Patents by Inventor Robert Rounthwaite

Robert Rounthwaite has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070100824
    Abstract: A unique ranking system and method that facilitates improving the ranking and ordering of objects to further enhance the quality, accuracy, and delivery of search results in response to a search query. The system and method involve monitoring and tracking an object in terms of the number of times it's been accessed and optionally by whom, when, for how long, and an access rate. The user's interaction with the object can be tracked as well. By tracking the objects, a popularity measure can be determined. Popularity based rankings can be computed based on the popularity measure or some function thereof. The popularity measure can be affected by the access time, who accessed it, access duration or the user's interaction with the object upon access. The popularity based rankings can be utilized by a search component to improve the quality and retrieval of search results.
    Type: Application
    Filed: November 3, 2005
    Publication date: May 3, 2007
    Applicant: Microsoft Corporation
    Inventors: Matthew Richardson, Eric Brill, Robert Ragno, Robert Rounthwaite
  • Publication number: 20070100949
    Abstract: Embodiment of proofs to filter spam are presented herein.
    Type: Application
    Filed: November 3, 2005
    Publication date: May 3, 2007
    Applicant: Microsoft Corporation
    Inventors: Geoffrey Hulten, Gopalakrishnan Seshadrinathan, Joshua Goodman, Manav Mishra, Robert Pengelly, Robert Rounthwaite, Ryan Colvin
  • Publication number: 20070038705
    Abstract: Decision trees populated with classifier models are leveraged to provide enhanced spam detection utilizing separate email classifiers for each feature of an email. This provides a higher probability of spam detection through tailoring of each classifier model to facilitate in more accurately determining spam on a feature-by-feature basis. Classifiers can be constructed based on linear models such as, for example, logistic-regression models and/or support vector machines (SVM) and the like. The classifiers can also be constructed based on decision trees. “Compound features” based on internal and/or external nodes of a decision tree can be utilized to provide linear classifier models as well. Smoothing of the spam detection results can be achieved by utilizing classifier models from other nodes within the decision tree if training data is sparse. This forms a base model for branches of a decision tree that may not have received substantial training data.
    Type: Application
    Filed: July 29, 2005
    Publication date: February 15, 2007
    Applicant: Microsoft Corporation
    Inventors: David Chickering, Geoffrey Hulten, Robert Rounthwaite, Christopher Meek, David Heckerman, Joshua Goodman
  • Publication number: 20070039038
    Abstract: Phishing detection, prevention, and notification is described. In an embodiment, a messaging application facilitates communication via a messaging user interface, and receives a communication, such as an email message, from a domain. A phishing detection module detects a phishing attack in the communication by determining that the domain is similar to a known phishing domain, or by detecting suspicious network properties of the domain. In another embodiment, a Web browsing application receives content, such as data for a Web page, from a network-based resource, such as a Web site or domain. The Web browsing application initiates a display of the content, and a phishing detection module detects a phishing attack in the content by determining that a domain of the network-based resource is similar to a known phishing domain, or that an address of the network-based resource from which the content is received has suspicious network properties.
    Type: Application
    Filed: September 30, 2006
    Publication date: February 15, 2007
    Applicant: Microsoft Corporation
    Inventors: Joshua Goodman, Paul Rehfuss, Robert Rounthwaite, Manav Mishra, Geoffrey Hulten, Kenneth Richards, Aaron Averbuch, Anthony Penta, Roderic Deyo
  • Publication number: 20070033639
    Abstract: Phishing detection, prevention, and notification is described. In an embodiment, a messaging application facilitates communication via a messaging user interface, and receives a communication, such as an email message, from a domain. A phishing detection module detects a phishing attack in the communication by determining that the domain is similar to a known phishing domain, or by detecting suspicious network properties of the domain. In another embodiment, a Web browsing application receives content, such as data for a Web page, from a network-based resource, such as a Web site or domain. The Web browsing application initiates a display of the content, and a phishing detection module detects a phishing attack in the content by determining that a domain of the network-based resource is similar to a known phishing domain, or that an address of the network-based resource from which the content is received has suspicious network properties.
