Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: microsoft





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,959,259 State-based auxiliary display operation
Described is a technology by which the operation of an auxiliary computing device, comprising a display and/or actuator set, may be automatically modified based...
US-8,959,248 Personal computing environment with virtual computing device
Systems and methods of providing synchronization of providing a device mesh and a virtual computing device are disclosed herein. A selection of a plurality of...
US-8,959,219 Dynamic rerouting of service requests between service endpoints for web services in a composite service
Technologies are described herein for rerouting a service request between service endpoints. The service request is received, at a first web service, from a...
US-8,959,159 Personalized email interactions applied to global filtering
A computer implemented method for filtering unwanted bulk email in an email system and providing a positive user experience is provided. The method enables...
US-8,959,157 Real-time spam look-up system
A system and method of managing unsolicited email sent to an email system over a network. Email messages are received at an message at an inbound mail transfer...
US-8,959,152 Peer-to-peer communication to increase download throughput
Certain embodiments relate to use of aggressive peering requests, which enable a peer computing device to obtain desired digital content more quickly than...
US-8,959,147 Information management systems with time zone information, including event scheduling processes
Information management systems with time zone information, including event scheduling processes are disclosed. One aspect of the invention is directed toward a...
US-8,959,142 Combining server-side and client-side user interface elements
A method and apparatus are disclosed for combining server-supplied user interface elements with client-supplied user interface elements. The server-supplied...
US-8,959,110 Dynamic query for external data connections
An application module generates a query that may involve retrieving data from a local data storage source or from an external data storage source. The...
US-8,959,109 Business intelligent in-document suggestions
Implementing business intelligent in-document suggestion may include detecting a content that a user is inputting into a document or selecting from the...
US-8,959,104 Presenting query suggestions based upon content items
Systems and methods for determining query suggestions based upon content items are provided. Content items may include, without limitation, a search query...
US-8,959,077 Multi-layer search-engine index
Subject matter described herein includes a multi-layer search-engine index. Accordingly, the search-engine index is divided into multiple indexes, each of which...
US-8,958,569 Selective spatial audio communication
Audio data associated with a plurality of originating sources is obtained, the audio data directed to a participant entity. An originating entity associated...
US-8,958,448 Thermal management in laser diode device
Embodiments are disclosed that relate to reducing inductive losses and controlling driver and laser diode temperatures in an optical assembly comprising a laser...
US-8,958,405 Wireless network host in silent mode
An access point that implements operating modes in which beacons may be selectively disabled. Beacons may be disabled when no device is actively associated...
US-8,958,325 Fault-tolerant communications in routed networks
A method for providing fault-tolerant network communications between a plurality of nodes for an application, including providing a plurality of initial...
US-8,957,920 Alternative semantics for zoom operations in a zoomable scene
A scene comprising a set of visual elements may allow a user to perform "zoom" operations in order to navigate the depth of the scene. The "zoom" semantic is...
US-8,957,900 Coordination of animations across multiple applications or processes
Animation coordination system and methods are provided that manage animation context transitions between and/or among multiple applications. A global...
US-8,957,868 Multi-touch text input
This document describes tools associated with symbol entry control functions. In some implementations, the tools identify a first finger that is in tactile...
US-8,957,866 Multi-axis navigation
Multi-axis navigation techniques are described. In implementations, a user interface is output by a computing device, the user interface includes a first axis...
US-8,957,858 Multi-platform motion-based computer interactions
Systems and methods for multi-platform motion interactivity, is provided. The system includes a motion-sensing subsystem, a display subsystem including a...
US-D722,608 Display screen with graphical user interface
US-8,955,135 Malicious code infection cause-and-effect analysis
A malware analysis system for automating cause and effect analysis of malware infections is provided. The malware analysis system monitors and records computer...
US-8,955,134 Malicious code infection cause-and-effect analysis
A malware analysis system for automating cause and effect analysis of malware infections is provided. The malware analysis system monitors and records computer...
US-8,955,133 Applying antimalware logic without revealing the antimalware logic to adversaries
The subject disclosure is directed towards a technology by which antimalware detection logic is maintained and operated at a backend service, with which a...
