Patents by Inventor Manav Mishra
Manav Mishra has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7603422Abstract: Secure safe sender lists are described. In an implementation, a method includes determining which of a plurality of hierarchical levels corresponds to a message received via a network. Each of the hierarchical level is defined by mechanisms for identifying a sender of the message. The message is routed according to the corresponding one of the hierarchical levels.Type: GrantFiled: December 27, 2004Date of Patent: October 13, 2009Assignee: Microsoft CorporationInventors: Elissa E. S. Murphy, Geoffrey J Hulten, Manav Mishra, Robert L. Rounthwaite
-
Patent number: 7599993Abstract: Secure safe sender lists are described. In an implementation, a method includes examining a message received from a sender via a network to determine which identifying mechanisms are available for verifying an identity of the sender. When one or more available identifying mechanisms are deemed sufficient to verify the identity, a description of the identity and a description of the one or more said available identifying mechanisms are added to a safe senders list.Type: GrantFiled: December 27, 2004Date of Patent: October 6, 2009Assignee: Microsoft CorporationInventors: Elissa E. S. Murphy, Geoffrey J Hulten, Manav Mishra, Robert L. Rounthwaite
-
Patent number: 7525989Abstract: Described are a system and method of transmitting a time slot status message between nodes in a SONET network. One or more time slots in a SONET link may be allocated to provision a SONET circuit. Upon provisioning or de-provisioning the SONET circuit, a time slot status message may be transmitted to one or more non-participating nodes in the SONET network to indicate a change in status of one or more time slots of the SONET link.Type: GrantFiled: December 16, 2002Date of Patent: April 28, 2009Assignee: Intel CorporationInventors: Linda Cline, Christian Maciocco, Srihari Makineni, Manav Mishra
-
Patent number: 7409708Abstract: Disclosed are systems and methods that facilitate spam detection and prevention at least in part by building or training filters using advanced IP address and/or URL features in connection with machine learning techniques. A variety of advanced IP address related features can be generated from performing a reverse IP lookup. Similarly, many different advanced URL based features can be created from analyzing at least a portion of any one URL detected in a message.Type: GrantFiled: May 28, 2004Date of Patent: August 5, 2008Assignee: Microsoft CorporationInventors: Joshua T Goodman, Robert L Rounthwaite, Geoffrey J Hulten, John A Deurbrouck, Manav Mishra, Anthony P Penta
-
Patent number: 7397795Abstract: A method and system for label-based packet forwarding among multiple forwarding elements is described. The system includes a plurality of forwarding elements to forward a data packet from an ingress port at which the data packet is received from a network to an egress port from which the data packet will be transmitted to a next hop in the network and a control element coupled to the plurality of forwarding elements to control the forwarding elements. Each forwarding element has one or more label switch tables with one or entries to label data packets for forwarding along a path from the ingress port of one of the plurality of forwarding elements to the egress port of another of the plurality of forwarding elements.Type: GrantFiled: February 24, 2003Date of Patent: July 8, 2008Assignee: Intel CaliforniaInventors: Hsin-Yuo (York) Liu, Puqi (Perry) Tang, Manav Mishra, Sanjay Bakshi
-
Publication number: 20070192855Abstract: Described is a technology by which phishing-related data sources are processed into aggregated data and a given site evaluated the aggregated data using a predictive model to automatically determine whether the given site is likely to be a phishing site. The predictive model may be built using machine learning based on training data, e.g., including known phishing sites and/or known non-phishing sites. To determine whether an object corresponding to a site is likely a phishing-related object are described, various criteria are evaluated, including one or more features of the object when evaluated. The determination is output in some way, e.g., made available to a reputation service, used to block access to a site or warn a user before allowing access, and/or used to assist a hand grader in being more efficient in evaluating sites.Type: ApplicationFiled: January 18, 2006Publication date: August 16, 2007Applicant: Microsoft CorporationInventors: Geoffrey Hulten, Paul Rehfuss, Robert Rounthwaite, Joshua Goodman, Gopalakrishnan Seshadrinathan, Anthony Penta, Manav Mishra, Roderic Deyo, Elliott Haber, David Snelling
-
Publication number: 20070107054Abstract: Various embodiments provide protection against web resources associated with one or more undesirable activities. In at least some embodiments, a method detects and responds to a user-initiated activity on a computing device. Responding can include, by way of example and not limitation, checking locally, on the computing device, whether a web resource that is associated with the user-initiated activity has been identified as being associated with a safe site. Furthermore, in at least some embodiments, the method checks remotely, away from the computing device, whether the web resource is identified as being at least possibly associated with one or more undesirable activities.Type: ApplicationFiled: November 10, 2005Publication date: May 10, 2007Applicant: Microsoft CorporationInventors: Aaron Averbuch, Manav Mishra, Roberto Franco, Tariq Sharif
-
Publication number: 20070100949Abstract: Embodiment of proofs to filter spam are presented herein.Type: ApplicationFiled: November 3, 2005Publication date: May 3, 2007Applicant: Microsoft CorporationInventors: Geoffrey Hulten, Gopalakrishnan Seshadrinathan, Joshua Goodman, Manav Mishra, Robert Pengelly, Robert Rounthwaite, Ryan Colvin
