Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: microsoft





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-D724,562 Headset
US-8,978,144 Automatic construction of human interaction proof engines
Human Interaction Proofs ("HIPs", sometimes referred to as "captchas"), may be generated automatically. An captcha specification language may be defined, which...
US-8,978,115 Home realm discovery in mixed-mode federated realms
The authentication of identities within a realm in which some identities are authenticated using direct authentication, and some identities are authenticated...
US-8,978,106 Programming, verifying, visualizing, and deploying browser extensions with fine-grained security policies
An environment is described which enables the generation, analysis, and use of secure browser extensions. Each browser extension includes an extension body and...
US-8,978,091 Protecting content from third party using client-side security protection
Architecture that employs encryption and storage of encryption keys to protect trusted client message content from an untrusted third-party hosted service. Each...
US-8,978,041 Service virtualization container
Service virtualization containers to aggregate service functionality from a plurality of services into an apparent service exhibiting the aggregated...
US-8,978,028 Transactional multi-package installation
Described is installing multiple software packages to a computing device in a single transaction, whereby the multiple package installation commits if...
US-8,978,007 Static metadata in dynamic programs
A dynamic programming environment includes a dynamic runtime infrastructure configured to receive static metadata as source text in a source code written in a...
US-8,977,975 Method and system for creating temporary visual indicia
The present invention relates to new and improved embodiments of systems and methods for using a "pen" input as a temporary pointer to highlight a portion of a...
US-8,977,967 Rules for navigating to next content in a browser
In one or more embodiments, a flip ahead input, such as a gesture, provides touch users with an ability to easily navigate various websites. The flip ahead...
US-8,977,958 Community-based software application help system
A framework for enabling a community of users to share help information about an application program. The framework includes a mechanism for users to generate...
US-8,977,955 Sequential layout builder architecture
Layout processing techniques have been described that allow processing of structured documents to be conducted, and for associated layout to be accomplished in...
US-8,977,950 Techniques for selection and manipulation of table boarders
Techniques to select and manipulate table borders as discrete objects are described. In particular, a table border may be selected without having to select a...
US-8,977,910 Leveraging chip variability
Embodiments are described that leverage variability of a chip. Different areas of a chip vary in terms of reliability under a same operating condition. The...
US-8,977,867 Corralling virtual machines with encryption keys
A virtual machine comprises a unique identifier that is associated with one or more encryption keys. A management server encrypts the virtual machine's virtual...
US-8,977,865 Data encryption conversion for independent agents
The re-encryption of data can be performed with independent cryptographic agents that can automatically encrypt and decrypt data in accordance with ...
US-8,977,756 SWAN: achieving high utilization in networks
Greater network utilization is implemented through dynamic network reconfiguration and allocation of network services and resources based on the data to be...
US-8,977,726 Logical networks
An invention is provided for creating logical network abstractions of physical networks, and deploying computer services to physical networks based on a...
US-8,977,718 Website redevelopment wrapper
Existing network-based services can be reused by a new network service providing an updated interface to the existing services. A client request directed to the...
US-8,977,686 Distributed routing table interface
Application programming interface (API) for starting and accessing distributed routing table (DRT) functionality. The API facilitates bootstrapping into the DRT...
US-8,977,677 Throttling usage of resources
A computing device provides a first server. The first server receives a primary request associated with a client. In response to receiving the primary request,...
US-8,977,655 Automating evolution of schemas and mappings
Aspects of the subject matter described herein relate to automating evolution of schemas and mappings. In aspects, mappings between a conceptual model and a...
US-8,977,643 Dynamic asset monitoring and management using a continuous event processing platform
The disclosed architecture leverages realtime continuous event processing (CEP) to address using a general input interface framework to import a dynamic set of...
US-8,977,632 Travelogue locating mining for travel suggestion
A location extraction component analyzes a set of travelogues to identify all of the locations mentioned therein. A co-occurrence extraction component computes...
US-8,977,625 Inference indexing
Methods, systems, and media are provided for facilitating generation of an inference index. In embodiments, a canonical entity is referenced. The canonical...
