Patents by Inventor Ravi Kiran Reddy Poluri

Ravi Kiran Reddy Poluri has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12154056
    Abstract: The disclosure is directed to systems, methods, and computer storage media, for, among other things, employing nested model structures to enforce compliance, within a computational system, to at least one policy. One method includes receiving a digital record that encodes content. A plurality of models (e.g., integrated models and/or model droplets) is employed to analyze the records. The plurality of models is configured and arranged within a nested structure of a hierarchy of models. Each of the plurality of models analyzes at least a portion of the record. Based on the nested structure, the hierarchy combines the analysis from each of the plurality of models to determine that the content violates a policy of a system. In response to determining that the content violates the policy, at least one mitigation (or intervention) action are performed. The at least one mitigation action may alter subsequent transmissions of the record.
    Type: Grant
    Filed: March 30, 2022
    Date of Patent: November 26, 2024
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Mohit Sewak, Ravi Kiran Reddy Poluri
  • Publication number: 20240370484
    Abstract: The technology described herein determines whether a candidate text is in a requested class by using a generative model that may not be trained on the requested class. The present technology may use of a model trained primarily in an unsupervised mode, without requiring a large number of manual user-input examples of a label class. The may produce a semantically rich positive example of label text from a candidate text and label. Likewise, the technology may produce from the candidate text and the label a semantically rich negative example of label text. The labeling service makes use of a generative model to produce a generative result, which estimates the likelihood that the label properly applies to the candidate text. In another aspect, the technology is directed toward a method for obtaining a semantically rich example that is similar to a candidate text.
    Type: Application
    Filed: July 19, 2024
    Publication date: November 7, 2024
    Inventors: Mohit SEWAK, Ravi Kiran Reddy Poluri, William Blum, Pak On Chan, Weisheng Li, Sharada Shirish Acharya, Christian Rudnick, Michael Abraham Betser, Milenko Drinic, Sihong Liu
  • Patent number: 12113808
    Abstract: Methods, systems, and computer storage media for providing a multi-attribute cluster-identifier that supports identifying malicious activity in computing environments. An instance of an activity having an attribute set can be assessed. The attribute set of the instance of the activity is analyzed to determine whether the instance of the activity is a malicious activity. The attribute set of the instance of the activity is compared to a plurality of multi-attribute cluster-identifiers of previous instances of the activity, such that, a determination that the instance of the activity is a malicious activity is made when the attribute set of the instance of the activity corresponds to an identified multi-attribute cluster-identifier. The identified multi-attribute cluster-identifier has a risk score and an attribute set that indicate a likelihood that the instance of the activity is a malicious activity. A visualization that identifies the instance of the activity as a malicious activity is generated.
    Type: Grant
    Filed: November 3, 2020
    Date of Patent: October 8, 2024
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Mihai Costea, Michael Abraham Betser, Ravi Kiran Reddy Poluri, Hua Ding, Weisheng Li, Phanindra Pampati, David Nicholas Yost
  • Publication number: 20240187425
    Abstract: Methods, systems, and computer storage media for providing a multi-attribute cluster-identifier that supports identifying malicious activity in computing environments. An instance of an activity having an attribute set can be assessed. The attribute set of the instance of the activity is analyzed to determine whether the instance of the activity is a malicious activity. The attribute set of the instance of the activity is compared to a plurality of multi-attribute cluster-identifiers of previous instances of the activity, such that, a determination that the instance of the activity is a malicious activity is made when the attribute set of the instance of the activity corresponds to an identified multi-attribute cluster-identifier. The identified multi-attribute cluster-identifier has a risk score and an attribute set that indicate a likelihood that the instance of the activity is a malicious activity. A visualization that identifies the instance of the activity as a malicious activity is generated.
    Type: Application
    Filed: January 22, 2024
    Publication date: June 6, 2024
    Inventors: Mihai COSTEA, Michael Abraham Betser, Ravi Kiran Reddy Poluri, Hua Ding, Weisheng Li, Phanindra Pampati, David Nicholas Yost
  • Patent number: 11902299
    Abstract: Methods, systems, and computer storage media for providing a multi-attribute cluster-identifier that supports identifying malicious activity in computing environments. An instance of an activity having an attribute set can be assessed. The attribute set of the instance of the activity is analyzed to determine whether the instance of the activity is a malicious activity. The attribute set of the instance of the activity is compared to a plurality of multi-attribute cluster-identifiers of previous instances of the activity, such that, a determination that the instance of the activity is a malicious activity is made when the attribute set of the instance of the activity corresponds to an identified multi-attribute cluster-identifier. The identified multi-attribute cluster-identifier has a risk score and an attribute set that indicate a likelihood that the instance of the activity is a malicious activity. A visualization that identifies the instance of the activity as a malicious activity is generated.
