Patents by Inventor Geoffrey Hulten

Geoffrey Hulten has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8789171
    Abstract: The claimed subject matter is directed to mining user behavior data for increasing Internet Protocol (“IP”) space intelligence. Specifically, the claimed subject matter provides a method and system of mining user behavior within an IP address space and the application of the IP address space intelligence derived from the mined user behavior. In one embodiment, the IP address space intelligence is formed and/or increased with information obtained from the mined user behavior data. A system of uniquely-identified users is monitored and their behavior within the IP address space is recorded. Further data is mined from estimated characteristics about the user, including the nature of the IP address the user uses to log into the service, and characterizing the IP address according to a network type.
    Type: Grant
    Filed: March 26, 2008
    Date of Patent: July 22, 2014
    Assignee: Microsoft Corporation
    Inventors: Ivan Osipkov, Geoffrey Hulten, John Mehr, Yinglian Xie, Fang Yu
  • Publication number: 20090249480
    Abstract: The claimed subject matter is directed to mining user behavior data for increasing Internet Protocol (“IP”) space intelligence. Specifically, the claimed subject matter provides a method and system of mining user behavior within an IP address space and the application of the IP address space intelligence derived from the mined user behavior. In one embodiment, the IP address space intelligence is formed and/or increased with information obtained from the mined user behavior data. A system of uniquely-identified users is monitored and their behavior within the IP address space is recorded. Further data is mined from estimated characteristics about the user, including the nature of the IP address the user uses to log into the service, and characterizing the IP address according to a network type.
    Type: Application
    Filed: March 26, 2008
    Publication date: October 1, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Ivan Osipkov, Geoffrey Hulten, John Mehr, Yinglian Xie, Fang Yu
  • Publication number: 20070192855
    Abstract: Described is a technology by which phishing-related data sources are processed into aggregated data and a given site evaluated the aggregated data using a predictive model to automatically determine whether the given site is likely to be a phishing site. The predictive model may be built using machine learning based on training data, e.g., including known phishing sites and/or known non-phishing sites. To determine whether an object corresponding to a site is likely a phishing-related object are described, various criteria are evaluated, including one or more features of the object when evaluated. The determination is output in some way, e.g., made available to a reputation service, used to block access to a site or warn a user before allowing access, and/or used to assist a hand grader in being more efficient in evaluating sites.
    Type: Application
    Filed: January 18, 2006
    Publication date: August 16, 2007
    Applicant: Microsoft Corporation
    Inventors: Geoffrey Hulten, Paul Rehfuss, Robert Rounthwaite, Joshua Goodman, Gopalakrishnan Seshadrinathan, Anthony Penta, Manav Mishra, Roderic Deyo, Elliott Haber, David Snelling
  • Publication number: 20070100949
    Abstract: Embodiment of proofs to filter spam are presented herein.
    Type: Application
    Filed: November 3, 2005
    Publication date: May 3, 2007
    Applicant: Microsoft Corporation
    Inventors: Geoffrey Hulten, Gopalakrishnan Seshadrinathan, Joshua Goodman, Manav Mishra, Robert Pengelly, Robert Rounthwaite, Ryan Colvin
  • Publication number: 20070039038
    Abstract: Phishing detection, prevention, and notification is described. In an embodiment, a messaging application facilitates communication via a messaging user interface, and receives a communication, such as an email message, from a domain. A phishing detection module detects a phishing attack in the communication by determining that the domain is similar to a known phishing domain, or by detecting suspicious network properties of the domain. In another embodiment, a Web browsing application receives content, such as data for a Web page, from a network-based resource, such as a Web site or domain. The Web browsing application initiates a display of the content, and a phishing detection module detects a phishing attack in the content by determining that a domain of the network-based resource is similar to a known phishing domain, or that an address of the network-based resource from which the content is received has suspicious network properties.
