Patents by Inventor Krishna C. Vitaldevara
Krishna C. Vitaldevara has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9246894Abstract: When a user account is in an alternate (fault) state, communication or sync between an application provider and a device or client application typically is interrupted. When parties do not support rich fault messaging, communication of the reason for the interruption and remediation steps has been impossible. An application server provides rich fault messaging using applications that do not provide explicit error messaging and protocols that do not provide explicit error messaging without changing either the application or the protocol by additional interactions between an identity provider and the application server. The application server uses authentication state information provided by the identity server to generate a notification sync event that appears to the application and the protocol to be a normal sync event. The notification sync event is used to provide the user with information needed to determine what the problem with the account is and how to fix it.Type: GrantFiled: October 30, 2012Date of Patent: January 26, 2016Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC.Inventors: Ariel N. Gordon, David J. Steeves, Luke T. Abrams, Pui-Yin Wong, Krishna C. Vitaldevara
-
Patent number: 9098459Abstract: The filtering of activities generated by nodes of a network while interacting with a device may be performed by evaluating the desirability of the activities (e.g., a spam or not-spam determination of email messages sent by the node) and assigning a trust rating to the node. However, nodes are often identified by network address, and an operator of a node sending undesirable activities may reassign the network address of the node in order to avoid heavy filtering. Instead, nodes may be identified as being controlled by a network entity (e.g., an autonomous system identified in a border gateway protocol routing table.) The network entity is assigned a network entity trust rating based on the trust ratings of the nodes controlled thereby, and an appropriate level of activity filtering based on the network entity trust rating may be selected for subsequent activities received from all nodes controlled by the network entity.Type: GrantFiled: January 29, 2010Date of Patent: August 4, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Malcolm H Davis, Aravind K Ramachandran, Geoffrey J Hulten, Ivan Osipkov, Milenko Drinic, Eliot C. Gillum, Krishna C. Vitaldevara, Jason D. Walter, Mehrdad Bidgoli, Robert L. McCann
-
Patent number: 8959157Abstract: A system and method of managing unsolicited email sent to an email system over a network. Email messages are received at an message at an inbound mail transfer agent. A determination is made as to whether the email message is suspected to be an unsolicited suspect message. One or more queries for additional information on one or more characteristics of the message is initiated. Determinations are made based on replies to the queries before issuing a message accepted for delivery indication to a sending server.Type: GrantFiled: June 26, 2009Date of Patent: February 17, 2015Assignee: Microsoft CorporationInventors: Jason D. Walter, Eliot C. Gillum, Krishna C. Vitaldevara, Ryan Charles Colvin, Mehrdad Bidgoli, Chad W. Mills, Joshua David Korb, Robert Lee McCann, Douglas John Hines, Malcolm Hollis Davis, Milenko Drinic
-
Patent number: 8959159Abstract: A computer implemented method for filtering unwanted bulk email in an email system and providing a positive user experience is provided. The method enables protection of email users from unsolicited bulk email using user-provided data on user interactions at both a user storage level and a global level with an email system. Metadata on user interactions with messages is collected. Messages are received by the system and evaluated using a global filter which assigns a score resulting in a message action. The action may be message delivery, message non-delivery or message routing, based on a score assigned by the global filter. When the message is delivered to user storage, the message may be examined relative to the metadata, and may alter the message action to an action different than the message action resulting from the score. Metadata for a plurality of users is returned to the global filter for use in making filtering future messages and modifies the global filter.Type: GrantFiled: April 1, 2010Date of Patent: February 17, 2015Assignee: Microsoft CorporationInventors: Krishna C. Vitaldevara, Eliot C. Gillum, Jason D Walter, Robert McCann, Vasantha K. Vemula, Mehrdad Bidgoli
-
Patent number: 8745143Abstract: A computer implemented system and method to enable protection of email users from unsolicited bulk email using a message delivery delay based on characteristics detected in selected messages. Messages are evaluated for characteristics resembling unsolicited bulk email. A determination is made whether a message passing through the email system exhibits such characteristics and whether to delay the message. Suspect messages may be delayed for a period of time, the delay period being dependent on the characteristics giving rise to a determination to delay. Following the period, additional information received during the delay period characterizing the message is used to determine whether to dispose or deliver the message. Messages evaluated can be inbound to the email system, outbound to other email systems, or moving within the email system.Type: GrantFiled: April 1, 2010Date of Patent: June 3, 2014Assignee: Microsoft CorporationInventors: Krishna C Vitaldevara, Eliot C Gillum, Jason D Walter, Mehrdad Bidgoli
