Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: microsoft





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,290,288 Encoding macroblock type and coded block pattern information
The coded block parameters used to code blocks of image samples into structures called macroblocks are compressed more efficiently by exploiting the correlation...
US-8,290,252 Image-based backgrounds for images
In accordance with one or more aspects of the image-based backgrounds for images, an image is analyzed in order to identify a color that represents the image....
US-8,290,249 Systems and methods for detecting a tilt angle from a depth image
A depth image of a scene may be received, observed, or captured by a device. A human target in the depth image may then be scanned for one or more body parts...
US-8,290,181 Automatic audio gain control for concurrent capture applications
A system level automatic gain control ("System AGC") automatically initializes and controls analog microphone gain in an environment where multiple independent...
US-8,290,152 Management system for web service developer keys
Various technologies and techniques are disclosed for managing web service developer keys. A generic key identifier can be generated based on an original web...
US-8,290,128 Unified communication based multi-screen video system
A multiple screen telepresence style video conferencing experience is provided employing generic hardware and intelligent software, which may be based on...
US-8,289,970 IPSec encapsulation mode
Described are embodiments directed to negotiating an encapsulation mode between an initiator and a responder. As part of the negotiation of the security...
US-8,289,300 Ambient correction in rolling image capture system
Embodiments are disclosed that relate to the correction of an image acquired in a rolling image capture system for ambient light. One embodiment provides a...
US-8,289,288 Virtual object adjustment via physical object detection
Various embodiments related to the location and adjustment of a virtual object on a display in response to a detected physical object are disclosed. One...
US-8,289,280 Key screens formed from flexible substrate
Various embodiments related to an adaptive keyboard cut from a single flexible substrate are provided. One disclosed embodiment of an adaptive input device...
US-8,288,045 Apparatus and method for heating fuel cells
A fuel cell or fuel cell stack heater using resistive heat. A resistive conductor (preferably some type of metal wire) is attached to a source of electricity...
US-8,287,281 Memory training via visual journal
A system that can enhance cognitive ability by viewing sequences of images captured during an event is disclosed. For example, the innovation can employ...
US-8,286,223 Extensible access control architecture
Software for managing access control functions in a network. The software includes a host that receives access control commands or information and calls one or...
US-8,286,215 Pausing television programming in response to selection of network address
A time sequential signal comprising audiovisual content and network addresses is received and displayed on a display device by the systems of the invention in a...
US-8,286,212 On-demand asset distribution
On-demand asset distribution is described. In embodiment(s), a client device can maintain an on-demand asset received from a content distributor, such as with a...
US-8,286,195 Controlling hardware across two or more simultaneously running operating systems
A computing device has two or more software stacks, each stack simultaneously running a different operating system. Only one enabled operating system at a time...
US-8,286,177 Technique for conserving software application resources
Systems and methods of adjusting allocated hardware resources to support a running software application are disclosed. A system includes adjustment logic to...
US-8,286,138 Multi-threaded detection of a game software debugger
An anti-debugging mechanism is implemented into a game application, such that the anti-debugging mechanism is difficult to detect, difficult to bypass, and...
US-8,286,133 Fuzzing encoded data
A test tool is provided for testing a software component. The tool receives data structured and formatted for processing by the software component. The...
US-8,286,077 Remote batch editing of formatted text via an HTML editor
Remote batch editing of formatted text may be provided. A request to edit a source document comprising text using a first markup language may be received. The...
US-8,286,072 Variable formatting of cells
Variable formatting for cells in computer spreadsheets, tables, and other documents is provided. For a selected range of cells, cell formats vary with the value...
US-8,286,068 Linking digital and paper documents
Various embodiments facilitate linking physical documents to digital documents. Links link physical documents to digital documents. Using a sensor, the physical...
US-8,286,056 Encoding and application of extended hamming checksum
A method for calculating an extended hamming checksum and applying the extended hamming checksum to a data packet, the method comprising forming a packet...
US-8,286,036 Objective assessment of application crashes from a customer environment
A computerized method for collecting error data and providing error reports relating to occurrences of errors of software applications installed on one or more...
US-8,286,033 Network hang recovery
A method of detecting a network hang and restoring an application that communicates on a connection giving rise to the network hang. A user experience may be...
