Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: microsoft





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,208,543 Quantization and differential coding of alpha image data
Alpha images are efficiently encoded for inclusion in video bitstreams. During encoding, alpha image data is quantized as a first step before differential...
US-8,208,399 Rating effort input device
A rating mechanism may calculate a rating based on a user's effort and duration of input to an input mechanism. The more effort and time a user exerts, the more...
US-8,208,375 Selective filtering of network traffic requests
Several approaches to selectively filtering network traffic are described. One approach involves a system for selectively filtering network traffic. The system...
US-8,208,129 Method, device and system for imaging
There is provided a novel method, device and system for imaging. According to some embodiments of the present invention, a visible light image sensor array...
US-8,207,989 Multi-video synthesis
Embodiments that provide multi-video synthesis are disclosed. In accordance with one embodiment, multi-video synthesis includes breaking a main video into a...
US-8,207,822 Support for batching of events, and shredding of batched events in the RFID infrastructure platform
The claimed subject matter provides a system and/or a method that facilitates receiving data from at least one device. A radio frequency identification (RFID)...
US-D662,510 Display screen with user interface
US-8,205,252 Network accountability among autonomous systems
Accountability among Autonomous Systems (ASs) in a network ensures reliable identification of various customers within the ASs and provides defensibility...
US-8,205,241 Detection of hardware-based virtual machine environment
A method and a processing device are provided for detecting a hardware-based virtual machine environment. An execution time of a privileged instruction may be...
US-8,205,215 Automated event correlation
Events captured at an application are compared to event correlation instances, wherein an event correlation instance represents a relationship between events of...
US-8,205,214 Browser elements for communicating with other browser elements and with external applications
A method includes executing a web script by a browser element to access a web service executing on a web server and providing access to a web application,...
US-8,205,194 Updating offline virtual machines or VM images
Methods and systems for updating a virtual machine image. The virtual machine image may be stored as a collection of one or more virtual hard disk files. The...
US-8,205,172 Graphical web browser history toolbar
The present subject matter describes a graphical web browser toolbar the stores visual representations of user-selected web pages. A saved page is included in...
US-8,205,160 Graphical user interface for multi-frame presentation
A computing device configured to execute computer code to generate a graphical user interface (GUI) for creating a multi-frame presentation is provided. The...
US-8,205,149 Enhanced find and replace for electronic documents
An enhanced find and replace feature for a spreadsheet program module is disclosed. The enhanced find and replace feature allows users to search for terms and...
US-8,205,098 Secure and usable protection of a roamable credentials store
A tool which facilitates a balancing of security with usability enabling secure user access to multiple secure sites and locations from several computing...
US-8,205,090 Secure recovery in a serverless distributed file system
Systems and methods for secure file writes after a catastrophic event are allowed over an unauthenticated channel in a serverless distributed file system if an...
US-8,205,087 Tool for digitally signing multiple documents
A software tool for digitally signing multiple documents is disclosed. When a user wishes to sign multiple documents containing embedded executable code for...
US-8,205,080 Over the air communication authentication using a device token
A system and method are described for securing over the air communications between a service and a communication device. For example, one embodiment of a method...
US-8,204,964 Efficient size optimization of visual information or auditory information
A file, including visual information or auditory information may be uploaded to a processing device. Respective portions of content of the file may be...
US-8,204,937 Contact sidebar tile
Methods, systems, and computer program products for tracking real-time communication data within a single contact tracking application for diverse communication...
US-8,204,916 Hierarchical presentation of search results
Methods, and computer-readable media for presenting search results in a folder hierarchy are provided. Embodiments of the present invention include providing a...
US-8,204,910 Media device presence management
A media player may be adapted to manage presence information distribution and access to facilitate media communication between compatible devices. Devices...
US-8,204,903 Expressing and executing semantic queries within a relational database
Semantic queries are expressed and executed within a relational database. This can be done by defining semantic rules applied to execute the semantic queries...
US-8,204,866 Leveraging constraints for deduplication
A deduplication algorithm that provides improved accuracy in data deduplication by using aggregate and/or groupwise constraints. Deduplication is accomplished...
