Patents by Inventor Cormac Herley
Cormac Herley has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20070199054Abstract: A phishing detection client component and method is provided. The component can be employed as part of a system to detect and, optionally, prevent phishing attacks. The phishing detection client component can provide password reuse event report(s), for example, to a phishing detection server component. The client component can further include a credential component that can track use of credentials by a user and determine whether a specific security credential is being used or presented. Due to the malicious nature of phishing in general, the client component can be susceptible to attacks by phishers. For example, phishers can generate false logins in an attempt to flood the client component with information resulting in induced false positives and/or induced false negatives. The client component can perform one or more checks to determine whether false login(s) have been attempted.Type: ApplicationFiled: February 23, 2006Publication date: August 23, 2007Applicant: Microsoft CorporationInventors: Dinei Florencio, Cormac Herley
-
Patent number: 7162084Abstract: An object detection and extraction system and method for processing digital image data. The system and method segregates objects contained within a single image and allows those objects to be considered as an individual object. In general, the object detection and extraction method takes an image containing one or more objects of know shape (such as rectangular objects) and finds the number of objects along with their size, orientation and position. In particular, the object detection and extraction method includes classifying each pixel in an image containing one or more objects to obtain pixel classification data, defining an image function to process the pixel classification data, and dividing the image into sub-images based on disparities or gaps in the image function. Each of the sub-images is processed to determine a size and an orientation for the each of the objects. The object detection and extraction system uses the above method.Type: GrantFiled: January 29, 2003Date of Patent: January 9, 2007Assignee: Microsoft CorporationInventor: Cormac Herley
-
Publication number: 20070006305Abstract: A system for protecting against information security breaches comprises a credential module that maintains a list of protected security credentials that are each associated with a known computing system and that detects when a security credential in the list is used. The system also includes a protection module that detects use of the security credential in connection with a computing system other than the known computing system with which the security credential is associated and that reports such use to a security server. Methods for using the system are also provided.Type: ApplicationFiled: June 30, 2005Publication date: January 4, 2007Applicant: Microsoft CorporationInventors: Dinei Florencio, Cormac Herley
-
Publication number: 20070005984Abstract: A phishing detection server component and method is provided. The component can be employed as part of a system to detect/phishing attacks. The phishing detection server component can receive password reuse event report(s), for example, from a protection component of client component(s). Due to the malicious nature of phishing in general, the phishing detection server component can be susceptible to attacks by phishers (e.g., by reverse engineering of the client component). For example, false report(s) of PREs can be received from phisher(s) in an attempt to overwhelm the server component, induce false positives and/or induce false negatives. Upon receipt of a PRE report, the phishing detection server component can first verify that the timestamp(s) are genuine (e.g., previously generated by the phishing detection server component). The report verification component can employ the timestamp(s) to verify veracity of the report (e.g., to minimize attacks by phishers).Type: ApplicationFiled: February 23, 2006Publication date: January 4, 2007Applicant: Microsoft CorporationInventors: Dinei Florencio, Cormac Herley
-
Patent number: 7142235Abstract: Opportunistic image quality improvement in a digital camera. In a digital camera having a picture memory of fixed size for storing a predetermined number of pictures, raw image data is compressed to form primary and auxiliary data sets. The primary data set allows the image to be reconstructed at a first quality level. The primary and auxiliary data sets combined allow the reconstruction of the image at a higher quality level. As images are taken and processed, if sufficient storage space exists in the picture memory, both primary and auxiliary data sets are stored. This continues until the memory is full of primary and auxiliary data sets. Once the memory is full, as more images are taken and stored, the space used by auxiliary data sets is reclaimed for use by primary data sets, and the auxiliary data sets are not stored.Type: GrantFiled: July 30, 1998Date of Patent: November 28, 2006Assignee: Hewlett-Packard Development Company, L.P.Inventor: Cormac Herley
