Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: microsoft





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-D667,445 Display screen with icon
US-D667,444 Display screen with icon
US-D667,443 Display screen with icon
US-D667,442 Display screen with icon
US-D667,434 Display screen with icon
US-D667,433 Display screen with icon
US-D667,432 Display screen with icon
US-D667,431 Display screen with icon
US-D667,429 Display screen with icon
US-D667,428 Display screen with icon
US-D667,427 Display screen with icon
US-D667,426 Display screen with icon set
US-D667,425 Display screen with graphical user interface
US-D667,424 Display screen with animated user interface
US-D667,423 Display screen with animated user interface
US-D667,422 Display screen with animated user interface
US-D667,421 Display screen with graphical user interface
US-D667,420 Display screen with graphical user interface
US-D667,419 Display screen with user interface
US-D667,416 Display screen with graphical user interface
US-D667,415 Display screen with user interface
US-D667,409 Electronic mouse
US-8,266,714 Access control in a multi-principal browser
A principal operating system based-browser controls access to resources. The resources are represented semantically in a resource object model. A browser kernel...
US-8,266,706 Cryptographically controlling access to documents
Aspects of the subject matter described herein relate to cryptographically controlling access to documents. In aspects, documents are encrypted to protect them...
US-8,266,702 Analyzing access control configurations
A facility is described for analyzing access control configurations. In various embodiments, the facility comprises an operating system having resources and...
US-8,266,691 Renewable integrity rooted system
A method of validating software is disclosed. The method may include receiving, at a first function, a first hash and a first version. The first function may...
US-8,266,685 Firewall installer
Embodiments of the invention are directed to a firewall installer that receives a set of configuration instructions for configuring a firewall in a declarative...
US-8,266,680 Predictive HTTP authentication mode negotiation
A client system and a server system use a Hypertext Transfer Protocol (HTTP) authentication mode preference header to negotiate an HTTP authentication mode. The...
US-8,266,637 Privacy modes in a remote desktop environment
Techniques described maintain privacy of a remote desktop client when the remote client interacts with and displays the desktop of the host device. The...
US-8,266,634 Resource assignment system with recovery notification
The application discloses a resource assignment system including recovery notification procedures or methods to notify an application or node of potentially...
US-8,266,612 Dynamic, customizable and configurable notification mechanism
Provided are arrangements for delivering customized application or update notifications corresponding to a software application so that a user may be informed...
US-8,266,609 Efficient placement of software transactional memory operations around procedure calls
A software transactional memory system is described which utilizes decomposed software transactional memory instructions as well as runtime optimizations to...
US-8,266,604 Transactional memory compatibility management
Transactional memory compatibility type attributes are associated with intermediate language code to specify, for example, that intermediate language code must...
US-8,266,601 Framework for interoperability of solvers
A framework may be provided for facilitating adoption of mathematical and logical solvers. A model, representing a problem, may be defined. The model may be...
US-8,266,598 Bounding resource consumption using abstract interpretation
Bounding resource consumption of code using abstract interpretation includes a static analysis to estimate a code's resource consumption in terms of units of...
US-8,266,592 Ranking and optimizing automated test scripts
Technologies are described herein for ranking and optimizing test scripts utilized in the automated testing of software products. A score is calculated for each...
US-8,266,586 Application development with unified programming models
A unified programming environment allows application developers to work with declarative, procedural and service model based logic. In one aspect, instructions...
US-8,266,534 Collaborative generation of meeting minutes and agenda confirmation
Members working on the same project can access similar resources at substantially the same time to facilitate active participation in the project. A meeting...
US-8,266,524 Editing a document using a transitory editing surface
Technologies are described herein for editing a document using a transitory editing surface. A word processing program displays a document in a window. Upon...
US-8,266,514 Map service
Map service techniques are described. In an implementation, one or more computer-readable media comprise instructions that are executable by a computer to...
US-8,266,393 Coordination among multiple memory controllers
Systems and methods that coordinate operations among a plurality of memory controllers to make a decision for performing an action based in part on state...
US-8,266,387 Leveraging transactional memory hardware to accelerate virtualization emulation
Various technologies and techniques are disclosed for using transactional memory hardware to accelerate virtualization or emulation. One or more central...
US-8,266,362 Device connection routing for controllers
Device connection routing for controllers is provided. A computing device is configured with multiple controllers that provide connections for peripheral...
US-8,266,311 Strategies for transmitting in-band control information
Strategies are described for transmitting control information from a host module to a client module. The host module transmits the control information in-band...
US-8,266,310 Enabling peer-to-peer content retrieval in HTTP
Described are embodiments directed to enabling the retrieval of content from a peer-to-peer network. In embodiments, a client requesting content from a server...
US-8,266,294 Routing hints
A first exemplary media implementation includes processor-executable instructions that direct a device to perform actions including: creating a session...
US-8,266,292 Memorable resource names
Among other things, one or more techniques and/or systems are disclosed for generating a human memorable resource name. Both a first part of the resource name...
US-8,266,290 Scalable queues on a scalable structured storage system
A cloud computing platform contains a structured storage subsystem the provides scalable queues. The cloud computing platform monitors message throughput for...
US-8,266,289 Concurrent data processing in a distributed system
Systems, methods, and computer media for scheduling vertices in a distributed data processing network and allocating computing resources on a processing node in...
US-8,266,284 System from reputation shaping a peer-to-peer network
A method of managing access to resources in a network. A reputation for each network participant is evaluated by querying a data source for the reputation...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.