1
Scott B Guthery: Integrated circuit devices with steganographic authentication, and steganographic authentication methods. Microsoft Corporation, Lee & Haynes PLLC, August 17, 2004: US06779112 (16 worldwide citation)

This invention concerns an integrated circuit (IC) device, such as smart cards, electronic wallets, PC cards, and the like, and various methods for steganographically authenticating identities and authorizing transactions based on the authenticated identities. The IC device has a memory and a proces ...


2
Dmitry V Starostin, Joris Claessens, Alexey Orlov: Information rights management. Microsoft Corporation, Lee & Haynes PLLC, March 22, 2011: US07913309 (15 worldwide citation)

Information rights management (IRM) systems enable information to be protected after it has been accessed by or delivered to an authorized individual. For example, this might be to allow an email to be viewed for a limited time by specified individuals but to prevent that email from being forwarded. ...


3
Surajit Chaudhuri, Arnd Christian Konig, Vivek R Narasayya: Dynamic physical database design. Microsoft Corporation, Lee & Haynes PLLC, January 27, 2009: US07483918 (9 worldwide citation)

A monitoring component of a database server collects a subset of a query workload along with related statistics. A remote index tuning component uses the workload subset and related statistics to determine a physical design that minimizes the cost of executing queries in the workload subset while en ...


4
Derek Murman, Edward H Wayt, Jeffrey Bisset, Jing Wu, Kim Cameron, Max L Benson, Jie Liu: Preview mode. Microsoft Corporation, Lee & Haynes PLLC, August 14, 2007: US07257603 (7 worldwide citation)

Various exemplary metadirectories, systems and/or methods include or allow for executing a software module on an execution engine, emitting semantic information based on the executing, and analyzing the executing using the semantic information. An exemplary execution engine includes an input for rec ...


5
Robert L Beck, Kevin Sullivan: Character position-based password recovery. Microsoft Corporation, Lee & Haynes PLLC, November 9, 2010: US07831836 (4 worldwide citation)

A password recovery technique includes generating words by sequentially selecting a character for each character position of the word from a character string. The order of the characters in the character string is individually selected for each position of the word. Each sequentially generated word ...


6
Yuen Yu Leung, Shaun D Pierce: System and method for encapsulating legacy data transport protocols for IEEE 1394 serial bus. Microsoft Corporation, Lee & Haynes PLLC, March 14, 2000: US06038628 (4 worldwide citation)

A data transfer protocol encapsulates legacy transport protocols (e.g., TCP/IP, UDP/IP, IPX/SPX, etc.) for transfer of data over a memory mapped, high-speed serial bus conforming to the IEEE 1394 standard. The data transfer protocol is implemented as a databus manager layer interposed between the 13 ...


7
Thomas C Stickle: Validating machine images. Amazon Technologies, Lee & Haynes PLLC, April 14, 2015: US09009840 (4 worldwide citation)

In a resource-on-demand environment, virtual machine images are validated before use. A provider or source of a virtual machine image may generate a manifest, indicating executable components of the machine image. Before use, a created virtual machine may compare its executable components with those ...


8
Jeffrey B Smith, Michael L Eberle: Collect callback. dX dY Voice Processing, Lee & Haynes PLLC, October 3, 2006: US07116768 (2 worldwide citation)

In an implementation of collect callback, a call-in service establishes a communication link with a caller and initiates a collect callback option for the caller. A switch receives callback data from the call-in service and utilizes the callback data to establish a collect call via a second communic ...


9
Jiahe Helen Wang, Alexander Moshchuk: Access control in a multi-principal browser. Microsoft Corporation, Lee & Haynes PLLC, September 11, 2012: US08266714 (2 worldwide citation)

A principal operating system based-browser controls access to resources. The resources are represented semantically in a resource object model. A browser kernel of the browser mediates resources access calls from principals. In some implementations the principals are web entities and the resources a ...


10
Shan He, Darko Kirovski: Visual perception model for hi-fidelity image watermarking. Microsoft Corporation, Lee & Haynes PLLC, May 18, 2010: US07720253 (1 worldwide citation)

Exemplary systems and methods implement an exemplary visual perception model. This model can be implemented in such applications as imaging, compression, denoising, annotation of hi-fidelity images, etc. In one implementation a perceptual filter estimates an entropy statistic and a standard deviatio ...



Click the thumbnails below to visualize the patent trend.