At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
See-through near-eye display glasses with the optical assembly including
absorptive polarizers or...
This disclosure concerns an interactive head-mounted eyepiece with an integrated processor for handling content for display and an integrated image source for...
Display screen with transitional graphical user interface
Display screen with icon
Display screen with graphical user interface
Filtering and clustering crowd-sourced data for determining beacon
Embodiments analyze crowd-sourced data to identify a moved or moving beacon. The crowd-sourced data involving a particular beacon is filtered based on a cluster...
Location determination for white space utilization
A technique for a wireless device to obtain white space information from a component configured for cellular communication, such as a cellular phone. The...
Creation and management of RFID device versions
The claimed subject matter provides a system and/or method that creates, manages, or maintains multiple device versions in a network of Radio Frequency...
Place-specific buddy list services
An information service provides search and notifications to inform when certain people (e.g., friends, family, business contacts, etc.) are nearby so as to...
Searching electronic program guide data
Searching electronic program guide (EPG) data is described. The EPG data may be compartmentalized into channel metadata that describes characteristics of one or...
Proximity and connection based photo sharing
Photos are shared among devices that are in close proximity to one another and for which there is a connection among the devices. The photos can be shared...
Malicious uniform resource locator detection
The techniques described herein use training data to train classification models to detect malicious Uniform Resource Locators (URLs) that target authentic...
Strategies for controlling use of a resource that is shared between
trusted and untrusted environments
A strategy is described for controlling access to a resource which is shared between a trusted environment and an untrusted environment. The resource can...
Proof of device genuineness
A cryptographic process is provided which allows a server to verify that a client device is genuine. The client device is provisioned with first and second data...
Transmission of information relating to a quality of service
Methods of transmitting information relating to a quality of service are shown, which information is to be transmitted in at least one direction between a first...
Controlled data network error recovery
A method, a system and network nodes use an indication of possible duplicates of units, so that these units can be handled differently than other units. The...
Cognitive use of multiple regulatory domains
A wireless communication system that concurrently communicates information in multiple regulatory domains to facilitate audio/video media streaming and other...
An electronic connector includes a base, a tapered extension protruding from the base, and a nose forming a terminal end of the tapered extension. The tapered...
Media content for a mobile media device
Various embodiments enable a user of a mobile media device to select one or more channels to load onto the device. Each channel comprises a collection of media...
Conservatively adapting a deep neural network in a recognition system
Various technologies described herein pertain to conservatively adapting a deep neural network (DNN) in a recognition system for a particular user or context. A...
Virtual surface compaction
Virtual surface update and composition techniques are described. These techniques support the use of initialization and batching of updates, use of updates and...
Space skipping for multi-dimensional image rendering
Space skipping for multi-dimensional image rendering is described. In an embodiment a ray-casting engine is used to form a two dimensional image from an at...
Ad copy quality detection and scoring
Methods, systems, and computer-readable media for evaluating the quality of text within online advertisements using output from a language model are provided....
Single system image via shell database
A single system image is provided for a parallel data warehouse system by exposing a shell database within a database management system comprising metadata and...
Protection from unfamiliar login locations
In one embodiment, a user authentication server may use geo-location tracking to determine whether to present an enhanced identity challenge. A communication...
Reducing ad impact to browser onload event
Various embodiments pertain to techniques for decreasing an amount of time to a browser onload event by asynchronously loading web page content. In various...
Re-ranking search results based on lexical and ontological concepts
Search result re-ranking is provided by employing a concept graph from a metabase. When a search query is received, a query context of the search query is...
Topical search engines and query context models
Topical search engines can add contextual keywords to an input query to bias results toward a particular topic or domain. In one instance, query context models...
Determining quality of tier assignments
Technologies pertaining to computing a tiering policy that defines how digital items are desirable stored across a plurality of different storage tiers are...
User pipeline configuration for rule-based query transformation,
generation and result display
A query pipeline for an enterprise search system is configurable by a user of the system. A user may create rules for custom query transformation and parallel...
Query constraint encoding with type-based state machine
A query specified in a source programming language can be analyzed as a function of a type-based state machine that encodes query constraints of a target...
Generation based update system
Techniques are directed to managing image generation for desktop and screen sharing systems as well as for large image systems such as mapping. An apparatus may...
Computerized statistical machine translation with phrasal decoder
A computerized system for performing statistical machine translation with a phrasal decoder is provided. The system may include a phrasal decoder trained prior...
Application of multiple content items and functionality to an electronic
Application of content and associated functionality from multiple content sources to an electronic content item is provided. Content from a first document may...
Flux fountain techniques are described. In one or more implementations, an apparatus includes a cover configured to be disposed over at least a portion of a...
Flexible hinge and removable attachment
Flexible hinge and removable attachment techniques are described. In one or more implementations, a flexible hinge is configured to communicatively and...
Estimating application energy usage in a target device
Embodiments provide implementations for estimating a test application's energy usage on a target device based on execution of the test application. Resource...
Managing recovery virtual machines in clustered environment
Techniques involving replication of virtual machines of virtual machines in a clustered environment are described. One representative technique includes...
N-way parity for virtual disk resiliency
Resiliency techniques for a virtual disk are described that enable user control over storage efficiency and recovery time. Configuration parameters for a...
Virtual machine migration tool
Tools and techniques for migrating applications to compute clouds are described herein. A tool may be used to migrate any arbitrary application to a specific...
Partitioned array objects in a distributed runtime
Embodiments are directed to using object serialization to communicate references to shim objects and to managing memory on worker processes of a distributed...
Configurable planned virtual machines
A planned virtual machine, for use in staging the construction of a virtual machine. Such a planned virtual machine may be used as part of a method for...
Data templates in user interface elements
A data template that is used to generate arbitrary data of a user interface element that is part of the hierarchy of user interface elements used to render a...
Converting desktop applications to web applications
Technologies are described herein for converting a desktop application to a web application. An interface file is generated based on a user interface of the...
Suppressing dialog boxes
A method for browser software with a tabbed interface to suppress, or delay, the display of a dialog box that is initiated by an inactive, or background, tab....
Cumulative movement animations
Cumulative movement animation techniques are described. In one or more implementations, an output a first animation is initiated that involves a display of...
Input device configurations
Input device configurations are described. In one or more implementations, an input device includes a connection portion, protective case, and one or more...
Flexible display flexure assembly
In embodiments of a flexible display flexure assembly, a flexure assembly includes a structure of pivotable links that couples first and second housing parts of...
Occupancy prediction using historical occupancy patterns
Methods and systems for occupancy prediction using historical occupancy patterns are described. In an embodiment, an occupancy probability is computed by...
Proximity detection for shared computing experiences
Systems and methods for detecting whether or not two devices are proximate to one another in order to provide a shared computing experience are provided. The...