Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: microsoft





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,160,883 Focus tracking in dialogs
Controls are provided for a web server to generate client side markups that include recognition and/or audible prompting. The controls comprise elements of a...
US-8,160,881 Human-assisted pronunciation generation
Pronunciation generation may be provided. First, a pronunciation interface may be provided. The pronunciation interface may be configured to display a word and...
US-8,160,878 Piecewise-based variable-parameter Hidden Markov Models and the training thereof
A speech recognition system uses Gaussian mixture variable-parameter hidden Markov models (VPHMMs) to recognize speech under many different conditions. Each...
US-8,160,409 Flat-panel optical projection apparatus
A light guide of the tapered-waveguide type includes an input slab (30) for expanding a projected image between an input end and an output end, and an output...
US-8,160,400 Navigating images using image based geometric alignment and object based controls
Over the past few years there has been a dramatic proliferation of digital cameras, and it has become increasingly easy to share large numbers of photographs...
US-8,160,389 Method for overlapping visual slices
Image editing tools are commonly used to assist with manipulating and saving visual compositions. Many image editing tools provide slicing functionality to...
US-8,160,362 Combining online and offline recognizers in a handwriting recognition system
Described is a technology by which online recognition of handwritten input data is combined with offline recognition and processing to obtain a combined...
US-8,160,154 Encoding and decoding methods and systems
Methods and systems enable uncompressed source data, corresponding to previously-compressed data, to be manipulated or otherwise modified, prior to being...
US-8,160,132 Reducing key picture popping effects in video
Techniques and tools are described for reducing key picture popping effects. In some embodiments, an encoding system filters a video picture that is to be...
US-8,160,063 Data center interconnect and traffic engineering
A system for commoditizing data center networking is disclosed. The system includes an interconnection topology for a data center having a plurality of servers...
US-8,160,062 Network connectivity determination based on passive analysis of connection-oriented path information
Passive analysis connection detection architecture that leverages connection-oriented end-to-end stack protocol information. In a TCP/IP implementation, by...
US-8,159,495 Remoting sub-pixel resolved characters
Remoting sub-pixel defined text. Text is remoted at sub-pixel precision in a computing environment including a terminal server and a terminal client. At a...
US-8,159,372 Keyboard with plural key switch matrices to detect ghosting
Keyboard apparatus and methods for processing keyboard depressions are disclosed. One disclosed keyboard apparatus includes a keyboard having a plurality of...
US-D657,797 Display screen with an icon
US-D657,788 Electronic housing
US-8,156,565 Hardware-based protection of secure data
Computer-readable media, computerized methods, and computer systems for protecting secure data by writing content of the secure data to a protected memory...
US-8,156,559 Systematic approach to uncover GUI logic flaws
To achieve end-to-end security, traditional machine-to-machine security measures are insufficient if the integrity of the graphical user interface (GUI) is...
US-8,156,558 Mechanism for evaluating security risks
Described is a mechanism for collectively evaluating security risks associated with loading an application. A hosting environment associated with loading the...
US-8,156,550 Establishing secure data transmission using unsecured E-mail
In one embodiment, a host entity may create a trusted connection with a guest entity. The host entity may encrypt a trusted connection invitation for an...
US-8,156,538 Distribution of information protection policies to client machines
One embodiment includes a method which may be practiced in a computing environment where resources are distributed. The method includes acts for obtaining...
US-8,156,534 Seamless digital channel changing
Seamless channel changing in a digital-television-based entertainment network can be implemented, for example, by providing an intra frame to a client device...
US-8,156,507 User mode file system serialization and reliability
An operating system is provided. The system includes an agent component to monitor computer activities between one or more single-item access components (SIAC)...
US-8,156,500 Real-time self tuning of planned actions in a distributed environment
Automatic programming, scheduling, and control of planned activities at "worker nodes" in a distributed environment are provided by a "real-time self tuner"...
US-8,156,487 Efficient patching
A facility for automatically processing software patches is described. The facility receives in a computing system a distinguished patch package for modifying...
US-8,156,476 Debugging support for tasks in multithreaded environments
A debugger enhancement provides a debug-task-provider interface whose implementation includes routines designed to support debugging of programs that contain...
