Patents by Inventor Harry Simon

Harry Simon has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9779236
    Abstract: One or more techniques and/or systems are provided for risk assessment. Historical authentication data and/or compromised user account data may be evaluated to identify a set of authentication context properties associated with user authentication sessions and/or a set of malicious account context properties associated with compromised user accounts (e.g., properties indicative of whether a user recently visited a malicious site, created a fake social network profile, logged in from unknown locations, etc.). The set of authentication context properties and/or the set of malicious account context properties may be annotated to create an annotated context property training set that may be used to train a risk assessment machine learning model to generate a risk assessment model. The risk assessment model may be used to evaluate user context properties of a user account event to generate a risk analysis metric indicative of a likelihood the user account event is malicious or safe.
    Type: Grant
    Filed: June 21, 2016
    Date of Patent: October 3, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Luke Abrams, David J. Steeves, Robert Alexander Sim, Pui-Yin Winfred Wong, Harry Simon Katz, Aaron Small, Dana Scott Kaufman, Adrian Kreuziger, Mark A. Nikiel, Laurentiu Bogdan Cristofor, Alexa Lynn Keizur, Collin Tibbetts, Charles Hayden
  • Publication number: 20160300059
    Abstract: One or more techniques and/or systems are provided for risk assessment. Historical authentication data and/or compromised user account data may be evaluated to identify a set of authentication context properties associated with user authentication sessions and/or a set of malicious account context properties associated with compromised user accounts (e.g., properties indicative of whether a user recently visited a malicious site, created a fake social network profile, logged in from unknown locations, etc.). The set of authentication context properties and/or the set of malicious account context properties may be annotated to create an annotated context property training set that may be used to train a risk assessment machine learning model to generate a risk assessment model. The risk assessment model may be used to evaluate user context properties of a user account event to generate a risk analysis metric indicative of a likelihood the user account event is malicious or safe.
    Type: Application
    Filed: June 21, 2016
    Publication date: October 13, 2016
    Inventors: Luke Abrams, David J. Steeves, Robert Alexander Sim, Pui-Yin Winfred Wong, Harry Simon Katz, Aaron Small, Dana Scott Kaufman, Adrian Kreuziger, Mark A. Nikiel, Laurentiu Bogdan Cristofor, Alexa Lynn Keizur, Collin Tibbetts, Charles Hayden
  • Patent number: 9396332
    Abstract: One or more techniques and/or systems are provided for risk assessment. Historical authentication data and/or compromised user account data may be evaluated to identify a set of authentication context properties associated with user authentication sessions and/or a set of malicious account context properties associated with compromised user accounts (e.g., properties indicative of whether a user recently visited a malicious site, created a fake social network profile, logged in from unknown locations, etc.). The set of authentication context properties and/or the set of malicious account context properties may be annotated to create an annotated context property training set that may be used to train a risk assessment machine learning model to generate a risk assessment model. The risk assessment model may be used to evaluate user context properties of a user account event to generate a risk analysis metric indicative of a likelihood the user account event is malicious or safe.
    Type: Grant
    Filed: May 21, 2014
    Date of Patent: July 19, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Luke Abrams, David J. Steeves, Robert Alexander Sim, Pui-Yin Winfred Wong, Harry Simon Katz, Aaron Small, Dana Scott Kaufman, Adrian Kreuziger, Mark A. Nikiel, Laurentiu Bogdan Cristofor, Alexa Lynn Keizur, Collin Tibbetts, Charles Hayden
  • Publication number: 20150339477
    Abstract: One or more techniques and/or systems are provided for risk assessment. Historical authentication data and/or compromised user account data may be evaluated to identify a set of authentication context properties associated with user authentication sessions and/or a set of malicious account context properties associated with compromised user accounts (e.g., properties indicative of whether a user recently visited a malicious site, created a fake social network profile, logged in from unknown locations, etc.). The set of authentication context properties and/or the set of malicious account context properties may be annotated to create an annotated context property training set that may be used to train a risk assessment machine learning model to generate a risk assessment model. The risk assessment model may be used to evaluate user context properties of a user account event to generate a risk analysis metric indicative of a likelihood the user account event is malicious or safe.
