Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: microsoft





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,903,057 Offline voicemail
A method for accessing offline voicemail messages within a mobile messaging application may be provided. First, a voice mail message may be received and the...
US-8,903,055 Out of office message improvements
Embodiments of the present invention relate to set of improvements to the out of office assistant that send out of office messages to senders of messages while...
US-8,902,743 Distributed and scalable network address translation
A method of enabling an electronic privately addressable source to be publicly addressable starts at a receiver where an electronic message is received. It is...
US-8,902,363 Clear rectangle processing
High definition media content processing techniques are described in which enhanced media content rendering techniques may be performed to output high...
US-8,902,255 Mobile platform for augmented reality
A mobile image processing manager may include an image data receiving engine configured to obtain a first set of three-dimensional (3-D) image data associated...
US-8,902,181 Multi-touch-movement gestures for tablet computing devices
Functionality is described herein for detecting and responding to gestures performed by a user using a computing device, such as, but not limited to, a tablet...
US-D718,781 Display screen with animated graphical user interface
US-8,590,021 Passive security enforcement
Technology is described for enabling passive enforcement of security at computing systems. A component of a computing system can passively authenticate or...
US-8,590,012 Network access control based on program state
A gateway controls access to a region of a network by either granting or denying a client machine access to the network region based on whether a particular...
US-8,590,003 Controlling access to resources by hosted entities
Controlling resource access by entities hosted by an execution extension environment via entity identifiers associated with the resources or with the execution...
US-8,589,991 Direct connection with side channel control
A wireless computer that pairs with a remote audio-video presentation device, such as a television. As a result of the pairing, a communication channel is...
US-8,589,925 Techniques for switching threads within routines
Various technologies and techniques are disclosed for switching threads within routines. A controller routine receives a request from an originating routine to...
US-8,589,888 Demand-driven analysis of pointers for software program analysis and debugging
A "Demand-Driven Pointer Analyzer" (DDPA) provides a "demand-driven" field-sensitive pointer analysis process. This process rapidly and accurately identifies...
US-8,589,885 Debugger launch and attach on compute clusters
Launching a debugging process. A method includes at a compute node on a cluster private network, receiving a debug job via a scheduler of a head node from a...
US-8,589,878 Heuristics for determining source code ownership
Various technologies and techniques are disclosed for using heuristics to determine source code ownership. A request is received to identify at least one owner...
US-8,589,874 Visual interface to represent scripted behaviors
Systems and methods for visually representing scripted behaviors are provided. A system is disclosed that includes an authoring program executable on a...
US-8,589,867 Compiler-generated invocation stubs for data parallel programming model
Described herein are techniques for generating invocation stubs for a data parallel programming model so that a data parallel program written in a...
US-8,589,862 Application loading
Extensions or additional software programs that are requested by a computer application running on an application platform are handled in an efficient manner...
US-8,589,815 Control of timing for animations in dynamic icons
Dynamic icons are described that can employ animations, such as visual effects, audio, and other content that change with time. If multiple animations are...
US-8,589,791 Automatically generating a glossary of terms for a given document or group of documents
Automatically generating a glossary of terms for a given document or group of documents is provided. A single document or a group of documents associated with a...
US-8,589,732 Consistent messaging with replication
A messaging entity configured in a memory of first node of a plurality communicatively coupled nodes is disclosed. The nodes are included in a distributed...
US-8,589,701 Saving and retrieving data based on public key encryption
In accordance with certain aspects, bound key operations on ciphertext and/or data are implemented. A bound key operation can receive both data to be signed and...
US-8,589,565 Client-server session parallelism
Using client-server session parallelism (CSSP), a client device establishes multiple network communication sessions with different remote servers and requests...
US-8,589,559 Capture of content from dynamic resource services
Methods are described which enable processing of resources originally accessed by a content access operation. An identifier is generated and used to augment all...
US-8,589,553 Directory leasing
Described are embodiments for allowing clients that access a distributed file system to locally cache directory metadata. The client may request a read lease...
US-8,589,535 Maintaining service performance during a cloud upgrade
Systems, methods, and computer storage media for upgrading a domain in a distributed computing environment are provided. Upgrading of the domain includes...
