Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: microsoft





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,180,905 User-mode based remote desktop protocol (RDP) encoding architecture
Techniques are disclosed for a user-mode based remote desktop protocol (RDP) encoding architecture. A user mode desktop application and user mode virtual...
US-8,180,887 Geolocation mapping of network devices
A geographic location of a network device is determined using response delay times from internet servers used as landmarks. A coordination server provides to a...
US-8,180,838 Efficiently managing modular data storage systems
The management of a data storage system. The system may store data objects that are subject to change in container sets. The data storage system uses location...
US-8,180,833 Managing working set in an extensible message transfer system
Within a mail transfer agent of a message transfer system, a message is received and if the recipient entity resolves to a number of recipients exceeding a...
US-8,180,826 Media sharing and authoring on the web
Exemplary media browsing, searching and authoring tools allow for media interaction over a web. An exemplary method includes acquiring digital video data,...
US-8,180,812 Templates for configuring file shares
Aspects of the subject matter described herein relate to configuring file shares. In aspects, a template is created that includes policies to apply to one or...
US-8,180,790 Search macro suggestions relevant to search queries
Search macros suggestions are provided to refine a user's search. When a search query is received from an end user, one or more search macros are determined to...
US-8,180,786 Symbolic query exploration
A symbolic query exploration (QEX) module automatically produces output information that can be used to evaluate a database. The QEX module operates by...
US-8,180,767 Inferred relationships from user tagged content
A tagged content inference system and method is provided. The system facilitates browsing of content with a pseudo-hierarchical feel using ...
US-8,180,766 Bayesian video search reranking
A general framework for video search reranking is disclosed which explicitly formulates reranking into a global optimization problem from the Bayesian...
US-8,180,763 Cache-friendly B-tree accelerator
A system and method for accelerating searches of B-trees. An auxiliary index that is optimized for use with a cache is used in conjunction with a B-tree. A hash...
US-8,180,748 Surrogate key generation and utilization
The subject disclosure pertains to databases as well as generation and utilization of keys. A desired or default number of values can be requested from a domain...
US-8,180,663 Facilitating automated meeting scheduling
A computer-implemented method for assisting in the scheduling of a meeting. A user who desires to schedule a meeting simply inputs the relevant meeting...
US-8,180,658 Exploitation of workflow solution spaces to account for changes to resources
It is difficult for managers or other operators to decide how best to modify an available pool of resources used for their workflows. Methods for achieving this...
US-8,180,645 Data preparation for media browsing
A media browsing system prepares various media content and synchronizes the content for playback. A user can specify the content and preconfigure the manner in...
US-8,180,641 Sequential speech recognition with two unequal ASR systems
Sequential speech recognition using two unequal automatic speech recognition (ASR) systems may be provided. The system may provide two sets of vocabulary data....
US-8,180,640 Grapheme-to-phoneme conversion using acoustic data
Described is the use of acoustic data to improve grapheme-to-phoneme conversion for speech recognition, such as to more accurately recognize spoken names in a...
US-8,180,637 High performance HMM adaptation with joint compensation of additive and convolutive distortions
A method of compensating for additive and convolutive distortions applied to a signal indicative of an utterance is discussed. The method includes receiving a...
US-8,180,636 Pitch model for noise estimation
Pitch is tracked for individual samples, which are taken much more frequently than an analysis frame. Speech is identified based on the tracked pitch and the...
US-8,180,626 Language detection service
Language detection techniques are described. In implementation, a method comprises determining which human writing system is associated with text characters in...
US-8,180,624 Fast beam-search decoding for phrasal statistical machine translation
Improved systems, methods and apparatuses are provided for fast beam-search decoding for phrasal statistical machine translation. The provided techniques...
US-8,180,465 Multi-modal device power/mode management
A system that facilitates managing resources (e.g., functionality, services) based at least in part upon an established context. More particularly, a context...
US-8,180,165 Accelerated screen codec
An accelerated screen codec technique is described that provides a general screen compression framework, which, in one embodiment, is Graphics Processor Unit...
