The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.
The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.
Patent No.:
Date of Patent:
Aug. 04, 2015
Filed:
Jan. 29, 2010
Malcolm H Davis, Kirkland, WA (US);
Aravind K Ramachandran, Redmond, WA (US);
Geoffrey J Hulten, Lynnwood, WA (US);
Ivan Osipkov, Bellevue, WA (US);
Milenko Drinic, Bellevue, WA (US);
Eliot C. Gillum, Mountain View, CA (US);
Krishna C. Vitaldevara, Fremont, CA (US);
Jason D. Walter, San Jose, CA (US);
Mehrdad Bidgoli, San Francisco, CA (US);
Robert L. Mccann, Fall City, WA (US);
Malcolm H Davis, Kirkland, WA (US);
Aravind K Ramachandran, Redmond, WA (US);
Geoffrey J Hulten, Lynnwood, WA (US);
Ivan Osipkov, Bellevue, WA (US);
Milenko Drinic, Bellevue, WA (US);
Eliot C. Gillum, Mountain View, CA (US);
Krishna C. Vitaldevara, Fremont, CA (US);
Jason D. Walter, San Jose, CA (US);
Mehrdad Bidgoli, San Francisco, CA (US);
Robert L. McCann, Fall City, WA (US);
Microsoft Technology Licensing, LLC, Redmond, WA (US);
Abstract
The filtering of activities generated by nodes of a network while interacting with a device may be performed by evaluating the desirability of the activities (e.g., a spam or not-spam determination of email messages sent by the node) and assigning a trust rating to the node. However, nodes are often identified by network address, and an operator of a node sending undesirable activities may reassign the network address of the node in order to avoid heavy filtering. Instead, nodes may be identified as being controlled by a network entity (e.g., an autonomous system identified in a border gateway protocol routing table.) The network entity is assigned a network entity trust rating based on the trust ratings of the nodes controlled thereby, and an appropriate level of activity filtering based on the network entity trust rating may be selected for subsequent activities received from all nodes controlled by the network entity.