Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: microsoft





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,108,205 Leveraging back-off grammars for authoring context-free grammars
A system and method of refining context-free grammars (CFGs). The method includes deriving back-off grammar (BOG) rules from an initially developed CFG and...
US-8,107,939 Software defined radio architecture
A computing device with a software defined radio. The software defined radio has an architecture with separate components to provide control functions and data...
US-8,107,758 Block based image processing
Block based image processing techniques are described in which one or more processing filters are applied to an image block by block. One or more filters are...
US-8,107,671 Script detection service
Script detection service techniques are described. In an implementation, a determination is made as to which human writing system is associated with individual...
US-8,107,642 Spatial noise suppression for a microphone array
A noise reduction system and a method of noise reduction includes a microphone array comprising a first microphone, a second microphone, and a third microphone....
US-8,107,571 Parameterized filters and signaling techniques
Filter taps for filters are specified by filter coefficient parameters. The filter taps are greater in number than the coefficient parameters from which the...
US-8,107,531 Signaling and repeat padding for skip frames
A video codec efficiently signals that a frame is identical to its reference frame, such that separate coding of its picture content is skipped. Information...
US-8,107,469 Enabling routing of data on a network based on a portion of data accessed from a non-network enabled device
A system and method for enabling routing of data on a network based on a portion of data accessed from a non-network enabled device is disclosed. The technology...
US-8,106,909 Common key frame caching for a remote user interface
Common key frames are provided to a client during initialization to provide more efficient remoting of user interface graphical information. By storing the...
US-D653,262 Display screen with an icon
US-8,104,088 Trusted operating environment for malware detection
Techniques and apparatuses for scanning a computing device for malware are described. In one implementation, a trusted operating environment, which includes a...
US-8,104,080 Universal schema for representing management policy
A computer-readable storage medium has a data structure stored thereon for constructing expressions representing software configurations to be applied to...
US-8,104,074 Identity providers in digital identity system
A digital identity system includes a principal including an identity selector programmed to receive a security policy from a relying party, review a plurality...
US-8,104,070 Interest aligned manual image categorization for human interactive proofs
A system and method that facilitates and effectuates distinguishing a human from a non-human user. A human interactive proof (HIP) employs images from a large...
US-8,104,043 System and method for dynamic cooperative distributed execution of computer tasks without a centralized controller
A system and method is provided for cooperative execution of distributed tasks by networked computers without the use of a centralized controller to coordinate...
US-8,104,025 Extensible metadata
Systems and methods for extensible metadata are described. In one aspect, source code is compiled to generate an assembly. During assembly generating...
US-8,104,021 Verifiable integrity guarantees for machine code programs
A verifier performs static checks of machine code to ensure that the code will execute safely. After verification is performed, the code is executed. The code...
US-8,104,019 Debugging in an operating system with multiple subsystems
A facility for debugging in an operating system with native and non-native subsystems is described. The facility employs a debugger designed for use with the...
US-8,103,967 Generating and organizing references to online content
Systems, methods, and computer storage media for generating a virtual workspace that references online media content of interest, facilitates re-visitation of...
US-8,103,905 Detecting and recovering from process failures
A service is used to process files. The processing of the files is performed by worker services that are assigned to process a portion of the files. Each worker...
US-8,103,847 Storage virtual containers
A controller of a Solid State Device (SSD) defines a mapping from memory devices, such as flash packages, that make up the SSD to one or more storage virtual...
US-8,103,823 Host initiated background formatting of optical medium
A method and a host processing device are provided for background formatting, or de-icing, an optical medium with no de-icing assistance from an optical drive...
US-8,103,815 Lazy handling of end of interrupt messages in a virtualized environment
Techniques enable reducing a number of intercepts performed by a hypervisor by reducing a number of End Of Interrupt (EOI) messages sent from a virtual central...
US-8,103,759 Message redirection within a messaging infrastructure
The present invention extends to methods, systems, and computer program products for redirecting client messages between hosts within a messaging ...
US-8,103,753 Distributing membership information for multi-party application layer sessions
Membership information for participating computer systems participating in a multi-party conferencing session is distributed by intermittently exchanging link...
US-8,103,725 Communication using delegates
A facility allows for automatic delegation of incoming real-time communications based on a delegation scheme. The delegation scheme may be rules-based and may...
