Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: microsoft





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,040,9444 Head-mounted display input translation
Computing devices, head-mounted display devices and methods for processing spatial input signals from a pointing device are disclosed. In one example, a pointer...
US-1,040,9443 Contextual cursor display based on hand tracking
A head mounted display device and method for contextual cursors comprising a camera configured to capture a series of images, a display, and a processor...
US-1,040,9381 Gestures, interactions, and common ground in a surface computing environment
Aspects relate to detecting gestures that relate to a desired action, wherein the detected gestures are common across users and/or devices within a surface...
US-1,040,9355 Estimating and preserving battery life based on usage patterns
Embodiments apply user-specific usage patterns to estimate and preserve remaining battery life on a computing device. An amount of battery drain and an...
US-1,040,9349 Remediating power loss at a server
Aspects extend to methods, systems, and computer program products for remediating power loss at a server. Aspects of the invention increase the likelihood of...
US-1,040,9074 Near-to-eye display with steerable phased arrays
Near-to-eye devices with steerable phased arrays are provided. In some configurations, a device comprises waveguides, e.g., color plates, that are individually...
US-1,040,8624 Providing familiarizing directional information
Examples are disclosed that relate to providing information regarding nearby locations that may be familiar to a user to help inform the user of a current...
US-1,040,8623 Retracing steps
Techniques for creating breadcrumbs for a trail of activity are described. The trail of activity may be created by recording movement information based on...
US-1,040,6438 Controlling behavior of entities in funnel sections of a computer-represented environment
Innovations in the area of controlling behavior of computer-controlled entities such as cars in a computer-represented environment are presented herein. In...
US-1,040,5165 Quick pair
A host device, such as a laptop or desktop computer, that supports wireless point-to-point connections with peripheral devices, such as a pair of headphones,...
US-1,040,4816 Determining browsing activities
Determining browsing activities is described. In one or more implementations, browsing history data, indicating navigation to websites using a web platform, is...
US-1,040,4791 State-aware load balancing of application servers
A load balancer receives a client request from a client device for a connection to an application. The load balancer queries a monitoring server for a list of...
US-1,040,4765 Re-homing embedded web content via cross-iframe signaling
Aspects of the present disclosure relate to providing a cross-iframe solution for instructing embedded content to reuse current in-browser app instances but to...
US-1,040,4744 Database query injection detection and prevention
Computer systems, devices, and associated methods of detecting and/or preventing injection attacks in databases are disclosed herein. In one embodiment, a...
US-1,040,4738 IPFIX-based detection of amplification attacks on databases
One embodiment illustrated herein includes a computer implemented method. The method includes acts for training an amplification attack detection system. The...
US-1,040,4716 Data classification and access control for cloud based data
A data protection policy can specify which applications are allowed and/or dis-allowed from accessing cloud data that is subject to a data protection policy...
US-1,040,4715 Cross-site collection queries
Providing users of an enterprise content management (ECM) system with faster and more accurate results to queries related to permission levels within the ECM...
US-1,040,4689 Password security
The description relates to password reset security. One example can receive a login request and a password for a cloud-based user account. The example can also...
US-1,040,4643 Undeliverable response handling in electronic mail systems
Systems, methods, apparatuses, and software for electronic mail systems and service in computing environments are provided herein. In one example, an electronic...
US-1,040,4641 Internet e-mail bridge
An Internet mail bridge is provided for downloading e-mail messages from Internet mail servers supporting different email protocols, such as the Post Office...
US-1,040,4637 Electronic communication-based storage of documents to support multiple workflows
Electronic communication-based storage of content items to support multiple workflows is provided. When an attached content item is received with an electronic...
US-1,040,4631 Creating groups in a messaging system
A messaging system comprising: computer storage holding messaging accounts for users of the messaging system, each comprising a user identifier of a first type;...
US-1,040,4556 Methods and computer program products for correlation analysis of network traffic in a network device
Provided are methods and computer program products for monitoring the contents of network traffic in a network device and performing correlation analysis of...
US-1,040,4520 Efficient programmatic memory access over network file access protocols
Embodiments provide a method and system for transferring data between different computing devices. Specifically, a communication session is established between...
US-1,040,4470 Signature verification of field-programmable gate array programs
Techniques for signature verification of field-programmable gate array (FPGA) programs are described herein. In one or more implementations, an FPGA...
US-1,040,4466 Secure hardware for cross-device trusted applications
Various technologies described herein pertain to a computing device that includes secure hardware (e.g., a TPM, a secure processor of a processing platform,...
