Patents by Inventor Gopalakrishnan Seshadrinathan
Gopalakrishnan Seshadrinathan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8839418Abstract: Described is a technology by which phishing-related data sources are processed into aggregated data and a given site evaluated the aggregated data using a predictive model to automatically determine whether the given site is likely to be a phishing site. The predictive model may be built using machine learning based on training data, e.g., including known phishing sites and/or known non-phishing sites. To determine whether an object corresponding to a site is likely a phishing-related object are described, various criteria are evaluated, including one or more features of the object when evaluated. The determination is output in some way, e.g., made available to a reputation service, used to block access to a site or warn a user before allowing access, and/or used to assist a hand grader in being more efficient in evaluating sites.Type: GrantFiled: January 18, 2006Date of Patent: September 16, 2014Assignee: Microsoft CorporationInventors: Geoffrey John Hulten, Paul Stephen Rehfuss, Robert Rounthwaite, Joshua Theodore Goodman, Gopalakrishnan Seshadrinathan, Anthony P. Penta, Manav Mishra, Roderic C. Deyo, Elliott Jeb Haber, David Aaron Ward Snelling
-
Patent number: 8065370Abstract: Embodiments of proofs to filter spam are presented herein. Proofs are utilized to indicate a sender used a set amount of computer resources in sending a message in order to demonstrate the sender is not a “spammer”. Varying the complexity of the proofs, or the level of resources used to send the message, will indicate to the recipient the relative likelihood the message is spam. Higher resource usage indicates that the message may not be spam, while lower resource usage increases the likelihood a message is spam. Also, if the recipient requires a higher level of proof than received, the receiver may request the sender send additional proof to verify the message is not spam.Type: GrantFiled: November 3, 2005Date of Patent: November 22, 2011Assignee: Microsoft CorporationInventors: Geoffrey J Hulten, Gopalakrishnan Seshadrinathan, Joshua T. Goodman, Manav Mishra, Robert C J Pengelly, Robert L. Rounthwaite, Ryan C Colvin
-
Patent number: 7908328Abstract: Identification of email forwarders is described. In an implementation, a method includes using heuristics to identify email forwarders for use in a reputation system for locating spammers. In another implementation, a method includes determining a likelihood that a particular Internet Protocol (IP) address corresponds to an email forwarder and processing email originating from the particular IP address based on the determined likelihood. In a further implementation, a method includes collecting heuristic data that describes characteristics of emails sent from one or more Internet Protocol (IP) addresses and constructing a model from the heuristic data for identifying whether at least one of the IP address is an email forwarder. In yet a further implementation, a method includes identifying that a particular Internet Protocol (IP) address likely corresponds to an email forwarder and processing email from the particular IP address based on an implied sender of the email.Type: GrantFiled: December 27, 2004Date of Patent: March 15, 2011Assignee: Microsoft CorporationInventors: Geoffrey J Hulten, Anthony P. Penta, David Maxwell Chickering, Eliot C. Gillum, Gopalakrishnan Seshadrinathan, Jay T. Buckingham, Joshua T. Goodman, Paul S Rehfuss, Robert L. Rounthwaite, Ryan C Colvin
-
Patent number: 7904517Abstract: Disclosed are systems and methods that facilitate securing communication channels used in a challenge-response system to mitigate spammer intrusion or deception. The systems and methods make use of unique IDs that can be added to outbound messages originating from a sender, a recipient, and a third-party server. The IDs can be correlated according to the relevant parties. Thus, for example, a sender can add a signed ID to an outgoing message. A challenge sent back to the sender for that particular message can echo the same ID or a new ID derived from the original ID to allow a sender to verify that the challenge corresponds to an actual message. The IDs can include cookies as well to facilitate correlation of messages and to facilitate the retrieval of messages once a sender is determined to be legitimate.Type: GrantFiled: August 9, 2004Date of Patent: March 8, 2011Assignee: Microsoft CorporationInventors: Nina W Kang, Joshua T Goodman, Robert L Rounthwaite, Josh Benaloh, Elissa E Murphy, Manav Mishra, Gopalakrishnan Seshadrinathan, Derek M Hazeur, Ryan C Colvin
