Patents by Inventor Mark E. Risher
Mark E. Risher has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8892661Abstract: The invention provides for at least three processes for detecting the probability of abusive use of a message account for sending large amounts of unsolicited messages, such as spam, to other message accounts. For example, information provided at registration for a new message account can be processed to determine the likelihood of abusive use of that message account. Also, inbound messages can be processed to determine if the message account that sent the inbound message is abusing the use of that message account. Additionally, outbound messages can be processed to determine if the message account that is attempting to send an outbound message is abusing the use of that message account. Each of these three processes can operate separately or in any combination with each other to further improve the probability that abusive use of a message account will be detected promptly and accurately.Type: GrantFiled: September 18, 2009Date of Patent: November 18, 2014Assignee: Yahoo! Inc.Inventors: Vishwanath Tumkur Ramarao, Mark E. Risher, Xiaopeng Xi
-
Patent number: 8868663Abstract: The invention provides for at least three processes for detecting the probability of abusive use of a message account for sending large amounts of unsolicited messages, such as spam, to other message accounts. For example, information provided at registration for a new message account can be processed to determine the likelihood of abusive use of that message account. Also, inbound messages can be processed to determine if the message account that sent the inbound message is abusing the use of that message account. Additionally, outbound messages can be processed to determine if the message account that is attempting to send an outbound message is abusing the use of that message account. Each of these three processes can operate separately or in any combination with each other to further improve the probability that abusive use of a message account will be detected promptly and accurately.Type: GrantFiled: September 17, 2009Date of Patent: October 21, 2014Assignee: Yahoo! Inc.Inventors: Bhasker Hariharan, Naveen Jamal, Anirban Kundu, Vishwanath Tumkur Ramarao, Mark E. Risher, Xiaopeng Xi, Lei Zheng
-
Patent number: 8826450Abstract: The invention provides for at least three processes for detecting the probability of abusive use of a message account for sending large amounts of unsolicited messages, such as spam, to other message accounts. For example, information provided at registration for a new message account can be processed to determine the likelihood of abusive use of that message account. Also, inbound messages can be processed to determine if the message account that sent the inbound message is abusing the use of that message account. Additionally, outbound messages can be processed to determine if the message account that is attempting to send an outbound message is abusing the use of that message account. Each of these three processes can operate separately or in any combination with each other to further improve the probability that abusive use of a message account will be detected promptly and accurately.Type: GrantFiled: September 17, 2009Date of Patent: September 2, 2014Assignee: Yahoo! Inc.Inventors: Bhasker Hariharan, Naveen Jamal, Anirban Kundu, Vishwanath Tumkur Ramarao, Mark E. Risher, Xiaopeng Xi, Lei Zheng
-
Patent number: 8463827Abstract: Embodiments are directed towards identifying auto-folder tags for messages by using a combinational optimization approach of bi-clustering folder names and features of messages based on relationship strengths. The combinational optimization approach of bi-clustering, generally, groups a plurality of folder names and a plurality of features into one or more metafolders to optimize a cost. The cost is based on an aggregate of cut relationship strengths, where a cut results when a relationship folder name and feature are grouped in separate metafolders. Furthermore, the plurality of folder names and the plurality of features are obtained by monitoring actions of a plurality of users, where the folder names are user generated folder names and features are from a plurality of messages. The metafolders may be used to tag new user messages with an auto-folder tag.Type: GrantFiled: January 4, 2011Date of Patent: June 11, 2013Assignee: Yahoo! Inc.Inventors: Vishwanath Tumkur Ramarao, Andrei Broder, Idan Szpektor, Edo Liberty, Yehuda Koren, Mark E. Risher, Yoelle Maarek Smadja
-
Patent number: 8381262Abstract: Embodiments are directed towards detecting and reporting use by a domain of a message authentication mechanism, such as DomainKeys (DK), and/or DomainKeys Identified Mail (DKIM), and enabling subsequent blocking of messages based, in part, on its usage. When a message is received by an inbound message server, a message source is determined for the message. In one embodiment, the message source is a domain name associated with the sender of the message. Statistics are recorded about the message, including the message source, whether the message is suspect, includes a forged source identifier, employs DK/DKIM message authentication, and the like. The reports may then be sent to various message sources to enable them to determine the extent of use of DK/DKIM message authentication, and to selectively block, re-direct, or forward the messages based, in part, on the use of DK/DKIM message authentication mechanism.Type: GrantFiled: February 20, 2008Date of Patent: February 19, 2013Assignee: Yahoo! Inc.Inventors: Mark E. Risher, Mark Delany, Anirban Kundu, Miles A. Libbey, IV, Masumi Taketomi