-
Patent number: 7089464Abstract: The invention disclosed herein includes a system and method for electronically transferring data through a communications connection in a transparent manner such that the data transfer does not interfere with other traffic sharing the connection. The invention transfers data using bandwidth of the connection that other traffic are not using. If other traffic desires to use the bandwidth currently being used by the invention, the invention relinquishes the bandwidth to the other traffic and retreats to avoid bandwidth contention. Although a retreat may cause gaps in the data transferred, a key aspect of the invention is that any missing data due to these gaps is recovered easily and in a bandwidth-efficient way using novel error correction and recovery.Type: GrantFiled: September 19, 2005Date of Patent: August 8, 2006Assignee: Microsoft CorporationInventors: Cormac Herley, Paul England
-
Publication number: 20060107823Abstract: A “Music Mapper” automatically constructs a set coordinate vectors for use in inferring similarity between various pieces of music. In particular, given a music similarity graph expressed as links between various artists, albums, songs, etc., the Music Mapper applies a recursive embedding process to embed each of the graphs music entries into a multi-dimensional space. This recursive embedding process also embeds new music items added to the music similarity graph without reembedding existing entries so long a convergent embedding solution is achieved. Given this embedding, coordinate vectors are then computed for each of the embedded musical items. The similarity between any two musical items is then determined as either a function of the distance between the two corresponding vectors. In various embodiments, this similarity is then used in constructing music playlists given one or more random or user selected seed songs or in a statistical music clustering process.Type: ApplicationFiled: November 19, 2004Publication date: May 25, 2006Applicant: Microsoft CorporationInventors: John Platt, Erin Renshaw, Max Chickering, Cormac Herley
-
Publication number: 20060092281Abstract: A “media stream customizer” customizes buffered media streams by inserting one or more media objects into the stream to maintain an approximate buffer level. Specifically, when media objects such as songs, jingles, advertisements, etc., are deleted from the buffered stream (based on some user specified preferences), the buffer level will decrease. Therefore, over time, as more objects are deleted, the amount of the media stream being buffered continues to decrease, thereby limiting the ability to perform additional deletions from the stream. To address this limitation, the media stream customizer automatically chooses one or more media objects to insert back into the stream, and ensures that the inserted objects are consistent with any surrounding content of the media stream, thereby maintaining an approximate buffer level. In addition, the buffered content can also be stretched using pitch preserving audio stretching techniques to further compensate for deletions from the buffered stream.Type: ApplicationFiled: November 2, 2004Publication date: May 4, 2006Applicant: Microsoft CorporationInventors: Cormac Herley, John Platt, Chris Burges, Erin Renshaw
-
Publication number: 20060092282Abstract: A “media stream customizer” customizes buffered media streams by inserting one or more media objects into the stream to maintain an approximate buffer level. Specifically, when media objects such as songs, jingles, advertisements, etc., are deleted from the buffered stream (based on some user specified preferences), the buffer level will decrease. Therefore, over time, as more objects are deleted, the amount of the media stream being buffered continues to decrease, thereby limiting the ability to perform additional deletions from the stream. To address this limitation, the media stream customizer automatically chooses one or more media objects to insert back into the stream, and ensures that the inserted objects are consistent with any surrounding content of the media stream, thereby maintaining an approximate buffer level. In addition, the buffered content can also be stretched using pitch preserving audio stretching techniques to further compensate for deletions from the buffered stream.Type: ApplicationFiled: November 12, 2004Publication date: May 4, 2006Applicant: Microsoft CorporationInventors: Cormac Herley, Chris Burges
-