-
Patent number: 7603718Abstract: Techniques for protecting personally identifiable information are described. In an implementation, a method is described which includes analyzing heuristics which correspond to a communication to determine a likelihood that the communication relates to a fraudulent attempt to obtain personally identifiable information. A determination is made based on the determined likelihood of whether to perform one or more actions in conjunction with the communication.Type: GrantFiled: March 31, 2005Date of Patent: October 13, 2009Assignee: Microsoft CorporationInventors: Robert L. Rounthwaite, Paul S Rehfuss, Gopalakrishnan Seshadrinathan, Kenneth G Richards, Michael T Gahrns
-
Publication number: 20070192855Abstract: Described is a technology by which phishing-related data sources are processed into aggregated data and a given site evaluated the aggregated data using a predictive model to automatically determine whether the given site is likely to be a phishing site. The predictive model may be built using machine learning based on training data, e.g., including known phishing sites and/or known non-phishing sites. To determine whether an object corresponding to a site is likely a phishing-related object are described, various criteria are evaluated, including one or more features of the object when evaluated. The determination is output in some way, e.g., made available to a reputation service, used to block access to a site or warn a user before allowing access, and/or used to assist a hand grader in being more efficient in evaluating sites.Type: ApplicationFiled: January 18, 2006Publication date: August 16, 2007Applicant: Microsoft CorporationInventors: Geoffrey Hulten, Paul Rehfuss, Robert Rounthwaite, Joshua Goodman, Gopalakrishnan Seshadrinathan, Anthony Penta, Manav Mishra, Roderic Deyo, Elliott Haber, David Snelling
-
Publication number: 20070100949Abstract: Embodiment of proofs to filter spam are presented herein.Type: ApplicationFiled: November 3, 2005Publication date: May 3, 2007Applicant: Microsoft CorporationInventors: Geoffrey Hulten, Gopalakrishnan Seshadrinathan, Joshua Goodman, Manav Mishra, Robert Pengelly, Robert Rounthwaite, Ryan Colvin
-
Publication number: 20060225136Abstract: Techniques for protecting personally identifiable information are described. In an implementation, a method is described which includes analyzing heuristics which correspond to a communication to determine a likelihood that the communication relates to a fraudulent attempt to obtain personally identifiable information. A determination is made based on the determined likelihood of whether to perform one or more actions in conjunction with the communication.Type: ApplicationFiled: March 31, 2005Publication date: October 5, 2006Applicant: Microsoft CorporationInventors: Robert Rounthwaite, Paul Rehfuss, Gopalakrishnan Seshadrinathan, Kenneth Richards, Michael Gahrns
-
Publication number: 20060031338Abstract: Disclosed are systems and methods that facilitate securing communication channels used in a challenge-response system to mitigate spammer intrusion or deception. The systems and methods make use of unique IDs that can be added to outbound messages originating from a sender, a recipient, and a third-party server. The IDs can be correlated according to the relevant parties. Thus, for example, a sender can add a signed ID to an outgoing message. A challenge sent back to the sender for that particular message can echo the same ID or a new ID derived from the original ID to allow a sender to verify that the challenge corresponds to an actual message. The IDs can include cookies as well to facilitate correlation of messages and to facilitate the retrieval of messages once a sender is determined to be legitimate.Type: ApplicationFiled: August 9, 2004Publication date: February 9, 2006Applicant: Microsoft CorporationInventors: Nina Kang, Joshua Goodman, Robert Rounthwaite, Josh Benaloh, Elissa Murphy, Manav Mishra, Gopalakrishnan Seshadrinathan, Derek Hazeur, Ryan Colvin