Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: microsoft





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,596,255 Honey monkey network exploration
A network can be explored to investigate exploitive behavior. For example, network sites may be actively explored by a honey monkey system to detect if they are...
US-9,596,235 Power efficient storage management
One or more systems and/or techniques are provided for managing a partially encrypted file system, for storage hardware virtualization, and/or for storage...
US-9,596,220 Secure protocol for peer-to-peer network
A wireless computing device operating as a controller of a peer-to-peer group configured to generate unique master keys for each device joining the group. The...
US-9,596,214 Firewall with two-phase filtering
Two-phase filtering for a firewall is disclosed. In the first, general phase, a request is filtered to verify one or more of: that the request is pursuant to a...
US-9,596,201 Identifying first contact unsolicited communications
Techniques involving identification of electronic messages that are the first contact between the sender identification and addressed recipients. One...
US-9,596,153 Wake pattern management
Wake pattern management techniques are described. In one or more implementations, network traffic received by a network interface device of a computing device...
US-9,596,127 Scalable data feed system
A scalable data feed system is disclosed. The data feed system may be offered as a cloud service that can serve many enterprises or tenants that require data to...
US-9,596,063 Dynamically allocating network resources for communication session
A primary call admission controller (CAC) system receives a request from a client to allocate a network resource such as a network bandwidth. The primary CAC...
US-9,595,550 CMOS three-dimensional image sensor detectors having reduced inter-gate capacitance, and enhanced modulation...
A CMOS detector with pairs of interdigitated elongated finger-like collection gates includes p+ implanted regions that create charge barrier regions that can...
US-9,595,298 Transforming data to create layouts
Concepts and technologies are described herein for transforming data to create layouts. In accordance with the concepts and technologies disclosed herein, a...
US-9,595,146 Persistent user identification
Embodiments are disclosed that relate to persistently identifying a user interacting with a computing device. For example, one disclosed embodiment provides a...
US-9,595,054 Resource management for cloud computing platforms
A system for managing allocation of resources based on service level agreements between application owners and cloud operators. Under some service level...
US-9,594,960 Visualizing video within existing still images
Video from a video camera can be integrated into a still image, with which it shares common elements, to provide greater context and understandability....
US-9,594,925 Method to delay locking of server files on edit
A server is implemented with a modified file open action, which, when a user performs the modified open, initially opens a file without locking the file. When a...
US-9,594,900 Isolating applications hosted by plug-in code
Described is a technology in which one application running in a browser can host another application (e.g., an advertisement) in an isolated manner that...
US-9,594,885 Licensing using a cloud public-messaging infrastructure
In various embodiments, methods and systems for license-messaging using cloud public-messaging infrastructures are provided. A cloud public-messaging...
US-9,594,884 Application licensing for devices
A method, system, and computer-readable storage media for licensing an application for a device are provided herein. The method includes providing a license for...
US-9,594,844 Selectively deleting items that are not of interest to a user
Various embodiments enable a user to use their browser to selectively delete items that are not of interest to them. In at least some embodiments, a user's...
US-9,594,838 Query simplification
Methods, systems, and computer-readable media for query simplification are provided. A search engine executed by a server receives a query. In response, the...
US-9,594,837 Prediction and information retrieval for intrinsically diverse sessions
Various technologies described herein pertain to predicting intrinsically diverse sessions and retrieving information for such intrinsically diverse sessions....
US-9,594,831 Targeted disambiguation of named entities
A targeted disambiguation system is described herein which determines true mentions of a list of named entities in a collection of documents. The list of named...
US-9,594,812 Interfaces for accessing and managing enhanced connection data for shared resources
Embodiments are directed to providing access to supplemental query data that is relevant to a data query. In one scenario, a computer system receives an input...
US-9,594,798 File system with per-file selectable integrity
A file system uses data integrity techniques that are a selectable attribute of a file system object. Some file system objects have integrity on for various...
US-9,594,776 Dynamic, parameterized image resource selection
Embodiments are directed to providing an image in response to a request for an image and to requesting an image for a specified context. In one scenario, a...
