Patents by Inventor Jason D. Walter

Jason D. Walter has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20130032363
    Abstract: A supplemental downforce system is shown for a ground working implement having a frame and a plurality of ground engaging row units movably mounted to the frame for up and down movement relative to the frame. The downforce system includes at least one actuator between the frame and each row unit to apply an up or down force to each row unit. The actuators are assigned to one group of at least two groups of actuators. A control system controls the down force applied by each group of actuators separately so that each group of actuators is given the amount of supplemental down force that group of row units needs. In a closed loop feedback system, at least one row unit in each group of row units is equipped with a load sensor so that feed back of the soil reaction force on the row unit is supplied to the control system.
    Type: Application
    Filed: August 1, 2011
    Publication date: February 7, 2013
    Inventors: KEITH A. CURRY, JASON D. WALTER, ANDREW C. DOCHTERMAN, MICHAEL E. FRASIER
  • Patent number: 8370902
    Abstract: Network entities controlling a set of nodes may vary by trustworthiness, such as tolerance for nodes that send spam, distribute malware, or perform denial-of-service attacks. A device receiving such activities may identify a trust rating of the network entity and apply appropriately stringent filtering (such as spam evaluation) to activities received from nodes controlled by the network entity. However, a poor trust rating of a network entity may subject a legitimate node controlled by the network entity to inefficiently or unfairly stringent activity filtering. Instead, the device may evaluate the activities of a particular node, assign a trust rating to the node, and if the trust rating of the node is higher than the trust rating of the network entity, apply less stringent activity filtering to the activities of the node, thereby “rescuing” the node from the more stringent activity filtering applied to the other nodes of the network entity.
    Type: Grant
    Filed: January 29, 2010
    Date of Patent: February 5, 2013
    Assignee: Microsoft Corporation
    Inventors: Malcolm H Davis, Aravind K Ramachandran, Geoffrey J Hulten, Ivan Osipkov, Milenko Drinic, Eliot C. Gillum, Krishna C. Vitaldevara, Jason D. Walter, Mehrdad Bidgoli, Robert L. McCann
  • Publication number: 20120290712
    Abstract: Techniques for account compromise detection are described. In one or more implementations, a usage pattern is established for a user account of a service provider, where the service provider is configured to provide a plurality of web services for access via a network and the usage pattern describes interaction with one or more of the plurality of web services. A deviation is detected in subsequent activity associated with the user account from the usage pattern and a determination is made as to whether compromise the user account is likely based at least in part on the detection.
    Type: Application
    Filed: May 13, 2011
    Publication date: November 15, 2012
    Applicant: MICROSOFT CORPORATION
    Inventors: Jason D. Walter, Krishna Vitaldevara, John D. Rodrigues
  • Publication number: 20120259929
    Abstract: Geo-data spam filters are described. In one or more implementations, origin data and language data of a message are evaluated to establish a score for the message indicating a likelihood that the message is spam. The evaluation includes comparing the origin data and the language data to ranked lists indicating message origins and languages with which a respective message recipient interacts positively and ranked lists indicating message origins and languages with which the respective recipient interacts negatively. Interactions of the respective recipient with previously sent messages may be tracked to form these lists. Based on the score established by evaluating the origin data and the language data of the message, the message is filtered for delivery.
    Type: Application
    Filed: April 11, 2011
    Publication date: October 11, 2012
    Applicant: MICROSOFT CORPORATION
    Inventors: Krishna Vitaldevara, Eliot C. Gillum, Jason D. Walter, Kevin H. Lau, Geoffrey J. Hulten
  • Publication number: 20120246720
    Abstract: Detection of user accounts associated with spammer attacks may be performed by constructing a social graph of email users. Biggest connected components (BCC) of the social graph may be used to identify legitimate user accounts, as the majority of the users in the biggest connected components are legitimate users. BCC users may be used to identify more legitimate users. Using degree-based detection techniques and PageRank based detection techniques, the hijacked user accounts and spammer user accounts may be identified. The users' email sending and receiving behaviors may also be examined, and the subgraph structure may be used to detect stealthy attackers. From the social graph analysis, legitimate user accounts, malicious user accounts, and compromised user accounts can be identified.