-
Patent number: 8364766Abstract: Embodiments are directed towards classifying messages as spam using a two phased approach. The first phase employs a statistical classifier to classify messages based on message content. The second phase targets specific message types to capture dynamic characteristics of the messages and identify spam messages using a token frequency based approach. A client component receives messages and sends them to the statistical classifier, which determines a probability that a message belongs to a particular type of class. The statistical classifier further provides other information about a message, including, a token list, and token thresholds. The message class, token list, and thresholds are provided to the second phase where a number of spam tokens in a given message for a given message class are determined. Based on the threshold, the client component then determines whether the message is spam or non-spam.Type: GrantFiled: December 4, 2008Date of Patent: January 29, 2013Assignee: Yahoo! Inc.Inventors: Lei Zheng, Sharat Narayan, Mark E. Risher, Stanley Ke Wei, Vishwanath Tumkur Ramarao, Anirban Kundu
-
Publication number: 20120173533Abstract: Embodiments are directed towards identifying auto-folder tags for messages by using a combinational optimization approach of bi-clustering folder names and features of messages based on relationship strengths. The combinational optimization approach of bi-clustering, generally, groups a plurality of folder names and a plurality of features into one or more metafolders to optimize a cost. The cost is based on an aggregate of cut relationship strengths, where a cut results when a relationship folder name and feature are grouped in separate metafolders. Furthermore, the plurality of folder names and the plurality of features are obtained by monitoring actions of a plurality of users, where the folder names are user generated folder names and features are from a plurality of messages. The metafolders may be used to tag new user messages with an auto-folder tag.Type: ApplicationFiled: January 4, 2011Publication date: July 5, 2012Applicant: Yahoo! Inc.Inventors: Vishwanath Tumkur Ramarao, Andrei Broder, Idan Szpektor, Edo Liberty, Yehuda Koren, Mark E. Risher, Yoelle Maarek Smadja
-
Publication number: 20110185024Abstract: Disclosed are apparatus and methods for annotating an electronic mail message and processing the annotated electronic mail message. More particularly, an electronic mail message may be generated and annotated such that the electronic mail message includes metadata identifying data provided in the electronic mail message. The electronic mail message may then be transmitted. When the annotated electronic mail message is received, at least a portion of the metadata may be obtained from the electronic mail message. At least a portion of the data in the electronic mail message may be identified using at least a portion of the metadata. At least a portion of the identified data in the electronic mail message may then be processed.Type: ApplicationFiled: January 26, 2010Publication date: July 28, 2011Applicant: YAHOO! INC.Inventors: Vishwanath Tumkur Ramarao, Mark E. Risher
-
Patent number: 7950047Abstract: Embodiments are directed towards detecting and reporting use by a domain of a message authentication mechanism, such as DomainKeys (DK), and/or DomainKeys Identified Mail (DKIM), and enabling subsequent blocking of messages based, in part, on its usage. When a message is received by an inbound message server, a message source is determined for the message. In one embodiment, the message source is a domain name associated with the sender of the message. Statistics are recorded about the message, including the message source, whether the message is suspect, includes a forged source identifier, employs DK/DKIM message authentication, and the like. The reports may ten be sent to various message sources to enable them to determine the extent of use of DK/DKIM message authentication, and to selectively block, re-direct, or forward the messages based, in part, on the use of DK/DKIM message authentication mechanism.Type: GrantFiled: February 22, 2008Date of Patent: May 24, 2011Assignee: Yahoo! Inc.Inventors: Mark E. Risher, Mark Delany, Anirban Kundu, Miles A. Libbey, IV, Masumi Taketomi
-
Publication number: 20100145900Abstract: Embodiments are directed towards classifying messages as spam using a two phased approach. The first phase employs a statistical classifier to classify messages based on message content. The second phase targets specific message types to capture dynamic characteristics of the messages and identify spam messages using a token frequency based approach. A client component receives messages and sends them to the statistical classifier, which determines a probability that a message belongs to a particular type of class. The statistical classifier further provides other information about a message, including, a token list, and token thresholds. The message class, token list, and thresholds are provided to the second phase where a number of spam tokens in a given message for a given message class are determined. Based on the threshold, the client component then determines whether the message is spam or non-spam.Type: ApplicationFiled: December 4, 2008Publication date: June 10, 2010Applicant: Yahoo! Inc.Inventors: Lei Zheng, Sharat Narayan, Mark E. Risher, Stanley Ke Wei, Vishwanath Tumkur Ramarao, Anirban Kundu
-
