Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: microsoft





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,064,696 Geometric parsing of mathematical expressions
A processing device may parse a group of strokes representing a mathematical expression. The group of strokes may be examined to determine whether the group of...
US-8,064,520 Advanced bi-directional predictive coding of interlaced video
For interlaced B-fields or interlaced B-frames, forward motion vectors are predicted by an encoder/decoder using forward motion vectors from a forward motion...
US-8,063,941 Enhancing digital images using secondary optical systems
Apparatuses and methods for enhancing a "primary" large format, digital, macro-image with "secondary" image data are provided. The secondary image data is...
US-8,063,909 Systems and methods for providing intermediate targets in a graphics system
Intermediate target(s) are utilized in connection with computer graphics in a computer system. In various embodiments, intermediate memory buffers in video...
US-8,063,888 Identification of devices on touch-sensitive surface
The identification of a data storage device detected on a touch-sensitive display surface of a display device is described. In one embodiment, the presence and...
US-8,063,882 Generating audio signals based on input device position
A computer input device and computer system are provided that determine if the input device is at an edge of a pattern on a working surface based on an image of...
US-8,063,463 Solid state image wavelength converter
A method for encoding information that is encoded in spatial variations of the intensity of light characterized by a first wavelength in light characterized by...
US-8,062,132 Subscription based services for closed computing systems
A disclosure of a subscription service is provided, where this service allows for the running of unsigned content, such as games, on closed computing systems,...
US-8,060,932 Modular enterprise authorization solution
An authorization framework located external to an application may be invoked to determine user authorization for a requested application component. Small...
US-8,060,931 Security authorization queries
In an example implementation, a bifurcated security scheme has a first level that does not allow usage of negations and a second level that does permit usage of...
US-8,060,927 Security state aware firewall
A network firewall may apply policies to packets based on a security classification. Packets with an authenticated and established security connection may be...
US-8,060,923 Trusted license removal in a content protection system or the like
A digital license includes an identification of a removal service that can authorize removing such license. A client selects the license to be removed and the...
US-8,060,920 Generating and changing credentials of a service account
Technologies are described herein for generating and changing credentials of a service account. In one method, a credential schedule is retrieved. The...
US-8,060,892 Executing business logic extensions on a client computing system
Technologies are described herein for executing business logic extensions on a client computing system. A server platform exposes server-hosted application...
US-8,060,891 Management of external hardware appliances in a distributed operating system
Embodiments are provided to manage external hardware appliances from a distributed operating system interface in a computer network using a driver model to...
US-8,060,881 Small barrier with local spinning
A barrier with local spinning. The barrier is described as a barrier object having a bit vector embedded as a pointer. If the vector bit is zero, the object...
US-8,060,880 System using backward inter-procedural analysis for determining alternative coarser grained lock when finer...
Locks which protect data structures used within atomic sections of concurrent programs are inferred from atomic sections and acquired in a manner to avoid...
US-8,060,871 Servicing software through versioning
Software typically changes over its useful lifetime. New versions of software are created to change or improve functionality, to add functionality, to correct...
US-8,060,868 Fully capturing outer variables as data objects
Providing for read/write access to captured free variables expressed as environment data objects is disclosed herein. By way of example, free variables can be...
US-8,060,865 Build-time enforcement of architectural partitioning in computer application
A computer software construct has a plurality of components and is built based on an architecture designed for the construct. The architecture includes a number...
US-8,060,859 Core object-oriented type system for semi-structured data
A type system employing structural subtyping is disclosed herein. A core type system supports several structural types, such as stream, choice, intersection and...
US-8,060,855 Artifact sharing from a development environment
An identification of a multi-component development artifact to be shared is obtained in a development environment. A remote receiver with whom to share...
US-8,060,840 Orientation free user interface
Generation and display of a dynamically orientable graphical user interface (GUI) is described. The GUI can include user input controls that are configured to...
US-8,060,831 User interface visual cue for use with literal and non-literal values
A property value associated with a property of a graphical object is retrieved. A visual cue associated with the property value is displayed, wherein the visual...
US-8,060,822 System and method for creation of an object within an object hierarchy structure
A system and method relating to creation of object(s) in an object hierarchy structure is provided. An object generator that in response to a command to expand...
