Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: microsoft





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,870,291 Snapshotting shared disk resources for checkpointing a virtual machine cluster
Embodiments are directed to backing up a virtual machine cluster and to determining virtual machine node ownership prior to backing up a virtual machine...
US-9,870,263 System virtualization instance management for terminal sessions
Terminal sessions providing remote access to functionality may be isolated from each other, as well as from the server system space, by being placed in system...
US-9,870,234 Automatic identification of returned merchandise in a data center
A method and system for determining a device identifier assigned to a device within an installation of devices connected via a network is provided. A system...
US-9,870,187 State-based auxiliary display operation
Described is a technology by which routing of data may be automatically modified based on detected state data of a computing system. For example, user input may...
US-9,870,141 Gesture recognition
Gesture recognition is described. In one example, gestures performed by a user of an input device having a touch-sensitive portion are detected using a...
US-9,870,132 Application reporting in an application-selectable user interface
This document describes techniques for application reporting in an application-selectable user interface. These techniques permit a user to view reports for...
US-9,870,124 Communications grouped as conversations
Described are embodiments for displaying groups of communications, such as messages, as a conversation. Conversations are groups of communications that can be...
US-9,870,099 Pressure sensing display
A device includes an electronic display supported in a display chassis, a digitizer sensor overlaid on the electronic display, a circuit configured to detected...
US-9,870,083 Multi-device multi-user sensor correlation for pen and computing device interaction
A grip of a primary user on a touch-sensitive computing device and a grip of a secondary user on the touch-sensitive computing device are sensed and correlated...
US-9,870,066 Method of manufacturing an input device
Input device manufacture techniques are described. In one or more implementations, a plurality of layers of a key assembly is positioned in a fixture such that...
US-9,870,063 Multimodal interaction using a state machine and hand gestures discrete values
A system for associating between a computerized model of multimodal human interaction and application functions, comprising: (a) An interface for receiving...
US-9,870,028 Universal dock for context sensitive computing device
A dock for interacting with a computing device. The computing device configures itself for operations based on its context, which may be determined form the...
US-9,869,748 Locating a mobile device
Identifying a location of a mobile device is disclosed (e.g., presuming user consent to the same). One or more received signal strengths (RSSs), comprising a...
US-9,868,058 Thumbstick with adjustable tension
Methods, systems, apparatuses, and computer program products are provided for a user input device, such as a game controller, that includes a thumbstick having...
US-9,867,220 Tethering parameters for a tethering connection
Techniques for tethering parameters for a tethering connection are described. Implementations, for example, enable a tethered connection between a tethered...
US-9,867,132 Prediction for power conservation in a mobile device
Architecture that facilitates power conservation in mobile devices such as cell phones using prediction. The architecture is an algorithmic-based solution that...
US-9,867,036 Creation and management of wireless reader device profiles
The claimed subject matter provides a system and/or method that creates, manages, or maintains multiple device versions in a network of Radio Frequency...
US-9,867,006 Geo-classification of users from application log data
Non-limiting examples of the present disclosure describe evaluation of log data of an application/service for the migration of user data to a data center in a...
US-9,866,927 Identifying entities based on sensor data
Sensor data from multiple sensors associated with a user is received. The sensors may include sensors of a smart phone, and sensors associated with other...
US-9,866,871 Use of frame caching to improve packet loss recovery
Various new and non-obvious apparatus and methods for using frame caching to improve packet loss recovery are disclosed. One of the disclosed embodiments is a...
US-9,866,868 Non-transform coding
Techniques for selectively transforming one or more coding units when coding video content are described herein. The techniques may include determining whether...
US-9,866,867 Non-transform coding
Techniques for selectively transforming one or more coding units when coding video content are described herein. The techniques may include determining whether...
US-9,866,684 Process for real-time data exchange between users on a phone call
A process for real-time data exchange allows for sharing data, including metadata such as user data and phone data, between multiple handsets so that handsets...
US-9,866,514 Electronic message organization via social groups
A mechanism for automatically organizing electronic messages is described herein. Social groups of a particular user that may be representative of topics,...
US-9,866,494 Wireless communication using delayed frame transmission
The disclosed subject matter includes techniques for delaying network frames. In some examples, a system for delaying network frames can include a processor and...