    Type: Application
    Filed: March 24, 2011
    Publication date: September 27, 2012
    Applicant: Microsoft Corporation
    Inventors: Yinglian Xie, Fang Yu, Martin Abadi, Eliot C. Gillum, Junxian Huang, Zhuoqing Morley Mao, Jason D. Walter, Krishna Vitaldevara
  • Patent number: 8255468
    Abstract: Methods for assisting email users manage email messages received in an email account. An event is triggered by an action performed by an email user with respect to an email message in an email account. The event identifies an entity associated with the email message (e.g., sender address, domain, keyword, etc.). A determination is made whether to assist the user manage their email based on a heuristic. The heuristic assigns weights based on prior events associated with the same entity to determine whether the user is interested in receiving emails from the sender. Based on the heuristics, the method may add the sender to the user's block-list or unsubscribe the user from a mailing list.
    Type: Grant
    Filed: February 11, 2009
    Date of Patent: August 28, 2012
    Assignee: Microsoft Corporation
    Inventors: Krishna C. Vitaldevara, Eliot C. Gillum, Jason D. Walter, Mehrdad Bidgoli
  • Patent number: 8195753
    Abstract: In a distributed email system, user preferences respected more effectively by presenting messages marked for deletion to secondary messaging servers having access to user preferences. Messages marked for deletion by inbound servers are presented to secondary level servers having access to user white lists and the choice of whether to delete the suspect message is made by the secondary server.
    Type: Grant
    Filed: January 7, 2009
    Date of Patent: June 5, 2012
    Assignee: Microsoft Corporation
    Inventors: Krishna C. Vitaldevara, Eliot C. Gillum, Jason D. Walter, Mehrdad Bidgoli
  • Publication number: 20120004768
    Abstract: A seeding apparatus and a method is disclosed in which a seed spacing variability value is determined and displayed to the operator during a planting operation. Any method of determining variability among a set of data can be used to determine the seed spacing variability value. Three examples are shown: standard deviation; coefficient of variation; and coefficient of uniformity. Data can be stored for later comparison with harvest yield data to determine the effects of seed spacing on yield.
    Type: Application
    Filed: November 5, 2010
    Publication date: January 5, 2012
    Inventors: John M. Schweitzer, Jason D. Walter, James R. Peterson
  • Publication number: 20110296524
    Abstract: Campaign detection techniques are described. In implementations, a signature is computed for each of a plurality of emails to be communicated by a service provider to respective intended recipients. A determination is made that two or more of the plurality of emails is similar based on the respective signatures. Responsive to a finding that a number of similar emails exceeds a threshold, an indication is output that the similar emails have a likelihood of being involved in a spam campaign.
    Type: Application
    Filed: May 27, 2010
    Publication date: December 1, 2011
    Applicant: Microsoft Corporation
    Inventors: Douglas J. Hines, Mihai Costea, Yuxiang Xu, Harsh S. Dangayach, Krishna Vitaldevara, Eliot C. Gillum, Jason D. Walter, Aleksander R. Kolcz
  • Publication number: 20110296003
    Abstract: User account behavior techniques are described. In implementations, a determination is made as to whether interaction with a service provider via a user account deviates from a model. The model is based on behavior that was previously observed as corresponding to the user account. Responsive to a determination that the interaction deviates from the model, the user account is flagged as being potentially compromised by a malicious party.
    Type: Application
    Filed: June 1, 2010
    Publication date: December 1, 2011
    Applicant: MICROSOFT CORPORATION
    Inventors: Robert L. McCann, Eliot C. Gillum, Krishna Vitaldevara, Jason D. Walter, Linda A. McColm, Ivan Osipkov
  • Patent number: 8065421
    Abstract: Publicly accessible linking information is to establish a trusted relationship between reciprocally linked entities controlling web resources, such as websites or web logs. A method of establishing a trust relationship between two entities identifying a user-installed link to a second web resource in a first web resource. Next, the method determines when a reciprocal link is made in the second web resource directed to the first web resource and creates a trust relationship between the entities based on the reciprocal link.
