Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: microsoft





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,544,537 Shared scene mesh data synchronization
A user device within a communication architecture, the user device comprising: an image capture device configured to determine image data and...
US-9,544,504 Rapid synchronized lighting and shuttering
This document describes various apparatuses and techniques for rapid synchronized lighting and shuttering. These apparatuses and techniques are capable of...
US-9,544,436 Providing missed call and message information
Information associated with messages and/or missed calls is provided to a subscriber. Calls received but not answered by the subscriber may be monitored. Each...
US-9,544,409 Automated caller identifier from contact lists of a user's contacts
When a call or message is received from an unidentified sender on the user's communication device, the caller identifier application launches a text-based...
US-9,544,400 Manipulating binary large objects
Embodiments provide automated access policy enforcement, content rule enforcement, and data transformations in a binary large object (blob) storage service....
US-9,544,374 Relative timestamp when real time clock is unavailable
An operating system or other software resident on an electronic processing device employs aggregated timestamps. In this way timestamps can be generated and...
US-9,544,353 Dynamic activation of web applications
Techniques are described herein that are capable of dynamically activating web applications. For instance, such applications may not be configured on a machine...
US-9,544,310 Discovering and disambiguating identity providers
Systems, methods, and computer-readable storage media are provided for discovering and disambiguating identity providers such that user knowledge of appropriate...
US-9,544,280 Utilization of a protected module to prevent offline dictionary attacks
Various technologies pertaining to authenticating a password in a manner that prevents offline dictionary attacks are described. A protected module, which can...
US-9,544,266 NSEC3 performance in DNSSEC
A method includes receiving, at a server, a request from a DNS client. The request identifies a domain name to be resolved that is not able to be resolved by...
US-9,544,225 Method for end point identification in computer networks
Various techniques for partitioning a computer network is disclosed herein. In certain embodiments, control plane functions (e.g., computation of network...
US-9,544,213 Keep alive management
Keep alive management techniques are described. In one or more implementations, a keep alive interval is calculated by an operating system of the computing...
US-9,544,212 Data usage profiles for users and applications
Embodiments profile users and applications based on network data usage. Data usage statistics are collected and compared for the users and applications....
US-9,544,207 Using different connectivity checks to determine causes of connectivity issues
Connectivity is tested using different locations and contexts selected from different possible failure zones. The failure zones may include: client failure...
US-9,544,158 Workspace collaboration via a wall-type computing device
Multi-user, multi-computing device collaborative work experience is provided. One or more computing devices, including wired and wireless personal computers,...
US-9,544,147 Model based multi-tier authentication
Authentication is widely used to protect consumer data and computing services, such as email, document storage, and online banking. Current authentication...
US-9,543,959 Phase-mode based superconducting logic
A device including Josephson junctions, and a terminal for receiving a sinusoidal clock signal for providing power to the Josephson junctions, is provided. The...
US-9,543,937 Multi-phase clock generation
Embodiments are disclosed that relate to multi-phase clock generators and data samplers for use in high speed I/O circuitry. One disclosed example provides a...
US-9,543,650 Loop antenna for mobile handset and other applications
There is disclosed an antenna system for mobile handsets and other devices. The antenna system comprises a dielectric substrate having first and second opposed...
US-9,543,639 Back face antenna in a computing device case
An antenna assembly includes a portion of the metal computing device case as a primary radiating structure. The metal computing device case includes a back face...
US-9,542,949 Satisfying specified intent(s) based on multimodal request(s)
Techniques are described herein that are capable of satisfying specified intent(s) based on multimodal request(s). A multimodal request is a request that...
US-9,542,931 Leveraging interaction context to improve recognition confidence scores
On a computing device a speech utterance is received from a user. The speech utterance is a section of a speech dialog that includes a plurality of speech...
US-9,542,928 Generating natural language outputs
Methods, computer systems, and computer-storage media are provided for generating natural language outputs. Sets of triples may be used to map voice queries and...
US-9,542,906 Shared compositional resources
Shared compositional resources are described. In one or more implementations, a global composition system may be configured to perform rendering for a plurality...
US-9,542,766 Intelligent configuration of data visualizations
The techniques described herein determine configurations for data visualizations based on characteristics interpreted from input data. Input data including a...
