At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
System and method of storing backup image catalog
A system and method for managing backup and restore operations associated with a backup system. Metadata associated with files/directories of one or more file...
Resource management in a multi-operating environment
A method for providing user access to telephony operations in a multi operating environment having memory resources nearly depleted that include determining...
Audio control of multimedia objects
In some examples, aspects of the present disclosure may include techniques for audio control of one or more multimedia objects. In one example, a method...
Recommended news edition on a map using geo entities
Described embodiments enable the presentation to a user of news articles or other content that is of likely interest to a user and that is geographically...
User interfaces for remote management and control of network-connected
Aspects of the present invention provide user interface methods for interacting with and managing network-connected thermostats through a thermostat management...
Active phase balancing in power zones
Methods, systems, and apparatus for managing power in a data center. In one aspect, a method includes monitoring respective phase power level in each phase of...
Microphone autolocalization using moving acoustic source
Provided are methods and systems for calibrating a distributed sensor (e.g., microphone) array using time-of-flight (TOF) measurements for a plurality of...
Personalized mapping with photo tours
Methods, systems and computer-readable storage mediums encoded with computer programs executed by one or more processors for providing personalized mapping with...
Robotic gripper with multiple pairs of gripping fingers
Provided herein is a robotic gripper comprising two gripping components, where each component may comprise a rotatable axle oriented along a longitudinal axis,...
Methods and systems for distributing remote assistance to facilitate
robotic object manipulation
Methods and systems for distributing remote assistance to facilitate robotic object manipulation are provided herein. Regions of a model of objects in an...
Dual-axis robotic joint
Example joints for a robotic device are provided. An example robotic joint may include an upper portion, a lower portion, and a connecting link positioned...
Wristband with recessed clasp and method of assembling and operating same
A wristband has a clasp that includes a clasp latch and a clasp leg having an inner end and an outer end, wherein the inner end of the clasp leg is pivotally...
Portion of a display panel with a graphical user interface
Display screen with a graphical user interface
Portion of a display panel with a graphical user interface
Portion of a display panel with a computer icon
Method, apparatus and system for triggering wireless communication devices
to attach to a wireless...
A method for triggering a group of one or more detached wireless communication devices (122) to attach to a wireless communications network (101) for enabling...
Apparatus and method for seamless commissioning of wireless devices
An apparatus is provided for commissioning a target device onto a wireless local area network (WLAN). The apparatus includes a smart wireless device. The smart...
Method for effective fast re-paging in a wireless communication network
A method for paging a mobile station where the mobile station (208-212) may be in a dormant state is described. The method begins by sending a first paging...
Idle state interference mitigation in wireless communication network
A method in a mobile station for ranking cells in order to perform reselection from a serving cell to a second cell is disclosed. The method includes detecting...
Smart cache warming
According to one general aspect, a method of preemptively caching data within a mobile device may include detecting that a triggering event has occurred. The...
Techniques for using software application-related metadata in near field
A computer-implemented method includes determining, at a first mobile device associated with a first user, whether a second mobile device is within range for...
Methods, systems, and media for presenting suggestions of media content
Methods, systems, and media for presenting suggestions of media content are provided. In some implementations, the method comprises: determining an item of...
Systems and methods for using closed captions for television viewership
To provide audience measurement services without requiring broadcasters to install additional watermarking equipment, a small video capture device may receive a...
Video coding using reference motion vectors
Techniques are described to use a reference motion vector to reduce the amount of bits needed to encode motion vectors for inter prediction. One method includes...
Methods and systems for communicating sensor data on a mobile device
Methods and systems for communicating sensor data on a mobile device are described. An example method involves receiving, by a processor and from an inertial...
Action-defined conditions for selecting curated content
The subject matter of this specification can be implemented in, among other things, a method that includes providing instructions to an administrative device...
Assisting the authoring of posts to an asymmetric social network
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for assisting the authoring of posts to an asymmetric social...
Securing a wireless mesh network via a chain of trust
A master beacon device emits a data packet that is received and retransmitted by servant beacon devices in a wireless mesh network that enables the beacon...
Efficient key generator for distribution of sensitive material from
multiple application service providers to a...
A method provides end-to-end security for transport of a profile to a target device (e.g., a mobile computing device) over at least one communications network...
Automatic proxy setting modification
The proxy settings for a browser are modified to route public Internet traffic through a local client assistant, while keeping previous proxy policies intact....
Method and apparatus for scheduling asynchronous transmissions
The present invention provides a method of scheduling asynchronous transmissions for a plurality of subscriber units. The method includes receiving information...
Encoder that optimizes bit allocation for information sub-parts
A digital information encoder including a divider configured to divide a block of information into a plurality of sub-parts, an initial bit allocator configured...
A modulated signal based on a low-precision, fast startup oscillator is provided to a circuit with a high-precision, slow startup oscillator. The frequency of...
Video chunking for robust, progressive uploading
Devices and methods are provided herein relating to video chunking for robust, progressive upload. Video can be parsed to determined byte offsets associated...
Training multiple neural networks with different accuracy
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for training a deep neural network. One of the methods includes...
Automatic fading of online user content
Automatically fading online user content may include receiving digital content from a first user, the digital content associated with a first user-defined...
Providing content using integrated objects
A real-time bidding system receives a notification of an available impression from an impression notification object integrated with an application executing on...
Methods, systems, and apparatus for managing labeling privileges. In one aspect, a method includes receiving label data defining a label to be associated with...
System and method for using segmentation to identify object location in
A computing device segments an image into a plurality of segments, wherein each segment of the plurality of segments has a segment location and a set of pixels...
Enabling user privacy for changes of access to shared content
In one embodiment, a method for enabling user privacy for content on a network includes receiving input from a first user instructing at least one change in...
Firmware verified boot
Methods and apparatus for verifying a boot process of a computing system are disclosed. An example computer-implemented method includes reading, by a computing...
Method and apparatus for configuring privacy settings for publishing
A method and apparatus configure privacy settings for publishing electronic images. An image including first image content and second image content can be...
Evaluation of substitution contexts
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for evaluating substitute terms. One of the methods includes...
A hybrid-sharded index includes document-sharded posting lists and term-sharded posting lists. Implementations include systems and methods using a distributed...
Method and apparatus for providing suggestions driven by nearby favorites
A computer-implemented method and system may promote points of interest (POIs) for display on a digital map at a client computing device based on context...
System and method for determining the legitimacy of a listing
A system and method is provided wherein, in one aspect, the likelihood of a listing being spam or enhanced by spam is determined based on whether the number of...
Associating a task with a user based on user selection of a query
Methods and apparatus related to associating a task with a user based on the user selecting a task suggestion that is provided to the user in response to a user...
System and method for improving access to search results
Aspects of the disclosure provide a system and method for prerendering of search result pages. A search engine may process search queries received from a...
Aggregating photos captured at an event
Methods and systems for aggregating digital content captured at an event. In one aspect, a connection is established from a computing device to a Near Field...