Patents by Inventor Gerald McBrearty

Gerald McBrearty has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20060080247
    Abstract: Controlling electronic withdrawals by a transaction processor including receiving in the transaction processor from a withdrawal device a withdrawal request, where the withdrawal request includes a withdrawal device identifier, a drawer identifier, a drawee identifier, and a withdrawal amount; transmitting from the transaction processor to a drawee a request for limitations on electronic withdrawals for the drawer, where the limitations include a limitation on drawer location; receiving in the transaction processor from storage in computer memory of the drawee data representing the limitations on electronic withdrawals for the drawer, including the limitation on drawer location; and authorizing, by the transaction processor, an electronic withdrawal in dependence upon the limitations, including the limitation on drawer location.
    Type: Application
    Filed: October 7, 2004
    Publication date: April 13, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20060080249
    Abstract: Controlling electronic withdrawals by a drawee including receiving in the drawee from a withdrawal device a withdrawal request, where the withdrawal request includes a withdrawal device identifier, a drawer identifier, and a withdrawal amount; retrieving from storage in computer memory of the drawee data representing limitations on electronic withdrawals for the drawer, wherein the limitations include a limitation on drawer location; and authorizing, by the drawee, an electronic withdrawal in dependence upon the limitations, including the limitation on drawer location. In typical embodiments, the limitations on electronic withdrawals may include limitations on withdrawal type account, withdrawal period, and maximum withdrawal amount. In typical embodiments, the limitation on drawer location may include a geographic area that includes one or more locations of withdrawal devices.
    Type: Application
    Filed: October 7, 2004
    Publication date: April 13, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20060080248
    Abstract: Controlling electronic withdrawals by a withdrawal device including creating in the withdrawal device a data structure representing a withdrawal request, where the data structure includes fields for a withdrawal device identifier, a drawer identifier, a drawee identifier, and a withdrawal amount; transmitting from the withdrawal device to a drawee a request for limitations on electronic withdrawals for the drawer, where the limitations include a limitation on drawer location; receiving in the withdrawal device from storage in computer memory of the drawee data representing the limitations on electronic withdrawals for the drawer, including the limitation on drawer location; and authorizing, by the withdrawal device, an electronic withdrawal in dependence upon the limitations, including the limitation on drawer location.
    Type: Application
    Filed: October 7, 2004
    Publication date: April 13, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20060075064
    Abstract: Methods, systems, and media are disclosed for concurrent ftp transfer of a file. In one embodiment, the method for concurrent ftp reading and writing includes uploading a file by a first computer system in communication with an ftp site, such as a server, having an ftp program. Further, the method includes receiving, by the ftp site, a plurality of file segments of the file during the uploading. Further still, the method includes downloading, by a second computer system in communication with the ftp site, all of the plurality of file segments, whereby the downloading may begin during such receiving, i.e., before complete upload of the file. An intermediary ftp program associated with the ftp daemon of the ftp program permits the concurrent reading and writing of the file. Possible implementations of this intermediary ftp program include, for example, into either the ftp daemon or the logical file systems layer.
    Type: Application
    Filed: September 30, 2004
    Publication date: April 6, 2006
    Applicant: International Business Machines Corporation
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20060056626
    Abstract: A method and system for selectively masking the display of data field values provides improved security and flexibility in computer data entry screens and dedicated terminals. A user input is received that selects a masked state of one or more data entry fields. When data is entered in a field, the masked state is used to determine whether to mask the data. The field may be a field in a web page, a dedicated application, an operating system interface or a dedicated terminal. The method and system may mask information that is typically not masked or may unmask information that is typically masked. The data entry fields may be entry fields for entering personal information within a web page and the user input may be a right mouse button click that generates a pop-up menu containing a selection for setting the masking state of a selected input field.
    Type: Application
    Filed: September 16, 2004
    Publication date: March 16, 2006
    Applicant: International Business Machines Corporation
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20060031781
    Abstract: A system and method for reversing a windows close action is provided. The system retains data corresponding to a window after the window is closed for some period of time. The parameters by which the closed window data is retained is user-configurable. When a window is closed, data corresponding to the closed window is not reclaimed by the operating system. Instead, the operating system notes that the window is no longer being managed by the operating system so that no new messages, or signals, are sent to or from the closed window. In addition, the visual aspects of the closed window are removed from the user's display so that, from the user's perspective, the closed window appears to have been closed as in a traditional GUI operating system. The system further reclaims memory from inactive windows according to user-configurable parameters.
