Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: microsoft





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,008,5129 Mobile device communication
Described is a technology by which a mobile computing device such as a mobile telephone operates differently based on detected proximity to another mobile...
US-1,008,5127 Pre-determined responses for wireless devices
In accordance with one or more aspects, criteria including both a type of communication and a user signal are received. Additionally, a response to be stored as...
US-1,008,5102 Detection of device configuration
Devices connected with a computer system are interrogated to detect whether they are configured and functioning. In an audio device implementation, a known...
US-1,008,4868 IoT gateway for weakly connected settings
A gateway that may be implemented in a local network and that communicates with a cloud network to provide efficient services in a weakly connected setting is...
US-1,008,4807 Detection of bypass vulnerabilities
A method and proxy device for detecting bypass vulnerabilities in a cloud-computing platform are provided. The method includes identifying an access attempt by...
US-1,008,4785 Connecting and retrieving security tokens based on context
An application may be configured with two or more cloud contexts and one or more identity Systems. Using this information, the application has the ability to...
US-1,008,4754 Virtual private network aggregation
Aggregating traffic over multiple VPN connections is described. A first Virtual Private Network (VPN) connection is established between a client device and a...
US-1,008,4752 Hybrid hardware-software distributed threat analysis
Embodiments relate to detecting and mitigating network intrusions. Packets are inspected at their source/destination hosts to identify packet trends local to...
US-1,008,4736 Conversation enrichment through component re-order
Technologies are described for chronological re-ordering of transmitted conversation components. A message transmitting a message chain in the conversation...
US-1,008,4705 Location identification of prior network message processor
The communication of a network message from a first network node in a particular location to a second network node in a manner that the second network node...
US-1,008,4483 Interleaving information for media data
Techniques for interleaving information for media data are described. In at least some embodiments, interleaving information is propagated from a network-based...
US-1,008,3540 Virtual light in augmented reality
A head-mounted display system includes a see-through display that is configured to visually augment an appearance of a physical environment to a user viewing...
US-1,008,3454 Social network content item federation based on item utility value
Systems and methods for federating social network content items include determining an engagement value for content items based on previous interactions with...
US-1,008,3315 Privacy enhanced personal search index
Examples of the present disclosure describe systems and methods for enhancing the privacy of a personal search index. In some aspects, a personal cleartext...
US-1,008,3233 Video processing for motor task analysis
Video processing for motor task analysis is described. In various examples, a video of at least part of a person or animal carrying out a motor task, such as...
US-1,008,3162 Constructing a narrative based on a collection of images
A computer-implemented technique is described for generating a textual narrative based on a set of input images. In one scenario, the end user captures the set...
US-1,008,3068 Fast transfer of workload between multiple processors
Techniques and systems for prescheduling an alternative CPU as soon as a need for a task is detected by a primary CPU are disclosed. A process includes...
US-1,008,2944 Autoscroll regions
Technologies are described herein for autoscroll regions. A device establishes a trigger line near an edge of a selectable region of content that is adjacent to...
US-1,008,2931 Transitioning command user interface between toolbar user interface and full menu user interface based on use...
Transitioning of a command user interface (UI) between a toolbar UI and a full menu UI based on a use context is provided. An application such as a messaging...
US-1,008,2913 Embroidered sensor assembly
Embroidered sensor assemblies are described that are formed on a flexible substrate, such as a suitable fabric material. Conductive patterns are embroidered...
US-1,008,2890 Electrostatic communication using an active stylus
An active stylus includes an electrode and a controller. The controller is configured to 1) generate a report including stylus information represented by a...
US-1,008,2888 Stylus modes
Stylus modes are described. In implementations, one or more sensors of a stylus are used to detect that contact with a user has ceased. A battery-conservation...
US-1,008,2669 Variable-depth stereoscopic display
This document describes various techniques for implementing a variable-depth stereoscopic display. A first distance at which a viewer is disposed relative to a...
US-1,008,2640 Dual stage actuator
An electromagnetic actuator comprises a dual stage action, wherein the actuator comprises an electromagnetic element between two ferromagnetic elements. An...
US-1,008,2584 Hybrid device location determination system
Various different techniques are used to determine a location of a device, including 3-dimensional (3D) mapping techniques as well as one or more of Global...
