Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: microsoft





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,941,670 Para-virtualized high-performance computing and GDI acceleration
The present invention extends to methods, systems, and computer program products for para-virtualized GPGPU computation and GDI acceleration. Some embodiments...
US-8,941,657 Calculating zoom level timeline data
The present invention extends to methods, systems, and computer program products for calculating zoom level timeline data. Event aggregators are configured to...
US-8,941,644 Computing three-dimensional image models in parallel
This document describes techniques for creating three-dimensional models of image collections using a network-accessible (e.g., cloud-based) computation...
US-8,941,641 Annotating or editing three dimensional space
In one example, images may be used to create a model of a three-dimensional space, and the three-dimensional space may be annotated and/or edited. When a...
US-8,941,591 User interface elements positioned for display
User interface elements positioned for display is described. In various embodiment(s), sensor input can be received from one or more sensors that are integrated...
US-8,941,559 Opacity filter for display device
An optical see-through head-mounted display device includes a see-through lens which combines an augmented reality image with light from a real-world scene,...
US-D721,727 Display screen with icon set
US-8,938,788 Associating computing devices with common credentials
Method and computer storage media for sharing resources between a plurality of computing devices associated with a common non-enterprise network. A common set...
US-8,938,783 Security language expressions for logic resolution
A security language expresses assertions and authorization queries in a manner that facilitates logic resolution. In an example implementation, assertion syntax...
US-8,938,738 Shared user-mode for controlling synchronized access to a shared resource
Technologies are described herein for implementing shared locks for controlling synchronized access to a shared resource. In one method, in a user mode of an...
US-8,938,727 Method for preventing software reverse engineering, unauthorized modification, and runtime data interception
A method for preventing the unauthorized modification of a software or unauthorized modification of runtime data. According to this method, a converter, which...
US-8,938,721 Measuring actual end user performance and availability of web applications
Techniques for monitoring web application performance are provided. A request for a web application is received at an application server. A response pipeline at...
US-8,938,653 Increasing the accuracy of information returned for context signals
The subject disclosure is directed towards a technology by which the accuracy of context-based information provided by at least one data source for received...
US-8,938,638 Recovery service location for a service
A secondary location of a network acts as a recovery network for a primary location of the service. The secondary location is maintained in a warm state that is...
US-8,938,618 Device booting with an initial protection component
Booting a computing device includes executing one or more firmware components followed by a boot loader component. A protection component for the computing...
US-8,938,558 Modifying functionality based on distances between devices
Described herein are techniques and systems that allow modification of functionalities based on distances between a shared device (e.g., a shared display, etc.)...
US-8,938,555 Non-blocking buffered inter-machine data transfer with acknowledgment
A system, method and data structures for transmitting batched data over a network in asynchronous, non-blocking operations, with acknowledgements returned to...
US-8,938,550 Autonomous network streaming
Embodiments are directed to dynamically delivering virtual software applications and to allocating application data between local and network data stores. In...
US-8,938,529 Hardware management communication protocol
A simplified hardware management communication protocol comprises defined request packets, which are utilized to transmit requests to lower layers of management...
US-8,938,448 Alternative market search result toggle
Systems, methods, and computer media for providing alternative market search results are provided. A user search query in a first market is received. Search...
US-8,938,407 Information propagation probability for a social network
One or more techniques and/or systems are disclosed for predicting propagation of a message on a social network. A predictive model is trained to determine a...
US-8,938,391 Dynamically adding personalization features to language models for voice search
A dynamic exponential, feature-based, language model is continually adjusted per utterance by a user, based on the user's usage history. This adjustment of the...
US-8,938,272 Channel reporting for television whitespace
Various technologies described herein pertain to providing spectrum utilization feedback from a whitespace device. A database query for a set of available...
US-8,937,771 Three piece prism eye-piece
A prism eye piece and optical system including a prism eye piece and microdisplay are described herein. The prism eye piece may include three prisms. A main...
US-8,937,663 Camera and sensor augmented reality techniques
Camera and sensor augmented reality techniques are described. In one or more implementations, an optical basis is obtained that was generated from data obtained...
US-8,936,366 Illuminated skin robot display
There is provided a robot that includes a processor executing instructions that determine a desired image to be displayed. The processor issues control signals...
US-D721,385 Display screen with graphical user interface
US-D721,381 Display screen with animated graphical user interface
US-D721,380 Display screen with graphical user interface
US-D721,369 Keyboard
US-D721,368 Keyboard
US-D721,367 Keyboard
US-D721,366 Keyboard
US-D721,365 Keyboard
US-8,935,810 Cloud key directory for federating data exchanges
Embodiments are directed to providing attribute-based data access. In an embodiment, a data request specifies one or more search data attributes describing...
US-8,935,796 Segment based digital content protection
Techniques are disclosed herein for applying different content protection schemes to different segments of digital content. A method for protecting digital...
US-8,935,774 Accessory device authentication
Accessory device authentication techniques are described. In one or more embodiments, connection of an accessory device to a host computing device is detected....
US-8,935,767 Overlay human interactive proof system and techniques
The overlay human interactive proof system ("OHIPS") and techniques described herein operate in conjunction with any known or later developed computer-based...
US-8,935,748 Secure DNS query
A secure DNS query may be made by establishing a secure connection with a specific DNS server to determine an address for a hostname. A client device may have a...
US-8,935,742 Authentication in a globally distributed infrastructure for secure content management
Secure content management is enabled as a cloud-based service through which security protection and policy enforcement may be implemented for both on-premise...
US-8,935,711 Global API deployment and routing
A method and a system are provided for implementing a global application program interface and providing routing to a number of services. A global traffic...
US-8,935,697 Suspension and/or throttling of processes for connected standby
One or more techniques and/or systems are provided for assigning power management classifications to a process, transitioning a computing environment into a...
US-8,935,686 Error-code and exception-based function dispatch tables
A condition detected by a virtual routine may be treated by setting an error code or raising an exception, depending on circumstances. Enhanced vtable layouts...
US-8,935,677 Automatic reverse engineering of input formats
Systems and methods for automatically reverse engineering an input data format using dynamic data flow analysis. Combining input data with a simulated execution...
US-8,935,669 Strategies for performing testing in a multi-user environment
A strategy is described in which multiple testing agents perform multiple respective tests in a multi-user environment. One such multi-user environment allows...
US-8,935,631 Arranging tiles
This document describes techniques and apparatuses for arranging tiles. These techniques and apparatuses enable users to quickly and easily arrange tiles within...
US-8,935,610 Dynamic minimized navigation bar for expanded communication service
A minimized state navigation bar is provided for switching between modules within an expanded communication service such as email, calendar, contacts, tasks,...
US-8,935,528 Techniques for ensuring authentication and integrity of communications
Techniques are described for ensuring data integrity and authentication of received messages. One technique includes sending a request from a first module to a...
US-8,935,487 Fast and low-RAM-footprint indexing for data deduplication
The subject disclosure is directed towards a data deduplication technology in which a hash index service's index maintains a hash index in a secondary storage...
US-8,935,427 Providing virtual networks using multi-tenant relays
Embodiments are directed to providing a multi-tenant relay service that securely relays data between computer systems. A computer system receives a portion of...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.