Patents by Inventor Joseph Linn

Joseph Linn has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11503070
    Abstract: The present disclosure generally relates to web page analysis, and more particularly to a classification system for web pages. The classification system may classify a web page as malicious based upon one or more signatures generated for the web page. For example, the classification system may compare one or more signatures generated for a first web page to one or more signatures generated for a second web page, where the first web page and the second web page are the same web page at different times or different web pages. Based upon a similarity of the signatures, the classification system may output whether the first web page is malicious. For another example, the classification system may include a classification model that is trained based upon one or more signatures for one or more classified web pages. The classification model may output whether the web page is malicious.
    Type: Grant
    Filed: November 1, 2017
    Date of Patent: November 15, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Adam Hunt, Joseph Linn, Elias Manousos, Chris Kiernan, David Pon, Jonas Edgeworth, Steven Alexander Daniel Pon
  • Patent number: 11461342
    Abstract: A computing system is described that determines, based on user-initiated actions performed by a group of computing devices, an intent of a search using a particular search query received from a computing device. The computing system adjusts, based on the intent, at least a particular portion of search results obtained from the search using the search query by emphasizing information that satisfies the intent. The computing system sends, to the computing device, an indication of the adjusted search results.
    Type: Grant
    Filed: December 10, 2020
    Date of Patent: October 4, 2022
    Assignee: GOOGLE LLC
    Inventors: Yew Jin Lim, Joseph Linn, Yuling Liang, Carsten Steinebach, Wei Lwun Lu, Dong Hyun Kim, James Kunz, Lauren Koepnick, Min Yang
  • Publication number: 20220014552
    Abstract: The present disclosure generally relates to web page analysis, and more particularly to detecting malicious behavior using an accomplice model. In certain embodiments, the accomplice model may determine that a URI is associated with malicious behavior based upon the URI being associated with an attribute determined to be related to malicious behavior. Examples of an attribute include a host system, a domain, or an element of a document used to render the web page. Examples of an element of a document used to render the web page may include an active/dynamic element (e.g., a function, a script, etc.) or an inactive/static element (e.g., a string, a number, a frame, a tracking username, a social networking username, etc.).
    Type: Application
    Filed: September 27, 2021
    Publication date: January 13, 2022
    Inventors: Adam HUNT, Joseph LINN, Nick GOODMAN, Elias MANOUSOS, Chris KIERNAN, David PON, Jonas EDGEWORTH
  • Patent number: 11134101
    Abstract: The present disclosure generally relates to web page analysis, and more particularly to detecting malicious behavior using an accomplice model. In certain embodiments, the accomplice model may determine that a URI is associated with malicious behavior based upon the URI being associated with an attribute determined to be related to malicious behavior. Examples of an attribute include a host system, a domain, or an element of a document used to render the web page. Examples of an element of a document used to render the web page may include an active/dynamic element (e.g., a function, a script, etc.) or an inactive/static element (e.g., a string, a number, a frame, a tracking username, a social networking username, etc.).
    Type: Grant
    Filed: December 10, 2019
    Date of Patent: September 28, 2021
    Assignee: RiskIQ, Inc.
    Inventors: Adam Hunt, Joseph Linn, Nick Goodman, Elias Manousos, Chris Kiernan, David Pon, Jonas Edgeworth
  • Publication number: 20210089548
    Abstract: A computing system is described that determines, based on user-initiated actions performed by a group of computing devices, an intent of a search using a particular search query received from a computing device. The computing system adjusts, based on the intent, at least a particular portion of search results obtained from the search using the search query by emphasizing information that satisfies the intent. The computing system sends, to the computing device, an indication of the adjusted search results.
    Type: Application
    Filed: December 10, 2020
    Publication date: March 25, 2021
    Inventors: Yew Jin Lim, Joseph Linn, Yuling Liang, Carsten Steinebach, Wei Lwun Lu, Dong Hyun Kim, James Kunz, Lauren Koepnick, Min Yang
  • Patent number: 10909124
    Abstract: A computing system is described that determines, based on user-initiated actions performed by a group of computing devices, an intent of a search using a particular search query received from a computing device. The computing system adjusts, based on the intent, at least a particular portion of search results obtained from the search using the search query by emphasizing information that satisfies the intent. The computing system sends, to the computing device, an indication of the adjusted search results.