    Type: Application
    Filed: September 30, 2006
    Publication date: February 15, 2007
    Applicant: Microsoft Corporation
    Inventors: Joshua Goodman, Paul Rehfuss, Robert Rounthwaite, Manav Mishra, Geoffrey Hulten, Kenneth Richards, Aaron Averbuch, Anthony Penta, Roderic Deyo
  • Publication number: 20070038705
    Abstract: Decision trees populated with classifier models are leveraged to provide enhanced spam detection utilizing separate email classifiers for each feature of an email. This provides a higher probability of spam detection through tailoring of each classifier model to facilitate in more accurately determining spam on a feature-by-feature basis. Classifiers can be constructed based on linear models such as, for example, logistic-regression models and/or support vector machines (SVM) and the like. The classifiers can also be constructed based on decision trees. “Compound features” based on internal and/or external nodes of a decision tree can be utilized to provide linear classifier models as well. Smoothing of the spam detection results can be achieved by utilizing classifier models from other nodes within the decision tree if training data is sparse. This forms a base model for branches of a decision tree that may not have received substantial training data.
    Type: Application
    Filed: July 29, 2005
    Publication date: February 15, 2007
    Applicant: Microsoft Corporation
    Inventors: David Chickering, Geoffrey Hulten, Robert Rounthwaite, Christopher Meek, David Heckerman, Joshua Goodman
  • Publication number: 20070033639
    Abstract: Phishing detection, prevention, and notification is described. In an embodiment, a messaging application facilitates communication via a messaging user interface, and receives a communication, such as an email message, from a domain. A phishing detection module detects a phishing attack in the communication by determining that the domain is similar to a known phishing domain, or by detecting suspicious network properties of the domain. In another embodiment, a Web browsing application receives content, such as data for a Web page, from a network-based resource, such as a Web site or domain. The Web browsing application initiates a display of the content, and a phishing detection module detects a phishing attack in the content by determining that a domain of the network-based resource is similar to a known phishing domain, or that an address of the network-based resource from which the content is received has suspicious network properties.
    Type: Application
    Filed: September 30, 2006
    Publication date: February 8, 2007
    Applicant: Microsoft Corporation
    Inventors: Joshua Goodman, Paul Rehfuss, Robert Rounthwaite, Manav Mishra, Geoffrey Hulten, Kenneth Richards, Aaron Averbuch, Anthony Penta, Roderict Deyo
  • Publication number: 20060168041
    Abstract: Email spam filtering is performed based on a combination of IP address and domain. When an email message is received, an IP address and a domain associated with the email message are determined. A cross product of the IP address (or portions of the IP address) and the domain (or portions of the domain) is calculated. If the email message is known to be either spam or non-spam, then a spam score based on the known spam status is stored in association with each (IP address, domain) pair element of the cross product. If the spam status of the email message is not known, then the (IP address, domain) pair elements of the cross product are used to lookup previously determined spam scores. A combination of the previously determined spam scores is used to determine whether or not to treat the received email message as spam.
    Type: Application
    Filed: January 7, 2005
    Publication date: July 27, 2006
    Applicant: Microsoft Corporation
    Inventors: Manav Mishra, Elissa Murphy, Geoffrey Hulten, Joshua Goodman, Wen-Tau Yih
  • Publication number: 20060143271
    Abstract: Secure safe sender lists are described. In an implementation, a method includes determining which of a plurality of hierarchical levels corresponds to a message received via a network. Each of the hierarchical level is defined by mechanisms for identifying a sender of the message. The message is routed according to the corresponding one of the hierarchical levels.
    Type: Application
    Filed: December 27, 2004
    Publication date: June 29, 2006
    Applicant: Microsoft Corporation
    Inventors: Elissa Murphy, Geoffrey Hulten, Manav Mishra, Robert Rounthwaite
  • Publication number: 20060123464
    Abstract: Phishing detection, prevention, and notification is described. In an embodiment, a messaging application facilitates communication via a messaging user interface, and receives a communication, such as an email message, from a domain. A phishing detection module detects a phishing attack in the communication by determining that the domain is similar to a known phishing domain, or by detecting suspicious network properties of the domain. In another embodiment, a Web browsing application receives content, such as data for a Web page, from a network-based resource, such as a Web site or domain. The Web browsing application initiates a display of the content, and a phishing detection module detects a phishing attack in the content by determining that a domain of the network-based resource is similar to a known phishing domain, or that an address of the network-based resource from which the content is received has suspicious network properties.