-
Publication number: 20140123257Abstract: When a user account is in an alternate (fault) state, communication or sync between an application provider and a device or client application typically is interrupted. When parties do not support rich fault messaging, communication of the reason for the interruption and remediation steps has been impossible. An application server provides rich fault messaging using applications that do not provide explicit error messaging and protocols that do not provide explicit error messaging without changing either the application or the protocol by additional interactions between an identity provider and the application server. The application server uses authentication state information provided by the identity server to generate a notification sync event that appears to the application and the protocol to be a normal sync event. The notification sync event is used to provide the user with information needed to determine what the problem with the account is and how to fix it.Type: ApplicationFiled: October 30, 2012Publication date: May 1, 2014Applicant: Microsoft CorporationInventors: Ariel N. Gordon, David J. Steeves, Luke T. Abrams, Pui-Yin Wong, Krishna C. Vitaldevara
-
Patent number: 8707407Abstract: A method for providing an additional layer of authentication prior to accessing a user's account even though the user's credentials have previously been verified. User accounts are often accessed via a sign-in page that verifies the user's credentials. Upon detecting a device accessing the sign-in page, an identifier associated with the device is obtained. One such type of identifier is the IP address assigned to the device. Based on the identifier, it is determined whether the device is trusted or not. Even thought the user's credentials are verified via the sign-in page, if the device is not trusted, a second authentication page is presented to the user prior to proceeding to the account. The second authentication page presents at least one security question. The security question is based on information contained in the user's account (e.g., contact information, event information, electronic messages, etc.). The user is required to correctly answer the security question in order to access the account.Type: GrantFiled: February 4, 2009Date of Patent: April 22, 2014Assignee: Microsoft CorporationInventors: Richard S. Craddock, Krishna C. Vitaldevara
-
Patent number: 8370902Abstract: Network entities controlling a set of nodes may vary by trustworthiness, such as tolerance for nodes that send spam, distribute malware, or perform denial-of-service attacks. A device receiving such activities may identify a trust rating of the network entity and apply appropriately stringent filtering (such as spam evaluation) to activities received from nodes controlled by the network entity. However, a poor trust rating of a network entity may subject a legitimate node controlled by the network entity to inefficiently or unfairly stringent activity filtering. Instead, the device may evaluate the activities of a particular node, assign a trust rating to the node, and if the trust rating of the node is higher than the trust rating of the network entity, apply less stringent activity filtering to the activities of the node, thereby “rescuing” the node from the more stringent activity filtering applied to the other nodes of the network entity.Type: GrantFiled: January 29, 2010Date of Patent: February 5, 2013Assignee: Microsoft CorporationInventors: Malcolm H Davis, Aravind K Ramachandran, Geoffrey J Hulten, Ivan Osipkov, Milenko Drinic, Eliot C. Gillum, Krishna C. Vitaldevara, Jason D. Walter, Mehrdad Bidgoli, Robert L. McCann
-
Patent number: 8255468Abstract: Methods for assisting email users manage email messages received in an email account. An event is triggered by an action performed by an email user with respect to an email message in an email account. The event identifies an entity associated with the email message (e.g., sender address, domain, keyword, etc.). A determination is made whether to assist the user manage their email based on a heuristic. The heuristic assigns weights based on prior events associated with the same entity to determine whether the user is interested in receiving emails from the sender. Based on the heuristics, the method may add the sender to the user's block-list or unsubscribe the user from a mailing list.Type: GrantFiled: February 11, 2009Date of Patent: August 28, 2012Assignee: Microsoft CorporationInventors: Krishna C. Vitaldevara, Eliot C. Gillum, Jason D. Walter, Mehrdad Bidgoli
-
Patent number: 8195753Abstract: In a distributed email system, user preferences respected more effectively by presenting messages marked for deletion to secondary messaging servers having access to user preferences. Messages marked for deletion by inbound servers are presented to secondary level servers having access to user white lists and the choice of whether to delete the suspect message is made by the secondary server.Type: GrantFiled: January 7, 2009Date of Patent: June 5, 2012Assignee: Microsoft CorporationInventors: Krishna C. Vitaldevara, Eliot C. Gillum, Jason D. Walter, Mehrdad Bidgoli