US-9,594,759 Backup and archival of selected items as a composite object
An archive of items, which are computing data accessed by a user, is created at a semantic object level. The object archiving may group seemingly disparate...
US-9,594,754 Purity analysis using white list/black list analysis
Memoizable functions may be identified by analyzing a function's side effects. The side effects may be evaluated using a white list, black list, or other...
US-9,594,749 Visually differentiating strings for testing
In one embodiment, a data string test system may use a color-coding system, or other visual marker, to indicate which data strings are ready for testing. The...
US-9,594,735 Automatic highlighting of formula parameters for limited display devices
A formula bar is used for receiving user input for entry/editing of formulas using touch input and/or a Soft Input Panel (SIP) designed for formula input. In...
US-9,594,731 WYSIWYG, browser-based XML editor
Computer-implemented methods and computer-readable storage media are disclosed for facilitating browser-based, what-you-see-is-what-you-get (WYSIWYG) editing of...
US-9,594,729 Content navigation and zooming on a mobile device
The contents displayed on the touch screen of a mobile device are modified based in user input, in the form of touch input. In one mode, a content view,...
US-9,594,665 Regression evaluation using behavior models of software applications
Comparisons of different versions of an application may be compared using a behavior model of the application. A behavior model may be derived from n-gram...
US-9,594,656 Analysis and visualization of application concurrency and processor resource utilization
An analysis and visualization depicts how an application is leveraging computer processor cores in time. The analysis and visualization enables a developer to...
US-9,594,620 Proactive failure handling in data processing systems
Embodiments are directed to predicting the health of a computer node using health report data and to proactively handling failures in computer network nodes. In...
US-9,594,603 Application-to-application launch windowing
A window management system manages the placement of a window of a target application within a user interface. A source application launches the target...
US-9,594,544 Visualized code review
Visualization of the result of user interface code is provided in the context of code review. Changes to user interface code can be visualized to enable code...
US-9,594,537 Executable virtual objects associated with real objects
Embodiments for interacting with an executable virtual object associated with a real object are disclosed. In one example, a method for interacting with an...
US-9,594,504 User interface indirect interaction
One or more techniques and/or systems are provided for utilizing input data received from an indirect interaction device (e.g., mouse, touchpad, etc.) to...
US-9,594,493 Graphical user interface with dial control for a parameter
A graphical user interface for a computer includes a dial control. The control can be implemented, for example, as a touch-based, pointer-based, pen-based...
US-9,594,489 Hover-based interaction with rendered content
Disclosed are techniques and systems for enabling "hover-based" interaction with content that is rendered on a display of a viewing device. A process may...
US-9,594,457 Unintentional touch rejection
A method for rejecting an unintentional palm touch is disclosed. In at least some embodiments, a touch is detected by a touch-sensitive surface associated with...
US-9,594,430 Three-dimensional foreground selection for vision system
A method for controlling a computer system includes acquiring video of a subject, and obtaining from the video a time-resolved sequence of depth maps. An area...
US-9,594,427 Finger tracking
The description relates to smart rings. One example can include a finger band configured to accommodate a user's finger. This example can also include a set of...
US-9,594,415 Accessory device power management
Accessory device power management techniques are described in which a power exchange state for a system including a host computing device, an accessory device,...
US-9,593,957 Searching similar trajectories by locations
Techniques for providing a trajectory route to multiple geographical locations of interest are described. This disclosure describes receiving global position...
US-9,592,443 Data store for a modular assembly system
A data store for a modular assembly system is described. The data store comprises a number of records, each record relating to a physical module in the modular...
US-D781,341 Display screen with graphical user interface
US-D781,309 Display screen with animated graphical user interface
US-9,591,554 Management capabilities for a wireless docking experience
This document describes management capabilities for a wireless docking experience. A wireless dock is configured to connect to multiple peripheral devices, such...
US-9,591,514 Optimization of over-the-top (OTT) services on carrier networks
Methods and apparatus for executing a client-based, over-the-top (OTT) application, the client-based OTT application for maintaining communications with a...
US-9,591,483 Authentication mechanisms for wireless networks
Security techniques and security mechanisms for wireless networks that transmit content such as advertisements. According to exemplary techniques, control...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.