    Type: Application
    Filed: May 21, 2014
    Publication date: November 26, 2015
    Inventors: Luke Abrams, David J. Steeves, Robert Alexander Sim, Pui-Yin Winfred Wong, Harry Simon Katz, Aaron Small, Dana Scott Kaufman, Adrian Kreuziger, Mark A. Nikiel, Laurentiu Bogdan Cristofor, Alexa Lynn Keizur, Collin Tibbetts, Charles Hayden
  • Patent number: 8638218
    Abstract: The present invention extends to methods, systems, and computer program products for wireless takeover of wired alarm system components. Embodiments of the invention can be used to bridge hardwired alarm zones for use with a wireless alarm controller. Wired sensors are wired to a takeover module that converts communication from the wired sensors into wireless communication that can be compatibly processed at an alarm controller that accepts wireless signals. Power and ground connections from an existing wired alarm controller can be used with the takeover module to facilitate wireless takeover of wired alarm sensors.
    Type: Grant
    Filed: September 14, 2012
    Date of Patent: January 28, 2014
    Assignee: 2GIG Technologies, Inc.
    Inventors: Scott Harris Simon, Lance Leo Dean
  • Patent number: 8638210
    Abstract: The present invention extends to methods, systems, and computer program products for wireless takeover of wired alarm system components. Embodiments of the invention can be used to bridge hardwired alarm zones for use with a wireless alarm controller. Wired sensors are wired to a takeover module that converts communication from the wired sensors into wireless communication that can be compatibly processed at an alarm controller that accepts wireless signals. Power and ground connections from an existing wired alarm controller can be used with the takeover module to facilitate wireless takeover of wired alarm sensors.
    Type: Grant
    Filed: June 8, 2009
    Date of Patent: January 28, 2014
    Assignee: 2GIG Technologies, Inc.
    Inventors: Scott Harris Simon, Lance Leo Dean
  • Publication number: 20130009771
    Abstract: The present invention extends to methods, systems, and computer program products for wireless takeover of wired alarm system components. Embodiments of the invention can be used to bridge hardwired alarm zones for use with a wireless alarm controller. Wired sensors are wired to a takeover module that converts communication from the wired sensors into wireless communication that can be compatibly processed at an alarm controller that accepts wireless signals. Power and ground connections from an existing wired alarm controller can be used with the takeover module to facilitate wireless takeover of wired alarm sensors.
    Type: Application
    Filed: September 14, 2012
    Publication date: January 10, 2013
    Applicant: 2GIG TECHNOLOGIES, INC.
    Inventors: Scott Harris Simon, Lance Leo Dean
  • Patent number: 7921173
    Abstract: The present invention provides for generating inputs that can be provided to a message classification module to facilitate more reliable classification of electronic messages, such as, for example, as unwanted and/or unsolicited. In one embodiment, a sending messaging server provides an appropriate response to address verification data thereby indicating a reduced likelihood of the sending messaging server using a forged network address. In another embodiment, it is determined if a messaging server is authorized to send electronic messages for a domain. In yet another embodiment, electronic message transmission policies adhered to by a domain are identified. In yet a further embodiment, a sending computer system expends computational resources to solve a computational puzzle and includes an answer document in an electronic message. A receiving computer system receives the electronic message and verifies the answer document.
    Type: Grant
    Filed: April 7, 2009
    Date of Patent: April 5, 2011
    Assignee: Microsoft Corporation
    Inventors: Robert George Atkinson, Joshua T. Goodman, James M. Lyon, Roy Williams, Khaja E. Ahmed, Harry Simon Katz, Robert L. Rounthwaite, Andrew V. Goldberg, Cynthia Dwork
  • Publication number: 20100308990
    Abstract: The present invention extends to methods, systems, and computer program products for wireless takeover of wired alarm system components. Embodiments of the invention can be used to bridge hardwired alarm zones for use with a wireless alarm controller. Wired sensors are wired to a takeover module that converts communication from the wired sensors into wireless communication that can be compatibly processed at an alarm controller that accepts wireless signals. Power and ground connections from an existing wired alarm controller can be used with the takeover module to facilitate wireless takeover of wired alarm sensors.
    Type: Application
    Filed: June 8, 2009
    Publication date: December 9, 2010
    Inventors: Scott Harris Simon, Lance Leo Dean
  • Publication number: 20090193093
    Abstract: The present invention provides for generating inputs that can be provided to a message classification module to facilitate more reliable classification of electronic messages, such as, for example, as unwanted and/or unsolicited. In one embodiment, a sending messaging server provides an appropriate response to address verification data thereby indicating a reduced likelihood of the sending messaging server using a forged network address. In another embodiment, it is determined if a messaging server is authorized to send electronic messages for a domain. In yet another embodiment, electronic message transmission policies adhered to by a domain are identified. In yet a further embodiment, a sending computer system expends computational resources to solve a computational puzzle and includes an answer document in an electronic message. A receiving computer system receives the electronic message and verifies the answer document.
