Patents by Inventor John Mehr
John Mehr has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12076747Abstract: Methods and systems are provided for filling cracks in an environmental barrier coating and/or a thermal barrier coating (EBC/TBC). The method comprises locating a component within an enclosure of an apparatus, the component including a substrate having the EBC/TBC thereon, wherein the EBC/TBC includes cracks extending from an exterior surface of the EBC/TBC toward the substrate, reducing pressure within the enclosure to a first pressure that is less than atmospheric pressure, applying a filler slurry to the exterior surface to cover the cracks while the EBC/TBC is exposed to the first pressure, increasing the enclosure to a second pressure that is greater than the first pressure, wherein the second pressure is sufficient to cause the filler slurry on the EBC/TBC to infiltrate into and fill the cracks, and sintering the filler slurry sufficient to cure the filler slurry within the cracks.Type: GrantFiled: November 17, 2022Date of Patent: September 3, 2024Assignee: HONEYWELL INTERNATIONAL INC.Inventors: Mehrad Mehr, John Downs, Bahram Jadidian
-
Patent number: 8789171Abstract: The claimed subject matter is directed to mining user behavior data for increasing Internet Protocol (“IP”) space intelligence. Specifically, the claimed subject matter provides a method and system of mining user behavior within an IP address space and the application of the IP address space intelligence derived from the mined user behavior. In one embodiment, the IP address space intelligence is formed and/or increased with information obtained from the mined user behavior data. A system of uniquely-identified users is monitored and their behavior within the IP address space is recorded. Further data is mined from estimated characteristics about the user, including the nature of the IP address the user uses to log into the service, and characterizing the IP address according to a network type.Type: GrantFiled: March 26, 2008Date of Patent: July 22, 2014Assignee: Microsoft CorporationInventors: Ivan Osipkov, Geoffrey Hulten, John Mehr, Yinglian Xie, Fang Yu
-
Publication number: 20090249480Abstract: The claimed subject matter is directed to mining user behavior data for increasing Internet Protocol (“IP”) space intelligence. Specifically, the claimed subject matter provides a method and system of mining user behavior within an IP address space and the application of the IP address space intelligence derived from the mined user behavior. In one embodiment, the IP address space intelligence is formed and/or increased with information obtained from the mined user behavior data. A system of uniquely-identified users is monitored and their behavior within the IP address space is recorded. Further data is mined from estimated characteristics about the user, including the nature of the IP address the user uses to log into the service, and characterizing the IP address according to a network type.Type: ApplicationFiled: March 26, 2008Publication date: October 1, 2009Applicant: MICROSOFT CORPORATIONInventors: Ivan Osipkov, Geoffrey Hulten, John Mehr, Yinglian Xie, Fang Yu
-
Patent number: 7595765Abstract: Embedded surface wave antenna elements incorporating different dielectric materials or other features are provided. The different dielectric materials can arranged adjacent a feed, to absorb energy that can cause undesirable reflections in the antenna element. In addition or alternatively, different dielectric materials can be arranged to alter the velocity of energy through the antenna element, and to control or attenuate the formation of nulls in the far field at angles of interest. The control or attenuation of nulls in the far field at angles of interest can further be controlled through contouring an antenna element ground plane in a lens region of the antenna element. A buried feed arrangement is also described.Type: GrantFiled: June 29, 2006Date of Patent: September 29, 2009Assignee: Ball Aerospace & Technologies Corp.Inventors: Vincent A. Hirsch, Bradley M. McCarthy, Thomas S. Watson, John Mehr, Thomas M. Crawford
-
Publication number: 20070208856Abstract: The subject invention provides for a feedback loop system and method that facilitate classifying items in connection with spam prevention in server and/or client-based architectures. The invention makes uses of a machine-learning approach as applied to spam filters, and in particular, randomly samples incoming email messages so that examples of both legitimate and junk/spam mail are obtained to generate sets of training data. Users which are identified as spam-fighters are asked to vote on whether a selection of their incoming email messages is individually either legitimate mail or junk mail. A database stores the properties for each mail and voting transaction such as user information, message properties and content summary, and polling results for each message to generate training data for machine learning systems. The machine learning systems facilitate creating improved spam filter(s) that are trained to recognize both legitimate mail and spam mail and to distinguish between them.Type: ApplicationFiled: May 2, 2007Publication date: September 6, 2007Applicant: MICROSOFT CORPORATIONInventors: Robert Rounthwaite, Joshua Goodman, David Heckerman, John Mehr, Nathan Howell, Micah Rupersburg, Dean Slawson
-
Publication number: 20070118904Abstract: The present invention involves a system and method that facilitate extracting data from messages for spam filtering. The extracted data can be in the form of features, which can be employed in connection with machine learning systems to build improved filters. Data associated with origination information as well as other information embedded in the body of the message that allows a recipient of the message to contact and/or respond to the sender of the message can be extracted as features. The features, or a subset thereof, can be normalized and/or deobfuscated prior to being employed as features of the machine learning systems. The (deobfuscated) features can be employed to populate a plurality of feature lists that facilitate spam detection and prevention. Exemplary features include an email address, an IP address, a URL, an embedded image pointing to a URL, and/or portions thereof.Type: ApplicationFiled: January 9, 2007Publication date: May 24, 2007Applicant: MICROSOFT CORPORATIONInventors: Joshua Goodman, Robert Rounthwaite, Daniel Gwozdz, John Mehr, Nathan Howell, Micah Rupersburg, Bryan Starbuck