Publication number: 20060080356Abstract: A “similarity quantifier” automatically infers similarity between media objects which have no inherent measure of distance between them. For example, a human listener can easily determine that a song like Solsbury Hill by Peter Gabriel is more similar to Everybody Hurts by R.E.M. than it is to Highway to Hell by AC/DC. However, automatic determination of this similarity is typically a more difficult problem. This problem is addressed by using a combination of techniques for inferring similarities between media objects thereby facilitating media object filing, retrieval, classification, playlist construction, etc. Specifically, a combination of audio fingerprinting and repeat object detection is used for gathering statistics on broadcast media streams. These statistics include each media objects identity and positions within the media stream. Similarities between media objects are then inferred based on the observation that objects appearing closer together in an authored stream are more likely to be similar.Type: ApplicationFiled: October 13, 2004Publication date: April 13, 2006Applicant: Microsoft CorporationInventors: Chris Burges, Cormac Herley, John Platt
-
Publication number: 20060072818Abstract: A minimum area rectangle inscription method and system for automatically generating a minimum area rectangle that inscribes and bounds an approximately rectangular object (or “noisy” object) contained within scanned image data. The minimum area rectangle inscription method chooses an interior point located inside the object boundary and determine perimeter points located on the boundary. A convex hull is constructed from at least some of the perimeter points such that each side of the convex hull is convex. Inscribing rectangles, equal in number to the sides of the convex hull, are constructed such that each inscribing rectangle shares a side with the convex hull and circumscribes approximately the entire convex hull. The area of each of the inscribing rectangles is calculated, and the inscribing rectangle having the least amount of area is designated as the minimum area rectangle.Type: ApplicationFiled: September 30, 2004Publication date: April 6, 2006Applicant: Microsoft CorporationInventor: Cormac Herley
-
Patent number: 7020781Abstract: A system for distributing digital content over a computer network (e.g., the Internet) uses certificates to establish a trust relationship between a content provider and a display device. The certificates identify the display device and the content provider as well as unique characteristics of the distribution. For example, the content provider may be a book publisher and the display device may be a printer/binder.Type: GrantFiled: May 3, 2000Date of Patent: March 28, 2006Assignee: Hewlett-Packard Development Company, L.P.Inventors: Chit Wei Saw, Slawomir K. Ilnicki, Christian J. van den Branden Lambrecht, Joyce E Farrell, Cormac Herley, Joan Maria Mas Ribes
-
Patent number: 6996390Abstract: The present invention provides a large capacity, user defined audio content delivery system. The system delivers uninterrupted music and delivers information content (e.g., news by evaluating and encoding an input audio stream while outputting another stream. Undesirable audio content (e.g., advertisements and unwanted news) are not present in the output audio stream as only desired portions of information content are stored for playback on demand. The invention also includes a user interface that is simple enough to facilitate utilization of the audio system in an automobile and employs standard hardware available in typical computing and/or personal digital assistant equipment. Additionally, the audio system can be portable (e.g., as portable as a personal digital assistant) and can be updated in real time or off line via a personal computer.Type: GrantFiled: June 26, 2002Date of Patent: February 7, 2006Assignee: Microsoft CorporationInventors: Cormac Herley, John C. Platt
-
Publication number: 20060020703Abstract: Disclosed are methods and systems for a receiver to autonomously allocate bandwidth among its incoming communications flows. The incoming flows are assigned priorities. When it becomes necessary to alter the allocation of bandwidth among the flows, the receiver selects one of the lower priority flows. The receiver then causes the selected flow to delay sending acknowledgements of messages received to the senders of the messages. In most modern protocols, senders are sensitive to the time it takes to receive acknowledgements of the messages they send. When the acknowledgement time increases, the sender assumes that the receiver is becoming overloaded. The sender then slows down the rate at which it sends messages to the receiver. This lowered sending rate in turn reduces the amount of bandwidth used by the flow as it comes into the receiver. This frees up bandwidth which can then be used by higher priority flows.Type: ApplicationFiled: September 26, 2005Publication date: January 26, 2006Applicant: Microsoft CorporationInventors: Paul England, Cormac Herley
-