-
Publication number: 20110246583Abstract: A computer implemented system and method to enable protection of email users from unsolicited bulk email using a message delivery delay based on characteristics detected in selected messages. Messages are evaluated for characteristics resembling unsolicited bulk email. A determination is made whether a message passing through the email system exhibits such characteristics and whether to delay the message. Suspect messages may be delayed for a period of time, the delay period being dependent on the characteristics giving rise to a determination to delay. Following the period, additional information received during the delay period characterizing the message is used to determine whether to dispose or deliver the message. Messages evaluated can be inbound to the email system, outbound to other email systems, or moving within the email system.Type: ApplicationFiled: April 1, 2010Publication date: October 6, 2011Applicant: MICROSOFT CORPORATIONInventors: Krishna C. Vitaldevara, Eliot C. Gillum, Jason D. Walter, Mehrdad Bidgoli
-
Publication number: 20110246584Abstract: A computer implemented method for filtering unwanted bulk email in an email system and providing a positive user experience is provided. The method enables protection of email users from unsolicited bulk email using user-provided data on user interactions at both a user storage level and a global level with an email system. Metadata on user interactions with messages is collected. Messages are received by the system and evaluated using a global filter which assigns a score resulting in a message action. The action may be message delivery, message non-delivery or message routing, based on a score assigned by the global filter. When the message is delivered to user storage, the message may be examined relative to the metadata, and may alter the message action to an action different than the message action resulting from the score. Metadata for a plurality of users is returned to the global filter for use in making filtering future messages and modifies the global filter.Type: ApplicationFiled: April 1, 2010Publication date: October 6, 2011Applicant: MICROSOFT CORPORATIONInventors: Krishna C. Vitaldevara, Eliot C. Gillum, Jason D Walter, Robert McCann, Vasantha K. Vemula, Mehrdad Bidgoli
-
Publication number: 20110191847Abstract: The filtering of activities generated by nodes of a network while interacting with a device may be performed by evaluating the desirability of the activities (e.g., a spam or not-spam determination of email messages sent by the node) and assigning a trust rating to the node. However, nodes are often identified by network address, and an operator of a node sending undesirable activities may reassign the network address of the node in order to avoid heavy filtering. Instead, nodes may be identified as being controlled by a network entity (e.g., an autonomous system identified in a border gateway protocol routing table.) The network entity is assigned a network entity trust rating based on the trust ratings of the nodes controlled thereby, and an appropriate level of activity filtering based on the network entity trust rating may be selected for subsequent activities received from all nodes controlled by the network entity.Type: ApplicationFiled: January 29, 2010Publication date: August 4, 2011Applicant: Microsoft CorporationInventors: Malcolm H. Davis, Aravind K. Ramachandran, Geoffrey J. Hulten, Ivan Osipkov, Milenko Drinic, Eliot C. Gillum, Krishna C. Vitaldevara, Jason D. Walter, Mehrdad Bidgoli, Robert L. McCann
-
Publication number: 20110191832Abstract: Network entities controlling a set of nodes may vary by trustworthiness, such as tolerance for nodes that send spam, distribute malware, or perform denial-of-service attacks. A device receiving such activities may identify a trust rating of the network entity and apply appropriately stringent filtering (such as spam evaluation) to activities received from nodes controlled by the network entity. However, a poor trust rating of a network entity may subject a legitimate node controlled by the network entity to inefficiently or unfairly stringent activity filtering. Instead, the device may evaluate the activities of a particular node, assign a trust rating to the node, and if the trust rating of the node is higher than the trust rating of the network entity, apply less stringent activity filtering to the activities of the node, thereby “rescuing” the node from the more stringent activity filtering applied to the other nodes of the network entity.Type: ApplicationFiled: January 29, 2010Publication date: August 4, 2011Applicant: Microsoft CorporationInventors: Malcolm H. Davis, Aravind K. Ramachandran, Geoffrey J. Hulten, Ivan Osipkov, Milenko Drinic, Eliot C. Gillum, Krishna C. Vitaldevara, Jason D. Walter, Mehrdad Bidgoli, Robert L. McCann
-
