Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: microsoft





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,106,650 User-driven access control
An access system is described herein which allows an application module to access a user-owned resource based on an indication of a user's intent to interact...
US-9,106,639 WiMAX R6 management protocol
Within an access services network (ASN) operable for providing wireless access services to an access terminal and including a base station communicatively...
US-9,106,634 Resource protection on un-trusted devices
Authenticating a user to a first service to allow the user to access a resource provided by the first service. The resource is a protected resource requiring a...
US-9,106,629 Distributed algorithm for changing a shared value
Each member of a group contributes to and calculates a new shared value. A distributed shared value algorithm is used to reach unanimous agreement on a shared...
US-9,106,513 Unified communication aware networks
Unified Communication and Collaboration (UC&C) systems are enabled to dynamically enlighten a set of network elements (NEs) and/or network infrastructure with...
US-9,106,492 Digital receiver
A receiver and method is provided for sigma-delta converting an RF signal to a digital signal and downconverting to a digital baseband signal. The RF signal is...
US-9,106,480 Performing computations in a distributed infrastructure
The present invention extends to methods, systems, and computer program products for performing computations in a distributed infrastructure. Embodiments of the...
US-9,106,436 Home networking web-based service portal
A web-based service portal provides a user interface to configure and/or access device(s) of a home network. The service portal can communicate with device(s)...
US-9,106,433 Predicting degradation of a communication channel below a threshold based on data transmission errors
Applicants have discovered that error detection techniques, such as Forward Error Correction techniques, may be used to predict the degradation below a certain...
US-9,106,216 Programmable pulse generation
An electronic device includes a configurable pulse generator configured to generate a programmable master pulse train. One or more functional circuits of the...
US-9,105,986 Closely spaced antennas isolated through different modes
Multi-antenna systems, including mobile devices having multiple antennas, are provided herein. A first antenna and a second antenna are operable at two or more...
US-9,105,271 Complex-transform channel coding with extended-band frequency coding
An audio encoder receives multi-channel audio data comprising a group of plural source channels and performs channel extension coding, which comprises encoding...
US-9,105,262 Audio output of a document from mobile device
Architecture for playing a document converted into an audio format to a user of an audio-output capable device. The user can interact with the device to control...
US-9,105,210 Multi-node poster location
A system for identifying an AR tag and determining a location for a virtual object within an augmented reality environment corresponding with the AR tag is...
US-9,105,031 Authentication mechanisms for wireless networks
Security techniques and security mechanisms for wireless networks that transmit content such as advertisements. According to exemplary techniques, control...
US-9,105,009 Email-based automated recovery action in a hosted environment
Email-based recovery actions may be provided. A request from a user to perform an action may be received. If the user is determined not to have permission to...
US-9,104,992 Business application publication
A data marketplace infrastructure provides a crowd sourcing solution to development, discovery and publication of decision applications. Applications can be...
US-9,104,989 Priority and cost based deadlock victim selection via static wait-for graph
Systems and methods that enable resolving deadlock cycles by victim selection based on cost and/or priority of strongly connected components in a static...
US-9,104,979 Entity recognition using probabilities for out-of-collection data
A classifier that disambiguates among entities based on a dictionary, such as corpus of documents about those entities, is built by incorporating probabilities...
US-9,104,978 System and method for parameter evaluation
The described implementations relate to machine learning. One implementation provides a technique involving logging data that includes outcomes and values of...
US-9,104,961 Modeling a data generating process using dyadic Bayesian models
There is provided a method and system for modeling a data generating process. The method includes generating a dyadic Bayesian model including a pair of...
US-9,104,960 Click prediction using bin counting
Methods, systems, and computer-storage media having computer-usable instructions embodied thereon for calculating event probabilities are provided. The event...
US-9,104,893 Rule based access for removable storage
Various techniques and solutions are described for rule-based access to removable storage devices. For example, a request can be received to perform a file...
US-9,104,857 Gesture-based authentication without retained credentialing gestures
This document describes techniques and apparatuses enabling gesture-based authentication without retained credentialing gestures. The techniques are capable of...
US-9,104,846 Access provisioning via communication applications
Described herein is technology for, among other things, provisioning access to shared resources. It involves various techniques for creating accounts for...
