Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: microsoft





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,176,465 Pluggable model elements
Various technologies and techniques are disclosed for providing pluggable model elements. A modeling application is provided that is operable to allow custom...
US-8,176,442 Living cursor control mechanics
Disclosed herein are systems and methods for controlling a cursor. A user may control a cursor displayed by a computing environment such as a game console, a...
US-8,176,438 Multi-modal interaction for a screen magnifier
A multi-model magnification system is described that can be used with multiple forms of input, including natural input such as touch-based devices. Users can...
US-8,176,434 Virtual desktop view scrolling
Example embodiments of the present disclosure are related to scrolling the view of a virtual desktop on a client. The client can be in communication with a...
US-8,176,419 Self learning contextual spell corrector
A group of keywords are received, wherein each keyword includes one or more words. A word list is formed from the group of keywords, where the word list...
US-8,176,408 Modularized web provisioning
A system and method for modularized Web provisioning. Functionalities available for Web provisioning are modularized into individual feature files. A site...
US-8,176,407 Comparing values of a bounded domain
Methods, systems, and computer-readable media to compare values of a bounded domain are disclosed. A particular method includes, for each value in a bounded...
US-8,176,271 Backing up data from backup target to backup facility
Aspects of the subject matter described herein relate to backup up data. In aspects, a backup target determines a degree to which a data set included on the...
US-8,176,256 Cache regions
A cache region can be created in a cache in response to receiving a cache region creation request from an application. A storage request from the application...
US-8,176,253 Leveraging transactional memory hardware to accelerate virtualization and emulation
Various technologies and techniques are disclosed for using transactional memory hardware to accelerate virtualization or emulation. A central processing unit...
US-8,176,200 Distributed aggregation on an overlay network
The present invention extends to methods, systems, and computer program products for distributed aggregation on an overlay network. Embodiments of the invention...
US-8,176,193 Dynamic media asset delivery
Dynamic media asset delivery is described. In embodiments, a request for a media asset can be received from a client device. A transmission rate of a...
US-8,176,157 Exceptions grouping
Methods of experience-based exception grouping are described. A number of exceptions are read. The exceptions are intelligently associated with one of a number...
US-8,176,096 Data visualization interactivity architecture
A data visualization interactivity architecture may be provided. The architecture may allow the creation of a data visualization, such as a chart, and may...
US-8,176,085 Modular forest automata
Modular forest automata (MFA) provide a unified description of partially-ordered regular tree patterns. MFAs provide simple methods for determinization,...
US-8,176,071 Selection and sorting protocol extensions to the WS-enumeration protocol
Techniques are described herein for providing protocol extensions to the WS-Enumeration protocol. A selection protocol extension to the WS-Enumeration protocol...
US-8,176,023 Hierarchical locking in B-tree indexes
Portions of a B-tree index in a database are locked for concurrency control. In one example, hierarchical lock modes are provided that permit locking a key, a...
US-8,176,021 Optimized reverse key indexes
Aspects of the subject matter described herein relate to optimized reverse key indexes. In aspects, a dispersion function disperses index values such that they...
US-8,176,017 Live volume access
This document describes tools capable of enabling an entity requiring exclusive access to data and metadata of a volume to have that exclusive access while also...
US-8,176,003 Automatic designation of XBRL taxonomy tags
The embodiments described herein generally relate to new and alternate systems and methods to associate XBRL tags with financial data. A business user creates a...
US-8,176,002 Method and system for user alteration of the configuration of a data warehouse
Disclosed are methods usable by non-experts for altering a configuration of a data warehouse. The initial configuration of the data warehouse is represented in...
US-8,175,939 Merchant powered click-to-call method
A method is disclosed for enhancing the predictability, scalability and cost effectiveness of online advertising with voice over IP connectivity and event...
US-8,175,847 Tag ranking
Technologies for generating a boosted tag ranking for a media instance, the boosted tag ranking based on probabilistic relevance estimation computed by a...
US-8,175,726 Seeding in a skill scoring framework
Skill scores represent a ranking or other indication of the skill of the player based on the outcome of the game in a gaming environment. Skills scores can be...
