Patents by Inventor Matthew Bryan Jeffries

Matthew Bryan Jeffries has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11785027
    Abstract: A threat protection system provides for detecting links in a document and analyzing whether one of the detected links is a malicious link that may direct a user of the document to a malicious universal resource locator (URL). In one implementation of the described technology, when a user selects a link in a document, a link activation module calls a threat protection client module that performs a reputation check for the link. If the selected link is malicious, the threat protection client module sends a URL of a warning page to the link activation module.
    Type: Grant
    Filed: October 28, 2021
    Date of Patent: October 10, 2023
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Varagur Karthikeyan Sriram Iyer, Willson Kulandai Raj David, Vinayak Goyal, Matthew Bryan Jeffries
  • Publication number: 20220053008
    Abstract: A threat protection system provides for detecting links in a document and analyzing whether one of the detected links is a malicious link that may direct a user of the document to a malicious universal resource locator (URL). In one implementation of the described technology, when a user selects a link in a document, a link activation module calls a threat protection client module that performs a reputation check for the link. If the selected link is malicious, the threat protection client module sends a URL of a warning page to the link activation module.
    Type: Application
    Filed: October 28, 2021
    Publication date: February 17, 2022
    Inventors: Varagur Karthikeyan Sriram IYER, Willson Kulandai Raj DAVID, Vinayak GOYAL, Matthew Bryan JEFFRIES
  • Patent number: 11171973
    Abstract: A threat protection system provides for detecting links in a document and analyzing whether one of the detected links is a malicious link that may direct a user of the document to a malicious universal resource locator (URL). In one implementation of the described technology, when a user selects a link in a document, a link activation module calls a threat protection client module that performs a reputation check for the link. If the selected link is malicious, the threat protection client module sends a URL of a warning page to the link activation module.
    Type: Grant
    Filed: October 21, 2019
    Date of Patent: November 9, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Varagur Karthikeyan Sriram Iyer, Willson Kulandai Raj David, Vinayak Goyal, Matthew Bryan Jeffries
  • Patent number: 10855713
    Abstract: Implementations described herein disclose a system for providing personalized threat protection for users of computer applications. An implementation of a method disclosed herein includes analyzing usage pattern of an application by a client to determine various application functionalities used by the client, identifying security threats related to the various application functionalities used by the client, and changing the configuration settings of the application for the client based on the plurality of security threats.
    Type: Grant
    Filed: April 27, 2017
    Date of Patent: December 1, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Varagur Karthikeyan Sriram Iyer, Thomas P. Gallagher, Matthew Bryan Jeffries
  • Publication number: 20200296945
    Abstract: A device for rigging a fishing lure having a hollow cylindrical main body with a first tapered end and a second non-tapered end, such that the tapered end is sized to fit snugly on an artificial fishing worm lure. The device has a number of holes distributed around the central portion of the main body to enable the passage of a fishing hook through the lure and device combination. The device may be constructed of plastic, metal, rubber, or a combination of materials. The device may be weighted or have additional embellishments to enhance an angler's fishing success.
    Type: Application
    Filed: March 19, 2019
    Publication date: September 24, 2020
    Inventor: Matthew Bryan Jeffries
  • Publication number: 20200053106
    Abstract: A threat protection system provides for detecting links in a document and analyzing whether one of the detected links is a malicious link that may direct a user of the document to a malicious universal resource locator (URL). In one implementation of the described technology, when a user selects a link in a document, a link activation module calls a threat protection client module that performs a reputation check for the link. If the selected link is malicious, the threat protection client module sends a URL of a warning page to the link activation module.
    Type: Application
    Filed: October 21, 2019
    Publication date: February 13, 2020
    Inventors: Varagur Karthikeyan Sriram IYER, Willson Kulandai Raj DAVID, Vinayak GOYAL, Matthew Bryan JEFFRIES
  • Patent number: 10454952
    Abstract: A threat protection system provides for detecting links in a document and analyzing whether one of the detected links is a malicious link that may direct a user of the document to a malicious universal resource locator (URL). In one implementation of the described technology, when a user selects a link in a document, a link activation module calls a threat protection client module that performs a reputation check for the link. If the selected link is malicious, the threat protection client module sends a URL of a warning page to the link activation module.
