Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: microsoft





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,880,992 Multi-client collaboration to access and update structured data elements
Tools and techniques for providing multi-client collaboration to access and update structured data elements are disclosed. Client systems may present user...
US-9,880,990 Leveraging previous instances of handwriting for handwriting beautification and other applications
A stroke processing system (SPS) is described which processes a user's current instance of handwriting with reference to previous instances of handwriting. In...
US-9,880,988 Validation, rejection, and modification of automatically generated document annotations
A mixed-initiative annotation framework is described herein. A document that includes several sentences is presented to a user, and an extractor module analyzes...
US-9,880,915 N-gram analysis of inputs to a software application
Input sequence information may be analyzed and quantified using n-gram analysis of inputs received by an application. The sequences of inputs may be represented...
US-9,880,889 Virtual application extension points
A virtual application may be configured with several extension points within a host operating system. The virtual application may be configured with a private...
US-9,880,864 Dynamic configuration system for distributed services
A system includes a dynamic configuration property database for a computer-based service. The system executes an application program interface that couples the...
US-9,880,820 Programming language with extensions using dynamic keywords
Systems and methods for extending a programming language with a set of extensions using a strict meta-model are disclosed. Embodiments provide a set of...
US-9,880,759 Metadata for data storage array
A data storage array may be made up of several storage devices, each of which may contain array metadata that may allow portions of the storage array to be...
US-9,880,712 In-application customization
In-application customization is provided where users can both use and customize the application. Within a graphical user interface of an application developed...
US-9,880,365 Fiber-optic feedthroughs for superconducting systems
Interconnect systems for coupling a first system operating in a first type of environment (e.g., a cryogenic environment) to a second system operating in a...
US-9,879,980 Light based positioning
The subject matter described herein relates to light based positioning. In one embodiment, a method comprises: responsive to receiving a light signal from at...
US-9,878,447 Automated collection and labeling of object data
Data about a physical object in a real-world environment is automatically collected and labeled. A mechanical device is used to maneuver the object into...
US-9,875,736 Pre-training and/or transfer learning for sequence taggers
Systems and methods for pre-training a sequence tagger with unlabeled data, such as a hidden layered conditional random field model are provided. Additionally,...
US-9,875,406 Adjustable extension for temple arm
This disclosure concerns an interactive head-mounted eyepiece with an integrated processor for handling content for display and an integrated image source for...
US-9,875,402 Digital image manipulation
Techniques for assigning context to a digitally captured image, and for manipulating recognized data fields within such image. In an exemplary embodiment, a...
US-9,875,370 Database server and client for query processing on encrypted data
Methods, systems, apparatuses, and computer program products are provided for secure handling of queries by a data server (DS) and a database application (DA)....
US-9,875,358 Preventing code modification after boot
The subject disclosure is directed towards protecting code in memory from being modified after boot, such as code used in a dedicated microprocessor or...
US-9,875,302 Mining multilingual topics
Techniques for utilizing data mining technology to extract universal topics with multilingual representations from a multilingual database, and to organize...
US-9,875,301 Learning multimedia semantics from large-scale unstructured data
Systems and methods for learning topic models from unstructured data and applying the learned topic models to recognize semantics for new data items are...
US-9,875,263 Composite partition functions
Composite partition function techniques are described herein that may be used to repartition a database without moving existing data. In one or more...
US-9,875,253 Color sketch image searching
For each image in a collection of images to be searched, the image is represented as a collection of color-edge words, where each color-edge words includes...
US-9,875,235 Process flow diagramming based on natural language processing
Non-limiting examples of the present disclosure describe natural language translation capabilities that enable automated process flow diagram generation from...
US-9,875,173 Time travel debugging in managed runtime
Various technologies described herein pertain to time travel debugging in a managed runtime system. The managed runtime system can include an execution...
US-9,875,160 Efficiently providing virtual machine reference points
A computer system maintains identifiers that identify changed blocks of virtual machine (VM) storage. The computer system accesses a stable VM checkpoint...
US-9,875,149 Preventing sync interruptions
Described herein are techniques performed by an application executing on a computing device. The application may have a graphical user interface (GUI) comprised...
