Patents by Inventor Jason Steiner
Jason Steiner has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20210172018Abstract: Described herein are methods for generating and using variant panels of clonally expanded cells containing a plurality of introduced genetic variants. These clonally expanded cells can be partitioned such that each individual partition contains a single genetic variant, allowing for the assessment of the outcome of each variant without the confounding effect of background genetic variation. Further, panels of such variants can be used to evaluate nucleic acid repair strategies. Genetic variation can be introduced through the use of genome editing tools, such as CRISPR/Cas.Type: ApplicationFiled: February 12, 2021Publication date: June 10, 2021Inventors: Richard Stoner, Jason Steiner, Travis Maures, Reed Kelso, Aliesha Griffin
-
Patent number: 8086684Abstract: Systems and methods of the present invention provide for detecting and mitigating abuse of undeliverable email or “bounced” emails. An administrator may import a list of email addresses for one or more contacts. The opt-in software may determine if each email address in the list of email addresses is opted in to receive an email distribution, and if so, a bounce detection software may determine if each email address is found in a database of known undeliverable or “bounced” email addresses. If so, an abuse-mitigation software may defer importing the list of email addresses and display an alert referring the administrator to an abuse department for review of the account.Type: GrantFiled: April 20, 2010Date of Patent: December 27, 2011Assignee: The Go Daddy Group, Inc.Inventors: Sean Hayes, Ben Butler, Jason Steiner
-
Publication number: 20110258217Abstract: Systems and methods of the present invention provide for detecting and mitigating abuse of undeliverable email or “bounced” emails. An administrator may import a list of email addresses for one or more contacts. The opt-in software may determine if each email address in the list of email addresses is opted in to receive an email distribution, and if so, a bounce detection software may determine if each email address is found in a database of known undeliverable or “bounced” email addresses. If so, an abuse-mitigation software may defer importing the list of email addresses and display an alert referring the administrator to an abuse department for review of the account.Type: ApplicationFiled: April 20, 2010Publication date: October 20, 2011Applicant: THE GO DADDY GROUP, INC.Inventors: Sean Hayes, Ben Butler, Jason Steiner
-
Publication number: 20110258218Abstract: Systems and methods of the present invention provide for detecting and mitigating abuse of unsolicited email or “spam.” An administrator may select one or more contacts from a list of contacts to opt in to receive an email distribution. An abuse detection software may then determine for each contact in the contact list whether the contact has read the email distribution and reported the email distribution as an unsolicited email message. If so, an abuse department may place a hold on the email distribution (possibly using abuse mitigation software) and display an alert referring the administrator to the abuse department for review of the account. Otherwise, the email distribution may continue to completion.Type: ApplicationFiled: April 20, 2010Publication date: October 20, 2011Applicant: THE GO DADDY GROUP, INC.Inventors: Sean Hayes, Ben Butler, Jason Steiner
-
Patent number: 7580982Abstract: Systems and methods of the present invention allow filtering out spam and phishing email messages based on the links embedded into the email messages. In a preferred embodiment, an Email Filter extracts links from the email message and obtains desirability values for the links. The Email Filter may route the email message based on desirability values. Such routing includes delivering the email message to a Recipient, delivering the message to a Quarantine Mailbox, or deleting the message.Type: GrantFiled: December 14, 2004Date of Patent: August 25, 2009Assignee: The Go Daddy Group, Inc.Inventors: Brad Owen, Jason Steiner
-
Publication number: 20070118750Abstract: The invention is a method to authenticate a caller initiating a communication session (such as a VoIP or IM communication session) and accept, reject, or accept and route the communication session accordingly. The caller's terminal adapter or message server (such as a VoIP or IM server) may create a digital signature using the caller's private key and add the digital signature to a header block used to initiate the communication session. The digital signature in the header block may be decrypted by the receiver's terminal adapter or message server using the caller's public key, preferably found in a DNS record. An authenticated digital signature indicates that the header block was sent from the caller identified in the header block. Once the identity of the caller has been authenticated and the communication session accepted, further filtering and routing of the communication session may be performed as desired.Type: ApplicationFiled: October 27, 2005Publication date: May 24, 2007Inventors: Brad Owen, Jason Steiner
-
Publication number: 20070101144Abstract: The invention is a method to authenticate a caller initiating a communication session (such as a VoIP or IM communication session) and accept, reject, or accept and route the communication session accordingly. The caller's terminal adapter or message server (such as a VoIP or IM server) may create a digital signature using the caller's private key and add the digital signature to a header block used to initiate the communication session. The digital signature in the header block may be decrypted by the receiver's terminal adapter or message server using the caller's public key, preferably found in a DNS record. An authenticated digital signature indicates that the header block was sent from the caller identified in the header block. Once the identity of the caller has been authenticated and the communication session accepted, further filtering and routing of the communication session may be performed as desired.Type: ApplicationFiled: October 27, 2005Publication date: May 3, 2007Inventors: Brad Owen, Jason Steiner
-
Publication number: 20060184635Abstract: Systems and methods of the present invention allow a Sender of an email message to save the message into a network email storage and send an Email Tickler to a Recipient. The Email Tickler contains a location reference for the email message at the network email storage. A Recipient's Receiving Means may download the email message from the network email storage. The Recipient's Receiving Means may further refuse downloading the email message if it determines that the network email storage location is not trustworthy. Systems and methods of the present invention may help in combating SPAM.Type: ApplicationFiled: May 18, 2006Publication date: August 17, 2006Applicant: THE GO DADDY GROUP, INC.Inventors: Brad Owen, Jason Steiner
-
Publication number: 20060184634Abstract: Systems and methods of the present invention allow a Sender of an email message to save the message into a network email storage and send an Email Tickler to a Recipient. The Email Tickler contains a location reference for the email message at the network email storage. A Recipient's Receiving Means may download the email message from the network email storage. The Recipient's Receiving Means may further refuse downloading the email message if it determines that the network email storage location is not trustworthy. Systems and methods of the present invention may help in combating SPAM.Type: ApplicationFiled: May 18, 2006Publication date: August 17, 2006Applicant: THE GO DADDY GROUP, INC.Inventors: Brad Owen, Jason Steiner
-
Publication number: 20060149823Abstract: Systems and methods of the present invention allow a Sender of an email message to log email message attributes in an email database. An email filter located between the Sender and a Recipient of the email message may access the database and verify if the email message truly originated from the Sender. The email filter may route the email message based on the status of the email message attributes stored at the email database. Such routing includes delivering the email message to the Recipient, delivering the message to a Quarantine Mailbox, or deleting the message.Type: ApplicationFiled: January 6, 2005Publication date: July 6, 2006Applicant: The Go Daddy Group, IncInventors: Brad Owen, Jason Steiner
-
Publication number: 20060129644Abstract: Systems and methods of the present invention allow filtering out spam and phishing email messages based on the links embedded into the email messages. In a preferred embodiment, an Email Filter extracts links from the email message and obtains desirability values for the links. The Email Filter may route the email message based on desirability values. Such routing includes delivering the email message to a Recipient, delivering the message to a Quarantine Mailbox, or deleting the message.Type: ApplicationFiled: December 14, 2004Publication date: June 15, 2006Inventors: Brad Owen, Jason Steiner