    Type: Application
    Filed: August 5, 2004
    Publication date: February 9, 2006
    Applicant: International Business Machines Corporation
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20060031305
    Abstract: A method, system, and program for managing on-demand email storage are provided. An email service provider allocates a predetermined amount of storage space to an intended recipient. When an email is received for the intended recipient at the email service provider, the email service provider determines whether the predetermined storage space has sufficient capacity for storage of the email. If the predetermined storage space is insufficient for storage of the email, then the email service provider allocates on-demand storage space to the intended recipient. The email service provider then stores the email in the on-demand storage space, such that the email is stored, rather than discarded, when the predetermined storage space reaches full capacity. Before allocating on-demand storage space, the email service provider may compare the email characteristics with predefined criteria set by the intended recipient for emails to be stored in on-demand storage space.
    Type: Application
    Filed: April 29, 2004
    Publication date: February 9, 2006
    Applicant: International Business Machines Corporation
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20060020615
    Abstract: A method of creating an electronic document by entering data into the electronic document, searching one or more information sets to identify a set entry which matches a portion of the entered data, and inserting a link to information from the set entry into the electronic document, wherein the link is associated with the matched portion of the entered data. Searching occurs automatically as the data is entered, and different information sets can be designated for searching from among a plurality of available information sets, such as database files, file folders, web browser bookmarks, or email address books. The link is inserted in response to selection of the set entry for inclusion in the electronic document, particularly when multiple matches to parenthetical information are found. In the example where the set entry is a separate file and the document is an email message, the link points to the separate file as an attachment to the email message.
    Type: Application
    Filed: July 22, 2004
    Publication date: January 26, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20060020895
    Abstract: A method of creating multiple, alternative presentations within a single electronic presentation, by assigning one or more presentation constraint parameters to the electronic slides, and generating a sequence for presenting less than all of the electronic slides based on the presentation constraint parameters. Different sequences can be generated using different presentation constraint parameters that are assigned to the electronic slides. For example, a first electronic slide could be included in a first sequence, and a second electronic slide (or multiple slides) can be substituted for the first electronic slide in a second sequence. A sequence can be generated by adjusting a scalable constraint associated with the presentation constraint parameters to determine which electronic slides to include. The presentation constraint parameters can include a time factor and a content level.
    Type: Application
    Filed: July 22, 2004
    Publication date: January 26, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20050276393
    Abstract: A method, system and telephone answering device for processing control scripts attached to voice messages provides a mechanism by which a caller can leave an interactive list of contact information. The scripts provide for control of a display and input responses from a keypad or other input device so that an entry on the contact information list can be activated in response to user input, thus returning the call. The list information displayed may be arbitrary textual associations with the underlying contact number. The contact information may also include e-mail addresses, so that activation of an e-mail list element will activate a text messaging service, if available. For wireless telephone devices, the method implementing the present invention may be operable at the service provider only, so that standard wireless telephones may be programmed to provide the interactive list from a provider-side interpretation of the scripts.
    Type: Application
    Filed: June 10, 2004
    Publication date: December 15, 2005
    Applicant: International Business Machines Corporation
    Inventors: Susan Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20050276406
    Abstract: A system and method for using a centralized conference call manager is provided for initiating conference calls. Users register with the centralized conference call manager to set up a conference call at a future date and time. When the designated time/date arrive, the centralized conference call manager contacts the various intended attendees using a variety of contact locations (e.g., office telephone, mobile telephone, home telephone, etc.). The system further allows an intended attendee to, when contacted by the centralized conference call manager, provide a different contact number that the conference call manager will use instead. An anticipated attendee can decline the call and provide a verbal reason for not being able to attend. The centralized conference call manager records the reason and, when requested, plays the reason back to the other attendees.
    Type: Application
    Filed: June 10, 2004
    Publication date: December 15, 2005
    Applicant: International Business Machines Corporation
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20050257159
    Abstract: A method, apparatus, and computer instructions for processing email messages in a data processing system. A determination is made as to whether a set of attachments is associated with an email message. If a set of attachments is associated with the email message, an indicator is added to a subject line for the email message for each type of attachment in the set of attachments associated with the email message. The indicator provides an indication of a type of attachment associated with the email message and the indicator is displayed with the subject line in a folder of an email program.
    Type: Application
    Filed: May 13, 2004
    Publication date: November 17, 2005
    Applicant: International Business Machines Corporation
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20050257263
    Abstract: A system and method for determining a point of immunity of a computing system to a computer virus are provided. A trace of the calls of a process, that processes a data packet which is suspected of having a computer virus, in both an infected computing system and an immune computing system are obtained. Differences in the call traces are used to pinpoint a point in the series of calls at which the processing by the two processes diverge. The process corresponding to this point of divergence is then determined and version information of the version of the corresponding process on the infected computing system and the immune computing system are determined. Differences in the version information are identified and immunization recommendations are made based on the identified differences in the version information.