US-9,104,794 Automatic incremental application dependency discovery through code instrumentation
Disclosed is a method allowing the automatic discovery of application component dependencies by tracing application calls to dependant resources. The call...
US-9,104,787 Augmenting search results with relevant third-party application content
Methods, computer systems, and computer-storage media are provided for augmenting Web-based search results with relevant content received from third-party...
US-9,104,781 Obtaining metadata set by imperative statement
Aspects of the subject matter described herein relate to imperative attribution. In aspects, metadata of a managed runtime environment may be set by imperative...
US-9,104,773 Finding and consuming web subscriptions in a web browser
A content syndication platform, such as a web content syndication platform, manages, organizes and makes available for consumption content that is acquired from...
US-9,104,751 Supplemental search results having social connection endorsement data on a SERP
Systems, methods, and computer-readable storage media for presenting supplemental search results having indications that identified documents have been endorsed...
US-9,104,748 Providing a search service including updating aspects of a document using a configurable schema
Embodiments provide indexing and searching features including the use of a configurable schema as part of providing partial update support of one or more...
US-9,104,737 Social distance based search result order adjustment
Both search criteria and a friends list associated with a user are obtained. One or more data items that satisfy the search criteria are identified as search...
US-9,104,733 Web search ranking
A computer-implemented method and system for Web search ranking are provided herein. The method includes generating a number of training samples from...
US-9,104,715 Shared data collections
A data sharing mechanism may allow programs to share access to data collections. The mechanisms that implement the sharing may allow programs written in any...
US-9,104,628 Array object concurrency in STM
A software transactional memory system is provided that creates an array of transactional locks for each array object that is accessed by transactions. The...
US-9,104,594 Operational efficiency of virtual TLBs
Various mechanisms are disclosed for improving the operational efficiency of a virtual translation look-aside buffer (TLB) in a virtual machine environment. For...
US-9,104,563 Self-tuning statistical resource leak detection
Self-tuned detection of memory leaks or other resource leaks is described. Sample size and sample rate are set manually or computationally selected. Self-tuning...
US-9,104,561 Failure mode identification and reporting
When a software component is starting (305), such as but not limited to a task or a subtask, the component pushes (310) its identification (ID) onto a stack....
US-9,104,534 Abstracting programmatic representation of data storage systems
Providing for a paradigm shift in block-level abstraction for storage devices is described herein. At a block-level, storage is characterized as a variable size...
US-9,104,528 Controlling the release of private information using static flow analysis
A privacy control system is described herein for controlling dissemination of private information by a program. The privacy control system operates by...
US-9,104,527 Automatically generated style rules for page design
The automated derivation of style rules based on authored style rules. Style rules are used to apply styles to certain elements of a markup language document....
US-9,104,525 API usage pattern mining
Techniques for mining API method usage patterns from source code are described. These techniques include parsing the source code to generate API method call...
US-9,104,452 Hybrid remote sessions
High Fidelity remoting can be enabled by loading a hybrid remote session in a computer system. The hybrid remote session can include components loaded in a...
US-9,104,440 Multi-application environment
This document describes techniques and apparatuses enabling a multi-application environment. In some embodiments, these techniques and apparatuses enable...
US-9,104,434 Property accesses in dynamically typed programming languages
A code generator may emit a direct access code for accessing a property of an object under conditions which promote type safety in a dynamically typed...
US-9,104,406 Network presence offloads to network interface
A computing device that has a network interface that performs a subset of possible networking functions while the computing device is in a sleep mode. The...
US-9,104,307 Multi-application environment
This document describes techniques and apparatuses enabling a multi-application environment. In some embodiments, these techniques and apparatuses enable...
US-9,104,252 Assignment of control of peripherals of a computing device
Techniques for enabling software-assisted assignment of control of peripherals (e.g., assigning ownership of or assigning access to the peripherals) by a...
US-9,104,231 Mood-actuated device
This document describes techniques and apparatuses for implementing a mood-actuated device. In various embodiments, mood information corresponding to a current...
US-9,100,685 Determining audience state or interest using passive sensor data
This document describes techniques and apparatuses for determining an audience's state or interest using passive sensor data. The techniques receive sensor data...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.