US-9,866,418 Cognitive multi-user OFDMA
A computing device operating according to a frequency division multiplexed protocol in which communication occurs over a signal formed from a plurality of...
US-9,866,400 Action(s) based on automatic participant identification
Techniques are described herein that are capable of performing action(s) based on automatic participant identification. For example, participants of a meeting...
US-9,866,398 Pattern coalescing for remote wake-enabled applications
In various embodiments, methods and systems for managing wake-enabled transport connections of wake-enabled applications is provided. A set of ports is...
US-9,866,208 Precision measurements and calibrations for timing generators
Described herein are methods and subsystems for use with a timing generator having an output driver at which a timing signal having timing pulses is output. A...
US-9,865,939 Connecting element with a spring tab
A connecting element for galvanically connecting two electrically conductive surfaces, comprises: a body plate having a body plate upper surface defining a body...
US-9,865,262 Multi-mode text input
Concepts and technologies are described herein for multi-mode text input. In accordance with the concepts and technologies disclosed herein, content is...
US-9,865,230 Animated visualization of alpha channel transparency
Visual inspection of alpha channel values is aided by displaying a partially transparent image rendered over an animated background pattern. The background...
US-9,865,091 Localizing devices in augmented reality environment
Examples are disclosed herein that relate to identifying and localizing devices in an environment via an augmented reality display device. One example provides,...
US-9,865,089 Virtual reality environment with real world objects
An HMD device renders a virtual reality environment in which areas of the real world are masked out so that real world objects such as computer monitors, doors,...
US-9,865,077 Redundant pixel mitigation
Among other things, one or more techniques and/or systems are provided for mitigating redundant pixel texture contribution for texturing a geometry. That is,...
US-9,865,042 Image semantic segmentation
In implementations of the subject matter described herein, the feature maps are obtained by convoluting an input image using a plurality of layers of...
US-9,864,975 Information management systems with time zone information, including event scheduling processes
Information management systems with time zone information, including event scheduling processes are disclosed. One aspect of the invention is directed toward a...
US-9,864,974 Serendipitous issue reminder system
A method of arranging a serendipitous meeting is disclosed. It is determined that a first person of an organization is within a physical proximity to a second...
US-9,864,966 Data mining in a business intelligence document
A business intelligence document provides functionality for testing a hypothesis on aggregated data in a business intelligence document (e.g., a...
US-9,864,860 Code property analysis for security mitigations
Attempts to make code secure often are associated with performance penalties. To facilitate striking an acceptable balance between performance and security,...
US-9,864,817 Determination of relationships between collections of disparate media types
Architecture that automatically determines relationships between vector spaces of disparate media types, and outputs ranker signals based on these...
US-9,864,808 Knowledge-based entity detection and disambiguation
An entity-based search system is described herein that detects and recognizes entities in Internet-based content and uses this recognition to organize search...
US-9,864,796 Databases from models
One or more model elements may be extracted from a model. Coding patterns may be generated based on the extracted model elements. The coding patterns may be...
US-9,864,791 Flow for multi-master replication in distributed storage
Embodiments are directed to replicating data in distributed storage. A replication message may be retrieved from a message queue associated with a source table....
US-9,864,768 Surfacing actions from social data
Social data is used to extract actions that end users perform in order to provide deeplinks for search results. Social data from social networking services may...
US-9,864,678 Automatic risk analysis of software
Techniques are described herein that are capable of performing automatic risk analysis of software. An automatic risk analyzer may determine correlations...
US-9,864,676 Bottleneck detector application programming interface
An application programming interface may receive workload identifiers and checkpoint identifiers from which bottleneck detection may be performed. Workloads may...
US-9,864,672 Module specific tracing in a shared module environment
Visualizing execution of an application in a trace coverage graph includes receiving module trace data gathered during execution of an executable module. The...
US-9,864,637 Adaptable software resource managers based on intentions
User intentions can be derived from observations of user actions or they can be programmatically specified by an application or component that is performing an...
US-9,864,627 Power saving operating system for virtual environment
Principles for enabling power management techniques for virtual machines. In a virtual machine environment, a physical computer system may maintain management...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.