    Type: Application
    Filed: May 13, 2004
    Publication date: November 17, 2005
    Applicant: International Business Machines Corporation
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20050246444
    Abstract: Displaying a computer resource through a preferred browser, including invoking a URL that identifies a computer resource; identifying, among a plurality of available browsers, a preferred browser for the resource; and displaying the resource through the preferred browser. Typical embodiments also include storing the URL in association with an identification of the preferred browser. In such embodiments, identifying a preferred browser for the resource also includes identifying the preferred browser in dependence upon the URL. Identifying the preferred browser may include requesting the resource through a default browser and receiving the resource in the default browser, the resource having meta-data comprising an identification of the preferred browser. Such embodiments also typically include storing the URL in association with the identification of the preferred browser.
    Type: Application
    Filed: April 29, 2004
    Publication date: November 3, 2005
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susann Koehane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20050240777
    Abstract: A method, apparatus, and computer instructions for authorizing a user to access grid resources. A request is received from the user to access a resource on the data processing system. This request includes a certificate. An authentication process is performed using the certificate when the request is received. In response to successfully authenticating the user in the authentication process, a first host name for the certificate is requested from a trusted source. A reply containing the first host name is received. Access to the resource is provided if the first host name returned by the trusted source matches a second host name for the user from which the request originated.
    Type: Application
    Filed: April 22, 2004
    Publication date: October 27, 2005
    Applicant: International Business Machines Corporation
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20050235358
    Abstract: A method, apparatus, and computer instructions for responding to a denial of service attack. The method comprising from a remote data processing system detects an occurrence of the denial of service attack in which invalid credentials are presented to the data processing system. Connections from the remote data processing system to the data processing system are blocked in response to detecting the occurrence of the denial of service attack. A command is selectively sent to a server data processing system to block connections from the remote data processing system, in response to detecting the occurrence the denial of service attack.
    Type: Application
    Filed: April 15, 2004
    Publication date: October 20, 2005
    Applicant: International Business Machines Corporation
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20050223394
    Abstract: Administration of keyboard input in a computer having a display device supporting a graphical user interface (“GUI”), including storing keyboard input intended by a user for a second widget when keyboard focus is on a first widget, wherein the first widget receives no keyboard input; changing keyboard focus to the second widget; and providing the stored keyboard input to the second widget.
    Type: Application
    Filed: March 31, 2004
    Publication date: October 6, 2005
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20050216588
    Abstract: A system, system, and program for managing message storage are provided. A messaging client receives new messages for an intended recipient. The messaging client controls storage of these new messages in a message storage system of fixed capacity. The messaging client monitors the usage percentage of the capacity of the message storage system. When the messaging client receives a new message, the messaging client determines whether the sender identifier of the message and the usage percentage match with a criteria for blocking messages as set by the intended recipient. If the new message sender identifier and the usage percentage match the criteria for blocking, then the messaging client blocks the message from being stored in the message storage system, such that the intended recipient is enabled to specify blocking preferences which are then implemented by the messaging client to avoid overflowing the message storage capacity with less important unread messages.
    Type: Application
    Filed: March 25, 2004
    Publication date: September 29, 2005
    Applicant: International Business Machines Corporation
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20050216908
    Abstract: Assigning computational processes in a computer system to workload management classes that include installing on the computer system an executable file from a software installation package. The software installation package typically includes a specification of workload management properties for the executable file which in turn includes a definition of a workload management class. Typical embodiments also include executing a process in dependence upon the executable file and assigning the process to the workload management class. In typical embodiments, the workload management class definition also includes a class name, a priority ranking, and an inheritance attribute. In typical embodiments, the specification of workload management properties also includes minimum values and maximum values for CPU, memory, and disk I/O shares for the executable file.
    Type: Application
    Filed: March 25, 2004
    Publication date: September 29, 2005
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20050216842
    Abstract: A method, computer program product, and a data processing system for a method of managing event schedules is provided. A plurality of acceptance messages associated with a first scheduled event having a scheduled event time are received. Each of the plurality of acceptance messages are associated with a respective user. A schedule conflict of a user associated with an acceptance message of the plurality of acceptance messages is identified. Responsive to identifying the schedule conflict, a probable attendance is calculated from the plurality of acceptance messages.
    Type: Application
    Filed: March 25, 2004
    Publication date: September 29, 2005
    Applicant: International Business Machines Corporation
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh