Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: microsoft





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,077,143 Motion based display management
A display manager is configured to handle the drawing of windows on one or more displays for an application differently based on detected motion information...
US-8,077,090 Simultaneous localization and RF modeling
The simultaneous localization and RF modeling technique pertains to a method of providing simultaneous localization and radio frequency (RF) modeling. In one...
US-8,076,666 Use of sack geometry to implement a single qubit phase gate
An implementation of a single qubit phase gate for use in a quantum information processing scheme based on the .upsilon.=5/2 fractional quantum Hall (FQH) state...
US-8,075,404 Multi-player gaming
A method of enabling the playing of a game is described in which an electronic message requesting assistance is sent during a game being played by a gamer....
US-D650,393 Display screen with user interface
US-8,074,288 Isolation of application-specific data within a user account
A mechanism is provided for isolating application-specific data in an environment where multiple applications share a same user account. This mechanism enables...
US-8,074,287 Renewable and individualizable elements of a protected environment
Systems and methods for providing a protected computing environment comprising separating out a protected environment management component from a kernel of a...
US-8,074,281 Malware detection with taint tracking
Malware may be identified based on attempts to use tainted data in certain ways, such as by attempting to execute the tainted data, by attempting to modify...
US-8,074,272 Browser security notification
Tools are described that notify a user of a security risk in a network browser. The tools can determine that a security setting of a network browser poses a...
US-8,074,264 Secure key distribution to internet clients
A server may bridge between a wide area network, such as the Internet, and a local area network and may process authentication requests from clients on the wide...
US-8,074,258 Obtaining digital identities or tokens through independent endpoint resolution
A federated identity provisioning system includes relying parties, identity providers, and clients that obtain tokens from identity providers for access to a...
US-8,074,234 Web service platform for keyword technologies
The present web service platform includes a set of application program interfaces (APIs) and a framework for adding services that correspond to the APIs. The...
US-8,074,231 Configuration of isolated extensions and device drivers
In some implementations, the operations of a software system may include the execution of untrusted device drivers. The execution of an untrusted device driver...
US-8,074,227 Utilizing a first managed process to host at least a second managed process
A system and method for utilizing a first managed process to host at least a second managed process is disclosed. The technology initially provides a first...
US-8,074,226 Systems and methods for switching internet contexts without process shutdown
Systems and methods for switching from a first Internet context to a second Internet context without process shutdown are described. Internet context data, such...
US-8,074,219 Order preservation in data parallel operations
Various technologies and techniques are disclosed for preserving input element ordering in data parallel operations. This ordering may be based on element...
US-8,074,217 Methods and systems for delivering software
Methods and systems for software delivery are described. In one embodiment, an extension definition catalog structure is defined and can be used to select one...
US-8,074,209 Extending native data types
The functionality of a core application is extended using an add-on application (module) by extending native data types on the core application with custom data...
US-8,074,205 Binary verification service
A binary is received at a binary verification service from a binary verification client agent. The binary verification service performs binary verification of...
US-8,074,204 Test automation for business applications
A test framework suited for use with distributed business applications allows developers to specify a test, or suite of tests, to be easily selected and...
US-8,074,199 Unified messaging state machine
A unified messaging (UM) application benefits from platform independence and human intelligibility of eXtended Markup Language (XML). A finite state machine...
US-8,074,181 Screen magnifier panning model with dynamically resizable panning regions
A magnifier panning system is described that creates a panning region at the edges of a magnified view. When a user moves the cursor into the panning region,...
US-8,074,178 Visual feedback display
Visual feedback may be provided. First, a continuous contact with a first point on a surface may be detected. The surface may comprise, for example, a touch...
US-8,074,175 User interface for an inkable family calendar
The subject application relates to a user interface(s), system(s), and/or methodology that facilitate improved management and coordination of activities,...
US-8,074,173 Associating input with computer based content
Notes and other input may be entered directly onto computer based content. The notes may be taken on a portable computing device that contains metadata from the...
US-8,074,167 Cross domain presence of web user interface and logic
Various technologies and techniques are disclosed that allow for repurposing content of a source web site for an external web site. The developer uses a...
