Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: microsoft





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,104,893 Rule based access for removable storage
Various techniques and solutions are described for rule-based access to removable storage devices. For example, a request can be received to perform a file...
US-9,104,857 Gesture-based authentication without retained credentialing gestures
This document describes techniques and apparatuses enabling gesture-based authentication without retained credentialing gestures. The techniques are capable of...
US-9,104,846 Access provisioning via communication applications
Described herein is technology for, among other things, provisioning access to shared resources. It involves various techniques for creating accounts for...
US-9,104,794 Automatic incremental application dependency discovery through code instrumentation
Disclosed is a method allowing the automatic discovery of application component dependencies by tracing application calls to dependant resources. The call...
US-9,104,787 Augmenting search results with relevant third-party application content
Methods, computer systems, and computer-storage media are provided for augmenting Web-based search results with relevant content received from third-party...
US-9,104,781 Obtaining metadata set by imperative statement
Aspects of the subject matter described herein relate to imperative attribution. In aspects, metadata of a managed runtime environment may be set by imperative...
US-9,104,773 Finding and consuming web subscriptions in a web browser
A content syndication platform, such as a web content syndication platform, manages, organizes and makes available for consumption content that is acquired from...
US-9,104,751 Supplemental search results having social connection endorsement data on a SERP
Systems, methods, and computer-readable storage media for presenting supplemental search results having indications that identified documents have been endorsed...
US-9,104,748 Providing a search service including updating aspects of a document using a configurable schema
Embodiments provide indexing and searching features including the use of a configurable schema as part of providing partial update support of one or more...
US-9,104,737 Social distance based search result order adjustment
Both search criteria and a friends list associated with a user are obtained. One or more data items that satisfy the search criteria are identified as search...
US-9,104,733 Web search ranking
A computer-implemented method and system for Web search ranking are provided herein. The method includes generating a number of training samples from...
US-9,104,715 Shared data collections
A data sharing mechanism may allow programs to share access to data collections. The mechanisms that implement the sharing may allow programs written in any...
US-9,104,628 Array object concurrency in STM
A software transactional memory system is provided that creates an array of transactional locks for each array object that is accessed by transactions. The...
US-9,104,594 Operational efficiency of virtual TLBs
Various mechanisms are disclosed for improving the operational efficiency of a virtual translation look-aside buffer (TLB) in a virtual machine environment. For...
US-9,104,563 Self-tuning statistical resource leak detection
Self-tuned detection of memory leaks or other resource leaks is described. Sample size and sample rate are set manually or computationally selected. Self-tuning...
US-9,104,561 Failure mode identification and reporting
When a software component is starting (305), such as but not limited to a task or a subtask, the component pushes (310) its identification (ID) onto a stack....
US-9,104,534 Abstracting programmatic representation of data storage systems
Providing for a paradigm shift in block-level abstraction for storage devices is described herein. At a block-level, storage is characterized as a variable size...
US-9,104,528 Controlling the release of private information using static flow analysis
A privacy control system is described herein for controlling dissemination of private information by a program. The privacy control system operates by...
US-9,104,527 Automatically generated style rules for page design
The automated derivation of style rules based on authored style rules. Style rules are used to apply styles to certain elements of a markup language document....
US-9,104,525 API usage pattern mining
Techniques for mining API method usage patterns from source code are described. These techniques include parsing the source code to generate API method call...
US-9,104,452 Hybrid remote sessions
High Fidelity remoting can be enabled by loading a hybrid remote session in a computer system. The hybrid remote session can include components loaded in a...
US-9,104,440 Multi-application environment
This document describes techniques and apparatuses enabling a multi-application environment. In some embodiments, these techniques and apparatuses enable...
US-9,104,434 Property accesses in dynamically typed programming languages
A code generator may emit a direct access code for accessing a property of an object under conditions which promote type safety in a dynamically typed...
US-9,104,406 Network presence offloads to network interface
A computing device that has a network interface that performs a subset of possible networking functions while the computing device is in a sleep mode. The...
US-9,104,307 Multi-application environment
This document describes techniques and apparatuses enabling a multi-application environment. In some embodiments, these techniques and apparatuses enable...