    Type: Application
    Filed: April 7, 2009
    Publication date: July 30, 2009
    Applicant: Microsoft Corporation
    Inventors: Robert George Atkinson, Joshua T. Goodman, James M. Lyon, Roy Williams, Khaja E. Ahmed, Harry Simon Katz, Robert L. Rounthwaite, Andrew V. Goldberg, Cynthia Dwork
  • Patent number: 7552176
    Abstract: The present invention provides for generating inputs that can be provided to a message classification module to facilitate more reliable classification of electronic messages, such as, for example, as unwanted and/or unsolicited. In one embodiment, a sending messaging server provides an appropriate response to address verification data thereby indicating a reduced likelihood of the sending messaging server using a forged network address. In another embodiment, it is determined if a messaging server is authorized to send electronic messages for a domain. In yet another embodiment, electronic message transmission policies adhered to by a domain are identified. In yet a further embodiment, a sending computer system expends computational resources to solve a computational puzzle and includes an answer document in an electronic message. A receiving computer system receives the electronic message and verifies the answer document.
    Type: Grant
    Filed: October 10, 2003
    Date of Patent: June 23, 2009
    Assignee: Microsoft Corporation
    Inventors: Robert George Atkinson, Joshua T. Goodman, James M. Lyon, Roy Williams, Khaja E. Ahmed, Harry Simon Katz, Robert L. Rounthwaite, Andrew V. Goldberg, Cynthia Dwork
  • Patent number: 7398315
    Abstract: The present invention provides for generating inputs that can be provided to a message classification module to facilitate more reliable classification of electronic messages, such as, for example, as unwanted and/or unsolicited. In one embodiment, a sending messaging server provides an appropriate response to address verification data thereby indicating a reduced likelihood of the sending messaging server using a forged network address. In another embodiment, it is determined if a messaging server is authorized to send electronic messages for a domain. In yet another embodiment, electronic message transmission policies adhered to by a domain are identified. In yet a further embodiment, a sending computer system expends computational resources to solve a computational puzzle and includes an answer document in an electronic message. A receiving computer system receives the electronic message and verifies the answer document.
    Type: Grant
    Filed: October 10, 2003
    Date of Patent: July 8, 2008
    Assignee: Workman Nydegger
    Inventors: Robert George Atkinson, Joshua T. Goodman, James M. Lyon, Roy Williams, Khaja E. Ahmed, Harry Simon Katz, Robert L. Rounthwaite
  • Patent number: 7340279
    Abstract: Systems and techniques for parallel demodulation and searching using an adaptive antenna array with a processor configured to control the adaptive antenna to search for a first signal with the first beam and to receive a second signal for demodulation with a second beam.
    Type: Grant
    Filed: March 23, 2001
    Date of Patent: March 4, 2008
    Assignee: QUALCOMM Incorporated
    Inventors: Tao Chen, Harris Simon
  • Publication number: 20060229030
    Abstract: A mobile station with a tunable duplexer is disclosed. The mobile station includes a processor and memory in electronic communication with the processor. The mobile station includes a receive path that has a receive band reject filter in electronic communication with an antenna at a common node. The receive path also includes a receive band pass filter in electronic communication with the receive band reject filter. The mobile station includes a transmit path that has a transmit band reject filter in electronic communication with the antenna at the common node. The transmit path also includes a transmit band pass filter in electronic communication with the transmit band reject filter.
    Type: Application
    Filed: April 8, 2005
    Publication date: October 12, 2006
    Inventors: Harris Simon, Stanley Toncich
  • Publication number: 20060223587
    Abstract: At least one feature provides a way to perform point-to-multipoint transmissions using adaptive or directional antennas while reducing antenna pattern distortion. Generally, rather than transmitting the same waveform to two or more receivers, an information-bearing signal is transformed into different decorrelated waveforms and each decorrelated waveform is transmitted to a different receiver. In one implementation, an information-bearing signal is transformed into two decorrelated signals such that their crosscorrelation, or autocorrelation of the information-bearing signal, is zero or very small. Such decorrelation may be achieved by sending a first signal to a first receiver while sending a second signal, having a radio frequency spectrum that is the spectrally inverted version of the first signal, to a second receiver. In another implementation, a first signal is transmitted to a first receiver and is also transmitted to a second receiver with a time delay.