US-8,180,047 Trapdoor pairings
Systems and methods are described for trapdoor pairing. In one implementation, a trapdoor pairing is a cryptographic primitive generated by determining a...
US-8,179,974 Multi-level representation of reordered transform coefficients
Techniques and tools for encoding and decoding a block of frequency coefficients are presented. An encoder selects a scan order from multiple available scan...
US-8,179,899 Endpoint selection for a call completion response
Techniques for selecting a call completion response from a group of call completion responses based on weights associated with the call completion responses,...
US-8,179,797 Channel discovery and disconnection in networks over white spaces and other portions of the spectrum
Functionality is described for discovering a channel within an environment in which non-privileged entities have subordinate access rights to spectrum compared...
US-8,177,643 Out-of-band voice communication with interactive voice response services during gameplay
While executing a game program, a game console determines that a user wishes to issue a voice command through a headset or other audio input/output device...
US-8,177,641 Systems and methods for quickly selecting video games
A video game controller is equipped with an electronic input that can read a game identification code from an electronic key. When the user presents the key to...
US-D659,711 Portion of a display screen with icon
US-D659,709 Display screen with icon
US-D659,707 Display screen with graphical user interface
US-D659,706 Display screen with graphical user interface
US-8,176,564 Special PC mode entered upon detection of undesired state
A system and method for monitoring a computer, particularly a pay-per-use computer, uses an isolated computing environment or supervisor. The isolated computing...
US-8,176,542 Validating the origin of web content
Described herein is a technique of protecting users against certain types of Internet attacks. The technique involves obtaining certificates from visited web...
US-8,176,500 Closing a video stream object
Techniques are provided for facilitating processing of interlaced video images for progressive video displays. A method receives from a renderer a query for a...
US-8,176,499 Defining, distributing and presenting device experiences
Platforms and techniques for defining, authorizing/authenticating, distributing, and presenting dynamic device experiences using a number of ...
US-8,176,495 Client affinity in distributed load balancing systems
Aspects of the subject matter described herein relate to client affinity in distributed load balancing systems. In aspects, a request from a requester is sent...
US-8,176,485 Launching hypervisor under running operating system
The launching of a hypervisor after there is already a running operating system. The operating system itself may launch the hypervisor. The running operating...
US-8,176,476 Analyzing software usage with instrumentation data
Described is a technology by which software instrumentation data collected from user program sessions are analyzed to output an analysis report or the like via...
US-8,176,473 Transformations for software obfuscation and individualization
Methods and systems for software obfuscation are disclosed. In one exemplary embodiment, the obfuscation includes integrating the checker code with product code...
US-8,176,465 Pluggable model elements
Various technologies and techniques are disclosed for providing pluggable model elements. A modeling application is provided that is operable to allow custom...
US-8,176,442 Living cursor control mechanics
Disclosed herein are systems and methods for controlling a cursor. A user may control a cursor displayed by a computing environment such as a game console, a...
US-8,176,438 Multi-modal interaction for a screen magnifier
A multi-model magnification system is described that can be used with multiple forms of input, including natural input such as touch-based devices. Users can...
US-8,176,434 Virtual desktop view scrolling
Example embodiments of the present disclosure are related to scrolling the view of a virtual desktop on a client. The client can be in communication with a...
US-8,176,419 Self learning contextual spell corrector
A group of keywords are received, wherein each keyword includes one or more words. A word list is formed from the group of keywords, where the word list...
US-8,176,408 Modularized web provisioning
A system and method for modularized Web provisioning. Functionalities available for Web provisioning are modularized into individual feature files. A site...
US-8,176,407 Comparing values of a bounded domain
Methods, systems, and computer-readable media to compare values of a bounded domain are disclosed. A particular method includes, for each value in a bounded...
US-8,176,271 Backing up data from backup target to backup facility
Aspects of the subject matter described herein relate to backup up data. In aspects, a backup target determines a degree to which a data set included on the...
US-8,176,256 Cache regions
A cache region can be created in a cache in response to receiving a cache region creation request from an application. A storage request from the application...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.