Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: microsoft





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,955,126 Tiered object-related trust decisions
Adware and viruses are examples of objects that may be embedded in a web page or linked to a web page. When such an object is detected to be associated with a...
US-8,955,114 Application monitoring through collective record and replay
Methods and systems for application monitoring through collective record and replay are disclosed herein. The method includes recording a number of execution...
US-8,955,108 Security virtual machine for advanced auditing
A security system collects an audit trail on a computer outside of a boundary created by one or more virtual machines. The security system uses a privileged...
US-8,955,105 Endpoint enabled for enterprise security assessment sharing
An enterprise-wide sharing arrangement uses a semantic abstraction, called a security assessment, to share security-related information between security...
US-8,955,082 Authenticating using cloud authentication
An authentication mechanism in a local area network may use a cloud authentication mechanism to allow or deny authentication requests. A user may gain access...
US-8,955,043 Type-preserving compiler for security verification
Described is a source program code language that facilitates the association of security proofs obtained from a solver (e.g., a Z3 theorem prover) with the...
US-8,955,035 Anonymous principals for policy languages
Techniques to allow a security policy language to accommodate anonymous credentials are described. A policy statement in a security policy language can...
US-8,955,006 Entertainment content purchase via advertising viewing credit
The purchase of entertainment content online via advertising credits is disclosed herein. One disclosed embodiment comprises providing an advertising content...
US-8,954,995 Array object concurrency in STM
A software transactional memory system is provided that creates an array of transactional locks for each array object that is accessed by transactions. The...
US-8,954,965 Trusted execution environment virtual machine cloning
Cloning of a virtual machine having a trusted executed environment such as a software-based trusted platform module. In order to clone the virtual machine, the...
US-8,954,947 Fast variable validation for state management of a graphics pipeline
In a state management system of an effects system implemented in a Graphics Processing Unit (GPU), techniques and technologies are provided for setting a value...
US-8,954,939 Extending a development environment
Concepts and technologies are described herein for extending the behavior of a software development tool. An extension can be accessed and consumed by a...
US-8,954,929 Automatically redirecting method calls for unit testing
A unit testing system allows testing of multiple types of method calls using an unmodified software application module. The system dynamically copies byte code...
US-8,954,926 Code coverage detection with scriptable language unmodified source
Code coverage detection for interpreted scriptable programming languages avoids source code modification. Each program element of the script is performed by (a)...
US-8,954,925 User augmented reverse engineering
Disclosed herein is user augmented reverse engineering, where, in one embodiment, during the generation of a graphical representation of a codebase, database,...
US-8,954,924 Dynamic update of modularized programs in a continuation-based runtime
A framework for aggregating updates for individual modules into an update for a containing module is disclosed. The containing module may be an entire program...
US-8,954,897 Protecting a virtual guest machine from attacks by an infected host
In a virtualization environment, a host machine on which a guest machine is operable is monitored to determine that it is healthy by being compliant with...
US-8,954,881 Window minimization trigger
A method and computer-storage media for minimizing application windows based on a triggering event are provided. Embodiments of the present invention include...
US-8,954,857 Sections of a presentation having user-definable properties
In general, this disclosure describes techniques that employ user-defined values of properties of sections of an electronic presentation. As described herein, a...
US-8,954,851 Adding video effects for video enabled applications
A streaming video interface component receives video frames from a streaming driver before the frames are received by a consuming application. The streaming...
US-8,954,783 Two-tier failover service for data disaster recovery
Technologies are described herein for providing a two-tier failover service. A request to access content by an application associated with an application...
US-8,954,730 Establishing historical usage-based hardware trust
Establishing trust according to historical usage of selected hardware involves providing a usage history for a selected client device; and extending trust to a...
US-8,954,725 Sanitization of packets
Methods, systems, and computer-readable media are disclosed for packet sanitization. A particular method intercepts a packet of a packet stream, where the...
US-8,954,579 Transaction-level health monitoring of online services
Embodiments are directed to verifying the accessibility and functionality of an online service and to scheduling the automatic execution of an online service....
US-8,954,551 Virtualization of groups of devices
A virtualization mechanism may create a virtual representation of a group of physical computers and the physical connections between the computers. The...