-
Publication number: 20070086592Abstract: A method and system for determining the reputation of a sender for sending desirable communications is provided. The reputation system identifies senders of communications by keys sent along with the communications. The reputation system then may process a communication to determine whether it is a desirable communication. The reputation system then establishes a reputation for the sender of the communication based on the assessment of whether that communication and other communications sent by that sender are desirable. Once the reputation of a sender is established, the reputation system can discard communications from senders with undesired reputations, provide to the recipient communications from senders with desired reputations, and place in a suspect folder communications from senders with an unknown reputation.Type: ApplicationFiled: October 19, 2005Publication date: April 19, 2007Applicant: Microsoft CorporationInventors: Carl Ellison, Elissa Murphy, Manav Mishra
-
Publication number: 20070039038Abstract: Phishing detection, prevention, and notification is described. In an embodiment, a messaging application facilitates communication via a messaging user interface, and receives a communication, such as an email message, from a domain. A phishing detection module detects a phishing attack in the communication by determining that the domain is similar to a known phishing domain, or by detecting suspicious network properties of the domain. In another embodiment, a Web browsing application receives content, such as data for a Web page, from a network-based resource, such as a Web site or domain. The Web browsing application initiates a display of the content, and a phishing detection module detects a phishing attack in the content by determining that a domain of the network-based resource is similar to a known phishing domain, or that an address of the network-based resource from which the content is received has suspicious network properties.Type: ApplicationFiled: September 30, 2006Publication date: February 15, 2007Applicant: Microsoft CorporationInventors: Joshua Goodman, Paul Rehfuss, Robert Rounthwaite, Manav Mishra, Geoffrey Hulten, Kenneth Richards, Aaron Averbuch, Anthony Penta, Roderic Deyo
-
Publication number: 20070033639Abstract: Phishing detection, prevention, and notification is described. In an embodiment, a messaging application facilitates communication via a messaging user interface, and receives a communication, such as an email message, from a domain. A phishing detection module detects a phishing attack in the communication by determining that the domain is similar to a known phishing domain, or by detecting suspicious network properties of the domain. In another embodiment, a Web browsing application receives content, such as data for a Web page, from a network-based resource, such as a Web site or domain. The Web browsing application initiates a display of the content, and a phishing detection module detects a phishing attack in the content by determining that a domain of the network-based resource is similar to a known phishing domain, or that an address of the network-based resource from which the content is received has suspicious network properties.Type: ApplicationFiled: September 30, 2006Publication date: February 8, 2007Applicant: Microsoft CorporationInventors: Joshua Goodman, Paul Rehfuss, Robert Rounthwaite, Manav Mishra, Geoffrey Hulten, Kenneth Richards, Aaron Averbuch, Anthony Penta, Roderict Deyo
-
Patent number: 7139792Abstract: In one aspect of the invention is a method for locking in all client requests having the same session I.D. to the same server to facilitate secure e-commerce transactions. A client's session I.D. is mapped to an SSL context between a dispatcher and a server such that all subsequent client requests having the same session I.D. are forwarded to the same server.Type: GrantFiled: September 29, 2000Date of Patent: November 21, 2006Assignee: Intel CorporationInventors: Manav Mishra, Satyendra Yadav
-
Publication number: 20060168041Abstract: Email spam filtering is performed based on a combination of IP address and domain. When an email message is received, an IP address and a domain associated with the email message are determined. A cross product of the IP address (or portions of the IP address) and the domain (or portions of the domain) is calculated. If the email message is known to be either spam or non-spam, then a spam score based on the known spam status is stored in association with each (IP address, domain) pair element of the cross product. If the spam status of the email message is not known, then the (IP address, domain) pair elements of the cross product are used to lookup previously determined spam scores. A combination of the previously determined spam scores is used to determine whether or not to treat the received email message as spam.Type: ApplicationFiled: January 7, 2005Publication date: July 27, 2006Applicant: Microsoft CorporationInventors: Manav Mishra, Elissa Murphy, Geoffrey Hulten, Joshua Goodman, Wen-Tau Yih
-
Publication number: 20060168223Abstract: A method and system are disclosed. The method includes receiving a first request from a user at a dispatcher that corresponds to a first transaction. The method further includes creating at the dispatcher a unique identifier that is associated with the user. The unique identifier is based on data that is received from the user. A server is then assigned to the first request by adding an entry to a mapping table that is maintained by the dispatcher. The unique identifier is then associated with the assigned server.Type: ApplicationFiled: March 29, 2006Publication date: July 27, 2006Inventors: Manav Mishra, Satyendra Yadav
-
