Patents by Inventor Mark E. Risher

Mark E. Risher has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8892661
    Abstract: The invention provides for at least three processes for detecting the probability of abusive use of a message account for sending large amounts of unsolicited messages, such as spam, to other message accounts. For example, information provided at registration for a new message account can be processed to determine the likelihood of abusive use of that message account. Also, inbound messages can be processed to determine if the message account that sent the inbound message is abusing the use of that message account. Additionally, outbound messages can be processed to determine if the message account that is attempting to send an outbound message is abusing the use of that message account. Each of these three processes can operate separately or in any combination with each other to further improve the probability that abusive use of a message account will be detected promptly and accurately.
    Type: Grant
    Filed: September 18, 2009
    Date of Patent: November 18, 2014
    Assignee: Yahoo! Inc.
    Inventors: Vishwanath Tumkur Ramarao, Mark E. Risher, Xiaopeng Xi
  • Patent number: 8868663
    Abstract: The invention provides for at least three processes for detecting the probability of abusive use of a message account for sending large amounts of unsolicited messages, such as spam, to other message accounts. For example, information provided at registration for a new message account can be processed to determine the likelihood of abusive use of that message account. Also, inbound messages can be processed to determine if the message account that sent the inbound message is abusing the use of that message account. Additionally, outbound messages can be processed to determine if the message account that is attempting to send an outbound message is abusing the use of that message account. Each of these three processes can operate separately or in any combination with each other to further improve the probability that abusive use of a message account will be detected promptly and accurately.
    Type: Grant
    Filed: September 17, 2009
    Date of Patent: October 21, 2014
    Assignee: Yahoo! Inc.
    Inventors: Bhasker Hariharan, Naveen Jamal, Anirban Kundu, Vishwanath Tumkur Ramarao, Mark E. Risher, Xiaopeng Xi, Lei Zheng
  • Patent number: 8826450
    Abstract: The invention provides for at least three processes for detecting the probability of abusive use of a message account for sending large amounts of unsolicited messages, such as spam, to other message accounts. For example, information provided at registration for a new message account can be processed to determine the likelihood of abusive use of that message account. Also, inbound messages can be processed to determine if the message account that sent the inbound message is abusing the use of that message account. Additionally, outbound messages can be processed to determine if the message account that is attempting to send an outbound message is abusing the use of that message account. Each of these three processes can operate separately or in any combination with each other to further improve the probability that abusive use of a message account will be detected promptly and accurately.
    Type: Grant
    Filed: September 17, 2009
    Date of Patent: September 2, 2014
    Assignee: Yahoo! Inc.
    Inventors: Bhasker Hariharan, Naveen Jamal, Anirban Kundu, Vishwanath Tumkur Ramarao, Mark E. Risher, Xiaopeng Xi, Lei Zheng
  • Patent number: 8463827
    Abstract: Embodiments are directed towards identifying auto-folder tags for messages by using a combinational optimization approach of bi-clustering folder names and features of messages based on relationship strengths. The combinational optimization approach of bi-clustering, generally, groups a plurality of folder names and a plurality of features into one or more metafolders to optimize a cost. The cost is based on an aggregate of cut relationship strengths, where a cut results when a relationship folder name and feature are grouped in separate metafolders. Furthermore, the plurality of folder names and the plurality of features are obtained by monitoring actions of a plurality of users, where the folder names are user generated folder names and features are from a plurality of messages. The metafolders may be used to tag new user messages with an auto-folder tag.
    Type: Grant
    Filed: January 4, 2011
    Date of Patent: June 11, 2013
    Assignee: Yahoo! Inc.
    Inventors: Vishwanath Tumkur Ramarao, Andrei Broder, Idan Szpektor, Edo Liberty, Yehuda Koren, Mark E. Risher, Yoelle Maarek Smadja
  • Patent number: 8381262
    Abstract: Embodiments are directed towards detecting and reporting use by a domain of a message authentication mechanism, such as DomainKeys (DK), and/or DomainKeys Identified Mail (DKIM), and enabling subsequent blocking of messages based, in part, on its usage. When a message is received by an inbound message server, a message source is determined for the message. In one embodiment, the message source is a domain name associated with the sender of the message. Statistics are recorded about the message, including the message source, whether the message is suspect, includes a forged source identifier, employs DK/DKIM message authentication, and the like. The reports may then be sent to various message sources to enable them to determine the extent of use of DK/DKIM message authentication, and to selectively block, re-direct, or forward the messages based, in part, on the use of DK/DKIM message authentication mechanism.
    Type: Grant
    Filed: February 20, 2008
    Date of Patent: February 19, 2013
    Assignee: Yahoo! Inc.
