Patents by Inventor Krishna Vitaldevara
Krishna Vitaldevara has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9288173Abstract: Geo-data spam filters are described. In one or more implementations, origin data and language data of a message are evaluated to establish a score for the message indicating a likelihood that the message is spam. The evaluation includes comparing the origin data and the language data to ranked lists indicating message origins and languages with which a respective message recipient interacts positively and ranked lists indicating message origins and languages with which the respective recipient interacts negatively. Interactions of the respective recipient with previously sent messages may be tracked to form these lists. Based on the score established by evaluating the origin data and the language data of the message, the message is filtered for delivery.Type: GrantFiled: December 17, 2013Date of Patent: March 15, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Krishna Vitaldevara, Eliot C. Gillum, Jason D. Walter, Kevin H. Lau, Geoffrey John Hulten
-
Publication number: 20160021095Abstract: In one embodiment, a user authentication server may use geo-location tracking to determine whether to present an enhanced identity challenge. A communication interface 180 may receive a user login attempt by a user and a current location of the user login attempt. A data storage 150 may store a user location profile of the user. A processor 120 may execute a comparison of the current location to the user location profile. The communication interface 180 may present the user with an enhanced identity challenge before allowing user access based on the comparison.Type: ApplicationFiled: September 30, 2015Publication date: January 21, 2016Applicant: Microsoft Technology Licensing, LLCInventors: David Steeves, Luke Abrams, Hersh Dangayach, Eric Fleischman, Prabu Raju, Krishna Vitaldevara, Niyantha Shekar, Payoj Baral, Meenakshi Ramaswamy, Winfred Wong, Yordan Rouskov, Ramesh Manne
-
Patent number: 9177125Abstract: In one embodiment, a user authentication server may use geo-location tracking to determine whether to present an enhanced identity challenge. A communication interface 180 may receive a user login attempt by a user and a current location of the user login attempt. A data storage 150 may store a user location profile of the user. A processor 120 may execute a comparison of the current location to the user location profile. The communication interface 180 may present the user with an enhanced identity challenge before allowing user access based on the comparison.Type: GrantFiled: July 6, 2011Date of Patent: November 3, 2015Assignee: Microsoft Technology Licensing, LLCInventors: David Steeves, Luke Abrams, Hersh Dangayach, Eric Fleischman, Prabu Raju, Krishna Vitaldevara, Niyantha Shekar, Payoj Baral, Meenakshi Ramaswamy, Winfred Wong, Yordan Rouskov, Ramesh Manne
-
Patent number: 8966620Abstract: Campaign detection techniques are described. In implementations, a signature is computed for each of a plurality of emails to be communicated by a service provider to respective intended recipients. A determination is made that two or more of the plurality of emails is similar based on the respective signatures. Responsive to a finding that a number of similar emails exceeds a threshold, an indication is output that the similar emails have a likelihood of being involved in a spam campaign.Type: GrantFiled: May 27, 2010Date of Patent: February 24, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Douglas J. Hines, Mihai Costea, Yuxiang Xu, Harsh S. Dangayach, Krishna Vitaldevara, Eliot C. Gillum, Jason D. Walter, Aleksander R. Kolcz
-
Publication number: 20150007053Abstract: Email tags are described. In embodiments, email messages are received for distribution to client devices that correspond to respective recipients of the email messages. Email routing decisions are applied to route an email message to an email folder for a recipient of the email message, where the email folder may include an email inbox, a junk folder, or a user-created folder. The email message is then tagged with an email tag to generate a tagged email message. The email tag includes a routing description that indicates why the email message was routed to the particular email folder.Type: ApplicationFiled: September 12, 2014Publication date: January 1, 2015Inventors: Krishna Vitaldevara, Sanchan Sahai Saxena, Eliot C. Gillum, Rebecca Ping Zhu, Tyler J. Schnoebelen
-
Publication number: 20140289428Abstract: In embodiments of dynamic intervals for synchronizing data, the data is periodically synchronized between computing devices, such as between server devices, client devices, and/or between client and server devices. A polling optimization service can assess heuristics that are associated with the data synchronizations between the computing devices, and determine optimal dynamic intervals to periodically synchronize the data based on the heuristics. The polling optimization service can then iterate to further assess the heuristics that are associated with subsequent data synchronizations and determine updates of the optimal dynamic intervals. The polling optimization service updates the heuristics based on the subsequent and ongoing data synchronizations, and iterates to update the optimal dynamic intervals based on the updated heuristics.Type: ApplicationFiled: March 20, 2013Publication date: September 25, 2014Inventors: Jason D. Walter, Ashutosh Tewari, Krishna Vitaldevara
-
