Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: microsoft





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,040,2311 Code review rebase diffing
Various embodiments of the present technology generally relate to smarter code review tools. More specifically, some embodiments relate to code review tools...
US-1,040,2301 Cloud validation as a service
Described technologies facilitate cloud validation using validation as a service (VaaS). A cloud validation service provider acquires and securely stores...
US-1,040,2299 Configuring usage events that affect analytics of usage information
Collected usage information relating to interaction with content is integrated with operation of a system, such as a content management system. The usage...
US-1,040,2290 Using a pre-installation environment to debug a server without a functioning operating system
remote server machine, without an accessible operating system, is identified. A management computing system sends, to the remote server machine to be tested, a...
US-1,040,2273 IoT device update failure recovery
The disclosed technology is generally directed to IoT device update failure recovery. In one example of the technology, after writing an updated release to...
US-1,040,2258 Error handling during onboarding of a service
Described herein are techniques and systems for monitoring onboarding engagement sessions and storing onboarding information associated with completion of the...
US-1,040,2257 Issue detection and signature generation
A problem with a computing system is detected, a root cause is identified and a solution is also identified. Diagnostic data is obtained and an issue signature...
US-1,040,2244 Detection of abnormal resource usage in a data center
A system for identifying abnormal resource usage in a data center is provided. In some embodiments, the system employs a prediction model for each of a...
US-1,040,2237 Enhanced notifications
A facility for providing enhanced time-sensitive notifications on an electronic device is described. In some such notifications, the facility replaces an icon...
US-1,040,2208 Adaptive portable libraries
Platform-agnostic source code can be augmented with one or more portions of source code annotated for different platforms and/or versions. The source code...
US-1,040,2182 Satisfying application dependencies
The dependencies of an application are identified by intercepting application programming interface calls made by an application. A determination is then made...
US-1,040,2061 Productivity tools for content authoring
An assisted content authoring productivity tool can provide a set of content related to at least one topic determined from a user's expression of intent. The...
US-1,040,2034 Adaptive user interface pane manager
Embodiments of a system for automatically managing panes in relation to the application canvas in a user interface. The system includes a pane manager that...
US-1,040,1956 Infrared eye-tracking in high ambient light conditions
An eye-tracking system comprises one or more optical sources configured to emit infrared light with a narrow spectral linewidth toward an eye of a user and one...
US-1,040,1934 Process-level activity tagging
Embodiments relate to enabling software to interface with a power consumption telemetry system. A process may have tagging instructions that interface with an...
US-1,039,7661 Video frame selection for targeted content
Systems, methods, and computer-readable storage media are provided for providing target content, such as advertisements, based on one or more selected video...
US-1,039,7546 Range imaging
Apparatus for controlling a plurality of active illumination range cameras to operate in a time division multiplexed operating mode to acquire range images of...
US-1,039,7395 Departure or entry intent-based reminders
Intent-based reminders are provided. A user is enabled to initiate a reminder request based on an intent to enter or leave a given location. In a geofence...
US-1,039,7364 Skills endorsements
Disclosed in some examples is a method comprising determining a first set of high ranking skills, the first set containing skills possessed by a member of the...
US-1,039,7287 Audio data transmission using frequency hopping
A method includes obtaining data representing multiple characters, determining a code for each character wherein each code corresponds to a different audio...
US-1,039,7258 Continuous learning for intrusion detection
Balancing the observed signals used to train network intrusion detection models allows for a more accurate allocation of computing resources to defend the...
US-1,039,7256 Spam classification system based on network flow data
In an example embodiment, a computer-implemented method comprises obtaining labels from messages associated with an email service provider, wherein the labels...
US-1,039,7199 Integrated consent system
A system for creating an account with an identity provider. The system receives a request to create an identity provider account with the identity provider for...
US-1,039,7046 Contextual state-based user interface notification triggering
Triggering of user interface notifications can be managed for a plurality of computer applications via a digital assistant, which can include a notification...
US-1,039,6991 Controlling verification of key-value stores
Deferred verification of the integrity of data operations over a set of data that is hosted at an untrusted module (UM) is controlled. The controlling includes...