US-9,542,749 Fast general multipath correction in time-of-flight imaging
Fast general multipath correction in time of flight imaging is described, for example, to obtain accurate depth maps at frame rate from a time of flight camera....
US-9,542,670 Information management systems with time zone information, including event scheduling processes
Information management systems with time zone information, including event scheduling processes are disclosed. One aspect of the invention is directed toward a...
US-9,542,667 Navigating messages within a thread
A user may easily read, browse, and jump through the messages contained within a thread. Different portions of the message may be highlighted such that they are...
US-9,542,652 Posterior probability pursuit for entity disambiguation
Various technologies described herein pertain to disambiguation of a mention of an ambiguous entity in a document. A set of candidate entities can be retrieved...
US-9,542,622 Framework for data extraction by examples
Various technologies described herein pertain to controlling automated programming for extracting data from an input document. Examples indicative of the data...
US-9,542,621 Spatial pyramid pooling networks for image processing
Spatial pyramid pooling (SPP) layers are combined with convolutional layers and partition an input image into divisions from finer to coarser levels, and...
US-9,542,564 Personal site privacy policy
A request, from a requester, is received to view user information on a user's personal site associated with a user. A relationship is determined between the...
US-9,542,544 Correlated display of biometric identity, feedback and user interaction state
Aspects of the subject disclosure are directed towards providing feedback to users of multi-user system that has biometric recognition capabilities, so that a...
US-9,542,536 Sustained data protection
Among other things, one or more techniques and/or systems are provided for sustained data protection. In particular, a data protector may define a set of access...
US-9,542,498 Provision of applications to mobile devices
Embodiments related to the provision of applications to mobile devices are disclosed. One embodiment provides a mobile device application server system,...
US-9,542,495 Targeted content provisioning based upon tagged search results
One or more techniques and/or systems are provided for tagging search results, organizing tagged search results for later access from various devices, public...
US-9,542,494 Proactive delivery of related tasks for identified entities
A search engine database is utilized to identify "entities", or things for which there exists associated discrete, objective information. For hosted information...
US-9,542,491 Utilizing keystroke logging to determine items for presentation
Systems, methods, and computer-readable storage media are provided for utilizing keystroke logging information to determine items (e.g., search results and/or...
US-9,542,473 Tagged search result maintainance
One or more techniques and/or systems are provided for tagging search results, organizing tagged search results for later access from various devices, public...
US-9,542,465 Quorum based transactionally consistent membership management in distributed storage
Systems and methods that restore a failed reconfiguration of nodes in a distributed environment. By analyzing reports from read/write quorums of nodes...
US-9,542,440 Enterprise graph search based on object and actor relationships
Systems, methods, and software are disclosed herein for implementing enterprise graph search. In at least one implementation, an enterprise search service...
US-9,542,438 Term complete
Real-time query expansion (RTQE) is a process of supplementing an original query with additional terms or expansion choices that are ranked according to some...
US-9,542,431 Cyclic commit transaction protocol
A cyclic commit protocol is used to store relationships between transactions and is used by the technology to determine whether a transaction is committed or...
US-9,542,380 Generating financial data documents using templates
A computing system is disclosed including a computer processor configured to receive a selection of a template and identify a data field in the template. The...
US-9,542,337 Device side host integrity validation
Described is a technology by which a transient storage device or secure execution environment-based (e.g., including an embedded processor) device validates a...
US-9,542,256 Analysis stack for an event flow
An analysis module is configured to receive data associated with an event flow. The data is received from a first analysis module (e.g., in a stack of analysis...
US-9,542,247 Content sharing between sandboxed apps
Embodiments may include sharing application management data between sandboxed applications on a device. A method includes sending application management data...
US-9,542,229 Multiple core real-time task execution
A real-time task may initially be performed by a first thread that is executing on a first core of a multi-core processor. A second thread may be initiated to...
US-9,542,203 Universal dock for context sensitive computing device
A dock for interacting with a computing device. The computing device configures itself for operations based on its context, which may be determined form the...
US-9,542,176 Predicting software build errors
Systems and methods for predicting a software build error are described herein. In one example, a method includes detecting a plurality of changes in software....
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.