US-8,286,015 Storage array power management using lifecycle information
A multi-device storage system can be arranged into power saving systems by placing one or more storage devices into a reduced power consuming state when the...
US-8,285,855 System, method and user interface for network status reporting
A method and user interface for informing a user of the status of a network connection are provided. Conventionally, the "connected" icon in the system tray...
US-8,285,837 Recording and/or use of generation information
An object (e.g., a video, a widget, etc.) may carry generation information, indicating the length of the referral chain that led to the object's being...
US-8,285,812 Peer-to-peer synchronous content selection
Various technologies for sharing digital images within an instant messaging (IM) session between two users. In one implementation, a first user uploads a set of...
US-8,285,799 Quota-based archiving
A determination of whether to archive email messages in a user mailbox is made each time an email message is received at a server computer. A storage quota, a...
US-8,285,761 Aggregation of metadata associated with digital media files
Systems and methods for aggregating user feedback associated with digital media files is provided. User feedback is received from a user that includes metadata...
US-8,285,745 User query mining for advertising matching
Systems and methods to determine relevant keywords from a user's search query sessions are disclosed. The described method includes identifying search session...
US-8,285,730 Reviewing user-created content before website presentation
Methods and systems for reviewing content items created by users for presentation in association with a website are provided. Automatic scrubbing (followed by...
US-8,285,717 Storage of advertisements in a personal account at an online service
A system for use in storage of advertisements in a personal account at an online service is provided. The online service may be configured to serve data to a...
US-8,285,708 Query submission pipeline using LINQ
Described is a technology comprising a query processing pipeline in which a SPARQL query is processed into an intermediate LINQ query, which is then processed...
US-8,285,706 Using a human computation game to improve search engine performance
Human computation games are provided wherein a player is shown a page, such as a web page. The player is then asked to provide one or more terms that are...
US-8,285,699 Generating search result summaries
Embodiments are configured to provide a summary of information associated with one or more search results. In an embodiment, a system includes a summary...
US-8,285,668 Building a knowledgebase of associated time-based events
Technologies are described herein for building a knowledgebase of associated time-based events and displaying the associations between the events to a user. A...
US-8,285,652 Virtual robot integration with search
An arrangement for virtually integrating a bot with a search functionality provided by an online search engine enables users of personal computers ("PCs"),...
US-8,285,549 Personality-based device
A personality-based theme may be provided. A prompt and an input indicating a personality may be received. Next, a voice font corresponding to the personality...
US-8,285,542 Adapting a language model to accommodate inputs not found in a directory assistance listing
A statistical language model is trained for use in a directory assistance system using the data in a directory assistance listing corpus. Calculations are made...
US-8,285,259 Resource aggregation in an opportunistic network
A wireless opportunistic network that can facilitate resource aggregation by way of interconnected devices is disclosed. In accordance with this opportunistic...
US-8,285,049 Corrections for recognizers
A processing device may recognize a number of input handwritten strokes, which may represent a mathematical expression, a chemical formula, or other...
US-8,284,942 Persisting private/public key pairs in password-encrypted files for transportation to local cryptographic store
Systems and methods for using private keys in software development that minimizes the risks of the private key being lost or stolen. A strong name consists of...
US-8,284,923 Bridging messages to release enterprise ports
Architecture for bridging unwanted calls back to the PSTN (public switch telephone network) thereby freeing-up enterprise ports for other uses. When an incoming...
US-8,284,918 Media specific feature invocation signaling in enhanced communication systems
Subscribers of an enhanced communication system are enabled to indicate invocation or clearing of media specific features such as music-on-hold or...
US-8,284,909 Offline voicemail
A method for accessing offline voicemail messages within a mobile messaging application may be provided. First, a voice mail message may be received and the...
US-8,284,847 Detecting motion for a multifunction sensor device
To detect movement of a depth camera in a motion capture system, readings from an accelerometer in the depth camera are processed to provide short and long term...
US-8,284,803 Cross-scope synchronization of data item knowledge and corresponding metadata
The subject disclosure relates to cross scope synchronization among different sets of nodes that synchronize the same data item(s) according to different...
US-8,284,250 Determining trigger rate for a digital camera
A system that facilitates determining a trigger rate for a digital camera to provide a threshold forward overlap for consecutively captured images is described...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.