    Inventors: Mark E. Risher, Mark Delany, Anirban Kundu, Miles A. Libbey, IV, Masumi Taketomi
  • Patent number: 8364766
    Abstract: Embodiments are directed towards classifying messages as spam using a two phased approach. The first phase employs a statistical classifier to classify messages based on message content. The second phase targets specific message types to capture dynamic characteristics of the messages and identify spam messages using a token frequency based approach. A client component receives messages and sends them to the statistical classifier, which determines a probability that a message belongs to a particular type of class. The statistical classifier further provides other information about a message, including, a token list, and token thresholds. The message class, token list, and thresholds are provided to the second phase where a number of spam tokens in a given message for a given message class are determined. Based on the threshold, the client component then determines whether the message is spam or non-spam.
    Type: Grant
    Filed: December 4, 2008
    Date of Patent: January 29, 2013
    Assignee: Yahoo! Inc.
    Inventors: Lei Zheng, Sharat Narayan, Mark E. Risher, Stanley Ke Wei, Vishwanath Tumkur Ramarao, Anirban Kundu
  • Publication number: 20120173533
    Abstract: Embodiments are directed towards identifying auto-folder tags for messages by using a combinational optimization approach of bi-clustering folder names and features of messages based on relationship strengths. The combinational optimization approach of bi-clustering, generally, groups a plurality of folder names and a plurality of features into one or more metafolders to optimize a cost. The cost is based on an aggregate of cut relationship strengths, where a cut results when a relationship folder name and feature are grouped in separate metafolders. Furthermore, the plurality of folder names and the plurality of features are obtained by monitoring actions of a plurality of users, where the folder names are user generated folder names and features are from a plurality of messages. The metafolders may be used to tag new user messages with an auto-folder tag.
    Type: Application
    Filed: January 4, 2011
    Publication date: July 5, 2012
    Applicant: Yahoo! Inc.
    Inventors: Vishwanath Tumkur Ramarao, Andrei Broder, Idan Szpektor, Edo Liberty, Yehuda Koren, Mark E. Risher, Yoelle Maarek Smadja
  • Publication number: 20110185024
    Abstract: Disclosed are apparatus and methods for annotating an electronic mail message and processing the annotated electronic mail message. More particularly, an electronic mail message may be generated and annotated such that the electronic mail message includes metadata identifying data provided in the electronic mail message. The electronic mail message may then be transmitted. When the annotated electronic mail message is received, at least a portion of the metadata may be obtained from the electronic mail message. At least a portion of the data in the electronic mail message may be identified using at least a portion of the metadata. At least a portion of the identified data in the electronic mail message may then be processed.
    Type: Application
    Filed: January 26, 2010
    Publication date: July 28, 2011
    Applicant: YAHOO! INC.
    Inventors: Vishwanath Tumkur Ramarao, Mark E. Risher
  • Patent number: 7950047
    Abstract: Embodiments are directed towards detecting and reporting use by a domain of a message authentication mechanism, such as DomainKeys (DK), and/or DomainKeys Identified Mail (DKIM), and enabling subsequent blocking of messages based, in part, on its usage. When a message is received by an inbound message server, a message source is determined for the message. In one embodiment, the message source is a domain name associated with the sender of the message. Statistics are recorded about the message, including the message source, whether the message is suspect, includes a forged source identifier, employs DK/DKIM message authentication, and the like. The reports may ten be sent to various message sources to enable them to determine the extent of use of DK/DKIM message authentication, and to selectively block, re-direct, or forward the messages based, in part, on the use of DK/DKIM message authentication mechanism.
    Type: Grant
    Filed: February 22, 2008
    Date of Patent: May 24, 2011
    Assignee: Yahoo! Inc.
    Inventors: Mark E. Risher, Mark Delany, Anirban Kundu, Miles A. Libbey, IV, Masumi Taketomi
  • Publication number: 20100145900
    Abstract: Embodiments are directed towards classifying messages as spam using a two phased approach. The first phase employs a statistical classifier to classify messages based on message content. The second phase targets specific message types to capture dynamic characteristics of the messages and identify spam messages using a token frequency based approach. A client component receives messages and sends them to the statistical classifier, which determines a probability that a message belongs to a particular type of class. The statistical classifier further provides other information about a message, including, a token list, and token thresholds. The message class, token list, and thresholds are provided to the second phase where a number of spam tokens in a given message for a given message class are determined. Based on the threshold, the client component then determines whether the message is spam or non-spam.
    Type: Application
    Filed: December 4, 2008
    Publication date: June 10, 2010
    Applicant: Yahoo! Inc.
