Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: microsoft





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,201,147 Generic XAD processing model
Embodiments are directed to dynamically building software applications and dynamically updating software applications based on changed data values. In one...
US-8,201,143 Dynamic mating of a modified user interface with pre-modified user interface code library
Mating of a modified user interface to existing user interface code is provided. When a user interface is modified, a pseudo code representation of the modified...
US-8,201,142 Description language for structured graphs
A general purpose high-performance distributed execution engine can be used by developers to deploy large-scale distributed applications. To allow developers to...
US-8,201,139 Semantic framework for natural language programming
A framework for generating a semantic interpretation of natural language input includes an interpreter, a first set of types, and a second set of types. The...
US-8,201,103 Accessing an out-space user interface for a document editor program
An out-space actuator is selected to access an out-space user interface for a document editor program. An out-space actuator is associated with an in-space user...
US-8,201,074 Talking paper authoring tools
A range of unified software authoring tools for creating a talking paper application for integration in an end user platform are described herein. The authoring...
US-8,201,053 Dynamic electronic correction code feedback to extend memory device lifetime
Unrecoverable electronic correction code (ECC) errors in memory storage devices are usually preceded by recoverable ECC errors. A memory storage device...
US-8,201,024 Managing memory faults
Embodiments are described for managing memory faults. An example system can include a memory controller module to manage memory cells and report memory faults....
US-8,200,975 Digital signatures for network forms
Systems and/or methods enabling an individual to digitally sign data using an identifier where the data being digitally signed and the identifier are not...
US-8,200,956 Efficient method for operating system deployment
Method and computer storage media for efficiently deploying an operating system are provided. A virtual hard drive file is communicated by a computing device,...
US-8,200,952 Platform authentication via a transparent second factor
Firmware of a system is configured to allow secondary devices, such as a smart card, to be used for authentication. In an example embodiment, the secondary...
US-8,200,896 Increasing remote desktop performance with video caching
Described techniques improve remote desktop responsiveness by caching an image of a desktop when the host operating system running on the remote desktop server...
US-8,200,895 File system recognition structure
Embodiments include a file system data structure and file system recognition APIs that may allow an operating system to identify a partition of a storage device...
US-8,200,853 Extensions for USB driver interface functions
Extensions for USB driver interface functions are described. In embodiments, input/output of computer instructions and data exchange is managed in a USB core...
US-8,200,836 Durable exactly once message delivery at scale
The present invention extends to methods, systems, and computer program products for durable exactly once message delivery at scale. A message capture system...
US-8,200,758 Management of organizational boundaries in unified communications systems
In general, this disclosure describes techniques of controlling communications occurring in a unified communications system. As described herein, a directory is...
US-8,200,699 Secured and filtered personal information publishing
Selectively shared and filtered personal information collections are provided. Personal information collections include calendars, task lists, address books,...
US-8,200,681 Collaborative media recommendation and sharing technique
A media recommendation and sharing technique that employs agents on media players/devices to expand the scope of media sharing scenarios. The technique assists...
US-8,200,674 Personalized media recommendation
Systems and methods for personalized media recommendation are provided. One example system may include a media server including a media database containing a...
US-8,200,668 Scalar representation for a logical group of columns in relational databases
Systems and methods that group atomic scalar values recognized by a database such as columns into sets (e.g., column sets). A grouping component associated with...
US-8,200,640 Declarative framework for deduplication
A system, framework, and algorithms for data deduplication are described. A declarative language, such as a Datalog-type logic language, is provided. Programs...
US-8,200,623 Optimizing file replication using binary comparisons
Client and server based copies of a file are maintained in synchronicity as changes are made to the file. Data is compared to a previous version known to both...
US-8,200,604 Multi-platform business calculation rule language and execution environment
Computer-readable storage media, computer-implemented methods, and systems are disclosed for a multi-platform calculation rule language and its environment. A...
US-8,200,601 Boosting to determine indicative features from a training set
Determining indicative features may be provided. First, a first set of features may be determined using a document frequency process. Then a second set of...
US-8,200,587 Techniques to filter media content based on entity reputation
Techniques to filter media content based on entity reputation are described. An apparatus may comprise a reputation subsystem operative to manage an entity...
