Patents by Inventor Ryan C Colvin
Ryan C Colvin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9336379Abstract: Reputation-based resource lookup may include determining the reputation of resources that are to be accessed. Based on the reputation of the resource, a user experience is provided. Protection can be provided from known and suspicious resources, by providing warnings, such as unique graphical visual warnings and textual messages. Furthermore, additional information may be provided as to the desired resource. A user may be further required to go through several pages or asked various questions before accessing a resource.Type: GrantFiled: August 19, 2010Date of Patent: May 10, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Ryan C Colvin, Ameya S. Bhatawdekar, Elliot J (Jeb) Haber
-
Patent number: 9235586Abstract: A Web browser of a computing device downloads or otherwise obtains a file. File information identifying the file is obtained and is sent to a remote reputation service. Client information identifying aspects of the computing device can also optionally be sent to the remote reputation service. In response to the file information (and optionally client information), a reputation indication for the file is received from the remote reputation service. A user interface for the Web browser to present at the computing device is determined, based at least in part on the reputation indication, and presented at the computing device.Type: GrantFiled: September 13, 2010Date of Patent: January 12, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Ritika Virmani, Ryan C. Colvin, Elliott Jeb Haber, Warren G. Stevens, Jane T. Kim, Jess S. Holbrook, Sarah J. Bowers, John L. Scarrow, Jeffrey R. McKune
-
Patent number: 8627475Abstract: Evidence of attempted malware attacks may be used to identify the location and nature of future attacks. A failed attack may cause a program to crash. Crash data may be sent to an analyzer for analysis. The analysis may reveal information such as the identity of the program that is being exploited, the specific way in which the program is being exploited, and the identity or location of the source of the attack. This information may be used to identify potential sources of attack and to identify the same type of attack from other sources. When the source and/or nature of an attempted attack is known, remedial action may be taken. Filters may warn users who are attempting to visit sites from which attacks have been attempted, and the makers of programs that are being exploited can be notified so that those program makers can release updates.Type: GrantFiled: April 8, 2010Date of Patent: January 7, 2014Assignee: Microsoft CorporationInventors: Shawn D. Loveland, John J. Lambert, Darren E. Canavor, Ryan C. Colvin
-
Publication number: 20120066346Abstract: A Web browser of a computing device downloads or otherwise obtains a file. File information identifying the file is obtained and is sent to a remote reputation service. Client information identifying aspects of the computing device can also optionally be sent to the remote reputation service. In response to the file information (and optionally client information), a reputation indication for the file is received from the remote reputation service. A user interface for the Web browser to present at the computing device is determined, based at least in part on the reputation indication, and presented at the computing device.Type: ApplicationFiled: September 13, 2010Publication date: March 15, 2012Applicant: MICROSOFT CORPORATIONInventors: Ritika Virmani, Ryan C. Colvin, Elliott Jeb Haber, Warren G. Stevens, Jane T. Kim, Jess S. Holbrook, Sarah J. Bowers, John L. Scarrow, Jeffrey R. McKune
-
Publication number: 20120047461Abstract: Reputation-based resource lookup may include determining the reputation of resources that are to be accessed. Based on the reputation of the resource, a user experience is provided. Protection can be provided from known and suspicious resources, by providing warnings, such as unique graphical visual warnings and textual messages. Furthermore, additional information may be provided as to the desired resource. A user may be further required to go through several pages or asked various questions before accessing a resource.Type: ApplicationFiled: August 19, 2010Publication date: February 23, 2012Applicant: Microsoft CorporationInventors: Ryan C. Colvin, Ameya S. Bhatawdekar, Elliot J. Haber
-
Patent number: 8065370Abstract: Embodiments of proofs to filter spam are presented herein. Proofs are utilized to indicate a sender used a set amount of computer resources in sending a message in order to demonstrate the sender is not a “spammer”. Varying the complexity of the proofs, or the level of resources used to send the message, will indicate to the recipient the relative likelihood the message is spam. Higher resource usage indicates that the message may not be spam, while lower resource usage increases the likelihood a message is spam. Also, if the recipient requires a higher level of proof than received, the receiver may request the sender send additional proof to verify the message is not spam.Type: GrantFiled: November 3, 2005Date of Patent: November 22, 2011Assignee: Microsoft CorporationInventors: Geoffrey J Hulten, Gopalakrishnan Seshadrinathan, Joshua T. Goodman, Manav Mishra, Robert C J Pengelly, Robert L. Rounthwaite, Ryan C Colvin
-
Publication number: 20110252476Abstract: Evidence of attempted malware attacks may be used to identify the location and nature of future attacks. A failed attack may cause a program to crash. Crash data may be sent to an analyzer for analysis. The analysis may reveal information such as the identity of the program that is being exploited, the specific way in which the program is being exploited, and the identity or location of the source of the attack. This information may be used to identify potential sources of attack and to identify the same type of attack from other sources. When the source and/or nature of an attempted attack is known, remedial action may be taken. Filters may warn users who are attempting to visit sites from which attacks have been attempted, and the makers of programs that are being exploited can be notified so that those program makers can release updates.Type: ApplicationFiled: April 8, 2010Publication date: October 13, 2011Applicant: MICROSOFT CORPORATIONInventors: Shawn D. Loveland, John J. Lambert, Darren E. Canavor, Ryan C. Colvin
-
Patent number: 7908328Abstract: Identification of email forwarders is described. In an implementation, a method includes using heuristics to identify email forwarders for use in a reputation system for locating spammers. In another implementation, a method includes determining a likelihood that a particular Internet Protocol (IP) address corresponds to an email forwarder and processing email originating from the particular IP address based on the determined likelihood. In a further implementation, a method includes collecting heuristic data that describes characteristics of emails sent from one or more Internet Protocol (IP) addresses and constructing a model from the heuristic data for identifying whether at least one of the IP address is an email forwarder. In yet a further implementation, a method includes identifying that a particular Internet Protocol (IP) address likely corresponds to an email forwarder and processing email from the particular IP address based on an implied sender of the email.Type: GrantFiled: December 27, 2004Date of Patent: March 15, 2011Assignee: Microsoft CorporationInventors: Geoffrey J Hulten, Anthony P. Penta, David Maxwell Chickering, Eliot C. Gillum, Gopalakrishnan Seshadrinathan, Jay T. Buckingham, Joshua T. Goodman, Paul S Rehfuss, Robert L. Rounthwaite, Ryan C Colvin
-
Patent number: 7904517Abstract: Disclosed are systems and methods that facilitate securing communication channels used in a challenge-response system to mitigate spammer intrusion or deception. The systems and methods make use of unique IDs that can be added to outbound messages originating from a sender, a recipient, and a third-party server. The IDs can be correlated according to the relevant parties. Thus, for example, a sender can add a signed ID to an outgoing message. A challenge sent back to the sender for that particular message can echo the same ID or a new ID derived from the original ID to allow a sender to verify that the challenge corresponds to an actual message. The IDs can include cookies as well to facilitate correlation of messages and to facilitate the retrieval of messages once a sender is determined to be legitimate.Type: GrantFiled: August 9, 2004Date of Patent: March 8, 2011Assignee: Microsoft CorporationInventors: Nina W Kang, Joshua T Goodman, Robert L Rounthwaite, Josh Benaloh, Elissa E Murphy, Manav Mishra, Gopalakrishnan Seshadrinathan, Derek M Hazeur, Ryan C Colvin