Patent number: 8843568Abstract: Email tags are described. In embodiments, email messages are received for distribution to client devices that correspond to respective recipients of the email messages. Email routing decisions are applied to route an email message to an email folder for a recipient of the email message, where the email folder may include an email inbox, a junk folder, or a user-created folder. The email message is then tagged with an email tag to generate a tagged email message. The email tag includes a routing description that indicates why the email message was routed to the particular email folder.Type: GrantFiled: May 17, 2010Date of Patent: September 23, 2014Assignee: Microsoft CorporationInventors: Krishna Vitaldevara, Sanchan Sahai Saxena, Eliot C. Gillum, Rebecca Ping Zhu, Tyler J. Schnoebelen
-
Publication number: 20140156776Abstract: Techniques involving identification of electronic messages that are the first contact between the sender identification and addressed recipients. One representative technique includes identifying electronic messages originating from a sender that are first contact electronic messages between the sender and targeted recipients. The sender of the electronic messages may be designated as a source of unsolicited messages if heuristics involving the first contact electronic messages indicate a distribution of unsolicited messages by the sender.Type: ApplicationFiled: February 8, 2014Publication date: June 5, 2014Applicant: Microsoft CorporationInventors: Krishna Vitaldevara, Jason Walter, Vasantha K. Vemula
-
Patent number: 8745738Abstract: Trusted user accounts of an application provider are determined. Graphs, such as trees, are created with each node corresponding to a trusted account. Each of the nodes is associated with a vouching quota, or the nodes may share a vouching quota. Untrusted user accounts are determined. For each of these untrusted accounts, a trusted user account that has a social networking relationship is determined. If the node corresponding to the trusted user account has enough vouching quota to vouch for the untrusted user account, then the quota is debited, a node is added for the untrusted user account to the graph, and the untrusted user account is vouched for. If not, available vouching quota may be borrowed from other nodes in the graph.Type: GrantFiled: January 15, 2012Date of Patent: June 3, 2014Assignee: Microsoft CorporationInventors: Yinglian Xie, Fang Yu, Qifa Ke, Martin Abadi, Eliot C. Gillum, Krishna Vitaldevara, Jason D. Walter
-
Publication number: 20140108578Abstract: Geo-data spam filters are described. In one or more implementations, origin data and language data of a message are evaluated to establish a score for the message indicating a likelihood that the message is spam. The evaluation includes comparing the origin data and the language data to ranked lists indicating message origins and languages with which a respective message recipient interacts positively and ranked lists indicating message origins and languages with which the respective recipient interacts negatively. Interactions of the respective recipient with previously sent messages may be tracked to form these lists. Based on the score established by evaluating the origin data and the language data of the message, the message is filtered for delivery.Type: ApplicationFiled: December 17, 2013Publication date: April 17, 2014Applicant: Microsoft CorporationInventors: Krishna Vitaldevara, Eliot C. Gillum, Jason D. Walter, Kevin H. Lau, Geoffrey John Hulten
-
Patent number: 8682990Abstract: Techniques involving identification of electronic messages that are the first contact between the sender identification and addressed recipients. One representative technique includes identifying electronic messages originating from a sender that are first contact electronic messages between the sender and targeted recipients. The sender of the electronic messages may be designated as a source of unsolicited messages if heuristics involving the first contact electronic messages indicate a distribution of unsolicited messages by the sender.Type: GrantFiled: October 3, 2011Date of Patent: March 25, 2014Assignee: Microsoft CorporationInventors: Krishna Vitaldevara, Jason Walter, Vasantha K. Vemula
-
Publication number: 20140020108Abstract: In one embodiment, a cloud service interface 112 or a device interface 124 may filter messages in a message synchronization between a message service account and a cloud service account. A cloud service interface 112 or a device interface 124 may associate a message service account 114 on a user messaging device 110 with a cloud service account 122. The cloud service interface 112 or a device interface 124 may execute a message synchronization between the cloud service account 122 and the message service account 114. The cloud service interface 112 or a device interface 124 may apply a message filter to the message synchronization.Type: ApplicationFiled: July 12, 2012Publication date: January 16, 2014Applicant: Microsoft CorporationInventors: Aby John, Luke Abrams, Ryan Burkhardt, Krishna Vitaldevara
-
Patent number: 8626856Abstract: Geo-data spam filters are described. In one or more implementations, origin data and language data of a message are evaluated to establish a score for the message indicating a likelihood that the message is spam. The evaluation includes comparing the origin data and the language data to ranked lists indicating message origins and languages with which a respective message recipient interacts positively and ranked lists indicating message origins and languages with which the respective recipient interacts negatively. Interactions of the respective recipient with previously sent messages may be tracked to form these lists. Based message, the message is filtered for delivery.Type: GrantFiled: April 11, 2011Date of Patent: January 7, 2014Assignee: Microsoft CorporationInventors: Krishna Vitaldevara, Eliot C. Gillum, Jason D. Walter, Kevin H. Lau, Geoffrey J. Hulten
-