US-8,977,624 Enhancing search-result relevance ranking using uniform resource locators for queries containing non-encoding...
Computer-readable media, computer systems, and computing devices facilitate enhancing a web index with uniform resource locator (URL)/non-encoding character...
US-8,977,592 Synchronization framework that restores a node from backup
Architecture for restoring nodes. After restoring a node, fix-up occurs to make the node appear as a different node than before the restore operation. The node...
US-8,977,537 Hierarchical models for language modeling
The described implementations relate to natural language processing, and more particularly to training a language prior model using a model structure. The...
US-8,977,532 Estimating time remaining for an operation
Techniques for estimating time remaining for an operation are described. Examples operations include file operations, such as file move operations, file copy...
US-8,977,244 Extensible phone application
The present invention provides an extensible phone application that uses extensions to interact with other applications executing in a mobile communication...
US-8,977,231 Tracking data usage under a schematized data plan
Embodiments provide a schema for representing data usage plans and data usage statistics. The data usage plan describes threshold values associated with network...
US-8,977,068 Transform space difference compression
An invention is disclosed for performing differencing of graphical data in post-transform space for a remote presentation session. Graphical data is transformed...
US-8,977,060 Motion stabilization and detection of articulated objects
The techniques and systems described herein are directed to isolating part-centric motion in a visual scene and stabilizing (e.g., removing) motion in the...
US-8,977,042 Rotation-free recognition of handwritten characters
A character recognition system receives an unknown character and recognizes the character based on a pre-trained recognition model. Prior to recognizing the...
US-8,976,986 Volume adjustment based on listener position
Volume adjustment based on listener position is disclosed. A position of one or more speakers is identified, and a position of a listener is tracked. For each...
US-8,976,857 Quality-based video compression
Various embodiments are disclosed herein that relate to quality-based video encoding. For example, one disclosed embodiment provides a video compression system...
US-8,976,795 Gateway advertisement in a wireless mesh
A computing environment containing a mesh network that is adapted to provide a reliable transport mechanism over which services may be delivered. Nodes of the...
US-8,976,224 Controlled three-dimensional communication endpoint
A controlled three-dimensional (3D) communication endpoint system and method for simulating an in-person communication between participants in an online meeting...
US-8,976,189 Drawing operations using multiple graphics interfaces
Various embodiments provide techniques for enabling multiple graphics interfaces to be accessed to perform graphics-related operations. In at least some...
US-8,976,168 Mesh generation from depth images
Systems and methods for mesh generation from depth images are provided. According to one aspect, a method executable by a compression device for sending...
US-8,974,303 Ad-hoc user and device engagement platform
A local engagement system is described herein that leverages devices people commonly carry with them to dynamically engage them based on their locations and/or...
US-D724,086 Electronic pen
US-8,973,158 Trust level activation
An isolation execution environment provides an application with limited resources to execute an application. The application may require access to secured...
US-8,973,135 Selectively scanning objects for infection by malware
Techniques are described herein that are capable of selectively scanning objects for infection by malware (i.e., to determine whether one or more of the objects...
US-8,973,128 Search result presentation
A data presentation system for a search engine may use classified or tagged elements in a resulting document to create a search result document that has...
US-8,973,123 Multifactor authentication
Aspects of the subject matter described herein relate to identity technology. In aspects, a user device requests access to a service provided by a relying...
US-8,973,099 Integrating account selectors with passive authentication protocols
Described is using a client-side account selector in a passive authentication protocol environment (such as OpenID) in which a relying party website trusts the...
US-8,972,997 Work item processing in distributed applications
A system for organizing messages related to tasks in a distributed application is disclosed. The system includes a work-list creator to create a work list of...
US-8,972,991 Systems and methods for exposing processor topology for virtual machines
The present invention is directed to making a guest operating system aware of the topology of the subset of host resources currently assigned to it. At virtual...
US-8,972,977 Systems and methods for providing seamless software compatibility using virtual machines
Certain embodiments of the present invention are directed to a system for and method of providing seamless software compatibility by using virtual machines to...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.