Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: microsoft





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,589,410 Visual search using multiple visual input modalities
Systems, methods, and computer-readable storage media for web-scale visual search capable of using a combination of visual input modalities are provided. An...
US-8,589,408 Iterative set expansion using samples
A set expansion system is described herein that uses general-purpose web data to expand a set of seed entities. The system includes a simple yet effective...
US-8,589,392 Indexing and searching dynamically changing search corpora
Tools and techniques for indexing and searching dynamically changing search corpora are provided. These tools may receive requests to upload documents over a...
US-8,589,318 Location determination using generalized fingerprinting
An RF fingerprinting methodology is generalized to include non-RF related factors. For each fingerprinted tile, there is an associated distance function between...
US-8,589,317 Human-assisted training of automated classifiers
Many computing scenarios involve the classification of content items within one or more categories. The content item set may be too large for humans to...
US-8,589,258 Declining balance financial calculation with no remainder
An amount is divided into equal portions (n) in a manner which eliminates rounding errors or remainders and has repeatable results.
US-8,589,233 Arbitrage broker for online advertising exchange
For a multi-party online advertising exchange including advertising and publishing entities and one or more third party participants, the disclosed systems and...
US-8,589,228 Click modeling for URL placements in query response pages
A "General Click Model" (GCM) is constructed using a Bayesian network that is inherently capable of modeling "tail queries" by building the model on multiple...
US-8,589,187 Automated clustering for patient disposition
The described concepts relate to automated patient disposition. One example can receive a clinician's disposition for a patient. This implementation can perform...
US-8,589,157 Replying to text messages via automated voice search techniques
An automated "Voice Search Message Service" provides a voice-based user interface for generating text messages from an arbitrary speech input. Specifically, the...
US-8,589,153 Adaptive conference comfort noise
A continuous comfort noise is provided that is overlaid for the entire duration of a conference call scenario. The comfort noise may be adapted to match the...
US-8,589,033 Contactless obstacle detection for power doors and the like
Time-of-flight (TOF) three-dimensional sensing systems are deployed on or in a motor vehicle to image contact zones associated with potential contact between an...
US-8,588,741 Using EAP instead of PPP for authentication
Various embodiments are described for Point-to-Point Protocol-free (PPP-free) access and service authentication in a wireless network. An HRPD...
US-8,588,689 Systems and methods for configuring subscriber systems in wireless mesh networks
A wireless network may be managed by identifying one or more wireless subscriber systems included in a lobe pool of a wireless network, identifying at least one...
US-8,588,551 Multi-image sharpening and denoising using lucky imaging
The multi-image sharpening and denoising technique described herein creates a clean (low-noise, high contrast), detailed image of a scene from a temporal series...
US-8,588,534 Staged element classification
Various examples are disclosed herein that relate to staged element classification. For example, one disclosed example provides a method of classifying elements...
US-8,588,517 Motion detection using depth images
A sensor system creates a sequence of depth images that are used to detect and track motion of objects within range of the sensor system. A reference image is...
US-8,588,465 Visual target tracking
A method of tracking a target includes classifying a pixel having a pixel address with one or more pixel cases. The pixel is classified based on one or more...
US-8,588,421 Cryptographic key containers on a USB token
A Universal Serial Bus (USB) compatible storage device is utilized as a security token for storage of cryptographic keys. A cryptographic subsystem of a...
US-8,588,298 Harmonic quantizer scale
A digital media encoder/decoder performs quantization/dequantization based on quantization parameters taken from a harmonic quantizer scale. The harmonic...
US-8,587,773 System architecture design for time-of-flight system having reduced differential pixel size, and time-of-flight...
Embodiments of the present invention provide methods to produce a high performance, feature rich TOF system, phase-based or otherwise using small TOF pixels,...
US-8,587,771 Method and system for multi-phase dynamic calibration of three-dimensional (3D) sensors in a time-of-flight system
A phase-based TOF system preferably generates an optical waveform with fast rise and fall times, to enhance modulation contrast, notwithstanding there will be...
US-8,587,670 Automatic capture modes
An image capture device is described which is operable in any one of a number of capture modes. The device comprises a camera, a memory and a processor. The...
US-8,587,610 Rendering source content for display
A method for rendering source content for display in a destination figure is provided. The method may include receiving the source content of the file,...
US-8,587,602 GPU texture tile detail control
Systems and associated methods for processing textures in a graphical processing unit (GPU) are disclosed. Textures may be managed on a per region (e.g., tile)...
US-8,587,583 Three-dimensional environment reconstruction
Three-dimensional environment reconstruction is described. In an example, a 3D model of a real-world environment is generated in a 3D volume made up of voxels...
US-8,587,549 Virtual object adjustment via physical object detection
Various embodiments related to the location and adjustment of a virtual object on a display in response to a detected physical object are disclosed. One...
US-8,587,520 Generating position information using a video camera
Some implementations provide techniques and arrangements to receive image information. A plurality of reference fields of a user-manipulated device may be...
US-8,585,507 Extended and editable gamer profile
A user profile for an online gaming service is created. The user profile contains user gaming information received from a first location. The user profile is...
US-8,585,501 On-line gaming session and party management
A game hosting service manages game sessions and groups of players. The service creates, starts, and ends a game session. The service also manages the joining...
US-D693,843 Display screen with transitional graphical user interface
US-D693,841 Display screen with an animated graphical user interface
US-D693,840 Display screen with a graphical animated user interface
US-D693,839 Display screen with a graphical user interface
US-D693,838 Display screen with user interface
US-D693,832 Display screen with animated graphical user interface
US-D693,831 Display screen with animated graphical user interface
US-D693,830 Display screen with animated graphical user interface
US-D693,829 Display screen with animated graphical user interface
US-D693,711 Motion sensor with microphone
US-8,584,254 Data access reporting platform for secure active monitoring
Technologies pertaining to detecting accesses to monitored regions of memory and transmitting data to a protection system responsive to the detecting are...
US-8,584,230 Security authorization queries
In an example implementation, a bifurcated security scheme has a first level that does not allow usage of negations and a second level that does permit usage of...
US-8,584,227 Firewall with policy hints
A firewall helps a user make a decision regarding network access for an application executing on a computing device by providing "hints" to the user about an...
US-8,584,221 Authenticating using cloud authentication
An authentication mechanism in a local area network may use a cloud authentication mechanism to allow or deny authentication requests. A user may gain access...
US-8,584,147 Managed execution environment for software application interfacing
Some embodiments are directed to controlling interactions between a host software program and a computer system by providing a managed execution environment...
US-8,584,132 Ultra-wideband radio controller driver (URCD)-PAL interface
Various embodiments provide a two-way interface between a URC driver (URCD) and various Protocol Adaption Layer (PAL) drivers. The two-way interface can enable...
US-8,584,109 Virtualization for diversified tamper resistance
A computer-implementable method includes providing an instruction set architecture that comprises features to generate diverse copies of a program, using the...
US-8,584,102 Creating and using deltas to modify existing computer code
Aspects of the subject matter described herein relate to creating and using deltas to modify existing computer code. In aspects, computer code may be translated...
US-8,584,094 Dynamically computing reputation scores for objects
Tools and techniques for dynamically computing reputation scores for objects are described herein. The tools may provide machine-readable storage media...
US-8,584,047 Orbital representation of hierarchical navigation
Hierarchical structures are visualized and navigated using an orbital model. Sibling nodes are orbitally displayed in a generally circular arrangement along an...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.