    Type: Application
    Filed: July 15, 2005
    Publication date: October 5, 2006
    Inventors: Ivan Fernandez-Corbaton, Ahmad Jalali, Ernest Ozaki, Harris Simon, Sherman Gregory
  • Publication number: 20060098723
    Abstract: A multi-band handheld communications device includes a transceiver including a transmitter having a transmit filter and a receiver having a receive filter, each of the transmit and receive filters having a bandpass region tunable across multiple bands, and a processor configured to select one of the multiple bands to operate the handheld communications device, and tune each of the transmit and receive filters based on the selected one of the multiple bands.
    Type: Application
    Filed: November 4, 2005
    Publication date: May 11, 2006
    Inventors: Stanley Toncich, Harris Simon, Aracely Williams
  • Publication number: 20060020647
    Abstract: Method and apparatus for generating random numbers are disclosed. In one aspect, a method for generating random numbers for use in a wireless communication device provides for generating random numbers, gathering a sample of the generated random numbers, and computing at least one metric, such as mean value, standard deviation, and/or entropy. The method further provides for comparing the metric with a corresponding reference value and adjusting the metric based on a result of said comparison so that the generated random numbers achieve a desired distribution. In another aspect, an apparatus for generating random numbers includes an analog noise generator and hardware components for generating random numbers and feedback values to adjust the random numbers. The apparatus further includes a processor capable of executing instructions to carry out control algorithms for adjusting the random numbers.
    Type: Application
    Filed: July 23, 2004
    Publication date: January 26, 2006
    Inventors: Harris Simon, Kenneth Van Pelt, Dale Sharp
  • Publication number: 20060004445
    Abstract: An intraocular lens includes an optical portion (7; 607; 907; 1107) of a transparent, deformable material, at least one haptic (5, 6; 205, 206; 405, 406, 706; 806; 905; 1005; 1105; 1205) radially projecting from the optical portion for supporting the optical portion in a position parallel to and against an anterior iris surface plane (936; 1136), and at least one aperture (13; 213; 713; 913; 1013; 1113) bounded by the haptic. At least a stiff portion of the haptic has a higher stiffness against bending about an axis in the radial direction than the optical portion. furthermore, the stiff portion has a width (a) measured parallel to the plane and perpendicular to the radial direction, which is smaller than the size (b) of the optical portion in the direction of the width. An instrument and methods for preparing and carrying out insertion of such a lens are also described.
    Type: Application
    Filed: September 2, 2005
    Publication date: January 5, 2006
    Applicant: Ophtec B.V.
    Inventors: Jan Frans Worst, Harry Simon, Martinus Aponno
  • Publication number: 20050288683
    Abstract: An intraocular lens includes an optical portion (7; 607; 907; 1107) of a transparent, deformable material, at least one haptic (5, 6; 205, 206; 405, 406, 706; 806; 905; 1005; 1105; 1205) radially projecting from the optical portion for supporting the optical portion in a position parallel to and against an anterior iris surface plane (936; 1136), and at least one aperture (13; 213; 713; 913; 1013; 1113) bounded by the haptic. At least a stiff portion of the haptic has a higher stiffness against bending about an axis in the radial direction than the optical portion. furthermore, the stiff portion has a width (a) measured parallel to the plane and perpendicular to the radial direction, which is smaller than the size (b) of the optical portion in the direction of the width. An instrument and methods for preparing and carrying out insertion of such a lens are also described.
    Type: Application
    Filed: September 2, 2005
    Publication date: December 29, 2005
    Applicant: Ophtec B.V.
    Inventors: Jan Worst, Harry Simon, Martinus Aponno
  • Publication number: 20040181585
    Abstract: The present invention provides for generating inputs that can be provided to a message classification module to facilitate more reliable classification of electronic messages, such as, for example, as unwanted and/or unsolicited. In one embodiment, a sending messaging server provides an appropriate response to address verification data thereby indicating a reduced likelihood of the sending messaging server using a forged network address. In another embodiment, it is determined if a messaging server is authorized to send electronic messages for a domain. In yet another embodiment, electronic message transmission policies adhered to by a domain are identified. In yet a further embodiment, a sending computer system expends computational resources to solve a computational puzzle and includes an answer document in an electronic message. A receiving computer system receives the electronic message and verifies the answer document.
    Type: Application
    Filed: October 10, 2003
    Publication date: September 16, 2004
    Inventors: Robert George Atkinson, Joshua T. Goodman, James M. Lyon, Roy Williams, Khaja E. Ahmed, Harry Simon Katz, Robert L. Rounthwaite, Andrew V. Goldberg, Cynthia Dwork