US-8,200,475 Phonetic-based text input method
A method for transliterating languages in a computer system is disclosed. The method includes using a phonetic mapping engine to map languages to phonetic...
US-8,200,258 System and methods for communication between instant message users and short message service users
A routing system receives an instant message (IM) from a user via an IM service. The IM contains a source address associated with the IM user and a destination...
US-8,200,246 Data synchronization for devices supporting direction-based services
With the addition of directional information and gesture based input in a location based services environment, a variety of service(s) can be provided on top of...
US-8,200,037 Importance guided image transformation
Importance guided image transformation. A subject image is accessed, an importance is assigned respective features of the subject image and a scaling scheme is...
US-8,200,017 Face alignment via component-based discriminative search
Described is a technology in which face alignment data is obtained by processing an image using a component-based discriminative search algorithm. For each...
US-8,199,186 Three-dimensional (3D) imaging based on motionparallax
Techniques and technologies are described herein for motion parallax three-dimensional (3D) imaging. Such techniques and technologies do not require special...
US-8,199,131 Synchronization of plugins
A system and process for ensuring the smooth flow of electronic ink is described. Dynamic rendering is give priority over other event handlers. Priority may be...
US-8,199,117 Archive for physical and digital objects
Existing tools for organizing family memories offer few possibilities for easily integrating both physical and digital materials in order to produce a single...
US-8,197,313 User to user game referrals
A method is disclosed in a gaming and media system for quickly and easily creating and sending mail communications including pre-populated, or preformed,...
US-8,196,213 Verification of un-trusted code for consumption on an insecure device
Disclosed is a code verification service that detects malformed data in an automated process and rejects submission and distribution if any malicious code is...
US-8,196,210 Software license compliance
Aspects of the subject matter described herein relate to software license compliance. In aspects, a configuration manager receives an indication of an intent of...
US-8,196,196 Provisional administrator privileges
A system grants "provisional privileges" to a user request for the purpose of provisionally performing a requested transaction. If the provisionally-performed...
US-8,196,187 Resource state transition based access control system
Enforcing access control based on resource state. A method includes receiving a request for an operation on one or more objects stored on computer readable...
US-8,196,186 Security architecture for peer-to-peer storage system
An exemplary method includes receiving a request to register a peer in a peer-to-peer system; generating or selecting a transaction key for the peer; storing...
US-8,196,184 Efficient data structures for multi-dimensional security
Efficient data structures are generated to enforce permissions on a multi-dimensional representation in a performance management application. A model site is...
US-8,196,178 Expert system analysis and graphical display of privilege elevation pathways in a computing environment
A data collection application is executed on a target system. Various data indicative of privilege elevation pathways is collected, including user account data,...
US-8,196,175 Self-describing authorization policy for accessing cloud-based resources
A ticketing system adapted for use with a cloud-based services platform is provided by a ticket-based authorization model in which the authorization...
US-8,196,140 Service function redirection for avoiding function evaluation blockages
Threads operating in a computing environment often invoke service functions, such as methods of a programming library. Such invocations may sometimes cause a...
US-8,196,137 Remote auto provisioning and publication of applications
Techniques for auto provisioning and publication of applications are described. The auto provisioning process enables automatic installation of applications...
US-8,196,136 Configuration and change management system with restore points
A configuration and change management system may have installation and configuration processes that include a discovery mechanism for discovering incomplete...
US-8,196,134 Network service for a software change catalog
A catalog for maintaining a store of public and private limited distribution release software changes in a single location. A method for distributing limited...
US-8,196,123 Object model for transactional memory
Various technologies and techniques are disclosed for providing an object model for transactional memory. The object model for transactional memory allows...
US-8,196,122 Data flow analysis of transactional processes
A XLANG/s compilation method is provided that uses data flow analysis of a program's flow graph to determine lifetimes of a data object. A flowgraph is created...
US-8,196,118 Event set recording
Recording of functional steps resulting from actions in an application is desirable for performing functional testing or user interface automation of an...
US-8,196,107 Simulating stepping through interpreted code
The present invention extends to methods, systems, and computer program products for simulating stepping through interpreted code. Embodiments of the present...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.