Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: microsoft





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,020,298 Automated image cropping to include particular subjects
A digital image is automatically cropped to fit within a desired frame. The cropping is based on one or more of two identified portions of the image. One of the...
US-9,020,290 Reduce extrapolate
A method for removing boundary distortion includes receiving a one-dimensional input signal and determining whether the one-dimensional input signal includes an...
US-9,020,254 Dynamic image quality checker for use in image transcoding
Described is a technology by which an image is transcoded to a desired quality measure (e.g., PSNR). A quality measure of transcoded image data is checked...
US-9,020,239 Stereo video for gaming
A real-time stereo video signal of a captured scene with a physical foreground object and a physical background is received. In real-time, a ...
US-9,020,183 Tagging images with labels
An image to be shared with other users based on input from a first user is received. A second user is identified from a tag of the image, and information is...
US-9,019,945 Service-assisted network access point selection
Embodiments enable prioritization and selection of network access points (NAP) by a computing device using NAP attribute values. The computing device obtains...
US-9,019,878 Phone supporting mode conversion
A mechanism for a wireless device to obtain access to network connectivity through a WAN-enabled device. The wireless device may use peer-to-peer communication...
US-9,019,615 Wide field-of-view virtual image projector
A wide field-of-view virtual image projector includes a rod light guide that is embossed with at least a first diffraction grating and a second diffraction...
US-9,019,292 Reordering graph execution for processing optimization
Methods are provided for reordering operations in execution of an effect graph by graphics processing unit. Memory availability is evaluated for storing images...
US-9,019,201 Evolving universal gesture sets
In a gesture-based system, gestures may control aspects of a computing environment or application, where the gestures may be derived from a user's position or...
US-9,019,174 Wearable emotion detection and feedback system
A see-through, head mounted display and sensing devices cooperating with the display detect audible and visual behaviors of a subject in a field of view of the...
US-9,017,092 Electronic connector
An electronic connector includes a base, a tapered extension protruding from the base, and a nose forming a terminal end of the tapered extension. The tapered...
US-9,016,857 Multi-touch interactions on eyewear
The subject disclosure is directed towards eyewear configured as an input device, such as for interaction with a computing device. The eyewear includes a...
US-D727,954 Display screen with user interface
US-D727,952 Display screen with user interface
US-D727,951 Display screen with user interface
US-D727,950 Display screen with user interface
US-D727,949 Display screen with user interface
US-D727,948 Display screen with user interface
US-D727,946 Display screen with graphical user interface
US-D727,945 Display screen with graphical user interface
US-D727,944 Display screen with graphical user interface
US-D727,937 Display screen with graphical user interface
US-D727,936 Display screen with graphical user interface
US-D727,935 Display screen with graphical user interface
US-D727,926 Display screen with user interface
US-D727,925 Display screen with user interface
US-9,015,843 Predictive malware threat mitigation
The subject disclosure is directed towards protecting against malware, by classifying a user's risk level, which corresponds to a likelihood of malware being...
US-9,015,807 Authorizing application access to secure resources
An application submits a permission request to a resource server. In response to receiving the request, the resource server generates a user interface that asks...
US-9,015,788 Generation and provision of media metadata
Various embodiments related to the generation and provision of media metadata are disclosed. For example, one disclosed embodiment provides a computing device...
US-9,015,746 Interest-based video streams
Embodiments related to delivering a video stream to a requesting viewer are disclosed. In one example embodiment, a video stream is delivered by receiving a...
US-9,015,737 Linked advertisements
Embodiments of the present invention generate linked advertisements. Linked advertisements may include a preliminary advertisement and one or more subsequent...
US-9,015,674 Identifying execution paths that satisfy reachability queries
Various technologies pertaining to answering reachability queries are described herein. A reachability query includes a user-specified destination line of code...
US-9,015,667 Fuzz testing of asynchronous program code
A fuzz testing system is described herein that represents event sources, channels, processors, and consumers as first-class entities in an application....
US-9,015,662 Service level objective for cloud hosted applications
Embodiments are directed to declaratively managing software applications, dynamically applying configuration changes to a specified software application based...
US-9,015,650 Unified datacenter storage model
Modeling an application deployed in a distributed system. The method includes accessing an infrastructure model of a distributed system. The infrastructure...
US-9,015,638 Binding users to a gesture based system and providing feedback to the users
Techniques for managing a set of states associated with a capture device are disclosed herein. The capture device may detect and bind to users, and may provide...
US-9,015,624 Floating command object
A floating command object is provided for offering a set of commonly or frequently used commands in close proximity to a selected text, data or other object in...
US-9,015,621 Command user interface for displaying multiple sections of software functionality controls
To increase command-access efficiency and to optimize a user's available user interface work space, an improved user interface is provided for displaying...
US-9,015,614 Virtual keyboard text replication
Text that is selected at a virtual keyboard is submitted to and displayed at an application data field another data field, such as a keyboard data field, that...
US-9,015,606 Presenting an application change through a tile
This document describes techniques and apparatuses for presenting an application change through a tile. These techniques enable a user to see content associated...
US-9,015,604 Calendaring between user profiles
Calendar items can be scheduled with a joined group of user profiles. Scheduling calendar items can include, for each of the calendar items, sending a calendar...
US-9,015,591 Dynamic visualization generation and implementation
Embodiments are directed to selecting and applying data-specific presentations, to adaptively selecting visual presentations based on historical data and to...
US-9,015,578 Dynamic optimization of available display space
Embodiments provide for systems, methods, and computer program products for optimizing content rendered at a display unit by dynamically formatting the content...
US-9,015,577 Content flow through containers
Content can be flowed through one or more containers that can be laid out analogously to printed material. Content is flowed into the first specified container...
US-9,015,576 Informed partitioning of data in a markup-based document
One or more techniques and/or systems are provided for displaying a first portion of a markup language document on a first device and displaying a second...
US-9,015,496 MIME handling security enforcement
A model restricts un-trusted data/objects from running on a user's machine without permission. The data is received by a protocol layer that reports a MIME type...
US-9,015,493 Multitenant-aware protection service
Implementing a data protection service. One method includes receiving a request to provision a first tenant among a plurality of tenants managed by a single...
US-9,015,490 Secure credential unlock using trusted execution environments
Computing devices utilizing trusted execution environments as virtual smart cards are designed to support expected credential recovery operations when a user...
US-9,015,489 Securing passwords against dictionary attacks
Described herein are various technologies pertaining to constructions of a password-based authentication protocol that are configured to allow a user to...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.