Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: microsoft





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-D646,275 Game controller with elongated controller element
US-8,028,335 Protected environments for protecting users against undesirable activities
Various embodiments protect against undesirable activities, in at least some embodiments, by combining the protection of a data or message filter with the...
US-8,028,296 Providing a wrapper around native synchronization objects
A facility for managing a synchronization mechanism that supports initialization, acquisition, release, and deletion operations is described. When a thread...
US-8,028,293 Optimal policies for load balancing for distributed and strategic agents (more technically, optimal...
Providing for scheduling tasks in a distributed system based on an inefficiency of each task on a particular machine as compared with available networked...
US-8,028,274 Integrating loosely coupled tools using contracts and references
Various technologies and techniques are disclosed for providing an integration framework that enables tools to be integrated. The integration framework enables...
US-8,028,250 User interface having a carousel view for representing structured data
A carousel view is described. In an implementation, a method includes determining a number of items that are included in data. A carousel is then generated for...
US-8,028,245 Method and system for operating multiple web pages with anti-spoofing protection
Method and system for operating tabbed browsing with anti-spoofing protection. Tabbed browsing operates to detect pop-up dialogs sent from malicious web pages...
US-8,028,239 Context-based management user interface supporting extensible subtractive filtering
A management user interface can be generated at run time via subtractive extensible context-based filtering. Definitions of user interface elements can include...
US-8,028,229 Document merge
Methods and systems of merging a first document with at least a second document to generate a third document. Each of the first and second documents includes at...
US-8,028,225 Visual system for visualizing, navigating, and editing attribute lattices within OLAP databases
Various technologies and techniques are disclosed for creating and managing a visual representation of OLAP attributes and relationships for a dimension. A...
US-8,028,172 Systems and methods for updating a secure boot process on a computer with a hardware security module
Systems and methods are provided for maintaining and updating a secure boot process on a computer with a trusted platform module (TPM). A boot process may be...
US-8,028,148 Safe and efficient allocation of memory
Aspects of the present invention are directed at centrally managing the allocation of memory to executable images in a way that inhibits malware from...
US-8,028,085 Optimizing message transmission and delivery in a publisher-subscriber model
Systems and methods for reducing the latency incurred during the publication of a message in a message publication system are provided. In a message publication...
US-8,028,079 Efficient transform from XML to javascript objects
This disclosure describes data conversion and techniques for sending and receiving data at a mobile device. In one implementation, a proxy server may receive...
US-8,028,076 Edge traversal service dormancy
A system maintains a dormant state in the host, in which no beacons (or "bubbles") are transmitted from the host when no application or service (collectively,...
US-8,028,070 Synchronizing tasks between servers
Systems and methods for synchronizing task data between a mailbox server of an email system and a project server of a project management system include a...
US-8,028,032 Email messages
The described implementations relate to email messages. One technique detects a link to a web-site in an email message. The technique causes content from the...
US-8,028,031 Determining email filtering type based on sender classification
Determining email filtering type based on sender classification. Incoming email is accessed and a sender of the incoming email is identified. The reputation of...
US-8,028,026 Perimeter message filtering with extracted user-specific preferences
Propagating messaging preferences of one or more users from a recipient mailbox to a perimeter network administering e-mail content blocking and routing. A...
US-8,028,007 Scalable storage and processing of hierarchical documents
Large messages in the form of hierarchically structured documents are processed in a streaming fashion using the ultimate consumer read requests as the driving...
US-8,028,000 Data storage structure
Efficient data storage and retrieval (e.g., in terms of time and space requirements) is facilitated by implementing an indexing structure comprising an indexing...
US-8,027,977 Recommending content using discriminatively trained document similarity
A generalized discriminative training framework for reconciling the training and evaluation objectives for document similarity is provided. Prior information...
US-8,027,973 Searching questions based on topic and focus
A method and system for determining the relevance of questions to a queried question based on topics and focuses of the questions is provided. A question search...
US-8,027,957 Grammar compression
Compression of extensive, rule-based grammars used to facilitate search queries is provided herein. Rule-based grammars includes a list of rules that each...
US-8,027,955 Database management using a file to accumulate changes
Database management is described. A source data structure is copied to create a new data structure. Changes to the source data structure that occur during and...
US-8,027,940 Classification of images as advertisement images or non-advertisement images
An advertisement image classification system trains a binary classifier to classify images as advertisement images or non-advertisement images and then uses the...
US-8,027,832 Efficient language identification
A system and methods of language identification of natural language text are presented. The system includes stored expected character counts and variances for a...
US-8,027,541 Image organization based on image content
A system for organizing images includes an extraction component that extracts visual information (e.g., faces, scenes, etc.) from the images. The extracted...
US-8,027,518 Automatic configuration of devices based on biometric data
The claimed subject matter relates to an architecture that can obtain biometric data from a user as the user interacts with a device. Based upon the obtained...
US-8,026,931 Digital video effects
Digital video effects are described. In one aspect, a foreground object in a video stream is identified. The video stream comprises multiple image frames. The...
US-8,026,920 Extensible visual effects on active content in user interfaces
Methods and systems for applying visual effects to active content, such as buttons, comboboxes, video, edit fields, etc., wherein interactivity of the active...
US-8,025,572 Dynamic spectator mode
Methods and systems for broadcasting game sessions to be viewable by spectators are disclosed. After receiving game information from game participant clients,...
US-D645,881 Display screen with an icon
US-D645,880 Display screen with an icon
US-D645,879 Display screen with a set of icons
US-D645,878 Display screen with a set of icons
US-D645,877 Display screen with a set of icons
US-D645,876 Display screen with a set of icons
US-D645,875 Display screen with a set of icons
US-D645,874 Display screen with a set of icons
US-D645,873 Display screen with a set of icons
US-D645,872 Display screen with a group of icons
US-8,024,815 Isolation environment-based information access
In an embodiment of isolation environment-based information access, programs--including operating systems and applications--running on a computing-based device...
US-8,024,813 Task initiated account presentation for rights elevation
Systems and/or methods are described that enable a user to elevate his or her rights. In one embodiment, these systems and/or methods detect a task which is not...
US-8,024,796 System and method for storing events to enhance intrusion detection
Storing events to enhance intrusion detection in networks is described. In one exemplary implementation, an event is received. The event includes a data section...
US-8,024,791 Providing hints while entering protected information
One or more hints can be presented during the entry of protected information. Traditionally, for security reasons, the protected information is displayed as...
US-8,024,781 Signing-in to software applications having secured features
The present invention automatically signs or logs a user in to access secured features within a software application without prompting manual intervention when...
US-8,024,775 Sketch-based password authentication
A graphical password authentication method is based on sketches drawn by user. The method extracts a template edge orientation pattern from an initial sketch of...
US-8,024,770 Techniques for managing security contexts
Techniques for managing security contexts may be described. An apparatus may comprise a processor and a security management module. The security management...
US-8,024,732 State separation for application changes
Application states may be stored and retrieved using policies that define various contexts in which the application is used. The application states may define...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.