Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: microsoft





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-8,028,148 Safe and efficient allocation of memory
Aspects of the present invention are directed at centrally managing the allocation of memory to executable images in a way that inhibits malware from...
US-8,028,085 Optimizing message transmission and delivery in a publisher-subscriber model
Systems and methods for reducing the latency incurred during the publication of a message in a message publication system are provided. In a message publication...
US-8,028,079 Efficient transform from XML to javascript objects
This disclosure describes data conversion and techniques for sending and receiving data at a mobile device. In one implementation, a proxy server may receive...
US-8,028,076 Edge traversal service dormancy
A system maintains a dormant state in the host, in which no beacons (or "bubbles") are transmitted from the host when no application or service (collectively,...
US-8,028,070 Synchronizing tasks between servers
Systems and methods for synchronizing task data between a mailbox server of an email system and a project server of a project management system include a...
US-8,028,032 Email messages
The described implementations relate to email messages. One technique detects a link to a web-site in an email message. The technique causes content from the...
US-8,028,031 Determining email filtering type based on sender classification
Determining email filtering type based on sender classification. Incoming email is accessed and a sender of the incoming email is identified. The reputation of...
US-8,028,026 Perimeter message filtering with extracted user-specific preferences
Propagating messaging preferences of one or more users from a recipient mailbox to a perimeter network administering e-mail content blocking and routing. A...
US-8,028,007 Scalable storage and processing of hierarchical documents
Large messages in the form of hierarchically structured documents are processed in a streaming fashion using the ultimate consumer read requests as the driving...
US-8,028,000 Data storage structure
Efficient data storage and retrieval (e.g., in terms of time and space requirements) is facilitated by implementing an indexing structure comprising an indexing...
US-8,027,977 Recommending content using discriminatively trained document similarity
A generalized discriminative training framework for reconciling the training and evaluation objectives for document similarity is provided. Prior information...
US-8,027,973 Searching questions based on topic and focus
A method and system for determining the relevance of questions to a queried question based on topics and focuses of the questions is provided. A question search...
US-8,027,957 Grammar compression
Compression of extensive, rule-based grammars used to facilitate search queries is provided herein. Rule-based grammars includes a list of rules that each...
US-8,027,955 Database management using a file to accumulate changes
Database management is described. A source data structure is copied to create a new data structure. Changes to the source data structure that occur during and...
US-8,027,940 Classification of images as advertisement images or non-advertisement images
An advertisement image classification system trains a binary classifier to classify images as advertisement images or non-advertisement images and then uses the...
US-8,027,832 Efficient language identification
A system and methods of language identification of natural language text are presented. The system includes stored expected character counts and variances for a...
US-8,027,541 Image organization based on image content
A system for organizing images includes an extraction component that extracts visual information (e.g., faces, scenes, etc.) from the images. The extracted...
US-8,027,518 Automatic configuration of devices based on biometric data
The claimed subject matter relates to an architecture that can obtain biometric data from a user as the user interacts with a device. Based upon the obtained...
US-8,026,931 Digital video effects
Digital video effects are described. In one aspect, a foreground object in a video stream is identified. The video stream comprises multiple image frames. The...
US-8,026,920 Extensible visual effects on active content in user interfaces
Methods and systems for applying visual effects to active content, such as buttons, comboboxes, video, edit fields, etc., wherein interactivity of the active...
US-8,025,572 Dynamic spectator mode
Methods and systems for broadcasting game sessions to be viewable by spectators are disclosed. After receiving game information from game participant clients,...
US-D645,881 Display screen with an icon
US-D645,880 Display screen with an icon
US-D645,879 Display screen with a set of icons
US-D645,878 Display screen with a set of icons
US-D645,877 Display screen with a set of icons
US-D645,876 Display screen with a set of icons
US-D645,875 Display screen with a set of icons
US-D645,874 Display screen with a set of icons
US-D645,873 Display screen with a set of icons
US-D645,872 Display screen with a group of icons
US-8,024,815 Isolation environment-based information access
In an embodiment of isolation environment-based information access, programs--including operating systems and applications--running on a computing-based device...
US-8,024,813 Task initiated account presentation for rights elevation
Systems and/or methods are described that enable a user to elevate his or her rights. In one embodiment, these systems and/or methods detect a task which is not...
US-8,024,796 System and method for storing events to enhance intrusion detection
Storing events to enhance intrusion detection in networks is described. In one exemplary implementation, an event is received. The event includes a data section...
US-8,024,791 Providing hints while entering protected information
One or more hints can be presented during the entry of protected information. Traditionally, for security reasons, the protected information is displayed as...
US-8,024,781 Signing-in to software applications having secured features
The present invention automatically signs or logs a user in to access secured features within a software application without prompting manual intervention when...
US-8,024,775 Sketch-based password authentication
A graphical password authentication method is based on sketches drawn by user. The method extracts a template edge orientation pattern from an initial sketch of...
US-8,024,770 Techniques for managing security contexts
Techniques for managing security contexts may be described. An apparatus may comprise a processor and a security management module. The security management...
US-8,024,732 State separation for application changes
Application states may be stored and retrieved using policies that define various contexts in which the application is used. The application states may define...
US-8,024,729 Drawing resources
This disclosure relates to drawing within a computer environment using a drawing resource. The computer environment includes a managed code portion and a native...
US-8,024,727 Enhancing or replacing host operating system functionality by leveraging guest operating system functionality
Techniques for enhancing or replacing host operating system functionality by leveraging guest operating system functionality are disclosed. Incoming data is...
US-8,024,714 Parallelizing sequential frameworks using transactions
Various technologies and techniques are disclosed for transforming a sequential loop into a parallel loop for use with a transactional memory system. Open ended...
US-8,024,711 Software analysis tool
A tool for analyzing software. The tool identifies calls to framework components made from within one or more application programs. The information may be...
US-8,024,710 Unwinding unwindable code
Unwinding may take place in an annotated unwinding environment with non-annotated code by placing a context frame between a first annotated function and...
US-8,024,704 Systems and methods for employing tagged types in a dynamic runtime environment
The present invention relates to systems and methods that facilitate dynamic programming language execution in a managed code environment. A class component is...
US-8,024,701 Visual creation of object/relational constructs
Visual controls such as drag and drop are utilized to create object-oriented constructs from corresponding relational constructs, for instance. Similarly, an...
US-8,024,667 In-document floating object re-ordering
Techniques are disclosed herein for re-ordering floating objects in an electronic document. An electronic document having floating objects is displayed in a...
US-8,024,652 Techniques to associate information between application programs
Techniques to cross-reference information for application programs are described. An apparatus may comprise a first application program to create notes for an...
US-8,024,650 Drilling on elements in arbitrary ad-hoc reports
Mechanisms are provided for drilling on data elements in arbitrary ad-hoc reports. Data elements in one ad-hoc report can be examined and then drilled on, in...
US-8,024,648 Planar mapping of graphical elements
Planar rendering is described. In an implementation, a method includes approximating a shape that corresponds to an overlapping portion of at least one...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.