    Type: Application
    Filed: September 30, 2006
    Publication date: February 8, 2007
    Applicant: Microsoft Corporation
    Inventors: Joshua Goodman, Paul Rehfuss, Robert Rounthwaite, Manav Mishra, Geoffrey Hulten, Kenneth Richards, Aaron Averbuch, Anthony Penta, Roderict Deyo
  • Publication number: 20070016616
    Abstract: The present invention relates to a system and methodology to facilitate automated error correction of user input data via an analysis of the input data in accordance with an automatically generated and filtered database of processed structural groupings or formulations selected and filtered from past user activities. The filtered database provides a relevant foundation of potential phrases, topics, symbols, speech and/or colloquial structures of interest to users—which are automatically determined from previous user activity, and employed to facilitate automated error checking in accordance with the user's current input, command and/or request for information.
    Type: Application
    Filed: September 20, 2006
    Publication date: January 18, 2007
    Applicant: MICROSOFT CORPORATION
    Inventors: Eric Brill, Robert Rounthwaite
  • Publication number: 20060225136
    Abstract: Techniques for protecting personally identifiable information are described. In an implementation, a method is described which includes analyzing heuristics which correspond to a communication to determine a likelihood that the communication relates to a fraudulent attempt to obtain personally identifiable information. A determination is made based on the determined likelihood of whether to perform one or more actions in conjunction with the communication.
    Type: Application
    Filed: March 31, 2005
    Publication date: October 5, 2006
    Applicant: Microsoft Corporation
    Inventors: Robert Rounthwaite, Paul Rehfuss, Gopalakrishnan Seshadrinathan, Kenneth Richards, Michael Gahrns
  • Publication number: 20060179113
    Abstract: Network domain reputation-based spam filtering is described. In an embodiment, emails are received from a network domain and a reputation of the network domain is established. Additional emails are filtered as they are received to determine a status of each email as spam email or not spam email. An email can be determined to be a spam email based on any one or more of the reputation of the network domain, an authentication status of an email, and other information that can be derived from an email.
    Type: Application
    Filed: February 4, 2005
    Publication date: August 10, 2006
    Applicant: Microsoft Corporation
    Inventors: Jay Buckingham, John Mehr, Paul Rehfuss, Robert Rounthwaite
  • Patent number: 7076731
    Abstract: A spelling correction system and method for phrasal strings using a dictionary looping technique. The method of the present invention includes spelling correction of an input phrasal string by segmenting the string into a plurality of different segmentations, comparing each segmentation to dictionary entries using the dictionary looping technique, assigning a cost to each segmentation, and determining an output string by finding the segmentation having the lowest cost. The dictionary looping technique determines compares each segmentation to dictionary entries by performing a looping search through a phrasal dictionary data structure in a looping manner whereby a number of different searches are performed. Dictionary looping allows the dictionary to be compact because the dictionary need not include all potential combinations of all possible phrases that could be encountered. The present invention also includes a phrasal spelling correction system and a dynamic dictionary that uses the above-described method.
    Type: Grant
    Filed: June 2, 2001
    Date of Patent: July 11, 2006
    Assignee: Microsoft Corporation
    Inventors: Eric D. Brill, Robert Rounthwaite, Raman Chandrasekar
  • Publication number: 20060143271
    Abstract: Secure safe sender lists are described. In an implementation, a method includes determining which of a plurality of hierarchical levels corresponds to a message received via a network. Each of the hierarchical level is defined by mechanisms for identifying a sender of the message. The message is routed according to the corresponding one of the hierarchical levels.
    Type: Application
    Filed: December 27, 2004
    Publication date: June 29, 2006
    Applicant: Microsoft Corporation
    Inventors: Elissa Murphy, Geoffrey Hulten, Manav Mishra, Robert Rounthwaite
  • Publication number: 20060123464
    Abstract: Phishing detection, prevention, and notification is described. In an embodiment, a messaging application facilitates communication via a messaging user interface, and receives a communication, such as an email message, from a domain. A phishing detection module detects a phishing attack in the communication by determining that the domain is similar to a known phishing domain, or by detecting suspicious network properties of the domain. In another embodiment, a Web browsing application receives content, such as data for a Web page, from a network-based resource, such as a Web site or domain. The Web browsing application initiates a display of the content, and a phishing detection module detects a phishing attack in the content by determining that a domain of the network-based resource is similar to a known phishing domain, or that an address of the network-based resource from which the content is received has suspicious network properties.
