At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Modular architecture for distributed system management
A distributed system manager may identify updates to perform, identify devices to update, and perform the updates while maintaining service availability. The...
Contextual focus-agnostic parsing-validated alternatives information
Parsing-validated alternatives information (PVAI) is acquired from inactive software development contexts and displayed in the current context to help...
Soft keyboard interface
User experience of the performance of a computing device is improved through an operating system that processes inputs from a soft keyboard to provide...
Direct manipulation of content
Various embodiments provide techniques for direct manipulation of content. The direct manipulation of content can provide an intuitive way for a user to access...
Providing item specific functionality via service-assisted applications
Embodiments extend functionality of a first application with actions from one or more second applications specifically applicable to a content item selected by...
System and method for displaying full product functionality using minimal
user interface footprint
A sidebar UI of an application program provides access to the application program's functionality while occupying a reduced amount of real estate on the screen...
Unintentional touch rejection
A method for rejecting an unintentional palm touch is disclosed. In at least some embodiments, a touch is detected by a touch-sensitive surface associated with...
Integrating energy budgets for power management
Power consumption of a device (e.g., flash storage driver, hard drive, etc.) connected to a host computer system is managed to promote efficient power usage and...
Route computation based on route-oriented vehicle trajectories
Techniques for providing a route based on route-oriented vehicle trajectories are described. This disclosure describes receiving GPS logs and extracting...
Start-of-route map navigation with suppression of off-route feedback
A map navigation tool provides a start-of-route buffer area in which off-route feedback (e.g., audio or visual warnings or alerts) can be suppressed in some...
Interactive robot initialization
Initial interaction between a mobile robot and at least one user is described herein. The mobile robot captures several images of its surroundings, and...
Control of separate computer game elements
Control of separate computer game elements is described. In one example, a computer game system displays a computer game to a user, the computer game comprising...
Display screen with icon
Display screen with graphical user interface
Display screen with icon
Display screen with graphical user interface
Improving scalability and reliability of hardware geo-fencing with
Systems and methods disclosed herein may include tracking one or more geo-fences using a GNSS hardware processor within a computing device. The tracking may use...
Current device location advertisement distribution
In embodiments of current device location advertisement distribution, a mobile network operator receives media content from a content service and can then...
Video coding / decoding with re-oriented transforms and sub-block
Techniques and tools for video coding/decoding with sub-block transform coding/decoding and re-oriented transforms are described. For example, a video encoder...
User-specific roaming settings
Disclosed herein is a roaming settings service that receives an update to roaming settings specific to a user that is initiated by an instance of an application...
Data cube high availability
The subject disclosure is directed towards making cube data highly available and efficient to access by separating the read cube server from the processing cube...
Multiple buffering orders for digital content item
Various embodiments are disclosed that relate to buffering digital content items in different orders for different user experiences. For example, one disclosed...
Filtering electronic messages based on domain attributes without
A messaging application filters electronic messages based on domain attributes without a reputation. A message with a uniform resource identifier (URI) is...
Resource access throttling
Techniques for resource access throttling are described. In implementations, access to a network resource can be controlled based on a variety of factors, such...
Direct network having plural distributed connections to each resource
A direct network is described in which each resource is connected to a switching fabric via a set of two or more routing nodes. The routing nodes are...
Calling an unready terminal
A voice or video call is to be established between a caller and a callee based on a call flow that involves a call establishment request and a corresponding...
Methods and systems for providing secure access to a hosted service via a
The present invention discloses methods and systems for providing secure user access to services offered by a service provider to a client application over a...
Methods and systems to mitigate inter-cell interference
The present invention provides methods and devices for mitigating inter-cell interference in communication environments having a plurality of cells. In some...
Automatic audio harmonization based on pitch distributions
Two audio samples and/or sets of audio samples are identified. The pitch distributions of the audio samples and/or sets of audio samples are identified, the...
Enclosure power distribution architectures
Computational enclosures may be designed to distribute power from power supplies to load units (e.g., processors, storage devices, or network routers). The...
Tracking head movement when wearing mobile device
Methods for tracking the head position of an end user of a head-mounted display device (HMD) relative to the HMD are described. In some embodiments, the HMD may...
Medical image rendering
Medical image rendering is described. In an embodiment a medical image visualization engine receives results from an organ recognition system which provide...
Interpolating oriented disks in 3D space for constructing high fidelity
geometric proxies from point clouds
An "Oriented Disk Interpolator" provides various techniques for interpolating between points in a point cloud using RGB images (or images in other color spaces)...
Transformation function insertion for dynamically displayed tracer data
A visualization system for a tracer may include a processing pipeline that may generate tracing data, preprocess the data, and visualize the data. The...
Content recommendation system and method
A system and method of recommending and rating content and/or for generating a determined affinity between content consumers and reviewers. The method includes...
Modifying avatar behavior based on user action or mood
Techniques are described for enabling the selection of wallpaper to modify the mood projected by an avatar. The mood projected by an avatar may be modified, for...
Technology for pre-ordering (e.g., pre-fetching content) at a shared computing premise is described. The technology can enable a user to locate and reserve an...
Quantum computers having partial interferometric quantum gates
A quantum computer may include topologically protected quantum gates and non-protected quantum gates, which may be applied to topological qubits. The...
Method and apparatus for protecting regions of an electronic document
A method and apparatus for protecting regions of an electronic document are provided. According to the method, the entire electronic document is protected. The...
Product authorization with cross-region access
A method and system for authorizing access to a product to limit suspected cross-region access is provided. The system receives from a customer device a product...
Secure credential unlock using trusted execution environments
Computing devices utilizing trusted execution environments as virtual smart cards are designed to support expected credential recovery operations when a user...
Protecting operating system configuration values using a policy
identifying operating system configuration settings
In a pre-operating system environment on a device prior to loading and running an operating system on the device, a policy identifying configuration settings...
Retrieving content from website through sandbox
A client system interacts with a sandbox environment to host a web browser control within the sandbox. A webpage URL, a URL to a script file to be injected into...
Bidirectional mapping between applications and network content
A bidirectional mapping is established between network content and application programs, based on declarations at both the network content and at the...
Dynamic client interaction for search
A system for guiding a search for information is presented. The system comprises a user interface that accepts a phrase and receives at least one suggestion...
Biasing search results toward topics of interest using embedded relevance
Redirection ("biasing") architecture that automates the selection of topical terms in a search query, and provides a user-selectable (e.g., clickable) interface...
Dynamic schema content server
A method to develop a game using a networked content server includes an efficient method to add or modify a new object into the game environment. The method...
Formula and function generation and use in electronic spreadsheets
Spreadsheet formula and function creation and use with electronic computing devices are provided. When a user moves content (e.g., a spreadsheet cell) into a...