    Type: Grant
    Filed: November 3, 2020
    Date of Patent: February 13, 2024
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Mihai Costea, Michael Abraham Betser, Ravi Kiran Reddy Poluri, Hua Ding, Weisheng Li, Phanindra Pampati, David Nicholas Yost
  • Publication number: 20230316196
    Abstract: The disclosure is directed to systems, methods, and computer storage media, for, among other things, employing nested model structures to enforce compliance, within a computational system, to at least one policy. One method includes receiving a digital record that encodes content. A plurality of models (e.g., integrated models and/or model droplets) is employed to analyze the records. The plurality of models is configured and arranged within a nested structure of a hierarchy of models. Each of the plurality of models analyzes at least a portion of the record. Based on the nested structure, the hierarchy combines the analysis from each of the plurality of models to determine that the content violates a policy of a system. In response to determining that the content violates the policy, at least one mitigation (or intervention) action are performed. The at least one mitigation action may alter subsequent transmissions of the record.
    Type: Application
    Filed: March 30, 2022
    Publication date: October 5, 2023
    Inventors: Mohit SEWAK, Ravi Kiran Reddy POLURI
  • Publication number: 20230214707
    Abstract: The disclosure is directed to systems, methods, and computer storage media, for, among other things, generating, training, and tuning lexicon-based classifier models. The models may be employed in various compliance enforcement applications and/or tasks. The tradeoff between the model's false positive error rate (FPR) and the model's false negative rate (FNR) may be “tuned” via a balance parameter supplied by the user. The classifier model may classify content (e.g., text records) as either belonging to a “positive” class or a “negative” class. The positive class may be associated with non-compliance, while the negative class may be associated with compliance (or vice-versa). In some embodiments, the classifier model may be a probabilistic probability model that provides a probability (or degree of belief) that the content is associated with the positive and/or negative class.
    Type: Application
    Filed: December 31, 2021
    Publication date: July 6, 2023
    Inventors: Mohit SEWAK, Ravi Kiran Reddy POLURI
  • Publication number: 20230077990
    Abstract: Emails or other communications are labeled with a category label such as “spam” or “good” without using confidential or Personally Identifiable Information (PII). The category label is based on features of the emails such as metadata that do not contain PII. Graphs of inferred relationships between email features and category labels are used to assign labels to emails and to features of the emails. The labeled emails are used as a training dataset for training a machine learning model (“MLM”). The MLM model identifies unwanted emails such as spam, bulk email, phishing email, and emails that contain malware.
    Type: Application
    Filed: October 31, 2022
    Publication date: March 16, 2023
    Inventors: Yi LUO, Weigsheng LI, Sharada Shirish ACHARYA, Mainak SEN, Ravi Kiran Reddy POLURI, Christian RUDNICK
  • Publication number: 20220414137
    Abstract: The technology described herein determines whether a candidate text is in a requested class by using a generative model that may not be trained on the requested class. The present technology may use of a model trained primarily in an unsupervised mode, without requiring a large number of manual user-input examples of a label class. The may produce a semantically rich positive example of label text from a candidate text and label. Likewise, the technology may produce from the candidate text and the label a semantically rich negative example of label text. The labeling service makes use of a generative model to produce a generative result, which estimates the likelihood that the label properly applies to the candidate text. In another aspect, the technology is directed toward a method for obtaining a semantically rich example that is similar to a candidate text.
    Type: Application
    Filed: April 1, 2022
    Publication date: December 29, 2022
    Inventors: Mohit SEWAK, Ravi Kiran Reddy POLURI, William BLUM, Pak On CHAN, Weisheng LI, Sharada Shirish ACHARYA, Christian RUDNICK, Michael Abraham BETSER, Milenko DRINIC, Sihong LIU
  • Patent number: 11521108
    Abstract: Emails or other communications are labeled with a category label such as “spam” or “good” without using confidential or Personally Identifiable Information (PII). The category label is based on features of the emails such as metadata that do not contain PII. Graphs of inferred relationships between email features and category labels are used to assign labels to emails and to features of the emails. The labeled emails are used as a training dataset for training a machine learning model (“MLM”). The MLM model identifies unwanted emails such as spam, bulk email, phishing email, and emails that contain malware.
    Type: Grant
    Filed: July 30, 2018
    Date of Patent: December 6, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Yi Luo, Weigsheng Li, Sharada Shirish Acharya, Mainak Sen, Ravi Kiran Reddy Poluri, Christian Rudnick
  • Publication number: 20210136089
    Abstract: Methods, systems, and computer storage media for providing a multi-attribute cluster-identifier that supports identifying malicious activity in computing environments. An instance of an activity having an attribute set can be assessed. The attribute set of the instance of the activity is analyzed to determine whether the instance of the activity is a malicious activity. The attribute set of the instance of the activity is compared to a plurality of multi-attribute cluster-identifiers of previous instances of the activity, such that, a determination that the instance of the activity is a malicious activity is made when the attribute set of the instance of the activity corresponds to an identified multi-attribute cluster-identifier. The identified multi-attribute cluster-identifier has a risk score and an attribute set that indicate a likelihood that the instance of the activity is a malicious activity. A visualization that identifies the instance of the activity as a malicious activity is generated.