US-9,875,141 Managing pools of dynamic resources
Computer systems attempt to manage resource pools of a dynamic number of similar resources and work tasks in order to optimize system performance. Work requests...
US-9,875,120 Virtualized components in computing systems
The subject disclosure is directed towards virtual components, e.g., comprising software components such as virtual components of a distributed computing...
US-9,875,115 Memory-preserving reboot
Techniques are described for preserving application state in virtual memory during operating system reboot. A preserved virtual memory allocation that has been...
US-9,875,090 Program analysis based on program descriptors
A deployment package descriptor may be obtained. One or more application files that include application content in a plurality of different data formats may be...
US-9,874,630 Extended range gated time of flight camera
A gated time of flight (GT-TOF) range camera that transmits a plurality of light pulses to illuminate features in a scene and gates ON a photosensor in the...
US-9,872,390 Flexible interconnect
One example provides a flexible electrical interconnect comprising a substrate, a liquid conductive pathway supported by the substrate, and a conductively...
US-9,872,379 Flexible printed circuit with radio frequency choke
In an electronic device that employs high-speed differential signaling on one or more pairs of conductors in a flexible printed circuit, RF chokes are placed in...
US-9,872,202 Ad hoc wireless networking
A software architecture providing ad hoc wireless networking capabilities. The software architecture may be compatible with wireless devices, such as Ultra...
US-9,872,150 Inferring logical user locations
A logical location of a user may be inferred using semantics of the user's computing device(s). The logical locations may correspond to venues visited by the...
US-9,872,138 Techniques for exchanging contact information and establishing a connection via a social networking service
A method of making it easier for users to interact with each other via a social networking system is disclosed. It is detected that a first user of a social...
US-9,871,954 Two part device with camera and mechanical flap
A device comprising at least two body sections is disclosed. The first body section comprises a first camera element having an optical axis, and the second body...
US-9,871,930 Call invites
A network node, computer program product and method establishing a call between a caller and a callee over a network. Multiple versions of a call invite are...
US-9,871,911 Visualizations for interactions with external computing logic
Allowing a user to interact with external computing logic through a standardized user interface visualization. For instance, a user might be able to initiate an...
US-9,871,883 Opportunity events
The description relates to opportunity events. One example can filter events based upon at least one parameter from a profile of a user. The filtering can...
US-9,871,857 Optimal allocation of dynamic cloud computing platform resources
In various embodiments, methods and systems for optimizing allocation of dynamic resources are provided. A user service request resource instance is received at...
US-9,871,824 Unified policy over heterogenous device types
A system and method are disclosed for enforcing a normalized set of policy-based behaviors across two or more disparate client devices. The policy definition...
US-9,871,811 Identifying security properties of systems from application crash traffic
Most machines in an organization's computer network connect to the Internet and create web traffic logs which allow analysis of HTTP traffic in a simple,...
US-9,871,807 Generic protocol decoder for generic application-level protocol signatures
Described is a generic protocol decoder that analyzes network traffic or file data to look for a signature, and signals an intrusion prevention mechanism/system...
US-9,871,801 Secure computing system record access control
A computing system record security architecture comprises, in one example, a record generation component configured to generate a record in a computing system,...
US-9,871,799 Enabling trusted conferencing services
Architecture for providing a superuser privilege in a conferencing environment. A pre-configured entity such as a bot program receives special conferencing...
US-9,871,741 Resource management based on device-specific or user-specific resource usage profiles
Resources used by a foreground process associated with an application as well as one or more background tasks associated with the application that are running...
US-9,871,731 Data plane manipulation in a load balancer
A load balancer capable of adjusting how network data is distributed to a tenant or group of tenants by manipulating the data plane. The load balancer is placed...
US-9,871,711 Identifying problems in a network by detecting movement of devices between coordinates based on performances...
This document relates to a distributed network coordinate system. One implementation provides computer-readable storage media including instructions that may...
US-9,871,646 Front-end circuitry for multiband frequency management
The described technology provides front-end antenna architecture for wireless communication that manages multiple frequency sub-bands in a manner that results...
US-9,871,545 Selective specific absorption rate adjustment
An electronic device provides a capability of distinguishing between human tissue and a non-human object in proximity of a transmission source. In this manner,...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.