At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Wireless beacon filtering and untrusted data detection
A determination is made, at a device, as to whether data identifying signals detected at the device include data from a non-stationary wireless beacon. If the...
Event-based media grouping, playback, and sharing
Exemplary methods, apparatus, and systems are disclosed for capturing, organizing, sharing, and/or displaying media. For example, using embodiments of the...
Desktop screen sharing over HTTP
Sharing a desktop screen is implemented on a Hypertext Transfer Protocol (HTTP) web server using variable interval GET and POST requests. Connection to a web...
Peer-to-peer sharing of cloud-based content
A cloud-based storage service hosts content information that may be accessed by client machines in a peer-to-peer network. The content information is a compact...
Streaming video over a wireless network
Streaming video to a wireless device is described. For example, one embodiment of a computer-implemented method for providing a multimedia stream to a wireless...
Secure identification of intranet network
A method is provided for network identification based on high entropy data on a network which are not easily guessed or obtained outside the network, which can...
Granular assessment of device state
A system for assessing a computer device's state may collect state data about the device, then assess the state with respect to the policy for granting one or...
Reauthentication to a web service without disruption
Authenticating internet application sessions. A method includes downloading client side code that when executed implements one or more client side modules...
Granular client inventory management with conflict resolution
Granular inventory management with conflict resolution at a target is provided. A client receives inventory management requests, as default settings and/or from...
Sequenced transmission of digital content items
The disclosure provides a system and method for managing and sequencing the transmission of digital content items from a network-accessible content service to a...
Object-based computer system management
A method, system, and architecture for managing computer systems is provided. A management system employs management objects (MOs) to provide administrators the...
Masking with shared random bits
A non-linear transformation including a plurality of non-linear logical operations is masked to a second or higher order. The masking includes receiving a set...
Orthogonal signaling for CDMA
The present invention uses a portion of an orthogonal spreading code space in a CDMA spectrum for uplink from a user element to a base station. By assigning the...
Center of mass state vector for analyzing user motion in 3D images
Techniques described herein determine a center of mass state vector based on a body model. The body model may be formed by analyzing a depth image of a user who...
System, method, and medium for generating a map of a geographic region
based on client location data
Described herein are technologies pertaining to presenting a map to a user that comprises graphical icons that are representative of retail stores. The user has...
Self-healing of operating system components
Aspects of the subject matter described herein relate to operating system technology. In aspects, a mechanism is described that allows self-healing actions to...
Usable security of online password management with sensor-based
A multi-party security protocol that incorporates biometric-based authentication and withstands attacks against any single party (e.g., mobile phone, cloud, or...
Searching and browsing URLs and URL history
System(s) and/or method(s) ("tools") are described that present indicia for implicitly and explicitly user-associated web pages of a network browser...
Relevant file identification using automated queries to disparate data
Relevant files are determined for a user upon detecting a user action such as save, load, open, view, share, or comparable ones associated with a file. The...
Data management in social networks
Architecture that monitors interaction data (e.g., search queries, query results and click-through rates), and provides users with links to other users that...
Front end and backend replicated storage
An existing primary data copy can be maintained on an existing primary front end server node. One or more existing secondary data copies can be maintained on...
Cloud data storage using redundant encoding
Cloud data storage systems, methods, and techniques partition system data symbols into predefined-sized groups and then encode each group to form corresponding...
Incremental maintenance of range-partitioned statistics for query
A database management system that manages data in a database includes a query optimizer that performs query optimization based on statistics related to data in...
Fat directory structure for use in transaction safe file system
Directories in a file system are defined with a dummy cluster in a file allocation table as the initial entry. Subsequent clusters in a directory's definition...
Volume having tiers of different storage traits
A volume system that presents a volume having an extent of logical addresses to a file system. A volume exposure system exposes the volume to the file system in...
Controls of a graphical user interface (GUI) in an application under test (AUT) can be tested where the AUT utilizes an accessibility support framework. An...
Memory allocation tracking
The subject disclosure relates to tracking and/or auditing memory allocations for one or more computer-implemented processes. In particular, memory allocation...
Visualization of states of a process
A method of providing a visualization of states of a process includes identifying a set of potential states that can occur during the process and a...
Healing cloud services during upgrades
Embodiments described herein are directed to migrating affected services away from a faulted cloud node and to handling faults during an upgrade. In one...
Method, system, and apparatus for providing alert synthesis in a data
A method for diagnosing problems with protection of a data source and recovery of the same. The method includes diagnosing a copy of data located at the storage...
Conditional deferred queuing
Conditional deferred queuing may be provided. Upon receiving a message, one or more throttle conditions associated with the message may be identified. A lock...
Optimized datacenter management by centralized task execution through
A Datacenter Management Service (DMS) is provided as a platform designed to automate datacenter management tasks that are performed across multiple technology...
Plug-in task scheduler
A parallel execution runtime allows tasks to be executed concurrently in a runtime environment. The parallel execution runtime delegates the implementation of...
Terminal services application virtualization for compatibility
Systems, methods and computer-readable storage media are disclosed for providing a virtual single-user session to a client in a terminal server session. In an...
Model slicing and versioning
Embodiments are directed to implementing a dynamically changeable system model that is customizable per version, programmatically generating system models at...
Data-driven schema for describing and executing management tasks in a
graphical user interface
This disclosure describes a user interface (UI) conceptual model and a data model for quickly and easily developing and managing a GUI. The present methods and...
Managing boot loaders for virtual hard disks
The claimed subject matter provides a system or method for managing software changes. An exemplary method comprises creating a reset boot loader, a last known...
Process for generating dynamic type
A process for generating dynamic type is disclosed. A compiler generated template method including a mark for custom instruction is selected for cloning....
Simplified user controls for authoring workflows
A workflow design system provides user interface controls that allow a workflow author to focus on the steps of the workflow before deciding on how to control...
Solid-state drive management and control
Various techniques of solid-state drive ("SSD") management systems, components, modules, routines, and processes are described in this application. In one...
Virtual input devices created by touch input
An input device is created on a touch screen in response to a user's placement of their hand. When a user places their hand on the touch screen, an input device...
Edge-based hooking gestures for invoking user interfaces
Presented herein are techniques for invoking user interfaces in graphical computing environments involving "hooking" gestures applicable to an edge of a...
Techniques for using human gestures to control gesture unaware programs
A capture device can detect gestures made by a user. The gestures can be used to control a gesture unaware program.
Audio navigation assistance
Embodiments that relate to a head-mounted computing device for providing navigation assistance via audio output are disclosed. For example, in one disclosed...
Display screen with icon
Display screen with icon
Display screen with icon
Display screen with graphical user interface
Display screen with animated graphical user interface