US-8,060,789 Web page error reporting
An error in a web page displayed on a device is detected. The error is assigned to a bucket to indicate a type of the error, and a record describing the current...
US-8,060,782 Root cause problem identification through event correlation
Correlating activity events to identify a root cause of a process failure. Activity event data is received from a process executing on a computing device. The...
US-8,060,747 Digital signatures for embedded code
Generating a digital signature of an entire embedded code project while maintaining certain exclusion areas so that a productivity application can incorporate...
US-8,060,681 Interface protocol and API for a wireless transceiver
A wireless protocol may be implemented in a smart transceiver device that contains the physical (PHY) and media access control (MAC) layers of the wireless...
US-8,060,640 Combining SIP requests with SIP responses
A method and system for combining SIP requests with SIP responses is provided. When a server receives a request from a client, a message combining system of the...
US-8,060,620 Profile deployment using a generic format
A network enabled computer receives connection profile information in a generic form and creates one or more native mode profiles to establish connections. By...
US-8,060,614 Streaming operator placement for distributed stream processing
A streaming operator assignment system and method for determining a streaming operator assignment that minimizes overload in a data processing system....
US-8,060,586 Dynamic web service deployment and integration
A computer system receives registration information from a service provider registering web services with the dynamic web service configuration store. The...
US-8,060,569 Dynamic email directory harvest attack detection and mitigation
Dynamic directory harvest attack detection and mitigation system is accomplished by altering the logic surrounding how a receiving email server enforces its...
US-8,060,562 Real time update notification
Computer method and apparatus for communicating information between a plurality of client computers by means of a communications network. A data server computer...
US-8,060,540 Data relationship visualizer
Data having express or implied relationships may be displayed by selecting a starting entity in a data structure, building a relationship tree, and building and...
US-8,060,524 History answer for re-finding search results
A system, method, and medium are provided for providing a personalized answer to a user-defined search query by utilizing the user's search history. A search...
US-8,060,494 Indexing and searching audio using text indexers
A full-text lattice indexing and searching system and method for indexing word lattices using a text indexer to enable enhance searching of audio content. The...
US-8,060,490 Analyzer engine
Methods and systems provide a tool for searching and analyzing XPS files. In accordance with the described embodiments, a user can search and analyze XPS files...
US-8,060,456 Training a search result ranker with automatically-generated samples
A search result ranker may be trained with automatically-generated samples. In an example embodiment, user interests are inferred from user interactions with...
US-8,060,417 Date effective quantity on hand and adjusted unit cost calculation
An accounting method can insert changes that affect average cost calculations after the initial average cost calculations. The method can go back in time and...
US-8,060,406 Predictive geo-temporal advertisement targeting
A method, system, and medium are provided for targeting advertisements to users of mobile devices based on geo-temporal models. Time-stamped location...
US-8,060,360 Word-dependent transition models in HMM based word alignment for statistical machine translation
A word alignment modeler uses probabilistic learning techniques to train "word-dependent transition models" for use in constructing phrase level Hidden Markov...
US-8,060,358 HMM alignment for combining translation systems
A computing system configured to produce an optimized translation hypothesis of text input into the computing system. The computing system includes a plurality...
US-8,060,302 Visual assessment of landmarks
Visual images may be used to detect, or verify the existence of, landmarks. In one example, the landmarks may be used to provide driving or walking directions....
US-8,060,298 Multiple directions to a destination without providing a specific origin
The automatic generation of multiple sets of directions for navigating geographically to a specific destination without specification of an origin. Based on the...
US-8,060,297 Route transfer between devices
A user can intend to travel between different locations and employ different traveling manners to reach an intended travel destination. At different points,...
US-8,060,231 Producing a locally optimal path through a lattice by overlapping search
A system and computer-implemented method for the creation of a structure using Lego building blocks is disclosed. Aspects of the methods are equally appropriate...
US-8,060,064 System and method for optimizing network communication in response to network conditions
A system and method for facilitating communications between a mobile device and a network application are provided. A mobile device transmits a request for data...
US-8,059,888 Semi-automatic plane extrusion for 3D modeling
In accordance with one or more aspects, a plane in a 3D coordinate system in which a 3D model is to be generated based on one or more 2D images is identified. A...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.