Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: microsoft





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,161,200 Managing network data transfers in view of multiple data usage plans
Embodiments manage data transfers using a plurality of data usage plans available to a computing device. Each of the data usage plans has data usage statistics...
US-9,161,085 Adaptive timeline views of data
Concepts and technologies are described herein for providing adaptive timeline views of data. In accordance with the concepts and technologies disclosed herein,...
US-9,161,034 Scalable multi-thread video decoding
Decoding tasks are identified for decoding encoded video. Decoding tasks may include entropy decoding tasks, motion compensation tasks, inverse frequency...
US-9,161,012 Video compression using virtual skeleton
Optical sensor information captured via one or more optical sensors imaging a scene that includes a human subject is received by a computing device. The optical...
US-9,161,007 Automated story generation
Automatic story production is implemented by the utilization of theme scripts with user assets to generate a quality finished product with minimum user input or...
US-9,160,966 Imaging through a display screen
The described implementations relate to enhancement images, such as in videoconferencing scenarios. One system includes a poriferous display screen having...
US-9,160,960 Video preview based browsing user interface
A first video preview corresponding to a first video program is played back. When it is time to transition from playing back the first video preview to playing...
US-9,160,932 Fast gating photosurface
An embodiment of the invention provides a camera comprising a photosurface having a substrate comprising photopixels and associated storage pixels and a...
US-9,160,805 Proxy-based cache content distribution and affinity
A distributed caching hierarchy that includes multiple edge routing servers, at least some of which receiving content requests from client computing systems via...
US-9,160,794 Network address translators (NAT) type detection techniques
Techniques described herein enable peers to determine each peer's NAT type much more efficiently and quickly than when compared with existing techniques. To do...
US-9,160,775 Active speaker identification
Procedures for identifying clients in an audio event are described. In an example, a media server may order clients providing audio based on the input level. An...
US-9,160,740 Establishing secure, mutually authenticated communication credentials
Establishing secure, mutually authenticated communication between a trusted network and a perimeter network. Servers on the perimeter network may be securely...
US-9,160,738 Delegation-based authorization
Delegation-based authorization is described. In one example, a reference monitor receives from a first entity a request and a credential statement comprising a...
US-9,160,737 Statistical security for anonymous mesh-up oriented online services
Web pages and applications commonly consume functionality provided by services to provide users with a rich experience. For example, a backend mapping service...
US-9,160,735 System for and method of securing a network utilizing credentials
A system for and method of securing a network are described herein. A receiving device listens for packets with proper credentials. If a transmitting device...
US-9,160,528 Distributed single sign on technologies including privacy protection and proactive updating
Technologies for distributed single sign-on operable to provide user access to a plurality of services via authentication to a single entity. The distributed...
US-9,159,296 Synchronizing views during document presentation
An application synchronizes views during document presentation. The application detects a selection of a section of a portion of presented content at a...
US-9,159,238 Location-aware selection of public transportation
A mobile device such as a mobile phone, smart phone, personal music player, handheld game device and the like that is configured to be location-aware through...
US-9,159,151 Bringing a visual representation to life via learned input from the user
Data captured with respect to a human may be analyzed and applied to a visual representation of a user such that the visual representation begins to reflect the...
US-9,159,140 Signal analysis for repetition detection and analysis
Techniques described herein use signal analysis to detect and analyze repetitive user motion that is captured in a 3D image. The repetitive motion could be the...
US-9,159,036 Embedded gamer card across multiple devices and networks
A gamercard associated with an integrated gamer profile to identify a gamer is provided to the gamer and other PC/console users who also participate in other...
US-9,159,031 Predicting audience response for scripting
Various technologies described herein pertain to automatic prediction of an anticipated audience response for scripting. A sub-document unit can be received,...
US-9,159,003 Optimized font subsetting for a print path
Subject matter described herein is directed to providing font-rendering information (e.g., XPS file) that is usable to print a document. For example, a font...
US-9,158,935 Automatic mediation of resource access in mobile applications
The subject disclosure is directed towards automated, static analysis-based program code processing that detects unprotected resource accesses by applications,...