Publication number: 20060020702Abstract: Disclosed are methods and systems for a receiver to autonomously allocate bandwidth among its incoming communications flows. The incoming flows are assigned priorities. When it becomes necessary to alter the allocation of bandwidth among the flows, the receiver selects one of the lower priority flows. The receiver then causes the selected flow to delay sending acknowledgements of messages received to the senders of the messages. In most modern protocols, senders are sensitive to the time it takes to receive acknowledgements of the messages they send. When the acknowledgement time increases, the sender assumes that the receiver is becoming overloaded. The sender then slows down the rate at which it sends messages to the receiver. This lowered sending rate in turn reduces the amount of bandwidth used by the flow as it comes into the receiver. This frees up bandwidth which can then be used by higher priority flows.Type: ApplicationFiled: September 26, 2005Publication date: January 26, 2006Applicant: Microsoft CorporationInventors: Paul England, Cormac Herley
-
Publication number: 20060015782Abstract: The invention disclosed herein includes a system and method for electronically transferring data through a communications connection in a transparent manner such that the data transfer does not interfere with other traffic sharing the connection. The invention transfers data using bandwidth of the connection that other traffic are not using. If other traffic desires to use the bandwidth currently being used by the invention, the invention relinquishes the bandwidth to the other traffic and retreats to avoid bandwidth contention. Although a retreat may cause gaps in the data transferred, a key aspect of the invention is that any missing data due to these gaps is recovered easily and in a bandwidth-efficient way using novel error correction and recovery.Type: ApplicationFiled: September 19, 2005Publication date: January 19, 2006Applicant: Microsoft CorporationInventors: Cormac Herley, Paul England
-
Patent number: 6976166Abstract: The present invention is directed to methods and apparatus that partially encrypt an information data file. An exemplary method includes dividing the information file into a first file and a second file, wherein the second file includes content from the information file to preclude reconstruction of the information file using only the first file, and encrypting the second file. Additionally, the method provides for transmitting the first file and the encrypted second file from a first device to a second device.Type: GrantFiled: February 6, 2001Date of Patent: December 13, 2005Assignee: Hewlett-Packard Development Company, L.P.Inventors: Cormac Herley, Yihong Xu
-
Publication number: 20050273644Abstract: The invention disclosed herein includes a system and method for electronically transferring data through a communications connection in a transparent manner such that the data transfer does not interfere with other traffic sharing the connection. The invention transfers data using bandwidth of the connection that other traffic are not using. If other traffic desires to use the bandwidth currently being used by the invention, the invention relinquishes the bandwidth to the other traffic and retreats to avoid bandwidth contention. Although a retreat may cause gaps in the data transferred, a key aspect of the invention is that any missing data due to these gaps is recovered easily and in a bandwidth-efficient way using novel error correction and recovery.Type: ApplicationFiled: July 30, 2005Publication date: December 8, 2005Applicant: Microsoft CorporationInventors: Cormac Herley, Paul England
-
Publication number: 20050268090Abstract: A system for distributing digital content over a computer network (e.g., the Internet) uses certificates to establish a trust relationship between a content provider and a display device. The certificates identify the display device and the content provider as well as unique characteristics of the distribution. For example, the content provider may be a book publisher and the display device may be a printer/binder.Type: ApplicationFiled: May 16, 2005Publication date: December 1, 2005Inventors: Chit Saw, Slawomir Ilnicki, Christian Branden Lambrecht, Joyce Farrell, Cormac Herley, Joan Ribes
-
Publication number: 20050262528Abstract: The present invention provides a large capacity, user defined audio content delivery system. The system delivers uninterrupted music and delivers information content (e.g., news by evaluating and encoding an input audio stream while outputting another stream. Undesirable audio content (e.g., advertisements and unwanted news) are not present in the output audio stream as only desired portions of information content are stored for playback on demand. The invention also includes a user interface that is simple enough to facilitate utilization of the audio system in an automobile and employs standard hardware available in typical computing and/or personal digital assistant equipment. Additionally, the audio system can be portable (e.g., as portable as a personal digital assistant) and can be updated in real time or off line via a personal computer.Type: ApplicationFiled: July 25, 2005Publication date: November 24, 2005Applicant: Microsoft CorporationInventors: Cormac Herley, John Platt