    Type: Application
    Filed: May 13, 2005
    Publication date: June 8, 2006
    Applicant: Microsoft Corporation
    Inventors: Joshua Goodman, Paul Rehfuss, Robert Rounthwaite, Manav Mishra, Geoffrey Hulten, Kenneth Richards, Aaron Averbuch, Anthony Penta, Roderic Deyo
  • Publication number: 20060123478
    Abstract: Phishing detection, prevention, and notification is described. In an embodiment, a messaging application facilitates communication via a messaging user interface, and receives a communication, such as an email message, from a domain. A phishing detection module detects a phishing attack in the communication by determining that the domain is similar to a known phishing domain, or by detecting suspicious network properties of the domain. In another embodiment, a Web browsing application receives content, such as data for a Web page, from a network-based resource, such as a Web site or domain. The Web browsing application initiates a display of the content, and a phishing detection module detects a phishing attack in the content by determining that a domain of the network-based resource is similar to a known phishing domain, or that an address of the network-based resource from which the content is received has suspicious network properties.
    Type: Application
    Filed: May 13, 2005
    Publication date: June 8, 2006
    Applicant: Microsoft Corporation
    Inventors: Paul Rehfuss, Joshua Goodman, Robert Rounthwaite, Manav Mishra, Geoffrey Hulten, Kenneth Richards, Aaron Averbuch, Anthony Penta, Roderic Deyo
  • Publication number: 20060036693
    Abstract: Disclosed are signature-based systems and methods that facilitate spam detection and prevention at least in part by calculating hash values for an incoming message and then determining a probability that the hash values indicate spam. In particular, the signatures generated for each incoming message can be compared to a database of both spam and good signatures. A count of the number of matches can be divided by a denominator value. The denominator value can be an overall volume of messages sent to the system per signature for example. The denominator value can be discounted to account for different treatments and timing of incoming messages. Furthermore, secure hashes can be generated by combining portions of multiple hashing components. A secure hash can be made from a combination of multiple hashing components or multiple combinations thereof. The signature based system can also be integrated with machine learning systems to optimize spam prevention.
    Type: Application
    Filed: August 12, 2004
    Publication date: February 16, 2006
    Applicant: Microsoft Corporation
    Inventors: Geoffrey Hulten, Joshua Goodman, Robert Rounthwaite, Manav Mishra, Elissa Murphy
  • Publication number: 20060031338
    Abstract: Disclosed are systems and methods that facilitate securing communication channels used in a challenge-response system to mitigate spammer intrusion or deception. The systems and methods make use of unique IDs that can be added to outbound messages originating from a sender, a recipient, and a third-party server. The IDs can be correlated according to the relevant parties. Thus, for example, a sender can add a signed ID to an outgoing message. A challenge sent back to the sender for that particular message can echo the same ID or a new ID derived from the original ID to allow a sender to verify that the challenge corresponds to an actual message. The IDs can include cookies as well to facilitate correlation of messages and to facilitate the retrieval of messages once a sender is determined to be legitimate.
    Type: Application
    Filed: August 9, 2004
    Publication date: February 9, 2006
    Applicant: Microsoft Corporation
    Inventors: Nina Kang, Joshua Goodman, Robert Rounthwaite, Josh Benaloh, Elissa Murphy, Manav Mishra, Gopalakrishnan Seshadrinathan, Derek Hazeur, Ryan Colvin
  • Publication number: 20060015561
    Abstract: The present invention provides a unique system and method that facilitates incrementally updating spam filters in near real time or real time. Incremental updates can be generated in part by difference learning. Difference learning involves training a new spam filter based on new data and then looking for the differences between the new spam filter and the existing spam filter. Differences can be determined at least in part by comparing the absolute values of parameter changes (weight changes of a feature between the two filters). Other factors such as frequency of parameters can be employed as well. In addition, available updates with respect to particular features or messages can be looked up using one or more lookup tables or databases. When incremental and/or feature-specific updates are available, they can be downloaded such as by a client for example. Incremental updates can be automatically provided or can be provided by request according to client or server preferences.