US-8,156,472 Process language for microprocessors with finite resources
A reflective process algebra called the .rho.-calculus facilitates the serialization of processes at the level of the reflective process algebra. The reflective...
US-8,156,448 Site navigation and site navigation data source
A concept for providing hierarchical navigation information relative to one or more databases within a distributed computer system is described. In one aspect,...
US-8,156,445 Controlled interaction with heterogeneous data
A two-dimensional canvas onto which heterogenic objects of various types may be arranged side-by-side. Each type of object has an associated set of control(s),...
US-8,156,425 User interface (UI) dimensioning
Determining a total dimension of items in computer-based user interface control (e.g., non-uniform items displayed in grid-view), may be accomplished by...
US-8,156,420 Form validation with table driven error handling
Various embodiments provide a validation framework to validate whether data entered in a web application is valid. The framework includes a validation resource...
US-8,156,418 Image acquisition from dynamic content for delivery to network-enabled static display devices
An image service uses a uniform resource locator (URL) or other location identifier to retrieve static images embedded in dynamic content presentations from the...
US-8,156,330 Terminal for exchanging electronic business cards
A terminal and a method for exchanging electronic business cards that can guarantee privacy and guarantee complete and consistent communications to the user are...
US-8,156,300 Delete notifications for an entire storage volume
A delete notification can be received at a storage stack filter in a storage stack. It can be determined whether the delete notification applies to an entire...
US-8,156,297 Smart device recordation
Valuable information can be retained upon a storage device, such as a flash memory unit. Due to the portable nature of the memory, there can be increased...
US-8,156,289 Hardware support for work queue management
The claimed matter provides systems and/or methods that effectuate utilization of fine-grained concurrency in parallel processing and efficient management of...
US-8,156,249 Using server type to obtain network address
In aspects, a gateway that sits between a single network protocol client and a server receives a request from the client for a network address of the server....
US-8,156,223 Distribution of binary executables and content from peer locations/machines
Binary executables are distributed in a distributed manner by equipping a server with a bootstrap program. The server provides the bootstrap program to a client...
US-8,156,203 Dye injected request generation
Web server processes can host multiple web applications that process multiple requests from multiple clients. Recorded diagnostic information may not provide a...
US-8,156,201 Unifying discoverability of a website's services
Various embodiments provide a unified discovery control that can be incorporated as part of a web browser. The unified discovery control provides a central...
US-8,156,198 Live custom media play lists
List processing functionality (LPF) is described for creating a play list that defines an order in which video media programs are to be presented. Different...
US-8,156,165 Transaction-safe FAT files system
In one aspect, the present disclosure describes a process for maintaining file allocation tables (FATs) for a volume of storage medium. The process includes...
US-8,156,154 Techniques to manage a taxonomy system for heterogeneous resource domain
Techniques to manage vocabulary terms for a taxonomy system are described. An apparatus may comprise a managed taxonomy system having a vocabulary management...
US-8,156,153 Global metadata embedding and decoding
Global metadata, such as a document identifier, which may be a globally unique identifier, is embedded into an embedded interactive code document by combining a...
US-8,156,149 Composite nested streams
Reshaping of streams is provided to facilitate utilizing the streams without rapidly increasing memory requirements as the size of the stream increases. The...
US-8,156,148 Scalable algorithm for sharing EDI schemas
Recreating an electronic data interchange (EDI) schema from a file. The file is received from a source and the file includes a plurality of data values. The...
US-8,156,144 Metadata search interface
A system and method for implementing a metadata search interface is disclosed. The technology creates a configuration file for the metadata search interface...
US-8,156,129 Substantially similar queries
A system described herein includes analyzer component that analyzes queries submitted by users and corresponding URLs selected by the users, wherein the queries...
US-8,156,119 Smart attribute classification (SAC) for online reviews
Techniques for identifying attributes in a sentence and determining a number of attributes to be associated with the sentence are described. The techniques...
US-8,156,097 Two stage search
A two stage model identifies individuals having knowledge in a subject matter area relevant to a query. A relevance model receives a query and identifies...
US-8,156,094 Efficient navigation of search results
Systems, methods, and computer-readable media for navigating search results are provided. In response to receiving a search query, at least one individual...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.