-
Publication number: 20070061402Abstract: Techniques that are employable to perform multipurpose internet mail extension (MIME) analysis are presented herein.Type: ApplicationFiled: September 15, 2005Publication date: March 15, 2007Applicant: Microsoft CorporationInventors: John Mehr, Nathan Howell
-
Publication number: 20070011324Abstract: Message header spam filtering is described. In an embodiment, a message is received that includes header entries arranged in an ordered sequence which indicates a path by which the message was communicated. The header entries are parsed to categorize each header entry as a header type where the header types are listed in the ordered sequence. A quantity of each different header type is determined, and a determination is made as to whether the message is likely a spam message based at least in part on the quantity corresponding to a particular header type. In another embodiment, a numeric representation of the ordered sequence is created where the numeric representation includes unique integers assigned to each different header type. A determination is made as to whether the message is likely a spam message based at least in part on the numeric representation of the ordered sequence of header types.Type: ApplicationFiled: July 5, 2005Publication date: January 11, 2007Applicant: Microsoft CorporationInventors: John Mehr, Nathan Howell
-
Publication number: 20060277259Abstract: Distributed sender reputations are described. In an implementation, a method includes evaluating multiple characteristics of message delivery to establish a reputation for a sender of the message by a mail transfer agent and sharing data which describes the evaluation with another mail transfer agent.Type: ApplicationFiled: June 7, 2005Publication date: December 7, 2006Applicant: Microsoft CorporationInventors: Elissa Murphy, John Mehr, Nathan Howell, Paul Rehfuss
-
Publication number: 20060179113Abstract: Network domain reputation-based spam filtering is described. In an embodiment, emails are received from a network domain and a reputation of the network domain is established. Additional emails are filtered as they are received to determine a status of each email as spam email or not spam email. An email can be determined to be a spam email based on any one or more of the reputation of the network domain, an authentication status of an email, and other information that can be derived from an email.Type: ApplicationFiled: February 4, 2005Publication date: August 10, 2006Applicant: Microsoft CorporationInventors: Jay Buckingham, John Mehr, Paul Rehfuss, Robert Rounthwaite
-
Publication number: 20060168024Abstract: Techniques are presented for assigning reputations to email senders. In one implementation, real-time statistics and heuristics are constructed, stored, analyzed, and used to formulate a sender reputation level for use in evaluating and controlling a given sender's connection to an message transfer agent or email recipient. A sender with an unfavorable reputation may be denied a connection before resources are spent receiving and processing email messages from the sender. A sender with a favorable reputation may be rewarded by having safeguards removed from the connection, which also saves system resources. The statistics and heuristics may include real-time analysis of traffic patterns and delivery characteristics used by an email sender, analysis of content, and historical or time-sliced views of all of the above.Type: ApplicationFiled: December 13, 2004Publication date: July 27, 2006Applicant: Microsoft CorporationInventors: John Mehr, Nathan Howell, Paul Rehfuss
-
Publication number: 20050193073Abstract: The present invention involves a system and method that facilitate extracting data from messages for spam filtering. The extracted data can be in the form of features, which can be employed in connection with machine learning systems to build improved filters. Data associated with the subject line, timestamps, and the message body can be extracted and employed to generate one or more features. In particular, subject lines and message bodies can be examined for consecutive, repeating characters, blobs, the association or distance between such characters, blobs and non-blob portions of the message. The values or counts obtained can be broken down into one or more ranges corresponding to a degree of spaminess. Presence and type of attachments to messages, percentage of non-white-space and non-numeric characters of a message, and determining message delivery times can be used to identify spam. A time-based delta can be computed to facilitate determining the delivery time.Type: ApplicationFiled: March 1, 2004Publication date: September 1, 2005Inventors: John Mehr, Nathan Howell, Micah Rupersburg
-
Publication number: 20050022008Abstract: The present invention involves a system and method that facilitate extracting data from messages for spam filtering. The extracted data can be in the form of features, which can be employed in connection with machine learning systems to build improved filters. Data associated with origination information as well as other information embedded in the body of the message that allows a recipient of the message to contact and/or respond to the sender of the message call be extracted as features. The features, or a subset thereof, can be normalized and/or deobfuscated prior to being employed as features of the machine learning systems. The (deobfuscated) features can be employed to populate a plurality of feature lists that facilitate spam detection and prevention. Exemplary features include an email address, an IP address, a URL, an embedded image pointing to a URL, and/or portions thereof.Type: ApplicationFiled: June 4, 2003Publication date: January 27, 2005Inventors: Joshua Goodman, Robert Rounthwaite, Daniel Gwozdz, John Mehr, Nathan Howell, Micah Rupersburg, Bryan Starbuck