    Type: Grant
    Filed: February 15, 2011
    Date of Patent: November 22, 2011
    Assignee: Microsoft Corporation
    Inventors: Aditya Bansod, Charles Reeves Little, Jason D. Walter
  • Publication number: 20110246583
    Abstract: A computer implemented system and method to enable protection of email users from unsolicited bulk email using a message delivery delay based on characteristics detected in selected messages. Messages are evaluated for characteristics resembling unsolicited bulk email. A determination is made whether a message passing through the email system exhibits such characteristics and whether to delay the message. Suspect messages may be delayed for a period of time, the delay period being dependent on the characteristics giving rise to a determination to delay. Following the period, additional information received during the delay period characterizing the message is used to determine whether to dispose or deliver the message. Messages evaluated can be inbound to the email system, outbound to other email systems, or moving within the email system.
    Type: Application
    Filed: April 1, 2010
    Publication date: October 6, 2011
    Applicant: MICROSOFT CORPORATION
    Inventors: Krishna C. Vitaldevara, Eliot C. Gillum, Jason D. Walter, Mehrdad Bidgoli
  • Publication number: 20110246584
    Abstract: A computer implemented method for filtering unwanted bulk email in an email system and providing a positive user experience is provided. The method enables protection of email users from unsolicited bulk email using user-provided data on user interactions at both a user storage level and a global level with an email system. Metadata on user interactions with messages is collected. Messages are received by the system and evaluated using a global filter which assigns a score resulting in a message action. The action may be message delivery, message non-delivery or message routing, based on a score assigned by the global filter. When the message is delivered to user storage, the message may be examined relative to the metadata, and may alter the message action to an action different than the message action resulting from the score. Metadata for a plurality of users is returned to the global filter for use in making filtering future messages and modifies the global filter.
    Type: Application
    Filed: April 1, 2010
    Publication date: October 6, 2011
    Applicant: MICROSOFT CORPORATION
    Inventors: Krishna C. Vitaldevara, Eliot C. Gillum, Jason D Walter, Robert McCann, Vasantha K. Vemula, Mehrdad Bidgoli
  • Publication number: 20110191832
    Abstract: Network entities controlling a set of nodes may vary by trustworthiness, such as tolerance for nodes that send spam, distribute malware, or perform denial-of-service attacks. A device receiving such activities may identify a trust rating of the network entity and apply appropriately stringent filtering (such as spam evaluation) to activities received from nodes controlled by the network entity. However, a poor trust rating of a network entity may subject a legitimate node controlled by the network entity to inefficiently or unfairly stringent activity filtering. Instead, the device may evaluate the activities of a particular node, assign a trust rating to the node, and if the trust rating of the node is higher than the trust rating of the network entity, apply less stringent activity filtering to the activities of the node, thereby “rescuing” the node from the more stringent activity filtering applied to the other nodes of the network entity.
    Type: Application
    Filed: January 29, 2010
    Publication date: August 4, 2011
    Applicant: Microsoft Corporation
    Inventors: Malcolm H. Davis, Aravind K. Ramachandran, Geoffrey J. Hulten, Ivan Osipkov, Milenko Drinic, Eliot C. Gillum, Krishna C. Vitaldevara, Jason D. Walter, Mehrdad Bidgoli, Robert L. McCann
  • Publication number: 20110191847
    Abstract: The filtering of activities generated by nodes of a network while interacting with a device may be performed by evaluating the desirability of the activities (e.g., a spam or not-spam determination of email messages sent by the node) and assigning a trust rating to the node. However, nodes are often identified by network address, and an operator of a node sending undesirable activities may reassign the network address of the node in order to avoid heavy filtering. Instead, nodes may be identified as being controlled by a network entity (e.g., an autonomous system identified in a border gateway protocol routing table.) The network entity is assigned a network entity trust rating based on the trust ratings of the nodes controlled thereby, and an appropriate level of activity filtering based on the network entity trust rating may be selected for subsequent activities received from all nodes controlled by the network entity.