Publication number: 20060143271Abstract: Secure safe sender lists are described. In an implementation, a method includes determining which of a plurality of hierarchical levels corresponds to a message received via a network. Each of the hierarchical level is defined by mechanisms for identifying a sender of the message. The message is routed according to the corresponding one of the hierarchical levels.Type: ApplicationFiled: December 27, 2004Publication date: June 29, 2006Applicant: Microsoft CorporationInventors: Elissa Murphy, Geoffrey Hulten, Manav Mishra, Robert Rounthwaite
-
Publication number: 20060123464Abstract: Phishing detection, prevention, and notification is described. In an embodiment, a messaging application facilitates communication via a messaging user interface, and receives a communication, such as an email message, from a domain. A phishing detection module detects a phishing attack in the communication by determining that the domain is similar to a known phishing domain, or by detecting suspicious network properties of the domain. In another embodiment, a Web browsing application receives content, such as data for a Web page, from a network-based resource, such as a Web site or domain. The Web browsing application initiates a display of the content, and a phishing detection module detects a phishing attack in the content by determining that a domain of the network-based resource is similar to a known phishing domain, or that an address of the network-based resource from which the content is received has suspicious network properties.Type: ApplicationFiled: May 13, 2005Publication date: June 8, 2006Applicant: Microsoft CorporationInventors: Joshua Goodman, Paul Rehfuss, Robert Rounthwaite, Manav Mishra, Geoffrey Hulten, Kenneth Richards, Aaron Averbuch, Anthony Penta, Roderic Deyo
-
Publication number: 20060123478Abstract: Phishing detection, prevention, and notification is described. In an embodiment, a messaging application facilitates communication via a messaging user interface, and receives a communication, such as an email message, from a domain. A phishing detection module detects a phishing attack in the communication by determining that the domain is similar to a known phishing domain, or by detecting suspicious network properties of the domain. In another embodiment, a Web browsing application receives content, such as data for a Web page, from a network-based resource, such as a Web site or domain. The Web browsing application initiates a display of the content, and a phishing detection module detects a phishing attack in the content by determining that a domain of the network-based resource is similar to a known phishing domain, or that an address of the network-based resource from which the content is received has suspicious network properties.Type: ApplicationFiled: May 13, 2005Publication date: June 8, 2006Applicant: Microsoft CorporationInventors: Paul Rehfuss, Joshua Goodman, Robert Rounthwaite, Manav Mishra, Geoffrey Hulten, Kenneth Richards, Aaron Averbuch, Anthony Penta, Roderic Deyo
-
Publication number: 20060036693Abstract: Disclosed are signature-based systems and methods that facilitate spam detection and prevention at least in part by calculating hash values for an incoming message and then determining a probability that the hash values indicate spam. In particular, the signatures generated for each incoming message can be compared to a database of both spam and good signatures. A count of the number of matches can be divided by a denominator value. The denominator value can be an overall volume of messages sent to the system per signature for example. The denominator value can be discounted to account for different treatments and timing of incoming messages. Furthermore, secure hashes can be generated by combining portions of multiple hashing components. A secure hash can be made from a combination of multiple hashing components or multiple combinations thereof. The signature based system can also be integrated with machine learning systems to optimize spam prevention.Type: ApplicationFiled: August 12, 2004Publication date: February 16, 2006Applicant: Microsoft CorporationInventors: Geoffrey Hulten, Joshua Goodman, Robert Rounthwaite, Manav Mishra, Elissa Murphy
-
Publication number: 20060031338Abstract: Disclosed are systems and methods that facilitate securing communication channels used in a challenge-response system to mitigate spammer intrusion or deception. The systems and methods make use of unique IDs that can be added to outbound messages originating from a sender, a recipient, and a third-party server. The IDs can be correlated according to the relevant parties. Thus, for example, a sender can add a signed ID to an outgoing message. A challenge sent back to the sender for that particular message can echo the same ID or a new ID derived from the original ID to allow a sender to verify that the challenge corresponds to an actual message. The IDs can include cookies as well to facilitate correlation of messages and to facilitate the retrieval of messages once a sender is determined to be legitimate.Type: ApplicationFiled: August 9, 2004Publication date: February 9, 2006Applicant: Microsoft CorporationInventors: Nina Kang, Joshua Goodman, Robert Rounthwaite, Josh Benaloh, Elissa Murphy, Manav Mishra, Gopalakrishnan Seshadrinathan, Derek Hazeur, Ryan Colvin
-
Publication number: 20060002705Abstract: A system to decentralize network management tasks. The system includes an Optical Device Control (ODC) to provide management functionality of an optical network at a network element of the optical network. The ODC includes a control plane, a data plane, and an interface to pass information between the control plane and the data plane. The system also includes a Network Management System (NMS) communicatively coupled to the ODC and at least one optical device communicatively coupled to the ODC.Type: ApplicationFiled: June 30, 2004Publication date: January 5, 2006Inventors: Linda Cline, Christian Maciocco, Srihari Makineni, Manav Mishra