US-8,954,550 Service dependency discovery in enterprise networks
The claimed subject matter provides systems and/or techniques that identify service dependencies in enterprise networks. The system can include devices that,...
US-8,954,529 Smart data staging based on scheduling policy
Moving data to a remote system and performing computations at the remote system. A method includes receiving from one or more users a plurality jobs. The one or...
US-8,954,509 System and method for broadcasting data over a computer network
A system and method for broadcasting data in the form of instant messages over a computer network. The broadcast system 100 preferably includes a messaging...
US-8,954,507 Gathering and using awareness information
Systems, methods, and user interfaces for gathering and using awareness information with common awareness functionality accessible to multiple applications are...
US-8,954,488 Extensibility for web based diagram visualization
Extensible architecture and data flow in a web based diagram visualization service is accomplished by enabling a diagram update engine to launch custom data...
US-8,954,475 Deep cloning of objects using binary format
Techniques are described herein that are capable of deep cloning (a.k.a. deep copying) objects using a binary format. A deep clone of a designated object...
US-8,954,434 Enhancing a document with supplemental information from another document
The present technology is related to identifying, from within a corpus of documents, a subject (e.g., person, location, date, etc.) that is relevant to a topic...
US-8,954,425 Snippet extraction and ranking
Described herein is a technology that facilitates efficient automated mining of topic-related aspects of user-generated content based on automated analysis of...
US-8,954,423 Using reading levels in responding to requests
A request can be received and a request reading level representation for the request can be inferred. In response to the request, the request reading level...
US-8,954,414 Search model updates
Search model updates are described. In one or more implementations, a search service uses a model to rank items in a search result, the model formed using an...
US-8,954,396 Validating and enabling validation of package structures
This document describes tools capable of validating and enabling validation of a package's structure. To do so, constraint grammar is provided that is capable...
US-8,954,386 Locally editing a remotely stored image
One or more techniques and/or systems are disclosed for editing a remotely stored image. A user can browse to a site comprising the image, and a preview (e.g.,...
US-8,954,370 Policy processor for configuration management
A policy processor is described that may be used to implement a system for managing the configuration of assets in a distributed computing network, such as an...
US-8,954,368 Translating paralinguistic indicators
Paralinguistic indicators are translated at a paralinguistic translation server by receiving from a source a first set of data related to a first paralinguistic...
US-8,954,365 Density estimation and/or manifold learning
Density estimation and/or manifold learning are described, for example, for computer vision, medical image analysis, text document clustering. In various...
US-8,954,330 Context-aware interaction system using a semantic model
The subject disclosure is directed towards detecting symbolic activity within a given environment using a context-dependent grammar. In response to receiving...
US-8,954,266 Providing routes through information collection and retrieval
Providing directions from point A to point B may be treated as an information retrieval problem. In one example, actual routes that are traveled by people are...
US-8,954,061 Stored user selectable preferences for supporting data roaming in GPRS networks
A method and apparatus for supporting data connectivity with a roaming partner when a communication device is outside a service provider's range of coverage is...
US-8,953,888 Detecting and localizing multiple objects in images using probabilistic inference
An object detection system is disclosed herein. The object detection system allows detection of one or more objects of interest using a probabilistic model. The...
US-8,953,844 System for fast, probabilistic skeletal tracking
A system and method are disclosed for recognizing and tracking a user's skeletal joints with a NUI system. The system includes one or more experts for proposing...
US-8,953,768 Call-handling rules
Call-handling rules may be provided. A user interface may access a plurality of information associated with a user and provide functionality for creating a...
US-8,953,684 Multiview coding with geometry-based disparity prediction
Described herein is technology for, among other things, multiview coding with geometry-based disparity prediction. The geometry-based disparity prediction...
US-8,953,673 Scalable video coding and decoding with sample bit depth and chroma high-pass residual layers
Techniques and tools are described for scalable video encoding and decoding. In some embodiments, an input frame is downsampled in terms of sample depth and...
US-8,953,600 Telemetry data routing
Among other things, one or more techniques and/or systems are provided for routing telemetry data to one or more receivers. That is, telemetry data, such as...
US-8,953,149 CMOS three-dimensional image sensor detectors having reduced inter-gate capacitance, and enhanced modulation...
A CMOS detector with pairs of interdigitated elongated finger-like collection gates includes p+ implanted regions that create charge barrier regions that can...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.