US-8,589,481 Multi tenant access to applications
A mechanism is provided for presenting a software application to a plurality of users in a cloud computing environment. For example, an application that was...
US-8,589,452 End user defined event rules for ERP applications
A method of creating alerts in a database system is disclosed. The method may include allowing the selection of at least one field or record to be monitored,...
US-8,589,410 Visual search using multiple visual input modalities
Systems, methods, and computer-readable storage media for web-scale visual search capable of using a combination of visual input modalities are provided. An...
US-8,589,408 Iterative set expansion using samples
A set expansion system is described herein that uses general-purpose web data to expand a set of seed entities. The system includes a simple yet effective...
US-8,589,392 Indexing and searching dynamically changing search corpora
Tools and techniques for indexing and searching dynamically changing search corpora are provided. These tools may receive requests to upload documents over a...
US-8,589,318 Location determination using generalized fingerprinting
An RF fingerprinting methodology is generalized to include non-RF related factors. For each fingerprinted tile, there is an associated distance function between...
US-8,589,317 Human-assisted training of automated classifiers
Many computing scenarios involve the classification of content items within one or more categories. The content item set may be too large for humans to...
US-8,589,258 Declining balance financial calculation with no remainder
An amount is divided into equal portions (n) in a manner which eliminates rounding errors or remainders and has repeatable results.
US-8,589,233 Arbitrage broker for online advertising exchange
For a multi-party online advertising exchange including advertising and publishing entities and one or more third party participants, the disclosed systems and...
US-8,589,228 Click modeling for URL placements in query response pages
A "General Click Model" (GCM) is constructed using a Bayesian network that is inherently capable of modeling "tail queries" by building the model on multiple...
US-8,589,187 Automated clustering for patient disposition
The described concepts relate to automated patient disposition. One example can receive a clinician's disposition for a patient. This implementation can perform...
US-8,589,157 Replying to text messages via automated voice search techniques
An automated "Voice Search Message Service" provides a voice-based user interface for generating text messages from an arbitrary speech input. Specifically, the...
US-8,589,153 Adaptive conference comfort noise
A continuous comfort noise is provided that is overlaid for the entire duration of a conference call scenario. The comfort noise may be adapted to match the...
US-8,589,033 Contactless obstacle detection for power doors and the like
Time-of-flight (TOF) three-dimensional sensing systems are deployed on or in a motor vehicle to image contact zones associated with potential contact between an...
US-8,588,741 Using EAP instead of PPP for authentication
Various embodiments are described for Point-to-Point Protocol-free (PPP-free) access and service authentication in a wireless network. An HRPD...
US-8,588,689 Systems and methods for configuring subscriber systems in wireless mesh networks
A wireless network may be managed by identifying one or more wireless subscriber systems included in a lobe pool of a wireless network, identifying at least one...
US-8,588,551 Multi-image sharpening and denoising using lucky imaging
The multi-image sharpening and denoising technique described herein creates a clean (low-noise, high contrast), detailed image of a scene from a temporal series...
US-8,588,534 Staged element classification
Various examples are disclosed herein that relate to staged element classification. For example, one disclosed example provides a method of classifying elements...
US-8,588,517 Motion detection using depth images
A sensor system creates a sequence of depth images that are used to detect and track motion of objects within range of the sensor system. A reference image is...
US-8,588,465 Visual target tracking
A method of tracking a target includes classifying a pixel having a pixel address with one or more pixel cases. The pixel is classified based on one or more...
US-8,588,421 Cryptographic key containers on a USB token
A Universal Serial Bus (USB) compatible storage device is utilized as a security token for storage of cryptographic keys. A cryptographic subsystem of a...
US-8,588,298 Harmonic quantizer scale
A digital media encoder/decoder performs quantization/dequantization based on quantization parameters taken from a harmonic quantizer scale. The harmonic...
US-8,587,773 System architecture design for time-of-flight system having reduced differential pixel size, and time-of-flight...
Embodiments of the present invention provide methods to produce a high performance, feature rich TOF system, phase-based or otherwise using small TOF pixels,...
US-8,587,771 Method and system for multi-phase dynamic calibration of three-dimensional (3D) sensors in a time-of-flight system
A phase-based TOF system preferably generates an optical waveform with fast rise and fall times, to enhance modulation contrast, notwithstanding there will be...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.