At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Control of separate computer game elements
Control of separate computer game elements is described. In one example, a computer game system displays a computer game to a user, the computer game comprising...
Display screen with icon
Display screen with graphical user interface
Display screen with icon
Display screen with graphical user interface
Improving scalability and reliability of hardware geo-fencing with
Systems and methods disclosed herein may include tracking one or more geo-fences using a GNSS hardware processor within a computing device. The tracking may use...
Current device location advertisement distribution
In embodiments of current device location advertisement distribution, a mobile network operator receives media content from a content service and can then...
Video coding / decoding with re-oriented transforms and sub-block
Techniques and tools for video coding/decoding with sub-block transform coding/decoding and re-oriented transforms are described. For example, a video encoder...
User-specific roaming settings
Disclosed herein is a roaming settings service that receives an update to roaming settings specific to a user that is initiated by an instance of an application...
Data cube high availability
The subject disclosure is directed towards making cube data highly available and efficient to access by separating the read cube server from the processing cube...
Multiple buffering orders for digital content item
Various embodiments are disclosed that relate to buffering digital content items in different orders for different user experiences. For example, one disclosed...
Filtering electronic messages based on domain attributes without
A messaging application filters electronic messages based on domain attributes without a reputation. A message with a uniform resource identifier (URI) is...
Resource access throttling
Techniques for resource access throttling are described. In implementations, access to a network resource can be controlled based on a variety of factors, such...
Direct network having plural distributed connections to each resource
A direct network is described in which each resource is connected to a switching fabric via a set of two or more routing nodes. The routing nodes are...
Calling an unready terminal
A voice or video call is to be established between a caller and a callee based on a call flow that involves a call establishment request and a corresponding...
Methods and systems for providing secure access to a hosted service via a
The present invention discloses methods and systems for providing secure user access to services offered by a service provider to a client application over a...
Methods and systems to mitigate inter-cell interference
The present invention provides methods and devices for mitigating inter-cell interference in communication environments having a plurality of cells. In some...
Automatic audio harmonization based on pitch distributions
Two audio samples and/or sets of audio samples are identified. The pitch distributions of the audio samples and/or sets of audio samples are identified, the...
Enclosure power distribution architectures
Computational enclosures may be designed to distribute power from power supplies to load units (e.g., processors, storage devices, or network routers). The...
Tracking head movement when wearing mobile device
Methods for tracking the head position of an end user of a head-mounted display device (HMD) relative to the HMD are described. In some embodiments, the HMD may...
Medical image rendering
Medical image rendering is described. In an embodiment a medical image visualization engine receives results from an organ recognition system which provide...
Interpolating oriented disks in 3D space for constructing high fidelity
geometric proxies from point clouds
An "Oriented Disk Interpolator" provides various techniques for interpolating between points in a point cloud using RGB images (or images in other color spaces)...
Transformation function insertion for dynamically displayed tracer data
A visualization system for a tracer may include a processing pipeline that may generate tracing data, preprocess the data, and visualize the data. The...
Content recommendation system and method
A system and method of recommending and rating content and/or for generating a determined affinity between content consumers and reviewers. The method includes...
Modifying avatar behavior based on user action or mood
Techniques are described for enabling the selection of wallpaper to modify the mood projected by an avatar. The mood projected by an avatar may be modified, for...
Technology for pre-ordering (e.g., pre-fetching content) at a shared computing premise is described. The technology can enable a user to locate and reserve an...
Quantum computers having partial interferometric quantum gates
A quantum computer may include topologically protected quantum gates and non-protected quantum gates, which may be applied to topological qubits. The...
Method and apparatus for protecting regions of an electronic document
A method and apparatus for protecting regions of an electronic document are provided. According to the method, the entire electronic document is protected. The...
Product authorization with cross-region access
A method and system for authorizing access to a product to limit suspected cross-region access is provided. The system receives from a customer device a product...
Secure credential unlock using trusted execution environments
Computing devices utilizing trusted execution environments as virtual smart cards are designed to support expected credential recovery operations when a user...
Protecting operating system configuration values using a policy
identifying operating system configuration settings
In a pre-operating system environment on a device prior to loading and running an operating system on the device, a policy identifying configuration settings...
Retrieving content from website through sandbox
A client system interacts with a sandbox environment to host a web browser control within the sandbox. A webpage URL, a URL to a script file to be injected into...
Bidirectional mapping between applications and network content
A bidirectional mapping is established between network content and application programs, based on declarations at both the network content and at the...
Dynamic client interaction for search
A system for guiding a search for information is presented. The system comprises a user interface that accepts a phrase and receives at least one suggestion...
Biasing search results toward topics of interest using embedded relevance
Redirection ("biasing") architecture that automates the selection of topical terms in a search query, and provides a user-selectable (e.g., clickable) interface...
Dynamic schema content server
A method to develop a game using a networked content server includes an efficient method to add or modify a new object into the game environment. The method...
Formula and function generation and use in electronic spreadsheets
Spreadsheet formula and function creation and use with electronic computing devices are provided. When a user moves content (e.g., a spreadsheet cell) into a...
System for scalable configuration and context
Instance properties are defined for instances of an application. During episodes of the instances, the values of the instance properties are populated. Other...
Contextually interacting with applications
The present discussion relates to contextually interacting with applications. One example can include a computer that has a set of applications installed...
Dynamic extension view with multiple levels of expansion
Application extension management may be provided. A plurality of related documents may be scanned to determine whether an activation trigger associated with an...
Editor visualization of symbolic relationships
Enhancing dynamic code. A method includes obtaining one or more first data structures defining constructs in a body of dynamic language source code. From the...
Speech recognition for context switching
Various embodiments provide techniques for implementing speech recognition for context switching In at least some embodiments, the techniques can enable a user...
Systems, methods, and computer media for resizing icons displayed in a user interface are provided. Icons in a display can be resized by a user interacting with...
Tracking changes in collaborative authoring environment
Change tracking and collaborative communication are provided in authoring content in a collaborative environment. Monitored changes, comments, and similar input...
Input data type profiles
Techniques for providing input data type profiles are described. In at least some embodiments, input data type profiles can be implemented to enable...
Self aligning minimal gap keycaps
Keyboard keys are outfitted with alignment features whose configuration, placement and geometry on a key serve to allow the key to automatically self-locate...
Virtual object manipulation
Systems, methods and computer readable media are disclosed for manipulating virtual objects. A user may utilize a controller, such as his hand, in physical...
Object-detecting backlight unit
This document describes techniques and apparatuses for implementing an object-detecting backlight unit for a display device. An object-detecting backlight unit...