US-9,158,925 Server-aided private set intersection (PSI) with data transfer
Existing private set intersection (PSI) protocol allows two parties to find intersection of their sets, but restricts learning any other information about each...
US-9,158,919 Threat level assessment of applications
An application safety system is described herein that provides a scoring system of how dangerous an application is based on behavioral inspection of the...
US-9,158,900 Dynamic selection of authorization processes
Systems, methods, and software are disclosed herein for licensing applications using a preferred authorization process dynamically identified based on...
US-9,158,846 Entity detection and extraction for entity cards
A system and method are provided for detecting entity information contained within search results. The detected entity information can be used to determine a...
US-9,158,816 Event processing with XML query based on reusable XML query template
Methods, systems, and computer-readable media are disclosed for event processing with a query based on a reusable XML query template. A particular method...
US-9,158,813 Relaxation for structured queries
A structured query may specify attribute values for attributes. An estimate of the number of items that will match the structured query if it is applied to a...
US-9,158,809 Grid queries
Aspects of the subject matter described herein relate to grid queries. In aspects, a client sends search criteria that represent two or more dimensions to a...
US-9,158,767 Lock-free indexing of documents
Methods and systems for serving documents are provided. Documents may be served to users, for example, in response to search query inputs. Documents may be...
US-9,158,758 Retrieval of prefix completions by way of walking nodes of a trie data structure
Technologies pertaining to providing completions to proffered prefixes are disclosed herein. A suggested completion to a proffered prefix is retrieved by...
US-9,158,699 Memory management techniques
Memory management techniques that permit an executing process to store content in memory and later retrieve that content from the memory, but that also permit a...
US-9,158,659 Module specific tracing in a shared module environment
A module-specific tracing mechanism may trace the usage of a module on behalf of the module developer. The module may be used by multiple application...
US-9,158,649 Methods and computer program products for generating a model of network application health
Provided are methods and computer program products for generating a model of network application health. Methods may include receiving activity data that...
US-9,158,610 Fault tolerance for tasks using stages to manage dependencies
A high availability system has an application server communicatively coupled to one or more client machines through a network utilizing stateless communication...
US-9,158,605 Method, system and device for validating repair files and repairing corrupt software
A system and method for repairing corrupt software components of a computer system. Corrupt software is detected and repaired utilizing an automated component...
US-9,158,597 Controlling access to shared resource by issuing tickets to plurality of execution units
Access to a shared resource by a plurality of execution units is organized and controlled by issuing tickets to each execution unit as they request access to...
US-9,158,563 Dynamic plugin(s) for cloud application(s)
Techniques are described herein that are capable of dynamically installing plugin(s) for application(s). An agent plugin is caused to run in a deployment of a...
US-9,158,559 Roaming of note-taking application features
Methods are disclosed for managing configuration variables and settings within a note-taking application such that application features are adjusted globally...
US-9,158,557 Method of deriving web service interfaces from form and table metadata
A system and method of deriving web service interfaces from form and table metadata is disclosed. The method uses a discovery subsystem to discover services...
US-9,158,515 Control flow graph application configuration
An operating system may be configured using a control flow graph that defines relationships between each executable module. The operating system may be...
US-9,158,505 Specifying compiled language code in line with markup language code
Compiled language code is specified in line with markup language code. A parsing component parses the code to extract the compiled language code and a compiler...
US-9,158,445 Managing an immersive interface in a multi-application immersive environment
This document describes techniques and apparatuses for managing an immersive interface in a multi-application immersive environment. In some embodiments, these...
US-9,158,430 Target element zoom
Various embodiments provide a target element zoom component that is configured to perform a focal point zoom operation on a target element using an appropriate...
US-9,158,384 Flexible hinge protrusion attachment
Flexible hinge and removable attachment techniques are described. In one or more implementations, a flexible hinge is configured to communicatively and...
US-9,158,383 Force concentrator
Force concentrator techniques are described. In one or more implementations, a pressure sensitive key includes a sensor substrate having a plurality of...
US-9,158,331 On-demand scalable timer wheel
Various embodiments enable on-demand scaling of a timer wheel. Some embodiments dynamically start and stop a timer wheel based, at least in part, on whether the...
US-D740,843 Display screen with graphical user interface
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.