US-8,175,653 Chromeless user interface
Techniques are described to implement a user interface for a display of a mobile device. In an implementation, the user interface may include a chromeless menu...
US-8,175,442 Program recording completion
A program recording completion system automatically completes an incomplete program recording of a program. A recording application creates a program recording...
US-8,175,382 Learning image enhancement
Image enhancement techniques are described to enhance an image in accordance with a set of training images. In an implementation, an image color tone map is...
US-8,175,099 Embedded system development platform
A modular development platform is described which enables creation of reliable, compact, physically robust and power efficient embedded device prototypes. The...
US-8,175,097 Embedding a session description message in a real-time control protocol (RTCP) message
Embedded within at least some Real-Time Control Protocol (RTCP) messages sent from a media content source to a recipient is a session description message that...
US-8,174,620 High definition media content processing
High definition media content processing techniques are described in which enhanced media content rendering techniques may be performed to output high...
US-8,174,508 Pointing and data entry input device
An input device includes an array of adjacent capacitive sensors arranged into rows and columns. Each capacitive sensor exhibits a capacitance characteristic...
US-8,172,675 Personalization using a hand-pressure signature
A hand-held device having a body with a pressure-sensitive exterior surface. At least a portion of the pressure-sensitive exterior surface is designed to be...
US-D659,161 Display screen with an icon
US-D659,155 Display screen with user interface with orange colored bar
US-D659,140 Game controller
US-8,171,560 Secure content pre-distribution to designated systems
Described is a technology by which encrypted content is pre-distributed to recipients during a pre-distribution timeframe, for example to distribute protected...
US-8,171,538 Authentication and authorization of extranet clients to a secure intranet business application in a perimeter...
Methods and systems authenticate and authorize an extranet client to a secure intranet business application with a perimeter network topology, where connections...
US-8,171,534 Two-way authentication using a combined code
An authentication process for a client and a target service to perform mutual authentication. A combined code is received that comprises a combined code hash of...
US-8,171,522 Systems and processes for managing policy change in a distributed enterprise
A method for managing changes to policies in an enterprise includes receiving a systems policy change request to change a systems policy that implements a...
US-8,171,515 Automatically generated TV favorites list
A favorite channel list for a media system is generated by observing the viewing, surfing, and recording habits of a user. The viewing habits may include the...
US-8,171,495 Queue dispatch using deferred acknowledgement
Dispatching an incoming message from a queue into message transfer session(s) from which message consumers may draw messages. The message is reversibly received...
US-8,171,462 User declarative language for formatted data processing
A user declarative language for formatted data processing is provided. The user declarative language may be used to generate constraints which can be projected...
US-8,171,453 Explicit delimitation of semantic scope
Systems and methods are provided with respect to computer programming. Program behavior can be tuned to provide a seamless mixture of semantic behavior across a...
US-8,171,431 Handle flags
The claimed subject matter provides techniques to effectuate and facilitate efficient and flexible selection of display objects. The system can include devices...
US-8,171,401 Resizing an editable area in a web page
Embodiments of the present invention provide for vertically and/or horizontally resizing a zone or DIV element of a Web page via a browser-based Web authoring...
US-8,171,394 Methods and systems for providing a customized user interface for viewing and editing meta-data
Systems and methods are disclosed for providing a user interface. The disclosed systems and methods may include receiving a request to initiate an application...
US-8,171,346 Client session based debugging
Debugging operations on individual client sessions for a remotely executed shared application are enabled to be performed as the client requests are processed...
US-8,171,306 Universal secure token for obfuscation and tamper resistance
Program obfuscation is accomplished with tamper proof token including an embedded oracle. A public obfuscation function can be applied to any program/circuit to...
US-8,171,232 Stored value accessors in shared memory regions
Instruction sets in computing environments may execute within one of several domains, such as a natively executing domain, an interpretively executing domain,...
US-8,171,157 Distributing bandwidth across communication modalities
Embodiments are configured to provide communication environments to communicating participants using a number of modality control features, but are not so...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.