Patents by Inventor John L. Scarrow

John L. Scarrow has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9367706
    Abstract: Access to some aspect of a service may be limited until a user has invested in performing some amount of computation. Legitimate users typically have excess cycles on their machines, which can be used to perform computation at little or no cost to the user. By contrast, computation is expensive for for-profit internet abusers (e.g., spammers). These abusers typically use all of their computing resources to run “bots” that carry out their schemes, so computation increases the abuser's cost by forcing him or her to acquire new computing resources or to rent computer time. Thus, the providers of free services (e.g., web mail services, blogging sites, etc.), can allow newly registered users to use some limited form of the service upon registration. However, in order to make more extensive use of the service, the user can be asked to prove his legitimacy by investing in some amount of computation.
    Type: Grant
    Filed: April 2, 2010
    Date of Patent: June 14, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Shawn D. Loveland, Geoffrey J. Hulten, John L. Scarrow
  • Patent number: 9235586
    Abstract: A Web browser of a computing device downloads or otherwise obtains a file. File information identifying the file is obtained and is sent to a remote reputation service. Client information identifying aspects of the computing device can also optionally be sent to the remote reputation service. In response to the file information (and optionally client information), a reputation indication for the file is received from the remote reputation service. A user interface for the Web browser to present at the computing device is determined, based at least in part on the reputation indication, and presented at the computing device.
    Type: Grant
    Filed: September 13, 2010
    Date of Patent: January 12, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Ritika Virmani, Ryan C. Colvin, Elliott Jeb Haber, Warren G. Stevens, Jane T. Kim, Jess S. Holbrook, Sarah J. Bowers, John L. Scarrow, Jeffrey R. McKune
  • Patent number: 8862699
    Abstract: A reputation based redirection service is usable to build URL wrappers for un-trusted and unknown URLs. Such URL wrappers can be used to protect Web users by, for example, redirecting traffic to interstitial Web pages. Additionally, reputation decisions can be made by the service to further protect users from malicious URLs.
    Type: Grant
    Filed: December 14, 2009
    Date of Patent: October 14, 2014
    Assignee: Microsoft Corporation
    Inventors: Ameya S. Bhatawdekar, Kristofer N. Iverson, Elliott J. Haber, John L. Scarrow, Chad W. Mills
  • Patent number: 8429743
    Abstract: Online risk mitigation techniques are described. In an implementation, a service is queried for a reputation associated with an object from an online source in response to selection of the object. A backup of a client that is to receive the object is stored prior to obtaining the object when the reputation does not meet a threshold reputation level.
    Type: Grant
    Filed: December 23, 2008
    Date of Patent: April 23, 2013
    Assignee: Microsoft Corporation
    Inventors: Shawn Loveland, Geoffrey J Hulten, Elliott Jeb Haber, John L. Scarrow
  • Publication number: 20120066346
    Abstract: A Web browser of a computing device downloads or otherwise obtains a file. File information identifying the file is obtained and is sent to a remote reputation service. Client information identifying aspects of the computing device can also optionally be sent to the remote reputation service. In response to the file information (and optionally client information), a reputation indication for the file is received from the remote reputation service. A user interface for the Web browser to present at the computing device is determined, based at least in part on the reputation indication, and presented at the computing device.
    Type: Application
    Filed: September 13, 2010
    Publication date: March 15, 2012
    Applicant: MICROSOFT CORPORATION
    Inventors: Ritika Virmani, Ryan C. Colvin, Elliott Jeb Haber, Warren G. Stevens, Jane T. Kim, Jess S. Holbrook, Sarah J. Bowers, John L. Scarrow, Jeffrey R. McKune
  • Publication number: 20110247061
    Abstract: Access to some aspect of a service may be limited until a user has invested in performing some amount of computation. Legitimate users typically have excess cycles on their machines, which can be used to perform computation at little or no cost to the user. By contrast, computation is expensive for for-profit internet abusers (e.g., spammers). These abusers typically use all of their computing resources to run “bots” that carry out their schemes, so computation increases the abuser's cost by forcing him or her to acquire new computing resources or to rent computer time. Thus, the providers of free services (e.g., web mail services, blogging sites, etc.), can allow newly registered users to use some limited form of the service upon registration. However, in order to make more extensive use of the service, the user can be asked to prove his legitimacy by investing in some amount of computation.
