Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: microsoft





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,121,189 Video decoding using created reference pictures
Reference pictures can be created to assist with video decoding. For example, a method for decoding video can comprise receiving an encoded video bit stream,...
US-8,121,061 Efficient file management through granular opportunistic locking
Improved methods and systems for granular opportunistic locking mechanisms (oplocks) are provided for increasing file caching efficiency. Oplocks can be...
US-8,121,007 Pseudo-overwriting data on write-once discs
A file system which is enabled to use a Metadata Partition instead of VAT for write-once discs, is provided by a pseudo-overwrite method. On applying this...
US-8,120,625 Method and apparatus using multiple sensors in a device with a display
In a device having a display, a change in focus for an application is used with a requested usage of a context attribute to change the amount of information...
US-8,120,622 Proxy direct 3-D device and remote rendering
Systems, methods and computer readable media are disclosed for an overlaying requester to send graphics commands to a game connected to the overlaying requester...
US-8,120,617 Color conversion with many input channels
A method and apparatus for color conversion useful for color devices having a large number of input channels, for example CMYK color printers having additional...
US-8,118,678 Extended and editable gamer profile
A user profile for an online gaming service is created. The user profile contains user gaming information received from a first location. The user profile is...
US-8,118,653 Taking cover in a simulated environment
An approach is described for instructing a player character to automatically take cover in a region of a simulated environment without receiving express...
US-8,118,463 Uniformly lighting a cylindrical cavity via a prism
Systems and methods are disclosed for substantially uniformly lighting a substantially cylindrical cavity using a minimal amount of light sources. The primary...
US-D654,505 Display screen with user interface
US-D654,504 Display screen with animated image
US-D654,472 Headset
US-D654,471 Headset
US-8,117,666 File system operation and digital rights management (DRM)
File system interaction with digital rights management (DRM) is facilitated by enabling one or more file system components to be DRM-aware. These one or more...
US-8,117,664 Radio-type interface for tuning into content associated with projects
A user can receive content relating to a common topic, such as a project, through a radio-type interface. A frequency or other indicator associated with the...
US-8,117,660 Secure control flows by monitoring control transfers
A cross-module detection system and method for detecting and monitoring control flow transfers between software modules in a computer system. The system and...
US-8,117,659 Malicious code infection cause-and-effect analysis
A malware analysis system for automating cause and effect analysis of malware infections is provided. The malware analysis system monitors and records computer...
US-8,117,625 Module interrogation
Module interrogation techniques are described in which modules configured to rely upon one or more operating system features are interrogated to determine which...
US-8,117,622 Client application independent extensibility model
Information describing a type registration regarding which an action is being requested by the client application is received as one or more parameters of an...
US-8,117,613 Optimized virtual machine migration mechanism
A virtual machine management system may perform a three phase migration analysis to move virtual machines off of less efficient hosts to more efficient hosts....
US-8,117,612 Enterprise device driver management for operating system deployment
Enterprise driver management and image installation are described. In an implementation, a computer-implemented method is performed in which a determination is...
US-8,117,601 Internal test and manipulation of an application
System(s) and method(s) facilitate testing and manipulating an application internally within a client-server configuration coordinated by a communicator object....
US-8,117,595 Method for updating data in accordance with rights management policy
Disclosed is a method for dynamically applying a rights management policy to a message by allowing an administrator to associate certain rights management...
US-8,117,589 Metadata driven API development
The described method and system synchronizes source code with byproducts or artifacts of an application creation process. In one embodiment, a generation tool...
US-8,117,562 Runtime modification of data presented in a graphical element
The present invention provides ways for application programs to allow users to dynamically update data that is presented in a GUI element. In one aspect of the...
US-8,117,552 Incrementally designing electronic forms and hierarchical schemas
A system and method that enables a designer to build electronic forms and corresponding hierarchical schemas are described. Displays of hierarchical schemas,...
US-8,117,547 Environment-interactive context-aware devices and methods
Location-aware methods and systems are described. In one embodiment, a portable computing device determines its location by accessing one or more hierarchical...