    Inventors: Lei Zheng, Sharat Narayan, Mark E. Risher, Stanley Ke Wei, Vishwanath Tumkur Ramarao, Anirban Kundu
  • Publication number: 20100077040
    Abstract: The invention provides for at least three processes for detecting the probability of abusive use of a message account for sending large amounts of unsolicited messages, such as spam, to other message accounts. For example, information provided at registration for a new message account can be processed to determine the likelihood of abusive use of that message account. Also, inbound messages can be processed to determine if the message account that sent the inbound message is abusing the use of that message account. Additionally, outbound messages can be processed to determine if the message account that is attempting to send an outbound message is abusing the use of that message account. Each of these three processes can operate separately or in any combination with each other to further improve the probability that abusive use of a message account will be detected promptly and accurately.
    Type: Application
    Filed: September 17, 2009
    Publication date: March 25, 2010
    Applicant: Yahoo! Inc.
    Inventors: Bhasker Hariharan, Naveen Jamal, Anirban Kundu, Vishwanath Tumkur Ramarao, Mark E. Risher, Xiaopeng Xi, Lei Zheng
  • Publication number: 20100077043
    Abstract: The invention provides for at least three processes for detecting the probability of abusive use of a message account for sending large amounts of unsolicited messages, such as spam, to other message accounts. For example, information provided at registration for a new message account can be processed to determine the likelihood of abusive use of that message account. Also, inbound messages can be processed to determine if the message account that sent the inbound message is abusing the use of that message account. Additionally, outbound messages can be processed to determine if the message account that is attempting to send an outbound message is abusing the use of that message account. Each of these three processes can operate separately or in any combination with each other to further improve the probability that abusive use of a message account will be detected promptly and accurately.
    Type: Application
    Filed: September 18, 2009
    Publication date: March 25, 2010
    Applicant: Yahoo! Inc.
    Inventors: Vishwanath Tumkur Ramarao, Mark E. Risher, Xiaopeng Xi
  • Publication number: 20100076922
    Abstract: The invention provides for at least three processes for detecting the probability of abusive use of a message account for sending large amounts of unsolicited messages, such as spam, to other message accounts. For example, information provided at registration for a new message account can be processed to determine the likelihood of abusive use of that message account. Also, inbound messages can be processed to determine if the message account that sent the inbound message is abusing the use of that message account. Additionally, outbound messages can be processed to determine if the message account that is attempting to send an outbound message is abusing the use of that message account. Each of these three processes can operate separately or in any combination with each other to further improve the probability that abusive use of a message account will be detected promptly and accurately.
    Type: Application
    Filed: September 17, 2009
    Publication date: March 25, 2010
    Applicant: Yahoo! Inc.
    Inventors: Bhasker Hariharan, Naveen Jamal, Anirban Kundu, Vishwanath Tumkur Ramarao, Mark E. Risher, Xiaopeng Xi, Lei Zheng
  • Publication number: 20090216842
    Abstract: Embodiments are directed towards detecting and reporting use by a domain of a message authentication mechanism, such as DomainKeys (DK), and/or DomainKeys Identified Mail (DKIM), and enabling subsequent blocking of messages based, in part, on its usage. When a message is received by an inbound message server, a message source is determined for the message. In one embodiment, the message source is a domain name associated with the sender of the message. Statistics are recorded about the message, including the message source, whether the message is suspect, includes a forged source identifier, employs DK/DKIM message authentication, and the like. The reports may ten be sent to various message sources to enable them to determine the extent of use of DK/DKIM message authentication, and to selectively block, re-direct, or forward the messages based, in part, on the use of DK/DKIM message authentication mechanism.
    Type: Application
    Filed: February 22, 2008
    Publication date: August 27, 2009
    Applicant: Yahoo! Inc.
    Inventors: Mark E. Risher, Mark Delany, Anirban Kundu, Miles A. Libbey, IV, Masumi Taketomi
  • Publication number: 20090210501
    Abstract: Embodiments are directed towards detecting and reporting use by a domain of a message authentication mechanism, such as DomainKeys (DK), and/or DomainKeys Identified Mail (DKIM), and enabling subsequent blocking of messages based, in part, on its usage. When a message is received by an inbound message server, a message source is determined for the message. In one embodiment, the message source is a domain name associated with the sender of the message. Statistics are recorded about the message, including the message source, whether the message is suspect, includes a forged source identifier, employs DK/DKIM message authentication, and the like. The reports may then be sent to various message sources to enable them to determine the extent of use of DK/DKIM message authentication, and to selectively block, re-direct, or forward the messages based, in part, on the use of DK/DKIM message authentication mechanism.
    Type: Application
    Filed: February 20, 2008
    Publication date: August 20, 2009
    Applicant: Yahoo! Inc.
    Inventors: Mark E. Risher, Mark Delany, Anirban Kundu, Miles A. Libbey, IV, Masumi Taketomi