    Type: Application
    Filed: November 3, 2020
    Publication date: May 6, 2021
    Inventors: Mihai COSTEA, Michael Abraham BETSER, Ravi Kiran Reddy POLURI, Hua DING, Weisheng LI, Phanindra PAMPATI, David Nicholas YOST
  • Publication number: 20200034752
    Abstract: Emails or other communications are labeled with a category label such as “spam” or “good” without using confidential or Personally Identifiable Information (PII). The category label is based on features of the emails such as metadata that do not contain PII. Graphs of inferred relationships between email features and category labels are used to assign labels to emails and to features of the emails. The labeled emails are used as a training dataset for training a machine learning model (“MLM”). The MLM model identifies unwanted emails such as spam, bulk email, phishing email, and emails that contain malware.
    Type: Application
    Filed: July 30, 2018
    Publication date: January 30, 2020
    Inventors: Yi LUO, Weigsheng LI, Sharada Shirish ACHARYA, Mainak SEN, Ravi Kiran Reddy POLURI, Christian RUDNICK
  • Patent number: 9882851
    Abstract: Embodiments maintain filtering criteria for classifying electronic messages in a multi-tenant environment, including maintaining global filtering criteria for all tenants, as well as tenant-level filtering criteria for each tenant. For each tenant, feedback regarding a messaging campaign is identified. When the messaging campaign has not been categorized, and the feedback signals the messaging campaign as undesirable, the tenant-level filtering criteria for the tenant is updated to signal the messaging campaign as undesirable. When the messaging campaign has previously been categorized as undesirable, and the feedback signals the messaging campaign as desirable, the tenant-level filtering criteria for the tenant is updated to signal the messaging campaign as desirable. A reputation score for each tenant is also calculated.
    Type: Grant
    Filed: June 29, 2015
    Date of Patent: January 30, 2018
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Atapattuge D. Samith Gunasekara, Bruce Taimana, Gregory Gourevitch, Ravi Kiran Reddy Poluri, Krishnan Rangarajan, Una Sai Prasad Patro
  • Publication number: 20160380936
    Abstract: Embodiments maintain filtering criteria for classifying electronic messages in a multi-tenant environment, including maintaining global filtering criteria for all tenants, as well as tenant-level filtering criteria for each tenant. For each tenant, feedback regarding a messaging campaign is identified. When the messaging campaign has not been categorized, and the feedback signals the messaging campaign as undesirable, the tenant-level filtering criteria for the tenant is updated to signal the messaging campaign as undesirable. When the messaging campaign has previously been categorized as undesirable, and the feedback signals the messaging campaign as desirable, the tenant-level filtering criteria for the tenant is updated to signal the messaging campaign as desirable. A reputation score for each tenant is also calculated.
    Type: Application
    Filed: June 29, 2015
    Publication date: December 29, 2016
    Inventors: Atapattuge D. Samith Gunasekara, Bruce Taimana, Gregory Gourevitch, Ravi Kiran Reddy Poluri, Krishnan Rangarajan, Una Sai Prasad Patro
  • Patent number: 8812668
    Abstract: A method is provided for protecting an on-line resource using a HIP challenge. The method includes receiving a request to access the on-line resource from a remote client. A HIP challenge is presented to a user associated with the remote client. If a successful response to the HIP challenge is received from the user, a previous response pattern of the user is compared to known response patterns of humans and machines. The user is allowed to access to the on-line resource if the comparison indicates that the user is likely a human.
    Type: Grant
    Filed: November 6, 2009
    Date of Patent: August 19, 2014
    Assignee: Microsoft Corporation
    Inventors: Ravi Kiran Reddy Poluri, Weisheng Li, Usman Ahmed Shami, Vaishali De
  • Publication number: 20110113147
    Abstract: A method is provided for protecting an on-line resource using a HIP challenge. The method includes receiving a request to access the on-line resource from a remote client. A HIP challenge is presented to a user associated with the remote client. If a successful response to the HIP challenge is received from the user, a previous response pattern of the user is compared to known response patterns of humans and machines. The user is allowed to access to the on-line resource if the comparison indicates that the user is likely a human.
    Type: Application
    Filed: November 6, 2009
    Publication date: May 12, 2011
    Applicant: MICROSOFT CORPORATION
    Inventors: Ravi Kiran Reddy Poluri, Weisheng Li, Usman Ahmed Shami, Vaishali De