At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Display screen with transitional graphical user interface
Display screen with animated graphical user interface
Display screen with graphical user interface
Display screen with graphical user interface
Aggregated tuner scheduling
A television recording system in which multiple client devices can form a group, sharing tuners and channel lineups. The clients may be desktop or laptop...
Virtual image display device
This document describes techniques and apparatuses for implementing a virtual image display device. A virtual image display device may include a display and a...
Mixing infrared and color component data point clouds
The subject disclosure is directed towards mixing RGB data with infrared data so as to provide depth-related data in regions where infrared data are sparse....
Local participant identification in a web conferencing system
An event computer receives video in which one or more local participants of a conferencing event are viewable. The event computer receives head detection...
Systems and methods for detecting a tilt angle from a depth image
A depth image of a scene may be received, observed, or captured by a device. A human target in the depth image may then be scanned for one or more body parts...
Host enabled management channel
A logical communication path is provided between a target virtual machine (VM) and a host or application communicating with the VM. The target VM runs on a...
Wireless synchronization of media content and subscription content
Arrangements are provided which use a host computer to configure a wireless portable device's network connection parameters. The radio on the portable device...
Mobility in a multi-access communication network
Various embodiments provide a terminal capable of establishing multiple communication sessions with a public network proxy through different access networks....
Cross-process media handling in a voice-over-internet protocol (VOIP)
A computer-implemented system is provided that facilitates implementation of a voice-over-IP (VOIP) application. The system includes a host system and a user...
Dynamic cross-site request forgery protection in a web-based client
A canary value is used to validate a message from a non-web browser client application to a web server providing web services to mitigate cross-site forgery...
Extension model for improved parsing and describing protocols
Described is a technology by which an engine parses data based upon modules arranged in a tree-like model structure. Only those modules that meet a condition...
Protecting user credentials from a computing device
Protecting user credentials from a computing device includes establishing a secure session between a computing device and an identity provider (e.g., a Web...
On demand location sharing
An on demand location sharing technique protects the location of a client device until the user of the client device elects to share the location. The location...
Moderating electronic communications
A method for moderating an electronic message includes intercepting the electronic message at a server computing device, and evaluating content of the...
Secure computation using a server module
A server module evaluates a circuit based on concealed inputs provided by respective participant modules, to provide a concealed output. By virtue of this...
Using visual cues to disambiguate speech inputs
Embodiments related to recognizing speech inputs are disclosed. One disclosed embodiment provides a method for recognizing a speech input including receiving...
Machine-learning based classification of user accounts based on email
addresses and other account information
A trust level of an account is determined at least partly based on a degree of the memorability of an email address associated with the account. Additional...
Software-based trusted platform module
A "Firmware-Based TPM" or "fTPM" ensures that secure code execution is isolated to prevent a wide variety of potential security breaches. Unlike a conventional...
Data mapping using trust services
Embodiments are directed to mapping encryption policies to data stored in a database using a policy identifier, and to accessing data stored in a database using...
Information privacy system and method
The subject disclosure relates to systems and methods for providing privacy for information. In one non-limiting embodiment, a system includes an environment...
Protected computing environment
A method of establishing a protected environment within a computing device including validating a kernel component loaded into a kernel of the computing device,...
Inheritance of rules across hierarchical levels
Rules, such as condition-action rules, are configured at different levels of a hierarchy. For example, a top level site administrator may configure rules, lower...
Query refinement in a browser toolbar
Embodiment described herein are generally directed to a toolbar extension of a web browser that grabs a user's search engine query and suggests a refined search...
Presenting actions and providers associated with entities
Computer-readable media, computer systems, and computing devices method of facilitating presentation of actions and providers associated with entities. The...
Sync framework extensibility
Embodiments described herein may involve enabling applications to cooperate with a system-level sync framework. The sync framework may provide system...
Integrating search with application analysis
Aspects of the subject matter described herein relate to searching. In aspects, a software package may be received and transformed into searchable data. Static...
A method for scaling out database information may include creating second database instantiation. The method may include configuring one or more partitions of a...
Determination of landmarks
Hash values corresponding to a file are processed in windows to determine a minimum hash value for each window. Each window may begin at a minimum hash value...
Immutable sharable zero-copy data and streaming
The environment and use of an immutable buffer. A computing entity acquires data or generates data and populates the data into the buffer, after which the...
Predicting, diagnosing, and recovering from application failures based on
resource access patterns
Technologies are described herein for differentiating normal operation of an application program from error conditions to predict, diagnose, and recover from...
Scalable services deployment
Embodiments provide an abstraction on top of virtual machine allocation APIs to expose scalable services. The services are higher level components that expose a...
Context-based device action prediction
The described implementations relate to automatically performing device actions. One implementation can obtain a contextual value of a contextor. The...
Consistent operating system servicing for distributed nodes
Methods, systems, and computer-readable media for deploying an updated image to nodes propagated throughout a distributed computing platform are provided. Upon...
Automatic configuration of project system from project capabilities
A project system is automatically configured from project capabilities determined from an instance of a build system by a project capabilities analyzer. A...
Inline display and preview of related information for elements in a
Disclosed herein is a system and method for optimizing a developer's ability to find and navigate relevant documents, relationships, and other information...
Ink lag compensation techniques
Ink lag compensation techniques are described. In implementations, an input is recognized by a computing device as an ink stroke to be rendered on a display...
Toolbar dashboard functionality
A system described herein includes a receiver component that receives an indication that a user has selected a first selectable buttontab in a toolbar installed...
Multi-touch object inertia simulation
The inertia system provides a common platform and application-programming interface (API) for applications to extend the input received from various multi-touch...
Calibrating eye tracking system by touch input
Embodiments are disclosed that relate to calibrating an eye tracking system via touch inputs. For example, one disclosed embodiment provides, on a computing...
Assignment of control of peripherals of a computing device
Techniques for enabling software-assisted assignment of control of peripherals (e.g., assigning ownership of or assigning access to the peripherals) by a...
User character input interface with modifier support
A user interface suited for use on mobile devices for entering characters which may require one or more modifiers is disclosed. The interface may be implemented...
Throwing gestures for mobile devices
At least one tilt sensor generates a sensor value. A context information server, receives the sensor value and sets at least one context attribute. An...
Wearable food nutrition feedback system
A see-through, head mounted display and sensing devices cooperating to provide feedback on food items detected in the device field of view. Feedback can include...
Support component for an apparatus
A support component for an apparatus is described. In at least some implementations, a support component is attached to an apparatus (e.g., a computing device)...
Display screen with icon