    Type: Application
    Filed: June 29, 2004
    Publication date: January 19, 2006
    Applicant: Microsoft Corporation
    Inventors: Elissa Murphy, Joshua Goodman, Derek Hazeur, Robert Rounthwaite, Geoffrey Hulten
  • Publication number: 20050108196
    Abstract: Distribution displays for categories are provided which illuminate the distribution of continuous attributes over all cases in a category, and which provide a histogram of the population of the different states of categorical attributes. An array of such displays by attribute (in one dimension) and category (in another dimension) may be provided. Category diagram displays are also provided for visualizing the different categories, and their distributions, populations, and similarities. These are displayed through different shading of nodes and edges representing categories and the relationship between two categories, and through proximity of nodes.
    Type: Application
    Filed: September 30, 2004
    Publication date: May 19, 2005
    Applicant: Microsoft Corporation
    Inventors: David Chickering, Zhaohui Tang, David Heckerman, Robert Rounthwaite, Alexei Bocharov, Scott Oveson
  • Publication number: 20050108285
    Abstract: Distribution displays for categories are provided which illuminate the distribution of continuous attributes over all cases in a category, and which provide a histogram of the population of the different states of categorical attributes. An array of such displays by attribute (in one dimension) and category (in another dimension) may be provided. Category diagram displays are also provided for visualizing the different categories, and their distributions, populations, and similarities. These are displayed through different shading of nodes and edges representing categories and the relationship between two categories, and through proximity of nodes.
    Type: Application
    Filed: September 30, 2004
    Publication date: May 19, 2005
    Applicant: Microsoft Corporation
    Inventors: David Chickering, Zhaohui Tang, David Heckerman, Robert Rounthwaite, Alexei Bocharov, Scott Oveson
  • Publication number: 20050108284
    Abstract: Distribution displays for categories are provided which illuminate the distribution of continuous attributes over all cases in a category, and which provide a histogram of the population of the different states of categorical attributes. An array of such displays by attribute (in one dimension) and category (in another dimension) may be provided. Category diagram displays are also provided for visualizing the different categories, and their distributions, populations, and similarities. These are displayed through different shading of nodes and edges representing categories and the relationship between two categories, and through proximity of nodes.
    Type: Application
    Filed: September 30, 2004
    Publication date: May 19, 2005
    Applicant: Microsoft Corporation
    Inventors: David Chickering, Zhaohui Tang, David Heckerman, Robert Rounthwaite, Alexei Bocharov, Scott Oveson
  • Publication number: 20050091245
    Abstract: The system and method of the present invention automatically assigns “scores” to the predictor/variable value pairs of a conventional probabilistic model to measure the relative impact or influence of particular elements of a set of topics, items, products, etc. in making specific predictions using the probabilistic model. In particular, these scores measure the relative impact, either positive or negative, that the value of each individual predictor variable has on the posterior distribution of the target topic, item, product, etc., for which a probability is being determined. These scores are useful for understanding why each prediction is made, and how much impact each predictor has on the prediction. Consequently, such scores are useful for explaining why a particular prediction or recommendation was made.
    Type: Application
    Filed: November 17, 2004
    Publication date: April 28, 2005
    Applicant: Microsoft Corporation
    Inventors: David Chickering, David Heckerman, Robert Rounthwaite
  • Publication number: 20050066201
    Abstract: The present invention involves a system and method that facilitate identifying human interaction by utilizing HIPs such as order-based HIPs and determining a difficulty rating of any type of HIPs in an automated fashion. Order-based HIPs require a user to identify elements in the sequence as well as to identify a correct order of the elements in the sequence. The invention involves presenting a user with at least two HIPs such that the HIP can be of known and/or unknown difficulty. A user that correctly answers the HIP of known difficulty gains access to the HIP-controlled resource, action or application. The user's response to the HIP of unknown difficulty can then be examined and employed to determine whether that HIP is too difficult for humans to solve. Alternatively, at least one HIP can be presented. Difficulty of individual HIP parameters can also be determined.
    Type: Application
    Filed: September 23, 2003
    Publication date: March 24, 2005
    Inventors: Joshua Goodman, Robert Rounthwaite