Publication number: 20130185791Abstract: Trusted user accounts of an application provider are determined. Graphs, such as trees, are created with each node corresponding to a trusted account. Each of the nodes is associated with a vouching quota, or the nodes may share a vouching quota. Untrusted user accounts are determined. For each of these untrusted accounts, a trusted user account that has a social networking relationship is determined. If the node corresponding to the trusted user account has enough vouching quota to vouch for the untrusted user account, then the quota is debited, a node is added for the untrusted user account to the graph, and the untrusted user account is vouched for. If not, available vouching quota may be borrowed from other nodes in the graph.Type: ApplicationFiled: January 15, 2012Publication date: July 18, 2013Applicant: Microsoft CorporationInventors: Yinglian Xie, Fang Yu, Qifa Ke, Martin Abadi, Eliot C. Gillum, Krishna Vitaldevara, Jason D. Walter
-
Patent number: 8434150Abstract: Detection of user accounts associated with spammer attacks may be performed by constructing a social graph of email users. Biggest connected components (BCC) of the social graph may be used to identify legitimate user accounts, as the majority of the users in the biggest connected components are legitimate users. BCC users may be used to identify more legitimate users. Using degree-based detection techniques and PageRank based detection techniques, the hijacked user accounts and spammer user accounts may be identified. The users' email sending and receiving behaviors may also be examined, and the subgraph structure may be used to detect stealthy attackers. From the social graph analysis, legitimate user accounts, malicious user accounts, and compromised user accounts can be identified.Type: GrantFiled: March 24, 2011Date of Patent: April 30, 2013Assignee: Microsoft CorporationInventors: Yinglian Xie, Fang Yu, Martin Abadi, Eliot C. Gillum, Junxian Huang, Zhuoqing Morley Mao, Jason D. Walter, Krishna Vitaldevara
-
Publication number: 20130086180Abstract: Message management and classification techniques are described. In one or more implementations, a message received from a sender for delivery via a user account is examined to extract one or more features of the message. A determination is then made as to whether the message corresponds to one or more categories based on the extracted features, the categories usable to enable features to be applied to the message in a user interface.Type: ApplicationFiled: September 30, 2011Publication date: April 4, 2013Inventors: Paul M. Midgen, Vasantha K. Vemula, Krishna Vitaldevara, Jason D. Walter, Eliot C. Gillum, Mihai Costea, Douglas J. Hines, Wei Jiang, Malcolm H. Davis, Samuel J. L. Albert, Michael James Ahiakpor
-
Publication number: 20130086181Abstract: Techniques involving identification of electronic messages that are the first contact between the sender identification and addressed recipients. One representative technique includes identifying electronic messages originating from a sender that are first contact electronic messages between the sender and targeted recipients. The sender of the electronic messages may be designated as a source of unsolicited messages if heuristics involving the first contact electronic messages indicate a distribution of unsolicited messages by the sender.Type: ApplicationFiled: October 3, 2011Publication date: April 4, 2013Applicant: Microsoft CorporationInventors: Krishna Vitaldevara, Jason Walter, Vasantha K. Vemula
-
Publication number: 20120304260Abstract: In one embodiment, a user authentication server may use geo-location tracking to determine whether to present an enhanced identity challenge. A communication interface 180 may receive a user login attempt by a user and a current location of the user login attempt. A data storage 150 may store a user location profile of the user. A processor 120 may execute a comparison of the current location to the user location profile. The communication interface 180 may present the user with an enhanced identity challenge before allowing user access based on the comparison.Type: ApplicationFiled: July 6, 2011Publication date: November 29, 2012Applicant: Microsoft CorporationInventors: David Steeves, Luke Abrams, Hersh Dangayach, Eric Fleischman, Prabu Raju, Krishna Vitaldevara, Niyantha Shekar, Payoj Baral, Meenakshi Ramaswamy, Winfred Wong, Yordan Rouskov, Ramesh Manne
-
Publication number: 20120290712Abstract: Techniques for account compromise detection are described. In one or more implementations, a usage pattern is established for a user account of a service provider, where the service provider is configured to provide a plurality of web services for access via a network and the usage pattern describes interaction with one or more of the plurality of web services. A deviation is detected in subsequent activity associated with the user account from the usage pattern and a determination is made as to whether compromise the user account is likely based at least in part on the detection.Type: ApplicationFiled: May 13, 2011Publication date: November 15, 2012Applicant: MICROSOFT CORPORATIONInventors: Jason D. Walter, Krishna Vitaldevara, John D. Rodrigues
-
Publication number: 20120259929Abstract: Geo-data spam filters are described. In one or more implementations, origin data and language data of a message are evaluated to establish a score for the message indicating a likelihood that the message is spam. The evaluation includes comparing the origin data and the language data to ranked lists indicating message origins and languages with which a respective message recipient interacts positively and ranked lists indicating message origins and languages with which the respective recipient interacts negatively. Interactions of the respective recipient with previously sent messages may be tracked to form these lists. Based on the score established by evaluating the origin data and the language data of the message, the message is filtered for delivery.Type: ApplicationFiled: April 11, 2011Publication date: October 11, 2012Applicant: MICROSOFT CORPORATIONInventors: Krishna Vitaldevara, Eliot C. Gillum, Jason D. Walter, Kevin H. Lau, Geoffrey J. Hulten