US-9,104,252 Assignment of control of peripherals of a computing device
Techniques for enabling software-assisted assignment of control of peripherals (e.g., assigning ownership of or assigning access to the peripherals) by a...
US-9,104,231 Mood-actuated device
This document describes techniques and apparatuses for implementing a mood-actuated device. In various embodiments, mood information corresponding to a current...
US-9,100,685 Determining audience state or interest using passive sensor data
This document describes techniques and apparatuses for determining an audience's state or interest using passive sensor data. The techniques receive sensor data...
US-9,100,667 Life streaming
A system and method for analyzing, summarizing, and transmitting life experiences captured using a life recorder is described. A life recorder is a recording...
US-9,100,581 Time interleaved exposures and multiplexed illumination
Samples of a scene are acquired in synchronization with finely interleaved varying conditions such as lighting, aperture, focal length, and so forth. A...
US-9,100,488 Using physical gestures to initiate call transfers between devices
Various technologies described herein pertain to using detected physical gestures to cause calls to transfer between client devices. A physical gesture between...
US-9,100,410 Selective use of shared memory for remote desktop application
A method includes determining if a server supporting an application and a client having remote desktop access to the server are on a same physical computing...
US-9,100,402 Cognitive agent
Aspects relate to a cognitive agent that performs functions associated with a desired result. The functions performed by cognitive agent supplement other...
US-9,099,100 Determining an identification of a disc based on a format of the disc
A system, method, and computer-readable storage media for disc identification are disclosed. A first disc format may be identified by matching a sequence of...
US-9,099,083 Kernel deep convex networks and end-to-end learning
Data associated with spoken language may be obtained. An analysis of the obtained data may be initiated for understanding of the spoken language using a deep...
US-9,098,945 Modeling anisotropic surface reflectance with microfacet synthesis
Described is a search technology in which spatially varying anisotropic reflectance is modeled using image data captured from a single view. Reflectance at each...
US-9,098,908 Generating a depth map
Methods and systems for generating a depth map are provided. The method includes projecting an infrared (IR) dot pattern onto a scene. The method also includes...
US-9,098,873 Motion-based interactive shopping environment
An on-screen shopping application which reacts to a human target user's motions to provide a shopping experience to the user is provided. A tracking system...
US-9,098,859 Bringing achievements to an offline world
An achievement system tracks users' offline activities and awards achievements to users for participation in particular offline activities. The achievements...
US-9,098,837 Side-by-side shared calendars
Methods and systems are provided for presenting a plurality of shared calendars in a single electronic display frame or window where each of the plurality of...
US-9,098,836 Rich email attachment presentation
One or more techniques and/or systems are disclosed for providing a rich email experience for an email with an attachment. Intention metadata that is associated...
US-9,098,812 Faster minimum error rate training for weighted linear models
The claimed subject matter provides systems and/or methods for training feature weights in a statistical machine translation model. The system can include...
US-9,098,702 Controlling malicious activity detection using behavioral models
Systems, methods, and computer program products are described for controlling malicious activity detection with respect to information technology assets based...
US-9,098,689 Efficiently throttling user authentication
In an embodiment, an administrative computer system receives user login credentials from a user and makes at least one of the following determinations: that the...
US-9,098,621 Modeling software behavior using learned predicates
The described implementations relate to analysis of computing programs. One implementation provides a technique that can include accessing values of input...
US-9,098,609 Health monitoring of applications in a guest partition
A health monitoring technique monitors the health and performance of applications executing in a guest partition in a virtualized environment. In an embodiment,...
US-9,098,556 Indexing and searching dynamically changing search corpora
Tools and techniques for indexing and searching dynamically changing search corpora are provided. These tools may receive requests to upload documents over a...
US-9,098,541 Semantic user profiles for targeting user segments
Embodiments facilitate greater flexibility in definition of user segments for targeted advertising, by employing indexed semantic user profiles. Semantic user...
US-9,098,533 Voice directed context sensitive visual search
Various technologies described herein pertain to voice directed context sensitive visual searching. Visual content can be rendered on a display, and a voice...
US-9,098,494 Building multi-language processes from existing single-language processes
Processes capable of accepting linguistic input in one or more languages are generated by re-using existing linguistic components associated with a different...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.