Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: microsoft





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,006,3958 Earpiece attachment devices
Devices for attaching earpiece to a user's ear are described herein. In one embodiment, an earpiece that is removably attachable to an ear of a user can include...
US-1,006,3863 DC coefficient signaling at small quantization step sizes
Described tools and techniques relate to signaling for DC coefficients at small quantization step sizes. The techniques and tools can be used in combination or...
US-1,006,3846 Selective illumination of a region within a field of view
In embodiments of selective illumination of a region within a field of view, an illumination system includes light sources implemented for selective...
US-1,006,3844 Determining distances by probabilistic time of flight imaging
An embodiment of the invention provides a time of flight three-dimensional TOF-3D camera that determines distance to features in a scene responsive to amounts...
US-1,006,3663 Subscribing to multiple resources through a common connection
Methods, systems, and computer-readable media are provided to allow multiple server resources to share a single connection to a client device. The single...
US-1,006,3601 Client identification for enforcing computer resource quotas
A system, method, and apparatus are provided for identifying clients or consumers of one or more controlled resources within a computing environment (e.g., a...
US-1,006,3571 Systems and methods for the detection of advanced attackers using client side honeytokens
There is provided a method for detecting a malicious attempt to access a service providing server using credentials of a client terminal in a network, the...
US-1,006,3560 Gaze-based authentication
A user may be authenticated to access an account, computing device, or other resource using gaze tracking. A gaze-based password may be established by prompting...
US-1,006,3554 Techniques for detecting unauthorized access to cloud applications based on velocity events
A system and method for detecting unauthorized access to cloud applications based on velocity events are presented. The method includes identifying a first...
US-1,006,3537 Permission architecture for remote management and capacity instances
When a user inputs an action request, such as a requested command, to be performed on a target machine, a management system receives the request and verifies it...
US-1,006,3505 Enhanced delivery of a message for multiple recipients
Technologies are described herein for providing post-processing of messages. In particular, the post-processing of messages occurs without any condition that...
US-1,006,3501 Unified messaging platform for displaying attached content in-line with e-mail messages
A unified messaging platform is described which provides a comprehensive environment for collaboration, file sharing, and project management. In aspects, the...
US-1,006,3491 Dynamic allocation of resources while considering resource reservations
Described herein are technologies relating to computing resource allocation among multiple tenants. Each tenant may have a respective absolute reservation for...
US-1,006,3490 Method and system of operating an online application service in a deployment environment to facilitate run-time...
Disclosed herein are systems, methods, and software for implementing runtime experiments with user interface configurations. In at least one implementation, an...
US-1,006,3375 Isolation of trusted input/output devices
Techniques are provided to ensure isolation of trusted input/output devices using a Secure Crypto-Processor. Secure IO lines may be used to drive devices that...
US-1,006,3156 Leakage reduction circuit
A leakage reduction circuit is described herein that is configured to reduce high voltage leakage that may occur in electrical power step-down scenarios. The...
US-1,006,2727 Strain relieving die for curved image sensors
Techniques for fabricating a semiconductor die having a curved surface can include placing a substantially flat semiconductor die in a recess surface of a...
US-1,006,2352 Redundancy in a display comprising autonomous pixels
A display comprises a plurality of autonomous pixels on a substrate. Each autonomous pixel comprises a display element, a sensing element and a control element....
US-1,006,2213 Augmented reality spaces with adaptive rules
A system for generating a virtual gaming environment based on features identified within a real-world environment, and adapting the virtual gaming environment...
US-1,006,2201 Time-of-flight simulation of multipath light phenomena
Examples of time-of-flight ("TOF") simulation of multipath light phenomena are described. For example, in addition to recording light intensity for a pixel...
US-1,006,2188 Customizable route planning using graphics processing unit
Customizable route planning is a technique for computing point-to-point shortest paths in road networks. It includes three phases: preprocessing, metric...
US-1,006,2180 Depth sensor calibration and per-pixel correction
Various technologies described herein pertain to correction of an input depth image captured by a depth sensor. The input depth image can include pixels, and...
US-1,006,2101 Maximizing the propensity of content consumption according to content complexity and content consumption time
The disclosed embodiments provide a system for maximizing the propensity of content consumption according to content complexity and content consumption time....
US-1,006,2003 Real-time, model-based object detection and pose estimation
A system includes a memory and a processor configured to select a set of scene point pairs, to determine a respective feature vector for each scene point pair,...
