Patents by Inventor Tak Yin Wang

Tak Yin Wang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8528079
    Abstract: In one embodiment, the present invention relates to a method and system for combating phishing. A computer receives an email comprising a sender email address and a link. The computer determines a sender domain name from the sender email address and ascertains a Uniform Resource Locator (URL) corresponding to the link. The computer then determines a link domain name from the URL. The computer then determines whether the sender domain name is different than the link domain name, so as to classify the URL as a potential phishing URL.
    Type: Grant
    Filed: November 12, 2008
    Date of Patent: September 3, 2013
    Assignee: Yahoo! Inc.
    Inventor: Tak Yin Wang
  • Patent number: 8365267
    Abstract: Embodiments are directed towards employing a plurality of single use passwords to provide phishing detection and user authentication. A user receives a plurality of single use passwords that expire within a defined time period after having been sent to a registered device. During a login attempt, the user enters a user name and a requested one of the passwords, which once entered expires. If valid, the user then enters a portion of another password to complete a displayed portion of a password, and a specified other one of passwords. If the displayed portion of the other passwords does not match any portion of one of passwords, then the user may detect a phishing attempt and terminate the login. If the user correctly the password data, the user may then access secured data. Each new login request requires a different set of passwords to be used.
    Type: Grant
    Filed: November 13, 2008
    Date of Patent: January 29, 2013
    Assignee: Yahoo! Inc.
    Inventors: Tak Yin Wang, Patrick Wong
  • Publication number: 20100262662
    Abstract: A usage control mechanism is disclosed for use in deterring automated “bot” access. When implemented within an email or messaging system, the mechanism and system prevents generation of spam by the bots, while also minimizing collateral deterrence of desirable human usage. In a disclosed embodiment, a reference image is part of a message composition screen, and a message may be composed but not sent unless a user selects, from a plurality of screening images, an image containing an alphanumeric string or other object that matches that of the reference image.
    Type: Application
    Filed: April 10, 2009
    Publication date: October 14, 2010
    Applicant: Yahoo! Inc.
    Inventor: Tak Yin Wang
  • Publication number: 20100211645
    Abstract: Embodiments are directed towards identifying trusted senders and their trusted sender accounts within a household network for use in at least managing spam activities. Primary trusted sender accounts are determined based on a traceable relationship between a network account and a known trusted source, such as a communication of qualified electronic statements. Coverage of trusted senders may be expanded by including other network accounts that might not receive qualified electronic statements but are detected as being owned by a primary trusted sender and/or their household members. The other household members being definable as secondary trusted senders with secondary trusted sender accounts. Various anti-spam filters and/or other activities may be modified based on the determined trusted sender status of a network account, including, minimizing an amount of spam analysis performed for a message, training of spam filters, or the like.
    Type: Application
    Filed: February 18, 2009
    Publication date: August 19, 2010
    Applicant: Yahoo! Inc.
    Inventors: Tak Yin Wang, Leon Leytes
  • Patent number: 7769815
    Abstract: The disclosure describes systems and methods for determining spam. A spam detecting system identifies potential spam messages by checking the relationship between a sender of a message and a recipient of the message. The spam detecting system identifies the relationship between the sender and recipient as ‘unknown’ or ‘trusted’. If the message is ‘trusted’, the message is transmitted accordingly to the recipient. If the message is classified as ‘unknown’, then the message is analyzed in view of other identified potential spam messages where a count is tallied against a threshold value to keep track of the probability a message is spam.
    Type: Grant
    Filed: June 4, 2008
    Date of Patent: August 3, 2010
    Assignee: Yahoo! Inc.
    Inventors: Tak Yin Wang, Patrick Wong
  • Publication number: 20100179995
    Abstract: Various embodiments are directed towards enabling a user to forward messages, such as IM messages, or other text messages, from a forwarding account to a different account, where messages are received by the recipient account on behalf of the forwarding account, and reply messages are viewed as having been sent by the forwarding account rather than the recipient account. A message sender may send a message towards the intended (forwarding) account. A message forwarding service, based on forwarding rules, determines the recipient account, and forwards the received message towards the recipient account on behalf of the forwarding account. The message forwarding service may receive a reply, and modify a reply header, such that the reply appears to have been sent by the forwarding account, rather than the recipient account.