US-8,955,126 Tiered object-related trust decisions
Adware and viruses are examples of objects that may be embedded in a web page or linked to a web page. When such an object is detected to be associated with a...
US-8,955,114 Application monitoring through collective record and replay
Methods and systems for application monitoring through collective record and replay are disclosed herein. The method includes recording a number of execution...
US-8,955,108 Security virtual machine for advanced auditing
A security system collects an audit trail on a computer outside of a boundary created by one or more virtual machines. The security system uses a privileged...
US-8,955,105 Endpoint enabled for enterprise security assessment sharing
An enterprise-wide sharing arrangement uses a semantic abstraction, called a security assessment, to share security-related information between security...
US-8,955,082 Authenticating using cloud authentication
An authentication mechanism in a local area network may use a cloud authentication mechanism to allow or deny authentication requests. A user may gain access...
US-8,955,043 Type-preserving compiler for security verification
Described is a source program code language that facilitates the association of security proofs obtained from a solver (e.g., a Z3 theorem prover) with the...
US-8,955,035 Anonymous principals for policy languages
Techniques to allow a security policy language to accommodate anonymous credentials are described. A policy statement in a security policy language can...
US-8,955,006 Entertainment content purchase via advertising viewing credit
The purchase of entertainment content online via advertising credits is disclosed herein. One disclosed embodiment comprises providing an advertising content...
US-8,954,995 Array object concurrency in STM
A software transactional memory system is provided that creates an array of transactional locks for each array object that is accessed by transactions. The...
US-8,954,965 Trusted execution environment virtual machine cloning
Cloning of a virtual machine having a trusted executed environment such as a software-based trusted platform module. In order to clone the virtual machine, the...
US-8,954,947 Fast variable validation for state management of a graphics pipeline
In a state management system of an effects system implemented in a Graphics Processing Unit (GPU), techniques and technologies are provided for setting a value...
US-8,954,939 Extending a development environment
Concepts and technologies are described herein for extending the behavior of a software development tool. An extension can be accessed and consumed by a...
US-8,954,929 Automatically redirecting method calls for unit testing
A unit testing system allows testing of multiple types of method calls using an unmodified software application module. The system dynamically copies byte code...
US-8,954,926 Code coverage detection with scriptable language unmodified source
Code coverage detection for interpreted scriptable programming languages avoids source code modification. Each program element of the script is performed by (a)...
US-8,954,925 User augmented reverse engineering
Disclosed herein is user augmented reverse engineering, where, in one embodiment, during the generation of a graphical representation of a codebase, database,...
US-8,954,924 Dynamic update of modularized programs in a continuation-based runtime
A framework for aggregating updates for individual modules into an update for a containing module is disclosed. The containing module may be an entire program...
US-8,954,897 Protecting a virtual guest machine from attacks by an infected host
In a virtualization environment, a host machine on which a guest machine is operable is monitored to determine that it is healthy by being compliant with...
US-8,954,881 Window minimization trigger
A method and computer-storage media for minimizing application windows based on a triggering event are provided. Embodiments of the present invention include...
US-8,954,857 Sections of a presentation having user-definable properties
In general, this disclosure describes techniques that employ user-defined values of properties of sections of an electronic presentation. As described herein, a...
US-8,954,851 Adding video effects for video enabled applications
A streaming video interface component receives video frames from a streaming driver before the frames are received by a consuming application. The streaming...
US-8,954,783 Two-tier failover service for data disaster recovery
Technologies are described herein for providing a two-tier failover service. A request to access content by an application associated with an application...
US-8,954,730 Establishing historical usage-based hardware trust
Establishing trust according to historical usage of selected hardware involves providing a usage history for a selected client device; and extending trust to a...
US-8,954,725 Sanitization of packets
Methods, systems, and computer-readable media are disclosed for packet sanitization. A particular method intercepts a packet of a packet stream, where the...
US-8,954,579 Transaction-level health monitoring of online services
Embodiments are directed to verifying the accessibility and functionality of an online service and to scheduling the automatic execution of an online service....
US-8,954,551 Virtualization of groups of devices
A virtualization mechanism may create a virtual representation of a group of physical computers and the physical connections between the computers. The...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.