    Type: Grant
    Filed: April 28, 2017
    Date of Patent: October 22, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Varagur Karthikeyan Sriram Iyer, Willson Kulandai Raj David, Vinayak Goyal, Matthew Bryan Jeffries
  • Publication number: 20180316711
    Abstract: Implementations described herein disclose a system for providing personalized threat protection for users of computer applications. An implementation of a method disclosed herein includes analyzing usage pattern of an application by a client to determine various application functionalities used by the client, identifying security threats related to the various application functionalities used by the client, and changing the configuration settings of the application for the client based on the plurality of security threats.
    Type: Application
    Filed: April 27, 2017
    Publication date: November 1, 2018
    Inventors: Varagur Karthikeyan Sriram IYER, Thomas P. GALLAGHER, Matthew Bryan JEFFRIES
  • Publication number: 20180183820
    Abstract: A threat protection system provides for detecting links in a document and analyzing whether one of the detected links is a malicious link that may direct a user of the document to a malicious universal resource locator (URL). In one implementation of the described technology, when a user selects a link in a document, a link activation module calls a threat protection client module that performs a reputation check for the link. If the selected link is malicious, the threat protection client module sends a URL of a warning page to the link activation module.
    Type: Application
    Filed: April 28, 2017
    Publication date: June 28, 2018
    Inventors: Varagur Karthikeyan Sriram IYER, Willson Kulandai Raj DAVID, Vinayak GOYAL, Matthew Bryan JEFFRIES
  • Publication number: 20180143955
    Abstract: Providing automatic updates to transmitted copies of an electronic document is disclosed herein. In response to the first user such as the author/first user saving the electronic document, a copy of the electronic document is uploaded to a shared location and a reference to the copy of the electronic document uploaded to the shared location is stored in metadata of the electronic document. The first user can then transmit a copy of the electronic document with a link to the reference in the metadata to a second user. Then, if the first user subsequently revises the electronic document, the revised electronic document is uploaded to the shared location. When the second user then opens the copy of the electronic document, a copy of the most recently revised electronic document is retrieved from the shared location.
    Type: Application
    Filed: December 16, 2016
    Publication date: May 24, 2018
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Matthew Bryan Jeffries, Varagur Karthikeyan Sriram Iyer, Rorke Haining, Michael Paer
  • Patent number: 8424073
    Abstract: Methods and computer-readable media are provided for refreshing a page validation token. In response to a request for a form from a client, a server responds with the requested form, a page validation token, and a page token refresh program. The client executes the page token refresh program in response to a request to post the contents of the form to the server computer. The page token refresh program determines whether a preset period of time has elapsed since server computer generated the page validation token. If the period of time has not elapsed, the form is posted to the server with the page validation token and processed by the server computer. If the page timeout has elapsed, the page token refresh program refreshes the page validation token prior to posting the form by requesting an updated page validation token from the server.
    Type: Grant
    Filed: November 13, 2006
    Date of Patent: April 16, 2013
    Assignee: Microsoft Corporation
    Inventors: James Richard Sturms, Matthew Bryan Jeffries, William James Griffin
  • Publication number: 20080115201
    Abstract: Methods and computer-readable media are provided for refreshing a page validation token. In response to a request for a form from a client, a server responds with the requested form, a page validation token, and a page token refresh program. The client executes the page token refresh program in response to a request to post the contents of the form to the server computer. The page token refresh program determines whether a preset period of time has elapsed since server computer generated the page validation token. If the period of time has not elapsed, the form is posted to the server with the page validation token and processed by the server computer. If the page timeout has elapsed, the page token refresh program refreshes the page validation token prior to posting the form by requesting an updated page validation token from the server.
    Type: Application
    Filed: November 13, 2006
    Publication date: May 15, 2008
    Applicant: Microsoft Corporation
    Inventors: James Richard Sturms, Matthew Bryan Jeffries, William James Griffin