Patents by Inventor Krishna Vitaldevara

Krishna Vitaldevara has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9288173
    Abstract: Geo-data spam filters are described. In one or more implementations, origin data and language data of a message are evaluated to establish a score for the message indicating a likelihood that the message is spam. The evaluation includes comparing the origin data and the language data to ranked lists indicating message origins and languages with which a respective message recipient interacts positively and ranked lists indicating message origins and languages with which the respective recipient interacts negatively. Interactions of the respective recipient with previously sent messages may be tracked to form these lists. Based on the score established by evaluating the origin data and the language data of the message, the message is filtered for delivery.
    Type: Grant
    Filed: December 17, 2013
    Date of Patent: March 15, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Krishna Vitaldevara, Eliot C. Gillum, Jason D. Walter, Kevin H. Lau, Geoffrey John Hulten
  • Publication number: 20160021095
    Abstract: In one embodiment, a user authentication server may use geo-location tracking to determine whether to present an enhanced identity challenge. A communication interface 180 may receive a user login attempt by a user and a current location of the user login attempt. A data storage 150 may store a user location profile of the user. A processor 120 may execute a comparison of the current location to the user location profile. The communication interface 180 may present the user with an enhanced identity challenge before allowing user access based on the comparison.
    Type: Application
    Filed: September 30, 2015
    Publication date: January 21, 2016
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: David Steeves, Luke Abrams, Hersh Dangayach, Eric Fleischman, Prabu Raju, Krishna Vitaldevara, Niyantha Shekar, Payoj Baral, Meenakshi Ramaswamy, Winfred Wong, Yordan Rouskov, Ramesh Manne
  • Patent number: 9177125
    Abstract: In one embodiment, a user authentication server may use geo-location tracking to determine whether to present an enhanced identity challenge. A communication interface 180 may receive a user login attempt by a user and a current location of the user login attempt. A data storage 150 may store a user location profile of the user. A processor 120 may execute a comparison of the current location to the user location profile. The communication interface 180 may present the user with an enhanced identity challenge before allowing user access based on the comparison.
    Type: Grant
    Filed: July 6, 2011
    Date of Patent: November 3, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: David Steeves, Luke Abrams, Hersh Dangayach, Eric Fleischman, Prabu Raju, Krishna Vitaldevara, Niyantha Shekar, Payoj Baral, Meenakshi Ramaswamy, Winfred Wong, Yordan Rouskov, Ramesh Manne
  • Patent number: 8966620
    Abstract: Campaign detection techniques are described. In implementations, a signature is computed for each of a plurality of emails to be communicated by a service provider to respective intended recipients. A determination is made that two or more of the plurality of emails is similar based on the respective signatures. Responsive to a finding that a number of similar emails exceeds a threshold, an indication is output that the similar emails have a likelihood of being involved in a spam campaign.
    Type: Grant
    Filed: May 27, 2010
    Date of Patent: February 24, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Douglas J. Hines, Mihai Costea, Yuxiang Xu, Harsh S. Dangayach, Krishna Vitaldevara, Eliot C. Gillum, Jason D. Walter, Aleksander R. Kolcz
  • Publication number: 20150007053
    Abstract: Email tags are described. In embodiments, email messages are received for distribution to client devices that correspond to respective recipients of the email messages. Email routing decisions are applied to route an email message to an email folder for a recipient of the email message, where the email folder may include an email inbox, a junk folder, or a user-created folder. The email message is then tagged with an email tag to generate a tagged email message. The email tag includes a routing description that indicates why the email message was routed to the particular email folder.
    Type: Application
    Filed: September 12, 2014
    Publication date: January 1, 2015
    Inventors: Krishna Vitaldevara, Sanchan Sahai Saxena, Eliot C. Gillum, Rebecca Ping Zhu, Tyler J. Schnoebelen
  • Publication number: 20140289428
    Abstract: In embodiments of dynamic intervals for synchronizing data, the data is periodically synchronized between computing devices, such as between server devices, client devices, and/or between client and server devices. A polling optimization service can assess heuristics that are associated with the data synchronizations between the computing devices, and determine optimal dynamic intervals to periodically synchronize the data based on the heuristics. The polling optimization service can then iterate to further assess the heuristics that are associated with subsequent data synchronizations and determine updates of the optimal dynamic intervals. The polling optimization service updates the heuristics based on the subsequent and ongoing data synchronizations, and iterates to update the optimal dynamic intervals based on the updated heuristics.
    Type: Application
    Filed: March 20, 2013
    Publication date: September 25, 2014
    Inventors: Jason D. Walter, Ashutosh Tewari, Krishna Vitaldevara
  • Patent number: 8843568
    Abstract: Email tags are described. In embodiments, email messages are received for distribution to client devices that correspond to respective recipients of the email messages. Email routing decisions are applied to route an email message to an email folder for a recipient of the email message, where the email folder may include an email inbox, a junk folder, or a user-created folder. The email message is then tagged with an email tag to generate a tagged email message. The email tag includes a routing description that indicates why the email message was routed to the particular email folder.