US-1,039,6315 Hollow-core rolled-electrode battery cell
A flexible, jelly-roll type battery cell with a hollow core is disclosed. The battery cell includes a pair of electrodes wound together around a hollow core, a...
US-1,039,5646 Two-stage training of a spoken dialogue system
Described herein are systems and methods for two-stage training of a spoken dialog system. The first stage trains a policy network using external data to...
US-1,039,5418 Techniques for predictive prioritization of image portions in processing graphics
Examples described herein generally relate to prioritizing portions of images for rendering in a computing device. A probability field for prioritizing portions...
US-1,039,5412 Morphing chart animations in a browser
Morphing animations between arbitrary chart states in a web client application are provided. A morphing animation engine interpolates changes between a first...
US-1,039,5260 Federation of content items in a social network based on personalized relevance
A system and method for the federation of content items of a social network based on personalized relevance includes obtaining content items from first and...
US-1,039,5177 Optimized execution order correlation with production listing order
Optimized execution order results (e.g., from a Rete algorithm graph) are correlated with a production ordering selected by a user, thereby more accurately...
US-1,039,5138 Image segmentation using user input speed
An image segmentation apparatus comprises a processor which receives user input specifying a boundary of a region of interest of an image. The processor...
US-1,039,5060 Multiple message retrieval for secure electronic communication
Techniques for multiple message retrieval for secure electronic communication are described. The techniques, for instance, utilize a server and computing...
US-1,039,4957 Signal analysis in a conversational scheduling assistant computing system
A software agent, that is used to assist in providing a service, receives communications from a set of users that are attempting to use the software agent. The...
US-1,039,4949 Deconstructing documents into component blocks for reuse in productivity applications
Documents can be deconstructed into component blocks for reuse in productivity applications using a document shredder. The document shredder can identify...
US-1,039,4941 Collaborative authoring
A collaborative authoring application provides an authoring environment in which two or more users can edit a document concurrently. Each user edits a copy of...
US-1,039,4921 Career path navigation
In various example embodiments, a system and method for career path navigation are presented. A request to identify a set of positions sequentially related to...
US-1,039,4916 Personalized search environment
Technologies are described to provide a personalized search environment to users without requiring enterprise environment access. Upon access of a personal...
US-1,039,4874 Syntactic profiling of alphanumeric strings
A computing device includes a storage machine holding instructions executable by a logic machine to generate multi-string clusters, each containing alphanumeric...
US-1,039,4827 Discovering enterprise content based on implicit and explicit signals
Recommending relevant content to a user based on personalized implicit and explicit activity signals aggregated for various content items is provided. A user is...
US-1,039,4815 Join with predictive granularity modification by example
A computing device is provided, comprising a processor configured to select at least one pair of columns. Each pair may include a source column of the first...
US-1,039,4768 Selective data migration on schema breaking changes
This disclosure describes converting data from a current data schema to an updated data schema in response to an application being updated. More specifically,...
US-1,039,4757 Scalable chunk store for data deduplication
Data streams may be stored in a chunk store in the form of stream maps and data chunks. Data chunks corresponding to a data stream may be stored in a chunk...
US-1,039,4717 Central processing unit cache friendly multithreaded allocation
A cluster allocation bitmap determines which clusters in a band of storage remain unallocated. However, concurrent access to a cluster allocation bitmap can...
US-1,039,4680 Techniques for tracking graphics processing resource utilization
Examples described herein generally relate to reporting memory resource access by a graphics processing unit (GPU). A list of memory resources allocated for the...
US-1,039,4639 Detecting and surfacing user interactions
Incident information that describes a timing of an incident in a service, is received from a service. User activity information is received from a client system...
US-1,039,4633 On-demand or dynamic diagnostic and recovery operations in conjunction with a support service
An assistance service through its local client application or agent at a user's device hardware and software environment information and monitor a health of one...
US-1,039,4628 In-line event handlers across domains
Event handler records, for different event handlers in different domains, are stored in an event handler orchestrator service. The event handler records...
US-1,039,4625 Reactive coincidence
An outer event stream can be modeled to represent duration for an event with an inner event stream. The inner event stream can be generated to represent...
US-1,039,4585 Managing guest partition access to physical devices
A computing device includes a host, one or more guest partitions, and one or more physical devices. A physical device can be virtualized, at least in part, by...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.