    Type: Grant
    Filed: May 18, 2017
    Date of Patent: February 2, 2021
    Assignee: GOOGLE LLC
    Inventors: Yew Jin Lim, Joseph Linn, Yuling Liang, Carsten Steinebach, Wei Lwun Lu, Dong Hyun Kim, James Kunz, Lauren Koepnick, Min Yang
  • Patent number: 10757101
    Abstract: Embodiments are directed to using a hash signature of a rendered DOM object of a website to find similar content and behavior on other websites. Embodiments break a DOM into a large number of data portions (i.e., “shingles”), apply a hashing algorithm to the shingles, select a predetermined number of hashes from the hashed shingles according to a selection criteria to create a hash signature, and compare the hash signature to that of a reference page to determine similarity of website DOM object content. Embodiments can be used to identify phishing websites, defaced websites, spam websites, significant changes in the content of a webpage, copyright infringement, and any other suitable purposes related to the similarity between website DOM object content.
    Type: Grant
    Filed: September 25, 2018
    Date of Patent: August 25, 2020
    Assignee: RiskIQ, Inc.
    Inventors: Adam Hunt, David Pon, Chris Kiernan, Ben Adams, Jonas Edgeworth, Elias Manousos, Joseph Linn
  • Publication number: 20200120133
    Abstract: The present disclosure generally relates to web page analysis, and more particularly to detecting malicious behavior using an accomplice model. In certain embodiments, the accomplice model may determine that a URI is associated with malicious behavior based upon the URI being associated with an attribute determined to be related to malicious behavior. Examples of an attribute include a host system, a domain, or an element of a document used to render the web page. Examples of an element of a document used to render the web page may include an active/dynamic element (e.g., a function, a script, etc.) or an inactive/static element (e.g., a string, a number, a frame, a tracking username, a social networking username, etc.).
    Type: Application
    Filed: December 10, 2019
    Publication date: April 16, 2020
    Applicant: RISKIQ, Inc.
    Inventors: Adam Hunt, Joseph Linn, Nick Goodman, Elias Manousos, Chris Kiernan, David Pon, Jonas Edgeworth
  • Patent number: 10505981
    Abstract: The present disclosure generally relates to web page analysis, and more particularly to detecting malicious behavior using an accomplice model. In certain embodiments, the accomplice model may determine that a URI is associated with malicious behavior based upon the URI being associated with an attribute determined to be related to malicious behavior. Examples of an attribute include a host system, a domain, or an element of a document used to render the web page. Examples of an element of a document used to render the web page may include an active/dynamic element (e.g., a function, a script, etc.) or an inactive/static element (e.g., a string, a number, a frame, a tracking username, a social networking username, etc.).
    Type: Grant
    Filed: November 3, 2017
    Date of Patent: December 10, 2019
    Assignee: RiskIQ, Inc.
    Inventors: Adam Hunt, Joseph Linn, Nick Goodman, Elias Manousos, Chris Kiernan, David Pon, Jonas Edgeworth
  • Publication number: 20190028473
    Abstract: Embodiments are directed to using a hash signature of a rendered DOM object of a website to find similar content and behavior on other websites. Embodiments break a DOM into a large number of data portions (i.e., “shingles”), apply a hashing algorithm to the shingles, select a predetermined number of hashes from the hashed shingles according to a selection criteria to create a hash signature, and compare the hash signature to that of a reference page to determine similarity of website DOM object content. Embodiments can be used to identify phishing websites, defaced websites, spam websites, significant changes in the content of a webpage, copyright infringement, and any other suitable purposes related to the similarity between website DOM object content.
    Type: Application
    Filed: September 25, 2018
    Publication date: January 24, 2019
    Inventors: Adam Hunt, David Pon, Chris Kiernan, Ben Adams, Jonas Edgeworth, Elias Manousos, Joseph Linn
  • Publication number: 20180336200
    Abstract: A computing system is described that determines, based on user-initiated actions performed by a group of computing devices, an intent of a search using a particular search query received from a computing device. The computing system adjusts, based on the intent, at least a particular portion of search results obtained from the search using the search query by emphasizing information that satisfies the intent. The computing system sends, to the computing device, an indication of the adjusted search results.