US-1,006,1939 Computing confidential data insight histograms and combining with smoothed posterior distribution based histograms
In an example embodiment, a number of buckets is determined for an empirical histogram of confidential data values submitted to a computer system. The empirical...
US-1,006,1866 Providing query recourse with embedded query adjustment options
A user query may be evaluated to provide a result set. In case the results do not reflect the user's intent, the device may provide recourse options for...
US-1,006,1848 Ontology-crowd-relevance deep response generation
Generating responses to input utilizing an ontology-crowd-relevance methodology is described. The techniques described herein access a plurality of data items...
US-1,006,1843 Translating natural language utterances to keyword search queries
Natural language query translation may be provided. A statistical model may be trained to detect domains according to a plurality of query click log data. Upon...
US-1,006,1830 Reorganization of data under continuous workload
Architecture that provides the capability to automatically (e.g., dynamically) reorganize (repartition) an existing partition by dividing (splitting) or...
US-1,006,1826 Distant content discovery
Generating and providing a content feed to a user that surfaces information items that are determined to be interesting or relevant to the user including...
US-1,006,1791 Data management for connected devices
Techniques and constructs to facilitate data management can provide improved response time and space efficiency for time-series data such as from connected...
US-1,006,1759 Progressive loading for web-based spreadsheet applications
Concepts and technologies are described herein for progressive loading for web-based spreadsheet applications. In accordance with the concepts and technologies...
US-1,006,1718 Protecting secret state from memory attacks
Described is a technology by which classes of memory attacks are prevented, including cold boot attacks, DMA attacks, and bus monitoring attacks. In general,...
US-1,006,1684 Enhanced service validation
Technology is disclosed herein for validating a new version of a service running in parallel with a previous version of the service. In a validation...
US-1,006,1678 Automated validation of database index creation
Automated validation of the creation of indices in an environment that include multiple and potential many databases, such as perhaps a cloud computing...
US-1,006,1652 Fault recovery management in a cloud computing environment
Technologies for managing fault recovery in a cloud computing environment may be used after faults of various sizes, including faults which put total...
US-1,006,1595 Fast computer startup
Fast computer startup is provided by, upon receipt of a shutdown command, recording state information representing a target state. In this target state, the...
US-1,006,1584 Store nullification in the target field
Apparatus and methods are disclosed for nullifying memory store instructions identified in a target field of a nullification instruction. In some examples of...
US-1,006,1575 Managed execution environment for software application interfacing
Some embodiments are directed to controlling interactions between a host software program and a computer system by providing a managed execution environment...
US-1,006,1567 Multi-sized data types for managed code
Embodiments are directed towards generating applications that include multi-sized types running in managed code. During the compilation of an intermediate...
US-1,006,1537 Data reordering using buffers and memory
Apparatus and methods are disclosed for reordering data received in a non-contiguous order into a contiguous order. In one example of the disclosed technology,...
US-1,006,1492 Path-linked viewpoints from point of interest
Various embodiments relating to displaying viewpoints from a point of interest are disclosed. One embodiment includes displaying an entry point that includes a...
US-1,006,1473 Providing contextual on-object control launchers and controls
Object editing controls may be provided. First, a selection of an object within an electronic document may be received. Then, in response to the received...
US-1,006,1467 Presenting a message in a communication session
Techniques for presenting a message in a communication session are described. In at least some embodiments, a message is sent by a participant in a...
US-1,006,1427 Selecting first digital input behavior based on a second input
A computing device includes a digital input system that provides digital input functionality for the computing device. The digital input system receives both a...
US-1,006,1411 Dual-function switch for stylus tail eraser
The systems, methods, and techniques described herein provide for an improved stylus incorporating a dual-function switch as part of the tail eraser mechanism....
US-1,006,1385 Haptic feedback for a touch input device
Techniques for haptic feedback for a touch input device are described. Generally, haptic feedback is provided for different user interactions with a touch input...
US-1,006,1366 Schedule-based energy storage device selection
Schedule-based energy storage device selection is described for a device having an energy storage device system with heterogeneous energy storage devices, such...
US-1,006,1359 Hinged device with living hinge
A hinge assembly for a multi-part electronic device comprises a pair of opposing living hinge elements for connecting first and second parts of the multi-part...
US-1,006,1124 Robust architecture for large field of view components
A diffractive beam expander for use in an augmented-reality display is disclosed. The device can include a optical substrate with a first diffractive optical...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.