    Type: Application
    Filed: January 29, 2010
    Publication date: August 4, 2011
    Applicant: Microsoft Corporation
    Inventors: Malcolm H. Davis, Aravind K. Ramachandran, Geoffrey J. Hulten, Ivan Osipkov, Milenko Drinic, Eliot C. Gillum, Krishna C. Vitaldevara, Jason D. Walter, Mehrdad Bidgoli, Robert L. McCann
  • Publication number: 20110138062
    Abstract: Publicly accessible linking information is to establish a trusted relationship between reciprocally linked entities controlling web resources, such as websites or web logs. A method of establishing a trust relationship between two entities identifying a user-installed link to a second web resource in a first web resource. Next, the method determines when a reciprocal link is made in the second web resource directed to the first web resource and creates a trust relationship between the entities based on the reciprocal link.
    Type: Application
    Filed: February 15, 2011
    Publication date: June 9, 2011
    Applicant: MICROSOFT CORPORATION
    Inventors: Aditya Bansod, Charles Reeves Little, Jason D. Walter
  • Patent number: 7912960
    Abstract: Publicly accessible linking information is to establish a trusted relationship between reciprocally linked entities controlling web resources, such as websites or web logs. A method of establishing a trust relationship between two entities identifying a user-installed link to a second web resource in a first web resource. Next, the method determines when a reciprocal link is made in the second web resource directed to the first web resource and creates a trust relationship between the entities based on the reciprocal link.
    Type: Grant
    Filed: June 20, 2005
    Date of Patent: March 22, 2011
    Assignee: Microsoft Corporation
    Inventors: Aditya Bansod, Charles Reeves Little, Jason D. Walter
  • Publication number: 20100332601
    Abstract: A system and method of managing unsolicited email sent to an email system over a network. Email messages are received at an message at an inbound mail transfer agent. A determination is made as to whether the email message is suspected to be an unsolicited suspect message. One or more queries for additional information on one or more characteristics of the message is initiated. Determinations are made based on replies to the queries before issuing a message accepted for delivery indication to a sending server.
    Type: Application
    Filed: June 26, 2009
    Publication date: December 30, 2010
    Inventors: Jason D. Walter, Eliot C. Gillum, Krishna C. Vitaldevara, Ryan Charles Colvin, Mehrdad Bidgoli, Chad W. Mills, Joshua David Korb, Robert Lee McCann, Douglas John Hines, Malcolm Hollis Davis, Milenko Drinic
  • Publication number: 20100251362
    Abstract: A method of displaying email messages to a user is provided. Spam classification information and meta data is associated with email messages received for a user. Email message summary information is displayed in a user interface based on whether the meta data associated with the message meets or exceeds a threshold display level for the summary information. The user provides input via the user interface which is an indication to change the threshold display level and the change is dynamically displayed.
    Type: Application
    Filed: June 27, 2008
    Publication date: September 30, 2010
    Applicant: MICROSOFT CORPORATION
    Inventors: Eliot C. Gillum, Krishna Charan Vitaldevara, Jason D. Walter
  • Publication number: 20100205259
    Abstract: Methods for assisting email users manage email messages received in an email account. An event is triggered by an action performed by an email user with respect to an email message in an email account. The event identifies an entity associated with the email message (e.g., sender address, domain, keyword, etc.). A determination is made whether to assist the user manage their email based on a heuristic. The heuristic assigns weights based on prior events associated with the same entity to determine whether the user is interested in receiving emails from the sender. Based on the heuristics, the method may add the sender to the user's block-list or unsubscribe the user from a mailing list.
    Type: Application
    Filed: February 11, 2009
    Publication date: August 12, 2010
    Applicant: MICROSOFT CORPORATION
    Inventors: Krishna C. Vitaldevara, Eliot C. Gillum, Jason D. Walter, Mehrdad Bidgoli