    Type: Application
    Filed: May 18, 2017
    Publication date: November 22, 2018
    Inventors: Yew Jin Lim, Joseph Linn, Yuling Liang, Carsten Steinebach, Wei Lwun Lu, Dong Hyun Kim, James Kunz, Lauren Koepnick, Min Yang
  • Patent number: 10084779
    Abstract: Embodiments are directed to using a hash signature of a rendered DOM object of a website to find similar content and behavior on other websites. Embodiments break a DOM into a large number of data portions (i.e., “shingles”), apply a hashing algorithm to the shingles, select a predetermined number of hashes from the hashed shingles according to a selection criteria to create a hash signature, and compare the hash signature to that of a reference page to determine similarity of website DOM object content. Embodiments can be used to identify phishing websites, defaced websites, spam websites, significant changes in the content of a webpage, copyright infringement, and any other suitable purposes related to the similarity between website DOM object content.
    Type: Grant
    Filed: June 16, 2017
    Date of Patent: September 25, 2018
    Assignee: RiskIQ, Inc.
    Inventors: Adam Hunt, David Pon, Chris Kiernan, Ben Adams, Jonas Edgeworth, Elias Manousos, Joseph Linn
  • Publication number: 20180124109
    Abstract: The present disclosure generally relates to web page analysis, and more particularly to a classification system for web pages. The classification system may classify a web page as malicious based upon one or more signatures generated for the web page. For example, the classification system may compare one or more signatures generated for a first web page to one or more signatures generated for a second web page, where the first web page and the second web page are the same web page at different times or different web pages. Based upon a similarity of the signatures, the classification system may output whether the first web page is malicious. For another example, the classification system may include a classification model that is trained based upon one or more signatures for one or more classified web pages. The classification model may output whether the web page is malicious.
    Type: Application
    Filed: November 1, 2017
    Publication date: May 3, 2018
    Applicant: RiskIQ, Inc.
    Inventors: Adam Hunt, Joseph Linn, Elias Manousos, Chris Kiernan, David Pon, Jonas Edgeworth, Steven Alexander Daniel Pon
  • Publication number: 20180124110
    Abstract: The present disclosure generally relates to web page analysis, and more particularly to detecting malicious behavior using an accomplice model. In certain embodiments, the accomplice model may determine that a URI is associated with malicious behavior based upon the URI being associated with an attribute determined to be related to malicious behavior. Examples of an attribute include a host system, a domain, or an element of a document used to render the web page. Examples of an element of a document used to render the web page may include an active/dynamic element (e.g., a function, a script, etc.) or an inactive/static element (e.g., a string, a number, a frame, a tracking username, a social networking username, etc.).
    Type: Application
    Filed: November 3, 2017
    Publication date: May 3, 2018
    Applicant: RISKIQ, Inc.
    Inventors: Adam Hunt, Joseph Linn, Nick Goodman, Elias Manousos, Chris Kiernan, David Pon, Jonas Edgeworth
  • Publication number: 20180068324
    Abstract: A computing system is described that determines, based on survey information, a group of users of computing devices who have expressed interest in an event, wherein the group of users is included in a plurality of users, and wherein each of the plurality of users has an interest profile. The computing system also determines, based on the interest profiles for each of the users in the group of users, one or more interests indicating interest in the event, and identifies, based on the one or more interests indicating interest in the event, a user not included in the group of users that has an interest profile including the one or more interests indicating interest in the event. The computing system also transmits, to a computing device associated with the user, information about the event.
    Type: Application
    Filed: September 6, 2016
    Publication date: March 8, 2018
    Inventors: Lori Meiskey, Joseph Linn
  • Publication number: 20170286544
    Abstract: Embodiments are directed to using a hash signature of a rendered DOM object of a website to find similar content and behavior on other websites. Embodiments break a DOM into a large number of data portions (i.e., “shingles”), apply a hashing algorithm to the shingles, select a predetermined number of hashes from the hashed shingles according to a selection criteria to create a hash signature, and compare the hash signature to that of a reference page to determine similarity of website DOM object content. Embodiments can be used to identify phishing websites, defaced websites, spam websites, significant changes in the content of a webpage, copyright infringement, and any other suitable purposes related to the similarity between website DOM object content.