Publication number: 20100077040Abstract: The invention provides for at least three processes for detecting the probability of abusive use of a message account for sending large amounts of unsolicited messages, such as spam, to other message accounts. For example, information provided at registration for a new message account can be processed to determine the likelihood of abusive use of that message account. Also, inbound messages can be processed to determine if the message account that sent the inbound message is abusing the use of that message account. Additionally, outbound messages can be processed to determine if the message account that is attempting to send an outbound message is abusing the use of that message account. Each of these three processes can operate separately or in any combination with each other to further improve the probability that abusive use of a message account will be detected promptly and accurately.Type: ApplicationFiled: September 17, 2009Publication date: March 25, 2010Applicant: Yahoo! Inc.Inventors: Bhasker Hariharan, Naveen Jamal, Anirban Kundu, Vishwanath Tumkur Ramarao, Mark E. Risher, Xiaopeng Xi, Lei Zheng
-
Publication number: 20100077043Abstract: The invention provides for at least three processes for detecting the probability of abusive use of a message account for sending large amounts of unsolicited messages, such as spam, to other message accounts. For example, information provided at registration for a new message account can be processed to determine the likelihood of abusive use of that message account. Also, inbound messages can be processed to determine if the message account that sent the inbound message is abusing the use of that message account. Additionally, outbound messages can be processed to determine if the message account that is attempting to send an outbound message is abusing the use of that message account. Each of these three processes can operate separately or in any combination with each other to further improve the probability that abusive use of a message account will be detected promptly and accurately.Type: ApplicationFiled: September 18, 2009Publication date: March 25, 2010Applicant: Yahoo! Inc.Inventors: Vishwanath Tumkur Ramarao, Mark E. Risher, Xiaopeng Xi
-
Publication number: 20100076922Abstract: The invention provides for at least three processes for detecting the probability of abusive use of a message account for sending large amounts of unsolicited messages, such as spam, to other message accounts. For example, information provided at registration for a new message account can be processed to determine the likelihood of abusive use of that message account. Also, inbound messages can be processed to determine if the message account that sent the inbound message is abusing the use of that message account. Additionally, outbound messages can be processed to determine if the message account that is attempting to send an outbound message is abusing the use of that message account. Each of these three processes can operate separately or in any combination with each other to further improve the probability that abusive use of a message account will be detected promptly and accurately.Type: ApplicationFiled: September 17, 2009Publication date: March 25, 2010Applicant: Yahoo! Inc.Inventors: Bhasker Hariharan, Naveen Jamal, Anirban Kundu, Vishwanath Tumkur Ramarao, Mark E. Risher, Xiaopeng Xi, Lei Zheng
-
Publication number: 20090216842Abstract: Embodiments are directed towards detecting and reporting use by a domain of a message authentication mechanism, such as DomainKeys (DK), and/or DomainKeys Identified Mail (DKIM), and enabling subsequent blocking of messages based, in part, on its usage. When a message is received by an inbound message server, a message source is determined for the message. In one embodiment, the message source is a domain name associated with the sender of the message. Statistics are recorded about the message, including the message source, whether the message is suspect, includes a forged source identifier, employs DK/DKIM message authentication, and the like. The reports may ten be sent to various message sources to enable them to determine the extent of use of DK/DKIM message authentication, and to selectively block, re-direct, or forward the messages based, in part, on the use of DK/DKIM message authentication mechanism.Type: ApplicationFiled: February 22, 2008Publication date: August 27, 2009Applicant: Yahoo! Inc.Inventors: Mark E. Risher, Mark Delany, Anirban Kundu, Miles A. Libbey, IV, Masumi Taketomi
-
Publication number: 20090210501Abstract: Embodiments are directed towards detecting and reporting use by a domain of a message authentication mechanism, such as DomainKeys (DK), and/or DomainKeys Identified Mail (DKIM), and enabling subsequent blocking of messages based, in part, on its usage. When a message is received by an inbound message server, a message source is determined for the message. In one embodiment, the message source is a domain name associated with the sender of the message. Statistics are recorded about the message, including the message source, whether the message is suspect, includes a forged source identifier, employs DK/DKIM message authentication, and the like. The reports may then be sent to various message sources to enable them to determine the extent of use of DK/DKIM message authentication, and to selectively block, re-direct, or forward the messages based, in part, on the use of DK/DKIM message authentication mechanism.Type: ApplicationFiled: February 20, 2008Publication date: August 20, 2009Applicant: Yahoo! Inc.Inventors: Mark E. Risher, Mark Delany, Anirban Kundu, Miles A. Libbey, IV, Masumi Taketomi