US-8,204,853 Maintaining client data integrity in a distributed environment using asynchronous data submission
Data processing architecture where submitters can write data and/or metadata changes to a destination through an asynchronous interface. The architecture...
US-8,204,838 Scalable clustering
A scalable clustering system is described. In an embodiment the clustering system is operable for extremely large scale applications where millions of items...
US-8,204,536 Automatic provisioning based on communication network connectivity and characteristics
A communication device and/or applications capable of facilitating communication through different networks are automatically provisioned based on recognition...
US-8,204,338 Factoring repeated content within and among images
Systems and/or methods that factor large-scale repeated content within and/or among images can include devices and components that factor received or acquired...
US-8,204,310 Feature design for HMM based Eastern Asian character recognition
An exemplary method for online character recognition of East Asian characters includes acquiring time sequential, online ink data for a handwritten East Asian...
US-8,204,299 3D content aggregation built into devices
The claimed subject matter provides a system and/or a method that facilitates capturing a portion 2-dimensional (2D) data for implementation within a...
US-8,204,086 Natural network coding for multi-hop wireless network
Described herein is technology for, among other things, natural network coding in a wireless mesh network. The technology involves wireless mesh network...
US-8,203,699 System architecture design for time-of-flight system having reduced differential pixel size, and time-of-flight...
Embodiments of the present invention provide methods to produce a high performance, feature rich TOF system, phase-based or otherwise using small TOF pixels,...
US-8,203,654 Configuring television broadcast signals
A system and methods for configuring a television signal SourceType received by one or more tuners. Each of the tuners in the system are initially identified....
US-8,203,577 Proximity based computer display
A computer that can alter display the format or content of a computer display in response to context information indicating the proximity of a user to the...
US-8,203,566 Fixed function pipeline application remoting through a shader pipeline conversion layer
Systems, methods and computer readable media are disclosed for sending a client graphics data across a remote session for an application, where the application...
US-8,202,166 Multiple-player collaborative content editing
An arrangement is provided for multiplayer collaborative content editing which allows players to edit content and enjoy a social collaborative process. The...
US-8,201,253 Performing security functions when a process is created
A method and system in a computing device for performing security related functions as part of a process created to execute a software component that may be...
US-8,201,244 Automated malware signature generation
Automated malware signature generation is disclosed. Automated malware signature generation includes monitoring incoming unknown files for the presence of...
US-8,201,234 Multi-profile interface specific network security policies
Computer-readable medium having a data structure stored thereon for defining a schema for expressing a network security policy. The data structure includes a...
US-8,201,231 Authenticated credential-based multi-tenant access to a service
Associating a computing device with a group of other computing devices. A service receives a common credential from the computing device and associates the...
US-8,201,230 Method and system for protecting user choices
A system, method, and computer-accessible medium for protecting user choice settings are provided. The system and method provide an application programming...
US-8,201,218 Strategies for securely applying connection policies via a gateway
A strategy is described for securely applying connection policies in a system that includes a first entity (e.g., a TS client) connected to a second entity...
US-8,201,215 Controlling the delegation of rights
The delegation of rights may be controlled in a number of manners. In an example implementation, a delegation authority assertion is formulated with a delegator...
US-8,201,213 Controlling access of application programs to an adaptive input device
Methods and systems for controlling access of application programs to an adaptive input device are described herein. One exemplary computing system includes an...
US-8,201,188 Device-hosted services over media transfer protocol
An arrangement for exposing self-describing device-hosted services on a client device to a host application or processes over MTP (Media Transfer Protocol) is...
US-8,201,185 COM object and managed code object interoperability
Communicating between managed add-ins and COM hosts. A computing environment includes host objects which may be one of a COM object or a managed code object....
US-8,201,171 Adjacent data parallel and streaming operator fusion
Various technologies and techniques are disclosed for handling data parallel operations. Data parallel operations are composed together to create a more complex...
US-8,201,164 Dynamically regulating content downloads
A regulation service can deliver software packages to client computer systems while minimizing the overall effect on network (internet or LAN) traffic and/or...
US-8,201,155 Handling multiple definition of types
User assemblies can be created by a compiler that can handle more than one type definition during execution. Local copies are created for respective...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.