At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Propagating user status information across computing resources
The subject matter of this disclosure can be implemented in, among other things, a device that includes processors, means for receiving a voicemail greeting...
Maintaining network connectivity
A network device may select between two or more network connections based on a determination of whether the network device can access general Internet resources...
Systems and methods for displaying fixed-scale content on mobile devices
A system and method for maintaining certain content items at a fixed size and resolution and/or position relative to a device display are described herein....
Methods and systems for a virtual input device
The present application discloses systems and methods for a virtual input device. In one example, the virtual input device includes a projector and a camera....
Flipping for motion-based input
A computer-implemented method for identifying motion-based inputs to an electronic device involves determining that the electronic device has been rotated in a...
Identifying misrepresented characters in strings of text
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for identifying misrepresented characters in strings of text....
Wearable display device
Wearable display device section
Detecting impersonation on a social network
In one implementation, a method includes receiving a claim that identifies a first user profile page as allegedly impersonating a second user profile page on a...
Access to a target object with desired functionality
A system and method provide access to a target object associated with a desired functionality. This is accomplished by creating an instance of a pre-existing...
Rendering approximate webpage screenshot client-side
Methods, systems, and apparatuses, including computer programs encoded on a computer storage medium, for rendering an approximate webpage screenshot client-side...
Synchronizing web browsers
Systems and methods for synchronizing web browsers using synchronization windows are disclosed. A user action performed in a synchronization window, such as a...
Methods and apparatus for clustering news content
Methods and apparatus are described for scoring documents in response, in part, to parameters related to the document, source, and/or cluster score. Methods and...
System and method of accessing a document efficiently through multi-tier
A client-server network system implements a multi-tier caching strategy for a user to access a document efficiently. When serving a document to client, the...
Network failure detection
A number of requests for an alternative network location are identified, where the requests for the alternative network location are generated after failure of...
Electronic communication reminder technology
Techniques are described for providing reminders for electronic communications. For instance, response patterns of a user are determined by communication type...
Zero-click sharing of application context across devices
A first client device performs a handoff operation to a second client device by transmitting application information, associated with a first application, to...
Reusing data in content files
An embodiment for reusing data in content files includes receiving a request for a content file and retrieving a recipe that includes a series of instructions...
Data structure for incremental search
A system for searching an object environment includes harvesting and indexing applications to create a search database and one or more indexes into the...
Searching for user interface objects
A computer-implemented method includes searching resources related to an application in response to receiving a query, identifying an operation in the...
Searching in multiple languages
Systems and methods for multilingual searching allow search terms to be entered in a first language and searched in another language. A selection of a language...
Document ranking based on document classification
A system may determine an extent to which a document is selected when the document is included in a set of search results, generate a score for the document...
The present invention provides methods and apparatus, including computer program products, implementing techniques for searching and ranking linked information...
User interface for facts query engine with snippets from information
sources that include query terms and...
A method and a system for providing snippets of source documents of an answer to a fact query are disclosed. Snippets of source documents may be provided in...
System and method for improved information retrieval
An improved information retrieval system. In response to detecting that the user has interacted with a display element in a first web page within a web browser...
Escrowing digital property in a secure information vault
Digital data can be escrowed by receiving escrow parameters including a condition(s) for releasing the escrowed data, and an escrow recipient. An escrow...
Monetizing service calls through advertising
A platform service that is used by an application may be linked to an advertising service. A cost of using the platform service may be reduced based on the...
Estimating inventory, user behavior, and/or cost and presentation
attributes for an advertisement for use with...
An advertiser may be provided with fast and accurate estimates of the future performance of at least one of their advertisements. These estimates may be broken...
Editing voice input
A computer-implemented method of generating a voice command to perform an action includes receiving a voice request to perform the action, wherein the voice...
Text message sessions
The subject matter of this document can be embodied in, among other things, a computer-method that includes receiving a text message associated with a first...
Identifying a geographically nearby mobile computing device
In general, the subject matter described in this specification can be embodied in methods, systems, and program products for identifying proximity of a mobile...
Mesh network control using common designation wake-up
Each of a plurality of network nodes in an ad hoc mesh network utilizes a data communication device that includes a two-way communications component, comprising...
Regional map zoom tables
A graphics or image rendering system builds application-oriented tables on a server that are downloaded to a client device responsive to a request for map data...
Systems and methods for resizing an icon
Systems and methods for resizing an icon are disclosed according to various aspects of the subject technology. In one aspect, a computer-implemented method for...
Multimode input field for a head-mounted display
Exemplary methods and systems relate to a multimode input field for a head-mounted display (HMD). An exemplary multimode input field is operable to display...
Locking mechanism based on unnatural movement of head-mounted display
A wearable computer determines unnatural movements of a head-mounted display (HMD) and triggers a locking mechanism. In one embodiment, the wearable computer...
Double sand-boxing for flash library
A Flash advertisement is provided, and access to sensitive data associated with the Flash advertisement is restricted. First library code is stored at a first...
Anti-phishing system and method
An anti-phishing system and method includes monitoring a user input data stream input to a computing device, identifying, in the user input data stream, one or...
Traversing video recommendations
A system, method and various user interfaces facilitate traversing multiple groups of video recommendations. A group of video recommendations includes a central...
Exiting low-power state without requiring user authentication
A method may include, in response to an idle time of a computing device meeting or exceeding a power-save time threshold value, placing the device into a...
Anticipatory preparation of application-layer protocol responses
Methods, systems, and computer-readable medium for latency reduction on Hypertext Transfer Protocol (HTTP) servers using User Datagram Protocol (UDP) are...
Redundant data requests with cancellation
A server system having one or more processors and memory receives a request including server identifiers for one or more other server systems. After receiving...
Application verification for hosted services
In a client-server environment providing hosted services, an application service server receives from a client a first request for hosted services associated...
Content request optimization
Content item requests are identified in a web page source document. For each request, it is determined if a content item request has been generated, and if a...
Editing information configured for use in selecting content regarding at
least one content provider
A computer-implemented method for controlling content distribution includes forwarding information associated with a user to a device operated by the user, the...
Cross-domain communicating using data files
In one implementation, a computer-implemented method includes receiving at a data server computer hosted at a first internet domain a request from a client...
Acoustic model adaptation using geographic information
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for enhancing speech recognition accuracy. In one aspect, a...
System and method for storing and providing routes
In one aspect, a system and method is provided whereby map-related requests from mobile devices are used to store and aggregate routes. The routes are then used...
Wireless base station location estimation
A wireless base station allows a mobile device to communicate with a wireless network. An estimate of the location of the wireless base station may allow a...
Location based reminders
A computer-implemented user alert method includes identifying a task for a user, associating a location with the task, monitoring a location of a mobile device...