Publication number: 20100332601Abstract: A system and method of managing unsolicited email sent to an email system over a network. Email messages are received at an message at an inbound mail transfer agent. A determination is made as to whether the email message is suspected to be an unsolicited suspect message. One or more queries for additional information on one or more characteristics of the message is initiated. Determinations are made based on replies to the queries before issuing a message accepted for delivery indication to a sending server.Type: ApplicationFiled: June 26, 2009Publication date: December 30, 2010Inventors: Jason D. Walter, Eliot C. Gillum, Krishna C. Vitaldevara, Ryan Charles Colvin, Mehrdad Bidgoli, Chad W. Mills, Joshua David Korb, Robert Lee McCann, Douglas John Hines, Malcolm Hollis Davis, Milenko Drinic
-
Publication number: 20100205259Abstract: Methods for assisting email users manage email messages received in an email account. An event is triggered by an action performed by an email user with respect to an email message in an email account. The event identifies an entity associated with the email message (e.g., sender address, domain, keyword, etc.). A determination is made whether to assist the user manage their email based on a heuristic. The heuristic assigns weights based on prior events associated with the same entity to determine whether the user is interested in receiving emails from the sender. Based on the heuristics, the method may add the sender to the user's block-list or unsubscribe the user from a mailing list.Type: ApplicationFiled: February 11, 2009Publication date: August 12, 2010Applicant: MICROSOFT CORPORATIONInventors: Krishna C. Vitaldevara, Eliot C. Gillum, Jason D. Walter, Mehrdad Bidgoli
-
Publication number: 20100199338Abstract: A method for providing an additional layer of authentication prior to accessing a user's account even though the user's credentials have previously been verified. User accounts are often accessed via a sign-in page that verifies the user's credentials. Upon detecting a device accessing the sign-in page, an identifier associated with the device is obtained. One such type of identifier is the IP address assigned to the device. Based on the identifier, it is determined whether the device is trusted or not. Even thought the user's credentials are verified via the sign-in page, if the device is not trusted, a second authentication page is presented to the user prior to proceeding to the account. The second authentication page presents at least one security question. The security question is based on information contained in the user's account (e.g., contact information, event information, electronic messages, etc.). The user is required to correctly answer the security question in order to access the account.Type: ApplicationFiled: February 4, 2009Publication date: August 5, 2010Applicant: MICROSOFT CORPORATIONInventors: Richard S. Craddock, Krishna C. Vitaldevara
-
Publication number: 20100174788Abstract: In a distributed email system, user preferences respected more effectively by presenting messages marked for deletion to secondary messaging servers having access to user preferences. Messages marked for deletion by inbound servers are presented to secondary level servers having access to user white lists and the choice of whether to delete the suspect message is made by the secondary server.Type: ApplicationFiled: January 7, 2009Publication date: July 8, 2010Applicant: MICROSOFT CORPORATIONInventors: Krishna C. Vitaldevara, Eliot C. Gillum, Jason D. Walter, Mehrdad Bidgoli
-
Publication number: 20100175103Abstract: A method for throttling inbound email messages in an enterprise email system including a plurality of inbound mail servers and at least one management server is provided. Policies defining message event limits for each unique sender are applied to messaging events from the unique sender at each inbound server. Feedback from each of the inbound mail servers to the management server is provided. When events from a unique sender exceed a threshold, as determined by the management server using the feedback, an alert is generated and a new, more restrictive policy for the unique sender is created. The more restrictive policy is broadcast the more restrictive policy to each of the inbound mail servers.Type: ApplicationFiled: January 7, 2009Publication date: July 8, 2010Applicant: MICROSOFT CORPORATIONInventors: Jason D. Walter, Eliot C. Gillum, Krishna C. Vitaldevara, Ryan Charles Colvin, Mehrdad Bidgoli, Chad Mills, Joshua David Korb
-
Patent number: 7418461Abstract: Automatically determining the conformance of database server schema. Maintaining conformance of database schema helps manage and sustain database driven services and applications. Schema for a pair of randomly selected databases are generated and compared. A diffgram is generated from the difference of the database schema. An alarm message can then be sent to an alarm server with the differences of the comparable databases. A master schema dump can be compared to selected database servers within the database system concurrently with the comparable database pair schema processing. A diffgram is generated in response to the comparison between the selected database schema and the master schema.Type: GrantFiled: January 14, 2005Date of Patent: August 26, 2008Assignee: Microsoft CorporationInventors: Leela S. Tamma, Krishna C. Vitaldevara, Durgesh Srivastava