US-8,074,166 XSLT/XPATH focus inference for optimized XSLT implementation
Techniques are provided for performing focus inference when compiling an Extensible Markup Language Transforms (XSLT) stylesheet into a compiled XSLT processor....
US-8,074,117 Inference of contract using declarative program definition
A declarative program definition. The definition is analyzed to produce an application contract that describes semantics for sending and receiving application...
US-8,074,116 Exception raised notification
An exception notification system is described herein that provides an early notification that a software exception has occurred before exception handling code...
US-8,074,087 Configuring processors and loads for power management
Controlling processors and processor hardware components in a computing device based on execution load and a power saving preference. The power saving...
US-8,074,038 Converting luns into files or files into luns in real time
A LUN is provided that can store multiple datasets (e.g., data and/or applications, such as virtual machines stored as virtual hard drives). The LUN is...
US-8,074,027 Multi-level read caching for multiplexed transactional logging
A transactional logging service is provided to user-mode and kernel-mode log clients by utilizing a marshalling area to buffer a set of log records that a log...
US-8,074,014 Storage systems using write off-loading
Improved storage systems which use write off-loading are described. When a request to store some data in a particular storage location is received, if the...
US-8,073,979 Enhanced network system through the combination of networking objects
Reducing the cost of framing network packets in a virtual machine environment combines certain network objects to eliminate the cost of fully framing packets...
US-8,073,978 Proximity guided data discovery
Techniques are described for sharing content among peers. Locality domains are treated as first order network units. Content is located at the level of a...
US-8,073,976 Synchronizing clocks in an asynchronous distributed system
The present invention extends to methods, systems, and computer program products for synchronizing clocks in an asynchronous distributed system. Embodiments of...
US-8,073,971 Message based network configuration of dynamic domain name services
Systems and methodologies that facilitate hosting of a domain name and access of users to the Internet, by using a well defined protocol to interact with a...
US-8,073,959 Automatically detecting whether a computer is connected to a public or private network
Automatically detecting whether a local network that a computer is connected to is a public or private network by utilizing a trusted online service and/or...
US-8,073,956 Multimedia communications using preferred devices
Aspects of the present invention are directed at allowing users to establish a multimedia network session in which each user is allowed to employ multiple...
US-8,073,952 Proactive load balancing
A load balancing system is described herein that proactively balances client requests among multiple destination servers using information about anticipated...
US-8,073,928 Aggregating and searching profile data from multiple services
Profile data from multiple networking services can be combined and queried from one networking service. A primary networking service may store user profile data...
US-8,073,926 Virtual machine image server
Virtual machine image files are stored in a virtual machine storage by a virtual machine image file server. Users at virtual machine clients connect to the...
US-8,073,906 Inviting a conferencing unaware endpoint to a conference
Systems and methods that enable conference unaware clients to participate in the conference. A conferencing component is aware of what protocol to employ, and...
US-8,073,905 Method and apparatus for maintaining consistency of a shared space across multiple endpoints in a peer-to-peer...
In a peer-to-peer collaboration system, deltas containing data change commands are organized in a persistent data structure called a delta log. The delta log is...
US-8,073,897 Selecting values in a distributed computing system
A distributed computing system can operate in the face of malicious failures on the part of some of its constituent devices, and provide a minimum of message...
US-8,073,886 Non-privileged access to data independent of filesystem implementation
An application programming interface (API) module provides access to data, independent of filesystem implementation in a non-privileged user mode. A discovery...
US-8,073,879 Systems and methods that transform constructs from domain to domain
The present invention provides systems and methods that isomorphically maps constructs between domain spaces (e.g., object, markup, relational and user...
US-8,073,847 Extended user profile
A method of extending user profile. A user specific data related to an application is received and stored for integration with a user profile. A template for...
US-8,073,844 Pre-purchase device interoperability validation
An interoperability assessment between two or more devices can be based on the devices' specifications and on empirical evidence of interoperability....
US-8,073,838 Pseudo-anchor text extraction
A search method uses pseudo-anchor text associated with search objects to improve search performance. The pseudo-anchor text may be extracted in combination...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.