US-1,008,2397 Activating and deactivating sensors for dead reckoning
An identification is made as to when a device is at an anchor location, which can be a proximity zone along an edge of a dead zone or a location where a signal...
US-1,008,0967 Method and system providing spectator information for a multimedia application
A method and system for allowing spectators to experience multimedia information over a network generated by an online video game running on a participant's...
US-1,008,0317 Polymeric electromagnetic shield for electronic components
An electronic device can include a circuit board, an electronic component mounted on the circuit board, a conductive contact disposed (e.g., deposited) on the...
US-1,007,9929 Determining threats based on information from road-based devices in a transportation-related context
Techniques for ability enhancement are described. Some embodiments provide an ability enhancement facilitator system ("AEFS") configured to enhance a user's...
US-1,007,9922 Conductive structural members acting as NFC antenna
In an embodiment, conductive structural members of a device acting as NFC antenna are described. According to an embodiment, a device comprises: two conductive...
US-1,007,9907 Cached data detection
A service assigns session identifiers to usage sessions of a program on a computing device, and maintains records in a log of received page requests and...
US-1,007,9900 Techniques to manage presence information
Techniques to manage presence information are described. An apparatus may comprise a presence management component operative to manage presence information for...
US-1,007,9864 Communicating media data
Communicating media data over a communication system in which a first communication instance for a user of the communication system is implemented at a first...
US-1,007,9863 Media session between network endpoints
A media session is established between a first endpoint and a second endpoint via a communication network based on connectivity checks performed by the...
US-1,007,9818 Providing domain-joined remote applications in a cloud environment
Embodiments are directed to provisioning private virtual machines in a public cloud and to managing private virtual machines hosted on a public cloud. In one...
US-1,007,9789 Shared attachments
When an outgoing communication sent to one or more recipients contains a supported attachment type, a shared workspace that contains a shared version of the...
US-1,007,9720 Dynamically managing different versions of a service
A management portal receives an input indicating that a management operation is to be performed on a service. The management portal dynamically hosts a...
US-1,007,9002 Modifying graphical elements based on environment
This disclosure relates to systems and methods for modifying graphical element according to an environment. In one example, a method includes receiving inputs...
US-1,007,9001 Autonomous pixel with multiple different sensors
An autonomous pixel comprises a display element, a plurality of different sensors and a control element. The sensors are arranged to detect one or more external...
US-1,007,9000 Reducing display degradation
The description relates to maintaining display device image quality. One example can include a display that includes a set of multiple pixels. Individual pixels...
US-1,007,8760 Graph-based inference of confidential data insights
In an example, a weighted directed graph data structure is constructed from position information and position transition information, the weighted directed...
US-1,007,8748 Unlock and recovery for encrypted devices
A computing device can perform operations to unlock encrypted volumes of the computing device while the computing device is in a recovery environment. In some...
US-1,007,8747 Resumption of logon across reboots
In one embodiment, a user device may reestablish access to a user resource while forgoing use of a user credential during a system reboot. The user device may...
US-1,007,8703 Location-based media searching and sharing
Various embodiments relating to searching, identifying, and sharing music being played at entities is disclosed. In one embodiment, audio samples are received...
US-1,007,8627 Collaboration cards for communication related to a collaborated document
Collaboration cards are provided to enable people to collaborate and receive instant replies to comments or questions from anywhere in a collaboratively...
US-1,007,8575 Diagnostics of state transitions
A method for diagnosing computer readable instructions related to transfers of control is disclosed. A state transition of a unit of execution within a logical...
US-1,007,8562 Transactional distributed lifecycle management of diverse application data structures
A state manager provides transactional distributed lifecycle management of a group of different application-level state providers, namely, differently...
US-1,007,8536 Cloud-based build service
Building binary packages for software products, particularly large-scale software products, is a highly computation intensive process. Thus, it is desirable to...
US-1,007,8501 Domain specific language modeling framework in a development environment
A computing system comprises, in one example, a user interface component and a domain specific language (DSL) type generation system configured to control the...
US-1,007,8489 Voice interface to a social networking service
A machine may be configured to generate and provide, for example, a voice-user interface to a social networking service. The voice-user interface may enable a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.