US-8,103,720 Apparatus and computer-readable media for processing HTTP requests
Various embodiments of the invention are directed to closely integrating functionality between an internet server and a WebDAV tool. Areas of specific focus in...
US-8,103,718 Content discovery and transfer between mobile communications nodes
Content discovery and content transfer between mobile communications nodes is often required, for example, to synchronize maps, traffic hot spot information and...
US-8,103,706 Nondeferred reference-counting garbage collection using overlooking roots
A reference-counting garbage collection system utilizing overlooking roots injects eager reference-counting updates into the program. An overlooking roots...
US-8,103,687 Selecting member sets for generating asymmetric queries
Tools and techniques are described for selecting member sets for generating asymmetric queries. User interfaces provided by this description may include...
US-8,103,686 Extracting similar entities from lists/tables
Large numbers of lists of entities may be mined for similar entities to related searches. A representation for each list may be determined to provide for a...
US-8,103,684 Abstract pipeline component connection
The subject disclosure pertains to systems and methods for connecting pipeline components such as data flow pipeline components. Pipeline components are wrapped...
US-8,103,674 E-matching for SMT solvers
Embodiments are introduced which provide for creation of an E-matching code tree index which works on E-graphs to make E-matching more efficient. Use of the...
US-8,103,668 Search control and authoring environment
A technique for adding a search control by a user to a file, webpage, desktop, or mobile device, for example. The control lets the end user create documents,...
US-8,103,667 Ranking results of multiple intent queries
Techniques and systems are disclosed providing improved ranking of results to an online search-based query. One or more user types are identified for a...
US-8,103,665 Soliciting information based on a computer user's context
A user search request is received and context information for the user is identified. The user search request and the context information are then combined to...
US-8,103,652 Indexing explicitly-specified quick-link data for web pages
Systems, methods, and computer storage media having computer-executable instructions embodied thereon for permitting webmasters to explicitly specify links or...
US-8,103,646 Automatic tagging of content based on a corpus of previously tagged and untagged content
An automated mechanism of automatically tagging media files such as podcasts, blog entries, and videos, for example, with meaningful taxonomy tags. The...
US-8,103,644 Data access layer class generator
Systems and methods that that automatically generate a data access layer for a middle tier of a relational data store with stored procedures, via a data access...
US-8,103,638 Partitioning of contended synchronization objects
Methods, systems, and computer-readable media are disclosed for partitioning contended synchronization objects. A particular method determines a contention-free...
US-8,103,632 Self-contained partial database backups
Methods and computer readable media for restoring a database. In a method, a backup of a subset of a database is created, where the subset includes a filegroup...
US-8,103,629 Bi-directional data modification with synchronization
Systems and methods for synchronizing data between endpoints, including the modification of data on an endpoint without necessarily modifying data that is...
US-8,103,608 Reference model for data-driven analytics
A taxonomy reference model for use in an analytical modeling component. The analytical modeling component defines analytical relationships between the model...
US-8,103,599 Calculating web page importance based on web behavior model
Method for determining a webpage importance, including receiving web browsing behavior data of one or more users; creating a model of the web browsing behavior...
US-8,103,598 Compiler for probabilistic programs
A compiler for probabilistic programs is described. The inputs to the compiler are a definition of a model and a set of inference queries. The model definition...
US-8,103,592 First computer process and second computer process proxy-executing code on behalf of first process
Upon a first process encountering a triggering device, a second process chooses whether to proxy-execute code corresponding to the triggering device of the...
US-8,103,547 Logocons: AD product for brand advertisers
Logocons provide a new online advertising product for brand advertisers. During a computing session especially with consumer-generated content, brand names may...
US-8,103,537 Decision theoretic approach to targeted solicitation by maximizing expected profit increases
A decision theoretic approach to targeted solicitation, by maximizing expected profit increases, is disclosed. A decision theoretic model is used to identify a...
US-8,103,536 Unified model for authoring and executing flow-based and constraint-based workflows
Designing and executing a workflow having flow-based and constraint-based regions. A user selects one or more activities to be part of a constraint-based...
US-8,103,503 Speech recognition for determining if a user has correctly read a target sentence string
Systems and methods for processing a user speech input to determine whether the user has correctly read a target sentence string are provided. One disclosed...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.