    Type: Application
    Filed: January 12, 2009
    Publication date: July 15, 2010
    Applicant: Yahoo! Inc.
    Inventor: Tak Yin Wang
  • Publication number: 20100161734
    Abstract: Embodiments are directed towards identifying a message as spam or non-spam based on a number of messages in given category or combination of categories that exceed at least one threshold. As messages are received at a network device, they may be examined, and categorized. Various counts for each of the categories and/or combinations of categories may then be compared to various respective thresholds. If a threshold is exceeded for a given message, the message may be defined as a spam. In one embodiment, such classification of messages sent by that message sender address may be blocked from being delivered. In another embodiment, such classification of messages having substantially similar content independent of having the same message sender address may be blocked from being delivered.
    Type: Application
    Filed: December 22, 2008
    Publication date: June 24, 2010
    Applicant: Yahoo! Inc.
    Inventor: Tak Yin Wang
  • Publication number: 20100122331
    Abstract: Embodiments are directed towards employing a plurality of single use passwords to provide phishing detection and user authentication. A user receives a plurality of single use passwords that expire within a defined time period after having been sent to a registered device. During a login attempt, the user enters a user name and a requested one of the passwords, which once entered expires. If valid, the user then enters a portion of another password to complete a displayed portion of a password, and a specified other one of passwords. If the displayed portion of the other passwords does not match any portion of one of passwords, then the user may detect a phishing attempt and terminate the login. If the user correctly the password data, the user may then access secured data. Each new login request requires a different set of passwords to be used.
    Type: Application
    Filed: November 13, 2008
    Publication date: May 13, 2010
    Applicant: Yahoo! Inc.
    Inventors: Tak Yin Wang, Patrick Wong
  • Publication number: 20100083353
    Abstract: A system and method for authenticating a user seeking access to a resource via a computer is described herein. In accordance with one embodiment, a person authorized to control access to the resource selects a personalized combination of non-text elements, a collection of non-text elements from which the combination must be selected, and an arrangement in which the collection of non-text elements is presented to the user. When the user attempts to access the resource, the system presents the collection of non-text elements to the user and requires the user to select a combination of non-text elements from among the collection of non-text elements that matches the personalized combination previously selected by the person authorized to control access to the resource.
    Type: Application
    Filed: September 26, 2008
    Publication date: April 1, 2010
    Applicant: YAHOO! INC.
    Inventor: Tak Yin Wang
  • Publication number: 20100042687
    Abstract: In one embodiment, the present invention relates to a method and system for combating phishing. A computer receives an email comprising a sender email address and a link. The computer determines a sender domain name from the sender email address and ascertains a Uniform Resource Locator (URL) corresponding to the link. The computer then determines a link domain name from the URL. The computer then determines whether the sender domain name is different than the link domain name, so as to classify the URL as a potential phishing URL.
    Type: Application
    Filed: August 12, 2008
    Publication date: February 18, 2010
    Applicant: Yahoo! Inc.
    Inventor: Tak Yin Wang
  • Publication number: 20100043071
    Abstract: In one embodiment, the present invention relates to a method and system for combating phishing. A computer receives an email comprising a sender email address and a link. The computer determines a sender domain name from the sender email address and ascertains a Uniform Resource Locator (URL) corresponding to the link. The computer then determines a link domain name from the URL. The computer then determines whether the sender domain name is different than the link domain name, so as to classify the URL as a potential phishing URL.
    Type: Application
    Filed: November 12, 2008
    Publication date: February 18, 2010
    Applicant: Yahoo! Inc.
    Inventor: Tak Yin Wang
  • Publication number: 20090307313
    Abstract: The disclosure describes systems and methods for determining spam. A spam detecting system identifies potential spam messages by checking the relationship between a sender of a message and a recipient of the message. The spam detecting system identifies the relationship between the sender and recipient as ‘unknown’ or ‘trusted’. If the message is ‘trusted’, the message is transmitted accordingly to the recipient. If the message is classified as ‘unknown’, then the message is analyzed in view of other identified potential spam messages where an count is tallied against a threshold value to keep track of the probability a message is spam.
    Type: Application
    Filed: June 4, 2008
    Publication date: December 10, 2009
    Inventors: Tak Yin Wang, Patrick Wong