At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Interactive presentation system
A computerized educational presentation system is provided. The system may include a presentation application program. The presentation application program may...
Pinning a callout animation
Animation for the attachment of content items to a location on a content surface in a user interface is provided. A user interface showing a content surface may...
Resizable text backing shapes for digital images
In one embodiment, a digital image viewer 110 may use an adjustable text backing shape 312 to preserve legibility of an image text segment 310 during size...
Aggregation and visualization of multiple chat room information
The information made available in a series of chat windows which each represent a different chat room is summarized and displayed in a single chat window...
Memory facilitation using directed acyclic graphs
Memory facilitation using directed acyclic graphs is described, for example, where a plurality of directed acyclic graphs are trained for gesture recognition...
Topological quantum computation via tunable interactions
A quasiparticle interactor induces interactions between non-Abelian quasiparticles. State information is teleported between non-Abelian quasiparticles due to...
Single use recovery key
Aspects of the subject matter described herein relate to disclosing recovery keys. In aspects, when a recovery key is disclosed, data is updated to indicate...
Trustzone-based integrity measurements and verification using a
software-based trusted platform module
A "Firmware-Based TPM" or "fTPM" ensures that secure code execution is isolated to prevent a wide variety of potential security breaches. Unlike a conventional...
Opportunistic, priority-based object synchronization
Mechanisms for synchronizing an object set with a remote data store are often performed at a particular frequency, e.g., once per hour or day. However, the...
Interactive segment extraction in computer-human interactive learning
A collection of data that is extremely large can be difficult to search and/or analyze. Relevance may be dramatically improved by automatically classifying...
Suggesting a set of operations applicable to a selected range of data in a
A smart selection engine is provided. The smart selection engine may run in the context of a spreadsheet application on any device, service, or general endpoint...
Interactive synchronization of web data and spreadsheets
Interactive synchronization of Web data and spreadsheets is usable to build data wrappers based on any type of data found in a document. Such data wrappers can...
Editing the text of an arbitrary graphic via a hierarchical list
The present invention includes a graphics software program that automatically creates graphical content when a user creates or modifies a hierarchical list of...
Among other things, one or more techniques and/or systems are provided for application prioritization. For example, an operating system of a computing device...
Matching based pattern inference for SMT solvers
A method for automatically analyzing formulas and adding pattern annotations to quantifiers based on a database of common pattern idioms. The method involves...
Tile communication operator
A high level programming language provides a tile communication operator that decomposes a computational space into sub-spaces (i.e., tiles) that may be mapped...
Voice-command suggestions based on user identity
A computing system is configured to listen to user speech and translate the user speech into voice commands that control operation of the computing system. The...
Optimal display and zoom of objects and text in a document
An object is zoomed upon selection. A scaling factor is calculated for zooming the object based on current viewing properties of a document and properties of...
Showing interactions as they occur on a whiteboard
Real-time interactions made by a client on a whiteboard are shown on remote client(s) currently viewing the whiteboard. The real-time interactions that are...
Skeletal control of three-dimensional virtual world
A virtual skeleton includes a plurality of joints and provides a machine readable representation of a human target observed with a three-dimensional depth...
Scenario-specific body-part tracking
A human subject is tracked within a scene of an observed depth image supplied to a general-purpose body-part tracker. The general-purpose body-part tracker is...
Customizing operation of a touch screen
A method for customizing operation of a digitizer system operated with an electronic device is described, the electronic device including software applications....
Efficient power management of a system with virtual machines
Efficient power management of a system with virtual machines is disclosed. In particular, such efficient power management may enable coordination of system-wide...
Near eye display
A system and related methods for near-eye display of an image are provided. In one example, a near-eye display system includes a light source comprising a...
Spherical interface for binocular display
A binocular display includes a waveguide. A convex spherical mount has a fixed position relative to the waveguide. A light engine includes a concave spherical...
Ambient vehicle and pedestrian state detection for device notification
Described is a technology by which ambient data related to a vehicle is sensed and processed, for use in determining a state change related to external traffic...
Display screen with graphical user interface
Display screen with graphical user interface
Traffic segmentation in prevention of DDOS attacks
Systems, methods, and computer storage media for traffic segmentation in prevention of DDoS attacks are provided. Data associated with one or more users of a...
Volatility-based classifier for security solutions
Various embodiments provide an approach to classifying security events based on the concept of behavior change detection or "volatility." Behavior change...
Alerting recipients to errors occurring when accessing external services
A hosting provider operates a server system that provides a service to one or more tenants. The server system receives configuration data from the tenants. As...
Congestion control for delay sensitive applications
In various embodiments, methods and systems are disclosed for a hybrid rate plus window based congestion protocol that controls the rate of packet transmission...
Multi-use antenna techniques are described. In one or more implementations, a device includes a single fixed radiating structure, a first branch coupled to the...
Intelligent determination of replays based on event identification
A system for intelligently determining replay locations in a multimedia content stream based on identifying events in the multimedia content stream is provided....
Using free-form deformations in surface reconstruction
Volumes of a 3D physical space are used in a surface reconstruction process, where adjacent volumes share vertices so that no gaps or overlaps between the...
Avatars are used to graphically represent users in a communications session, and the avatars are capable of being animated. An indication of an animation of one...
Data interpolation and classification method for map data visualization
A method is provided for applying a visual classification scheme to a map. A target region comprising a plurality of display units is identified within the map....
Division of processing between systems based on external factors
A method includes acts for rendering, on a data processing system, a result derived from a set of data by performing data processing across a first data...
Runtime application integrity protection
Systems, methods, apparatuses, and computer program products are described for checking the integrity of applications installed on a computing device and...
User-defined application models
A system (and corresponding method) that employs wiki-type models to consider authoring rather than composition in an application environment is provided. The...
Small form factor web browsing
A large web page is analyzed and partitioned into smaller sub-pages so that a user can navigate the web page on a small form factor device. The user can browse...
Reformulating query terms in structured search
Search history data such as browse trails are collected over time. The browse trails, including associated queries and domains, are processed to identify free...
Keyword generation for media content
In various embodiments, a transcript that represents a media file is created. Keyword candidates that may represent topics and/or content associated with the...
Persisting state at scale across browser sessions
The management of application state storage associated with a hierarchical application. The hierarchical application includes multiple parent user interface...
Reducing update conflicts when maintaining views
Aspects of the subject matter described herein relate to reducing update conflicts when maintaining views. In aspects, a transaction in snapshot isolation may...
Queryless search based on context
Computer-readable media, computer systems, and computing devices for initiating a queryless search is provided. In this regard, a search can be initiated...