    Type: Grant
    Filed: May 17, 2010
    Date of Patent: September 23, 2014
    Assignee: Microsoft Corporation
    Inventors: Krishna Vitaldevara, Sanchan Sahai Saxena, Eliot C. Gillum, Rebecca Ping Zhu, Tyler J. Schnoebelen
  • Publication number: 20140156776
    Abstract: Techniques involving identification of electronic messages that are the first contact between the sender identification and addressed recipients. One representative technique includes identifying electronic messages originating from a sender that are first contact electronic messages between the sender and targeted recipients. The sender of the electronic messages may be designated as a source of unsolicited messages if heuristics involving the first contact electronic messages indicate a distribution of unsolicited messages by the sender.
    Type: Application
    Filed: February 8, 2014
    Publication date: June 5, 2014
    Applicant: Microsoft Corporation
    Inventors: Krishna Vitaldevara, Jason Walter, Vasantha K. Vemula
  • Patent number: 8745738
    Abstract: Trusted user accounts of an application provider are determined. Graphs, such as trees, are created with each node corresponding to a trusted account. Each of the nodes is associated with a vouching quota, or the nodes may share a vouching quota. Untrusted user accounts are determined. For each of these untrusted accounts, a trusted user account that has a social networking relationship is determined. If the node corresponding to the trusted user account has enough vouching quota to vouch for the untrusted user account, then the quota is debited, a node is added for the untrusted user account to the graph, and the untrusted user account is vouched for. If not, available vouching quota may be borrowed from other nodes in the graph.
    Type: Grant
    Filed: January 15, 2012
    Date of Patent: June 3, 2014
    Assignee: Microsoft Corporation
    Inventors: Yinglian Xie, Fang Yu, Qifa Ke, Martin Abadi, Eliot C. Gillum, Krishna Vitaldevara, Jason D. Walter
  • Publication number: 20140108578
    Abstract: Geo-data spam filters are described. In one or more implementations, origin data and language data of a message are evaluated to establish a score for the message indicating a likelihood that the message is spam. The evaluation includes comparing the origin data and the language data to ranked lists indicating message origins and languages with which a respective message recipient interacts positively and ranked lists indicating message origins and languages with which the respective recipient interacts negatively. Interactions of the respective recipient with previously sent messages may be tracked to form these lists. Based on the score established by evaluating the origin data and the language data of the message, the message is filtered for delivery.
    Type: Application
    Filed: December 17, 2013
    Publication date: April 17, 2014
    Applicant: Microsoft Corporation
    Inventors: Krishna Vitaldevara, Eliot C. Gillum, Jason D. Walter, Kevin H. Lau, Geoffrey John Hulten
  • Patent number: 8682990
    Abstract: Techniques involving identification of electronic messages that are the first contact between the sender identification and addressed recipients. One representative technique includes identifying electronic messages originating from a sender that are first contact electronic messages between the sender and targeted recipients. The sender of the electronic messages may be designated as a source of unsolicited messages if heuristics involving the first contact electronic messages indicate a distribution of unsolicited messages by the sender.
    Type: Grant
    Filed: October 3, 2011
    Date of Patent: March 25, 2014
    Assignee: Microsoft Corporation
    Inventors: Krishna Vitaldevara, Jason Walter, Vasantha K. Vemula
  • Publication number: 20140020108
    Abstract: In one embodiment, a cloud service interface 112 or a device interface 124 may filter messages in a message synchronization between a message service account and a cloud service account. A cloud service interface 112 or a device interface 124 may associate a message service account 114 on a user messaging device 110 with a cloud service account 122. The cloud service interface 112 or a device interface 124 may execute a message synchronization between the cloud service account 122 and the message service account 114. The cloud service interface 112 or a device interface 124 may apply a message filter to the message synchronization.
    Type: Application
    Filed: July 12, 2012
    Publication date: January 16, 2014
    Applicant: Microsoft Corporation
    Inventors: Aby John, Luke Abrams, Ryan Burkhardt, Krishna Vitaldevara
  • Patent number: 8626856
    Abstract: Geo-data spam filters are described. In one or more implementations, origin data and language data of a message are evaluated to establish a score for the message indicating a likelihood that the message is spam. The evaluation includes comparing the origin data and the language data to ranked lists indicating message origins and languages with which a respective message recipient interacts positively and ranked lists indicating message origins and languages with which the respective recipient interacts negatively. Interactions of the respective recipient with previously sent messages may be tracked to form these lists. Based message, the message is filtered for delivery.
    Type: Grant
    Filed: April 11, 2011
    Date of Patent: January 7, 2014
    Assignee: Microsoft Corporation
    Inventors: Krishna Vitaldevara, Eliot C. Gillum, Jason D. Walter, Kevin H. Lau, Geoffrey J. Hulten
  • Publication number: 20130185791
    Abstract: Trusted user accounts of an application provider are determined. Graphs, such as trees, are created with each node corresponding to a trusted account. Each of the nodes is associated with a vouching quota, or the nodes may share a vouching quota. Untrusted user accounts are determined. For each of these untrusted accounts, a trusted user account that has a social networking relationship is determined. If the node corresponding to the trusted user account has enough vouching quota to vouch for the untrusted user account, then the quota is debited, a node is added for the untrusted user account to the graph, and the untrusted user account is vouched for. If not, available vouching quota may be borrowed from other nodes in the graph.
    Type: Application
    Filed: January 15, 2012
    Publication date: July 18, 2013
    Applicant: Microsoft Corporation
    Inventors: Yinglian Xie, Fang Yu, Qifa Ke, Martin Abadi, Eliot C. Gillum, Krishna Vitaldevara, Jason D. Walter
  • Patent number: 8434150
    Abstract: Detection of user accounts associated with spammer attacks may be performed by constructing a social graph of email users. Biggest connected components (BCC) of the social graph may be used to identify legitimate user accounts, as the majority of the users in the biggest connected components are legitimate users. BCC users may be used to identify more legitimate users. Using degree-based detection techniques and PageRank based detection techniques, the hijacked user accounts and spammer user accounts may be identified. The users' email sending and receiving behaviors may also be examined, and the subgraph structure may be used to detect stealthy attackers. From the social graph analysis, legitimate user accounts, malicious user accounts, and compromised user accounts can be identified.
    Type: Grant
    Filed: March 24, 2011
    Date of Patent: April 30, 2013
    Assignee: Microsoft Corporation
    Inventors: Yinglian Xie, Fang Yu, Martin Abadi, Eliot C. Gillum, Junxian Huang, Zhuoqing Morley Mao, Jason D. Walter, Krishna Vitaldevara
  • Publication number: 20130086180
    Abstract: Message management and classification techniques are described. In one or more implementations, a message received from a sender for delivery via a user account is examined to extract one or more features of the message. A determination is then made as to whether the message corresponds to one or more categories based on the extracted features, the categories usable to enable features to be applied to the message in a user interface.
    Type: Application
    Filed: September 30, 2011
    Publication date: April 4, 2013
    Inventors: Paul M. Midgen, Vasantha K. Vemula, Krishna Vitaldevara, Jason D. Walter, Eliot C. Gillum, Mihai Costea, Douglas J. Hines, Wei Jiang, Malcolm H. Davis, Samuel J. L. Albert, Michael James Ahiakpor
  • Publication number: 20130086181
    Abstract: Techniques involving identification of electronic messages that are the first contact between the sender identification and addressed recipients. One representative technique includes identifying electronic messages originating from a sender that are first contact electronic messages between the sender and targeted recipients. The sender of the electronic messages may be designated as a source of unsolicited messages if heuristics involving the first contact electronic messages indicate a distribution of unsolicited messages by the sender.
    Type: Application
    Filed: October 3, 2011
    Publication date: April 4, 2013
    Applicant: Microsoft Corporation
    Inventors: Krishna Vitaldevara, Jason Walter, Vasantha K. Vemula
  • Publication number: 20120304260
    Abstract: In one embodiment, a user authentication server may use geo-location tracking to determine whether to present an enhanced identity challenge. A communication interface 180 may receive a user login attempt by a user and a current location of the user login attempt. A data storage 150 may store a user location profile of the user. A processor 120 may execute a comparison of the current location to the user location profile. The communication interface 180 may present the user with an enhanced identity challenge before allowing user access based on the comparison.
    Type: Application
    Filed: July 6, 2011
    Publication date: November 29, 2012
    Applicant: Microsoft Corporation
    Inventors: David Steeves, Luke Abrams, Hersh Dangayach, Eric Fleischman, Prabu Raju, Krishna Vitaldevara, Niyantha Shekar, Payoj Baral, Meenakshi Ramaswamy, Winfred Wong, Yordan Rouskov, Ramesh Manne
  • Publication number: 20120290712
    Abstract: Techniques for account compromise detection are described. In one or more implementations, a usage pattern is established for a user account of a service provider, where the service provider is configured to provide a plurality of web services for access via a network and the usage pattern describes interaction with one or more of the plurality of web services. A deviation is detected in subsequent activity associated with the user account from the usage pattern and a determination is made as to whether compromise the user account is likely based at least in part on the detection.
    Type: Application
    Filed: May 13, 2011
    Publication date: November 15, 2012
    Applicant: MICROSOFT CORPORATION
    Inventors: Jason D. Walter, Krishna Vitaldevara, John D. Rodrigues
  • Publication number: 20120259929
    Abstract: Geo-data spam filters are described. In one or more implementations, origin data and language data of a message are evaluated to establish a score for the message indicating a likelihood that the message is spam. The evaluation includes comparing the origin data and the language data to ranked lists indicating message origins and languages with which a respective message recipient interacts positively and ranked lists indicating message origins and languages with which the respective recipient interacts negatively. Interactions of the respective recipient with previously sent messages may be tracked to form these lists. Based on the score established by evaluating the origin data and the language data of the message, the message is filtered for delivery.
    Type: Application
    Filed: April 11, 2011
    Publication date: October 11, 2012
    Applicant: MICROSOFT CORPORATION
    Inventors: Krishna Vitaldevara, Eliot C. Gillum, Jason D. Walter, Kevin H. Lau, Geoffrey J. Hulten