Patents by Inventor Michael James Connor

Michael James Connor has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20080162385
    Abstract: An improved system and method is provided for learning a weighted index to categorize objects using ranked recall. In an offline embodiment, a learning engine may learn a weighted index for classifying objects using ranked recall by training during an entire initial pass of a training sequence of a collection of objects. In an online embodiment, a learning engine may learn a weighted index for classifying objects using ranked recall by dynamically updating the weighted index as each instance of the collection of objects may be categorized. Advantageously, an instance of a large collection of objects may be accurately and efficiently recalled for many large scale applications with hundreds of thousands of categories by quickly identifying a small set of candidate categories for the given instance of the object.
    Type: Application
    Filed: December 28, 2006
    Publication date: July 3, 2008
    Applicant: Yahoo! Inc.
    Inventors: Omid Madani, Michael James Connor
  • Publication number: 20040172551
    Abstract: A process of screening one or more software files to determine any that are recognized to have a matching hash signature with a file contained in a database of files known to be Virus, Trojan, Worm, or otherwise potentially malicious or suspicious which then can be safely blocked, quarantined and/or deleted. This is accomplished through a method and apparatus running on a firewall, network device, mail server, server, personal computer, PDA, cell phone or wireless device to compare the hash signature of each incoming software file against a regularly updated database of known infected file hash signatures. One or more users can be alerted when an infected file is identified. If quarantined the file is safely stored until virus software is updated properly with later developed virus definitions file(s), which are then used to eradicate or clean the infected file(s) or computer systems.
    Type: Application
    Filed: December 9, 2003
    Publication date: September 2, 2004
    Inventors: Alex Fielding, Michael James Connor
  • Publication number: 20040133548
    Abstract: This invention uses file hash signatures, including but not limited to those generated from MD5, MD2, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512 and FIPS 180-2 files, and various file comparison and matching technologies in a real time or near real time solution to determine if digital content has been stolen or otherwise illegally, opened, transferred, viewed, played or copied. Once digital content has been analyzed (match or no match) one or more follow-on actions can be taken with respect to the content based on preferences established by the owner/authorized agent of the digital content. These include blocking the copy or playback process, preventing transferring of files over a network or between systems, notification to one or more users about the theft of illegal use and/or instruction(s) to the unauthorized user. Digital content includes but is not limited to digital audio, digital picture and video, and digital documentation.
    Type: Application
    Filed: December 15, 2003
    Publication date: July 8, 2004
    Inventors: Alex Fielding, Michael James Connor