Patents by Inventor Timothy Colin LARSON

Timothy Colin LARSON has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11328047
    Abstract: A gamified challenge is presented to a user communicating with a website when the user is suspected of being a bot. The gamified challenge consists of a dynamic sequence of animated geometric objects displayed in an order that the user has to interact with within an allotted amount of time. The complexity of the gamified challenge increases when the challenge is failed and when features extracted from the user session indicate a high level of suspicion that the gamified challenge is performed by a non-human user.
    Type: Grant
    Filed: October 31, 2019
    Date of Patent: May 10, 2022
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC.
    Inventors: Timothy Colin Larson, Daniel. E. Castro, Andrew Ryan Pickering, Jiong Wang
  • Patent number: 11263319
    Abstract: Suspicious credential changes are automatically detected and mitigated. A comparison of data surrounding user-account credential changes with suspicious change patterns forms a basis for detecting suspicious credential changes. More particularly, if a credential change substantially matches a known suspicious change pattern, the credential change can be flagged as suspicious. After a credential change is determined to be suspicious, one or more mitigation activities can be triggered to allay adverse effects associated with a suspicious credential change.
    Type: Grant
    Filed: August 21, 2018
    Date of Patent: March 1, 2022
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Ariel Nicolas Gordon, Timothy Colin Larson
  • Patent number: 11212395
    Abstract: According to examples, an apparatus may include a processor and a computer readable medium on which is stored machine readable instructions that may cause the processor to determine a call duration threshold assigned to an entity, in which a phone number may be associated with the entity. The processor may also track durations of one or more calls placed to the phone number, determine whether the tracked durations of the one or more calls placed to the phone number meet or exceed the call duration threshold, and based on a determination that the tracked durations meet or exceed the call duration threshold, throttle placement of an additional call to the phone number.
    Type: Grant
    Filed: September 20, 2019
    Date of Patent: December 28, 2021
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Michael Vincent McLaughlin, Timothy Colin Larson
  • Publication number: 20210092234
    Abstract: According to examples, an apparatus may include a processor and a computer readable medium on which is stored machine readable instructions that may cause the processor to determine a call duration threshold assigned to an entity, in which a phone number may be associated with the entity. The processor may also track durations of one or more calls placed to the phone number, determine whether the tracked durations of the one or more calls placed to the phone number meet or exceed the call duration threshold, and based on a determination that the tracked durations meet or exceed the call duration threshold, throttle placement of an additional call to the phone number.
    Type: Application
    Filed: September 20, 2019
    Publication date: March 25, 2021
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Michael Vincent MCLAUGHLIN, Timothy Colin Larson
  • Patent number: 10630676
    Abstract: A sign-in system can be protected against enumeration attacks while providing an improved sign-in experience for legitimate users by disclosing whether or not an account exists. An account within a specified domain can be identified by an account identifier such as a username. Before a threshold throttling value is reached, account existence/non-existence information can be provided in response to an access request. In response to reaching or exceeding a specified threshold throttling value, account existence/non-existence information can cease to be provided. Entering a valid account identifier/authenticating credential credentials pair provides access to the computer system regardless of whether or not the threshold was reached or exceeded or not reached.
    Type: Grant
    Filed: November 24, 2017
    Date of Patent: April 21, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Ariel Gordon, Timothy Colin Larson
  • Publication number: 20200065484
    Abstract: Suspicious credential changes are automatically detected and mitigated. A comparison of data surrounding user-account credential changes with suspicious change patterns forms a basis for detecting suspicious credential changes. More particularly, if a credential change substantially matches a known suspicious change pattern, the credential change can be flagged as suspicious. After a credential change is determined to be suspicious, one or more mitigation activities can be triggered to allay adverse effects associated with a suspicious credential change.
    Type: Application
    Filed: August 21, 2018
    Publication date: February 27, 2020
    Inventors: Ariel Nicolas Gordon, Timothy Colin Larson
  • Publication number: 20190166112
    Abstract: A sign-in system can be protected against enumeration attacks while providing an improved sign-in experience for legitimate users by disclosing whether or not an account exists. An account within a specified domain can be identified by an account identifier such as a username. Before a threshold throttling value is reached, account existence/non-existence information can be provided in response to an access request. In response to reaching or exceeding a specified threshold throttling value, account existence/non-existence information can cease to be provided. Entering a valid account identifier/authenticating credential credentials pair provides access to the computer system regardless of whether or not the threshold was reached or exceeded or not reached.
    Type: Application
    Filed: November 24, 2017
    Publication date: May 30, 2019
    Inventors: Ariel GORDON, Timothy Colin LARSON