    Type: Application
    Filed: April 2, 2010
    Publication date: October 6, 2011
    Applicant: MICROSOFT CORPORATION
    Inventors: Shawn D. Loveland, Geoffrey J. Hulten, John L. Scarrow
  • Publication number: 20110145435
    Abstract: A reputation based redirection service is usable to build URL wrappers for un-trusted and unknown URLs. Such URL wrappers can be used to protect Web users by, for example, redirecting traffic to interstitial Web pages. Additionally, reputation decisions can be made by the service to further protect users from malicious URLs.
    Type: Application
    Filed: December 14, 2009
    Publication date: June 16, 2011
    Applicant: Microsoft Corporation
    Inventors: Ameya S. Bhatawdekar, Kristofer N. Iverson, Elliott J. Haber, John L. Scarrow, Chad W. Mills
  • Patent number: 7870609
    Abstract: Functionality is described for addressing a threat to the security of a user device that utilizes a network-accessible service. The functionality operates by assessing the likelihood that the user device is infected by the undesirable item. When the user device makes a request to access the network-accessible service, the functionality can interact with the user device in a manner that is governed by the assessed likelihood that the user device is infected by the undesirable item.
    Type: Grant
    Filed: June 29, 2007
    Date of Patent: January 11, 2011
    Assignee: Microsoft Corporation
    Inventors: Geoffrey J. Hulten, John L. Scarrow, Eliot C. Gillum, Kumar S. Srivastava, Anatoliy Panasyuk, Ivan Osipkov
  • Publication number: 20100162391
    Abstract: Online risk mitigation techniques are described. In an implementation, a service is queried for a reputation associated with an object from an online source in response to selection of the object. A backup of a client that is to receive the object is stored prior to obtaining the object when the reputation does not meet a threshold reputation level.
    Type: Application
    Filed: December 23, 2008
    Publication date: June 24, 2010
    Applicant: Microsoft Corporation
    Inventors: Shawn Loveland, Geoffrey J. Hulten, Elliott Jeb Haber, John L. Scarrow
  • Publication number: 20090006575
    Abstract: Functionality is described for addressing a threat to the security of a user device that utilizes a network-accessible service. The functionality operates by assessing the likelihood that the user device is infected by the undesirable item. When the user device makes a request to access the network-accessible service, the functionality can interact with the user device in a manner that is governed by the assessed likelihood that the user device is infected by the undesirable item.
    Type: Application
    Filed: June 29, 2007
    Publication date: January 1, 2009
    Applicant: Microsoft Corporation
    Inventors: Geoffrey J. Hulten, John L. Scarrow, Eliot C. Gillum, Kumar S. Srivastava, Anatoliy Panasyuk, Ivan Osipkov
  • Patent number: 5671445
    Abstract: A data transmission system transmits data from a first device to an interface device at a continuous rate and includes a first device for storing data and for transmitting data at a first data output rate. An interface device outputs data at a second data output rate different from the first data output rate. A preload buffer initially receives a predetermined amount of data from the first device and stores the initially received data. The preload buffer also transmits at least a portion of the initially received data at a third data output rate. The preload buffer receives additional data from the first device as the initially received data is transmitted from the preload buffer. A first buffer and a second buffer of generally equal size are sized to receive a single block of data from the preload buffer. The size of the single block of data is less than the predetermined amount of output data initially received and stored in the preload buffer.
    Type: Grant
    Filed: August 2, 1995
    Date of Patent: September 23, 1997
    Assignee: OKI America, Inc.
    Inventors: Stephen David Gluyas, Joseph A. Horanzy, John L. Scarrow