US-1,040,4287 Magic state distillation with low space overhead and asymptotic input count
Disclosed herein are example embodiments of protocols to distill magic states for T-gates. Particular examples have low space overhead and use an asymptotically...
US-1,040,4005 Plug receptacle and plug receptacle cover for an electronic device
A plug receptacle comprises a receptacle housing having a passage configured to receive at least a part of a plug of a plug connector, a front side having a...
US-1,040,3276 Voice enabled features based on proximity
Techniques for controlling a voice activated feature of a voice activated device are described. Data from one or more sensors and data indicative of a status of...
US-1,040,3054 Deconstructing and recombining three-dimensional graphical objects
Aspects of the technology described herein provide for generating a customized three-dimensional (3D) graphical object. A 3D graphical object is retrieved from...
US-1,040,3033 Preserving scene lighting effects across viewing perspectives
A scene may be rendered as objects that are lit by various light sources. A scene designer may arrange the scene to create particular lighting effects when...
US-1,040,3030 Computing volumes of interest for photogrammetric 3D reconstruction
Techniques for computing a volume of interest for photogrammetric 3D reconstruction are provided. According to one set of embodiments, a computer system can...
US-1,040,3029 Methods and systems for multistage post-rendering image transformation
Systems and methods for multistage post-rendering image transformation are provided. The system may include a transform generation module arranged to...
US-1,040,2930 Management of graphics processing units in a cloud platform
A graphics rendering system is provided for controlling the rendering of images to manage expected errors. The graphics rendering system receives a...
US-1,040,2863 Usability of supplemental application functions through dynamic modification of user-presented options
A function intelligence engine receives input regarding application program content, including functions or capabilities of the application program that can be...
US-1,040,2783 Method of automatically re-organizing structured data in a reporting system based on screen size by executing...
A method of automatically re-organizing structured data in a reporting system based on screen size calculated an initial layout for data containers in a report,...
US-1,040,2718 Assignation of emotional states to computer-implemented entities
Described herein are various technologies pertaining to assigning an emotional state to a computer-implemented entity. The emotional state is a function of data...
US-1,040,2647 Adapted user interface for surfacing contextual analysis of content
Non-limiting examples of the present disclosure describe surfacing of contextual suggestions for image content within an applications/service, a non-limiting...
US-1,040,2642 Automatically converting ink strokes into graphical objects
A system for automatically converting hand-drawn shapes into graphical objects is provided. In aspects, a user's intention to convert a hand-drawn shape into a...
US-1,040,2567 Secure boot for multi-core processor
The disclosed technology is generally directed to a secure boot mechanism for a multi-core system. In some examples, multiple execution environments may be...
US-1,040,2487 Creation of notecard items and association with digital documents
Non-limiting examples of the present disclosure relate to creation and management of exemplary notecard items that are reusable in different contexts and across...
US-1,040,2470 Effecting multi-step operations in an application in response to direct manipulation of a selected object
An electronic document having a current layout can be presented in an application user interface. Based on a detected interaction with an object in the...
US-1,040,2446 Image entity recognition and response
Systems and methods for responding to an image query from a computer user are provided. According to the disclosed subject matter, in response to receiving an...
US-1,040,2442 Semantic search interface for data collections
Described herein are technologies pertaining to automatically summarizing contents of a dataset and visualizing a summary of the dataset together with summaries...
US-1,040,2435 Utilizing semantic hierarchies to process free-form text
User feedback may be analyzed with semantic hierarchies. In some instances, the user feedback includes free-form text. The user feedback may be mapped to one or...
US-1,040,2417 Synthesizing data sources
In example embodiments, a machine accesses metadata items from multiple different sources associated with a user. The machine determines that metadata items...
US-1,040,2408 Versioning of inferred data in an enriched isolated collection of resources and relationships
Systems and methods that control versioning of inferred data in isolated collections representing resources and relationships between those resources. Multiple...
US-1,040,2403 Utilization of probabilistic characteristics for reduction of graph database traversals
Traversing data stored in a relational graph by utilization of probabilistic characteristics associated with the graph nodes is disclosed. When a user submits a...
US-1,040,2396 Online fraud detection system in an electronic content exchange
Techniques for identifying fraudulent entities is provided. Tracking data is received for displayed content items and is associated with one or more entities....
US-1,040,2375 Cloud content states framework
A cloud content states framework is described herein. In implementations, a framework is configured to perform operations for management of cloud content files...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.