US-8,117,542 User interface for displaying selectable software functionality controls that are contextually relevant to a...
An improved user interface is provided for displaying selectable functionality controls that identifies the context of the object to which the user interface is...
US-8,117,505 Resource exhaustion prediction, detection, diagnosis and correction
Resource exhaustion is anticipated, a cause of the resource exhaustion is identified and options are identified to address the resource exhaustion.
US-8,117,459 Personal identification information schemas
A digital identity system includes a principal including an identity selector programmed to receive a security policy from a relying party, review a plurality...
US-8,117,441 Integrating security protection tools with computer device integrity and privacy policy
At computer device power on, the operating system of the computer device initiates a monitor. The monitor assigns a monitoring program to each program and...
US-8,117,364 Enhanced protocol and architecture for low bandwidth force feedback game controller
Haptic features are stored in a haptic device by preloading or otherwise downloading them, e.g., wirelessly, into the haptic device at the time of manufacture,...
US-8,117,346 Configuration space virtualization
Various aspects are disclosed herein for bounding the behavior of a non-privileged virtual machine that interacts with a device by creating a description of the...
US-8,117,342 Media exchange protocol supporting format conversion of media items
A media exchange description language (MX-DL) is disclosed. The media exchange description language (MX-DL) may be used to facilitate media exchange within a...
US-8,117,340 Trans-network roaming and resolution with web services for devices
Systems and methods are provided that facilitate automated network address determinations and communications between roaming peers. In one aspect, a network...
US-8,117,329 Flow of streaming data through multiple processing modules
Frame-based streaming data flows through a graph of multiple interconnected processing modules. The modules have a set of performance parameters whose values...
US-8,117,328 System and method for automatically recovering from failed network connections in streaming media scenarios
Automatically recovering from broken network connections in streaming media scenarios. Server software executing on the server communicates with client software...
US-8,117,277 Component based infrastructure for sharing files
An operating system to componentize file sharing is described, in which a file transport send object is executable on the operating system to designate a shared...
US-8,117,254 User name mapping in a heterogeneous network
A user information management service including features and/or methods for user information mapping.
US-8,117,246 Registering, transfering, and acting on event metadata
A technique and associated mechanism is described for registering event metadata at a first site, transferring the event metadata to a second site using a...
US-8,117,239 Aggregating schema data from multiple sources
Systems, methods, and computer-readable media for aggregating schema data from two or more schemas are provided. Embodiments of the present invention include...
US-8,117,232 Intelligent container index and search
Aspects are introduced for indexing contents of a shell namespace extension. A plurality of files are indexed, and it is encountered that one of the files...
US-8,117,230 Interfaces and methods for group policy management
A system and method for managing group policy objects in a network, including interfaces that allow access by programs or a user interface component to...
US-8,117,226 System and method for virtual folder sharing including utilization of static and dynamic lists
A system and method for virtual folder sharing, including utilization of static and dynamic lists. Static and dynamic lists may be created as types of virtual...
US-8,117,201 Pre-populated and administrator defined groups in contacts lists
A contacts list for a subscriber is pre-populated based on information received from various data stores, data mining of applications associated with the...
US-8,117,194 Method and system for performing multilingual document searches
Multilingual document searches are performed by ordering and filtering localized documents in different languages based on user preferences. Documents are...
US-8,117,173 Efficient chunking algorithm
The present invention provides a method for chunking an object. The method is arranged to provide efficient chunking of objects such that objects can be...
US-8,117,164 Creating and utilizing network restore points
The creation and utilization of network restore points is provided by a schema associated with a structured data set that can be conveniently backed up by...
US-8,117,156 Replication for common availability substrate
Systems and methods that supply a replication layer/agent that is generic to supporting a plurality of storage configuration as part of a distributed store....
US-8,117,155 Collection-based object replication
Collection-based object replication for a system that includes a client computing device (client) connected to a server and multiple data storage nodes. In...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.