Computer method and apparatus for communicating information between a plurality of client computers by means of a communications network. A data server computer...
Data relationship visualizer
Data having express or implied relationships may be displayed by selecting a starting entity in a data structure, building a relationship tree, and building and...
History answer for re-finding search results
A system, method, and medium are provided for providing a personalized answer to a user-defined search query by utilizing the user's search history. A search...
Indexing and searching audio using text indexers
A full-text lattice indexing and searching system and method for indexing word lattices using a text indexer to enable enhance searching of audio content. The...
Methods and systems provide a tool for searching and analyzing XPS files. In accordance with the described embodiments, a user can search and analyze XPS files...
Training a search result ranker with automatically-generated samples
A search result ranker may be trained with automatically-generated samples. In an example embodiment, user interests are inferred from user interactions with...
Date effective quantity on hand and adjusted unit cost calculation
An accounting method can insert changes that affect average cost calculations after the initial average cost calculations. The method can go back in time and...
Predictive geo-temporal advertisement targeting
A method, system, and medium are provided for targeting advertisements to users of mobile devices based on geo-temporal models. Time-stamped location...
Word-dependent transition models in HMM based word alignment for
statistical machine translation
A word alignment modeler uses probabilistic learning techniques to train "word-dependent transition models" for use in constructing phrase level Hidden Markov...
HMM alignment for combining translation systems
A computing system configured to produce an optimized translation hypothesis of text input into the computing system. The computing system includes a plurality...
Visual assessment of landmarks
Visual images may be used to detect, or verify the existence of, landmarks. In one example, the landmarks may be used to provide driving or walking directions....
Multiple directions to a destination without providing a specific origin
The automatic generation of multiple sets of directions for navigating geographically to a specific destination without specification of an origin. Based on the...
Route transfer between devices
A user can intend to travel between different locations and employ different traveling manners to reach an intended travel destination. At different points,...
Producing a locally optimal path through a lattice by overlapping search
A system and computer-implemented method for the creation of a structure using Lego building blocks is disclosed. Aspects of the methods are equally appropriate...
System and method for optimizing network communication in response to
A system and method for facilitating communications between a mobile device and a network application are provided. A mobile device transmits a request for data...
Semi-automatic plane extrusion for 3D modeling
In accordance with one or more aspects, a plane in a 3D coordinate system in which a 3D model is to be generated based on one or more 2D images is identified. A...