    Type: Application
    Filed: June 16, 2017
    Publication date: October 5, 2017
    Applicant: RiskIQ, Inc.
    Inventors: Adam Hunt, David Pon, Chris Kiernan, Ben Adams, Jonas Edgeworth, Elias Manousos, Joseph Linn
  • Patent number: 9686283
    Abstract: Embodiments are directed to using a hash signature of a rendered DOM object of a website to find similar content and behavior on other websites. Embodiments break a DOM into a large number of data portions (i.e., “shingles”), apply a hashing algorithm to the shingles, select a predetermined number of hashes from the hashed shingles according to a selection criteria to create a hash signature, and compare the hash signature to that of a reference page to determine similarity of website DOM object content. Embodiments can be used to identify phishing websites, defaced websites, spam websites, significant changes in the content of a webpage, copyright infringement, and any other suitable purposes related to the similarity between website DOM object content.
    Type: Grant
    Filed: May 20, 2016
    Date of Patent: June 20, 2017
    Assignee: RiskIQ, Inc.
    Inventors: Adam Hunt, David Pon, Chris Kiernan, Ben Adams, Jonas Edgeworth, Elias Manousos, Joseph Linn
  • Publication number: 20170078286
    Abstract: Embodiments are directed to using a hash signature of a rendered DOM object of a website to find similar content and behavior on other websites. Embodiments break a DOM into a large number of data portions (i.e., “shingles”), apply a hashing algorithm to the shingles, select a predetermined number of hashes from the hashed shingles according to a selection criteria to create a hash signature, and compare the hash signature to that of a reference page to determine similarity of website DOM object content. Embodiments can be used to identify phishing websites, defaced websites, spam websites, significant changes in the content of a webpage, copyright infringement, and any other suitable purposes related to the similarity between website DOM object content.
    Type: Application
    Filed: May 20, 2016
    Publication date: March 16, 2017
    Inventors: Adam Hunt, David Pon, Chris Kiernan, Ben Adams, Jonas Edgeworth, Elias Manousos, Joseph Linn
  • Patent number: 9386037
    Abstract: Embodiments are directed to using a hash signature of a rendered DOM object of a website to find similar content and behavior on other websites. Embodiments break a DOM into a large number of data portions (i.e., “shingles”), apply a hashing algorithm to the shingles, select a predetermined number of hashes from the hashed shingles according to a selection criteria to create a hash signature, and compare the hash signature to that of a reference page to determine similarity of website DOM object content. Embodiments can be used to identify phishing websites, defaced websites, spam websites, significant changes in the content of a webpage, copyright infringement, and any other suitable purposes related to the similarity between website DOM object content.
    Type: Grant
    Filed: November 11, 2015
    Date of Patent: July 5, 2016
    Assignee: RiskIQ Inc.
    Inventors: Adam Hunt, David Pon, Chris Kiernan, Ben Adams, Jonas Edgeworth, Elias Manousos, Joseph Linn
  • Patent number: 6869535
    Abstract: There is disclosed a co-oxidation method and a reagent system of co-oxidation agents for removing from a contaminated zone below the ground surface a water-immiscible organic compound having a density greater than that of water from a contaminated zone below the ground surface, comprising the steps of (a) injecting into the contaminated zone a solution of at least one inorganic permanganate salt, (b) injecting into the zone a cosolvent compatible with the inorganic permanganate salt, (c) causing reaction of the permanganate salt with the water-immiscible organic compound, and (d) extracting co-oxidant from the contaminated zone, thereby diminishing the level of water-immiscible organic compound present in the contaminated zone.
    Type: Grant
    Filed: May 30, 2002
    Date of Patent: March 22, 2005
    Inventors: Robert Collins Cowdery, Joseph Linn Applegate, Kevin Michael Warner