    Type: Application
    Filed: May 13, 2005
    Publication date: June 8, 2006
    Applicant: Microsoft Corporation
    Inventors: Joshua Goodman, Paul Rehfuss, Robert Rounthwaite, Manav Mishra, Geoffrey Hulten, Kenneth Richards, Aaron Averbuch, Anthony Penta, Roderic Deyo
  • Publication number: 20060123478
    Abstract: Phishing detection, prevention, and notification is described. In an embodiment, a messaging application facilitates communication via a messaging user interface, and receives a communication, such as an email message, from a domain. A phishing detection module detects a phishing attack in the communication by determining that the domain is similar to a known phishing domain, or by detecting suspicious network properties of the domain. In another embodiment, a Web browsing application receives content, such as data for a Web page, from a network-based resource, such as a Web site or domain. The Web browsing application initiates a display of the content, and a phishing detection module detects a phishing attack in the content by determining that a domain of the network-based resource is similar to a known phishing domain, or that an address of the network-based resource from which the content is received has suspicious network properties.
    Type: Application
    Filed: May 13, 2005
    Publication date: June 8, 2006
    Applicant: Microsoft Corporation
    Inventors: Paul Rehfuss, Joshua Goodman, Robert Rounthwaite, Manav Mishra, Geoffrey Hulten, Kenneth Richards, Aaron Averbuch, Anthony Penta, Roderic Deyo
  • Publication number: 20060112190
    Abstract: A dependency network is created from a training data set utilizing a scalable method. A statistical model (or pattern), such as for example a Bayesian network, is then constructed to allow more convenient inferencing. The model (or pattern) is employed in lieu of the training data set for data access. The computational complexity of the method that produces the model (or pattern) is independent of the size of the original data set. The dependency network directly returns explicitly encoded data in the conditional probability distributions of the dependency network. Non-explicitly encoded data is generated via Gibbs sampling, approximated, or ignored.
    Type: Application
    Filed: January 3, 2006
    Publication date: May 25, 2006
    Applicant: Microsoft Corporation
    Inventors: Geoffrey Hulten, David Chickering, David Heckerman
  • Publication number: 20060036693
    Abstract: Disclosed are signature-based systems and methods that facilitate spam detection and prevention at least in part by calculating hash values for an incoming message and then determining a probability that the hash values indicate spam. In particular, the signatures generated for each incoming message can be compared to a database of both spam and good signatures. A count of the number of matches can be divided by a denominator value. The denominator value can be an overall volume of messages sent to the system per signature for example. The denominator value can be discounted to account for different treatments and timing of incoming messages. Furthermore, secure hashes can be generated by combining portions of multiple hashing components. A secure hash can be made from a combination of multiple hashing components or multiple combinations thereof. The signature based system can also be integrated with machine learning systems to optimize spam prevention.
    Type: Application
    Filed: August 12, 2004
    Publication date: February 16, 2006
    Applicant: Microsoft Corporation
    Inventors: Geoffrey Hulten, Joshua Goodman, Robert Rounthwaite, Manav Mishra, Elissa Murphy
  • Publication number: 20060015561
    Abstract: The present invention provides a unique system and method that facilitates incrementally updating spam filters in near real time or real time. Incremental updates can be generated in part by difference learning. Difference learning involves training a new spam filter based on new data and then looking for the differences between the new spam filter and the existing spam filter. Differences can be determined at least in part by comparing the absolute values of parameter changes (weight changes of a feature between the two filters). Other factors such as frequency of parameters can be employed as well. In addition, available updates with respect to particular features or messages can be looked up using one or more lookup tables or databases. When incremental and/or feature-specific updates are available, they can be downloaded such as by a client for example. Incremental updates can be automatically provided or can be provided by request according to client or server preferences.
    Type: Application
    Filed: June 29, 2004
    Publication date: January 19, 2006
    Applicant: Microsoft Corporation
    Inventors: Elissa Murphy, Joshua Goodman, Derek Hazeur, Robert Rounthwaite, Geoffrey Hulten
  • Publication number: 20050022031
    Abstract: Disclosed are systems and methods that facilitate spam detection and prevention at least in part by building or training filters using advanced IP address and/or URL features in connection with machine learning techniques. A variety of advanced IP address related features can be generated from performing a reverse IP lookup. Similarly, many different advanced URL based features can be created from analyzing at least a portion of any one URL detected in a message.
    Type: Application
    Filed: May 28, 2004
    Publication date: January 27, 2005
    Applicant: Microsoft Corporation
    Inventors: Joshua Goodman, Robert Rounthwaite, Geoffrey Hulten, John Deurbrouck, Manav Mishra, Anthony Penta