At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Managing network data transfers in view of multiple data usage plans
Embodiments manage data transfers using a plurality of data usage plans available to a computing device. Each of the data usage plans has data usage statistics...
Adaptive timeline views of data
Concepts and technologies are described herein for providing adaptive timeline views of data. In accordance with the concepts and technologies disclosed herein,...
Scalable multi-thread video decoding
Decoding tasks are identified for decoding encoded video. Decoding tasks may include entropy decoding tasks, motion compensation tasks, inverse frequency...
Video compression using virtual skeleton
Optical sensor information captured via one or more optical sensors imaging a scene that includes a human subject is received by a computing device. The optical...
Automated story generation
Automatic story production is implemented by the utilization of theme scripts with user assets to generate a quality finished product with minimum user input or...
Imaging through a display screen
The described implementations relate to enhancement images, such as in videoconferencing scenarios. One system includes a poriferous display screen having...
Video preview based browsing user interface
A first video preview corresponding to a first video program is played back. When it is time to transition from playing back the first video preview to playing...
Fast gating photosurface
An embodiment of the invention provides a camera comprising a photosurface having a substrate comprising photopixels and associated storage pixels and a...
Proxy-based cache content distribution and affinity
A distributed caching hierarchy that includes multiple edge routing servers, at least some of which receiving content requests from client computing systems via...
Network address translators (NAT) type detection techniques
Techniques described herein enable peers to determine each peer's NAT type much more efficiently and quickly than when compared with existing techniques. To do...
Active speaker identification
Procedures for identifying clients in an audio event are described. In an example, a media server may order clients providing audio based on the input level. An...
Establishing secure, mutually authenticated communication credentials
Establishing secure, mutually authenticated communication between a trusted network and a perimeter network. Servers on the perimeter network may be securely...
Delegation-based authorization is described. In one example, a reference monitor receives from a first entity a request and a credential statement comprising a...
Statistical security for anonymous mesh-up oriented online services
Web pages and applications commonly consume functionality provided by services to provide users with a rich experience. For example, a backend mapping service...
System for and method of securing a network utilizing credentials
A system for and method of securing a network are described herein. A receiving device listens for packets with proper credentials. If a transmitting device...
Distributed single sign on technologies including privacy protection and
Technologies for distributed single sign-on operable to provide user access to a plurality of services via authentication to a single entity. The distributed...
Synchronizing views during document presentation
An application synchronizes views during document presentation. The application detects a selection of a section of a portion of presented content at a...
Location-aware selection of public transportation
A mobile device such as a mobile phone, smart phone, personal music player, handheld game device and the like that is configured to be location-aware through...
Bringing a visual representation to life via learned input from the user
Data captured with respect to a human may be analyzed and applied to a visual representation of a user such that the visual representation begins to reflect the...
Signal analysis for repetition detection and analysis
Techniques described herein use signal analysis to detect and analyze repetitive user motion that is captured in a 3D image. The repetitive motion could be the...
Embedded gamer card across multiple devices and networks
A gamercard associated with an integrated gamer profile to identify a gamer is provided to the gamer and other PC/console users who also participate in other...
Predicting audience response for scripting
Various technologies described herein pertain to automatic prediction of an anticipated audience response for scripting. A sub-document unit can be received,...
Optimized font subsetting for a print path
Subject matter described herein is directed to providing font-rendering information (e.g., XPS file) that is usable to print a document. For example, a font...
Automatic mediation of resource access in mobile applications
The subject disclosure is directed towards automated, static analysis-based program code processing that detects unprotected resource accesses by applications,...
Server-aided private set intersection (PSI) with data transfer
Existing private set intersection (PSI) protocol allows two parties to find intersection of their sets, but restricts learning any other information about each...
Threat level assessment of applications
An application safety system is described herein that provides a scoring system of how dangerous an application is based on behavioral inspection of the...
Dynamic selection of authorization processes
Systems, methods, and software are disclosed herein for licensing applications using a preferred authorization process dynamically identified based on...
Entity detection and extraction for entity cards
A system and method are provided for detecting entity information contained within search results. The detected entity information can be used to determine a...
Event processing with XML query based on reusable XML query template
Methods, systems, and computer-readable media are disclosed for event processing with a query based on a reusable XML query template. A particular method...
Relaxation for structured queries
A structured query may specify attribute values for attributes. An estimate of the number of items that will match the structured query if it is applied to a...
Aspects of the subject matter described herein relate to grid queries. In aspects, a client sends search criteria that represent two or more dimensions to a...
Lock-free indexing of documents
Methods and systems for serving documents are provided. Documents may be served to users, for example, in response to search query inputs. Documents may be...
Retrieval of prefix completions by way of walking nodes of a trie data
Technologies pertaining to providing completions to proffered prefixes are disclosed herein. A suggested completion to a proffered prefix is retrieved by...
Memory management techniques
Memory management techniques that permit an executing process to store content in memory and later retrieve that content from the memory, but that also permit a...
Module specific tracing in a shared module environment
A module-specific tracing mechanism may trace the usage of a module on behalf of the module developer. The module may be used by multiple application...
Methods and computer program products for generating a model of network
Provided are methods and computer program products for generating a model of network application health. Methods may include receiving activity data that...
Fault tolerance for tasks using stages to manage dependencies
A high availability system has an application server communicatively coupled to one or more client machines through a network utilizing stateless communication...
Method, system and device for validating repair files and repairing
A system and method for repairing corrupt software components of a computer system. Corrupt software is detected and repaired utilizing an automated component...
Controlling access to shared resource by issuing tickets to plurality of
Access to a shared resource by a plurality of execution units is organized and controlled by issuing tickets to each execution unit as they request access to...
Dynamic plugin(s) for cloud application(s)
Techniques are described herein that are capable of dynamically installing plugin(s) for application(s). An agent plugin is caused to run in a deployment of a...
Roaming of note-taking application features
Methods are disclosed for managing configuration variables and settings within a note-taking application such that application features are adjusted globally...
Method of deriving web service interfaces from form and table metadata
A system and method of deriving web service interfaces from form and table metadata is disclosed. The method uses a discovery subsystem to discover services...
Control flow graph application configuration
An operating system may be configured using a control flow graph that defines relationships between each executable module. The operating system may be...
Specifying compiled language code in line with markup language code
Compiled language code is specified in line with markup language code. A parsing component parses the code to extract the compiled language code and a compiler...
Managing an immersive interface in a multi-application immersive
This document describes techniques and apparatuses for managing an immersive interface in a multi-application immersive environment. In some embodiments, these...
Target element zoom
Various embodiments provide a target element zoom component that is configured to perform a focal point zoom operation on a target element using an appropriate...
Flexible hinge protrusion attachment
Flexible hinge and removable attachment techniques are described. In one or more implementations, a flexible hinge is configured to communicatively and...
Force concentrator techniques are described. In one or more implementations, a pressure sensitive key includes a sensor substrate having a plurality of...
On-demand scalable timer wheel
Various embodiments enable on-demand scaling of a timer wheel. Some embodiments dynamically start and stop a timer wheel based, at least in part, on whether the...
Display screen with graphical user interface