Patents by Inventor Jessica C. Murillo

Jessica C. Murillo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10747581
    Abstract: Virtual machine volumes may be migrated between software defined storage (SDS) systems by an orchestration engine configured to manage one or more virtual machines. The orchestration engine may identify one or more volumes associated with the one or more virtual machines and resident in a first SDS system to migrate to a second SDS system, and for each identified volume among the one or more identified volumes, the orchestration engine may create a replacement volume for the identified volume on the second SDS system, map the replacement volume to the associated virtual machine for the identified volume, cause the associated virtual machine to discover the replacement volume, mirror data from the identified volume to the replacement volume, unmap the identified volume from the associated virtual machine, and delete the identified volume from the first SDS system.
    Type: Grant
    Filed: February 15, 2017
    Date of Patent: August 18, 2020
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Publication number: 20200259948
    Abstract: A method, computer system, and a computer program product for managing at least one notification received on a user mobile device is provided. The present invention may include determining a user state associated with a user. The present invention may also include determining at least one personal preference setting associated with the determined user state, wherein the at least one personal preference setting was previously provided. The present invention may then include receiving, on the user mobile device, the at least one notification. The present invention may also include analyzing the received at least one notification. The present invention may further include determining whether the user will accept at least one notification from the user mobile device based on the determined at least one personal preference setting associated with the determined user state.
    Type: Application
    Filed: February 12, 2019
    Publication date: August 13, 2020
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Jessica C. Murillo, Johnny M. Shieh
  • Patent number: 10609058
    Abstract: A method for sequencing virtual machines in a shared pool of configurable network computing resources includes sequencing at least one computing element for two or more virtual machines into a respective two or more profiles, stored in a security database. Each virtual machine corresponds to a respective profile. The method also includes comparing a profile of a virtual machine corresponding to a security incident in the shared pool of configurable network computing resources with respective profiles of other virtual machines to identify similar profiles and group profiles into first and second groups. The method also includes comparing profiles of the groups of virtual machines and determining an alteration plan based on the comparison of profiles of the groups. The alternation plan includes a plan to modify one or more computing elements for virtual machines in the first group of virtual machines to reduce likelihood of susceptibility to the security incident.
    Type: Grant
    Filed: August 1, 2017
    Date of Patent: March 31, 2020
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Publication number: 20180232249
    Abstract: Virtual machine volumes may be migrated between software defined storage (SDS) systems by an orchestration engine configured to manage one or more virtual machines. The orchestration engine may identify one or more volumes associated with the one or more virtual machines and resident in a first SDS system to migrate to a second SDS system, and for each identified volume among the one or more identified volumes, the orchestration engine may create a replacement volume for the identified volume on the second SDS system, map the replacement volume to the associated virtual machine for the identified volume, cause the associated virtual machine to discover the replacement volume, mirror data from the identified volume to the replacement volume, unmap the identified volume from the associated virtual machine, and delete the identified volume from the first SDS system.
    Type: Application
    Filed: February 15, 2017
    Publication date: August 16, 2018
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Patent number: 10019696
    Abstract: A system for transferring digital rights managed (DRM) files from a first seller device to a buyer device involves a buyer device configured to receive a file package having the DRM file. Some file packages may also have a DRM file access key. The system also has a first seller device having the DRM file stored thereon and configured to receive a request to purchase the DRM file (the request having a DRM file identifier); receive a buyer identifier associated with the request; transfer the file package to a buyer device to the buyer device; detect through a network connection, a digital rights management server; and send, responsive to detecting the digital rights management server, a sale record to the digital rights management server, where the sale record includes the DRM file identifier and the buyer identifier.
    Type: Grant
    Filed: January 29, 2015
    Date of Patent: July 10, 2018
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Patent number: 9886685
    Abstract: A system for transferring digital rights managed (DRM) files from a first seller device to a buyer device involves a buyer device configured to receive a file package having the DRM file. Some file packages may also have a DRM file access key. The system also has a first seller device having the DRM file stored thereon and configured to receive a request to purchase the DRM file (the request having a DRM file identifier); receive a buyer identifier associated with the request; transfer the file package to a buyer device to the buyer device; detect through a network connection, a digital rights management server; and send, responsive to detecting the digital rights management server, a sale record to the digital rights management server, where the sale record includes the DRM file identifier and the buyer identifier.
    Type: Grant
    Filed: March 30, 2016
    Date of Patent: February 6, 2018
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Publication number: 20170331845
    Abstract: A method for sequencing virtual machines in a shared pool of configurable network computing resources includes sequencing at least one computing element for two or more virtual machines into a respective two or more profiles, stored in a security database. Each virtual machine corresponds to a respective profile. The method also includes comparing a profile of a virtual machine corresponding to a security incident in the shared pool of configurable network computing resources with respective profiles of other virtual machines to identify similar profiles and group profiles into first and second groups. The method also includes comparing profiles of the groups of virtual machines and determining an alteration plan based on the comparison of profiles of the groups. The alternation plan includes a plan to modify one or more computing elements for virtual machines in the first group of virtual machines to reduce likelihood of susceptibility to the security incident.
    Type: Application
    Filed: August 1, 2017
    Publication date: November 16, 2017
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Patent number: 9791861
    Abstract: A method and/or computer program product autonomously drives a self-driving vehicle (SDV) to a service facility. One or more processors receive sensor readings from an SDV equipment maintenance sensor on the SDV. The SDV equipment maintenance sensor detects a state of equipment on the SDV indicative of a need for maintenance service for the SDV. The processor(s) identify a service facility capable of providing the maintenance service, and determine an amount of time required for the SDV to travel to and from a current location of the SDV to the service facility and to receive the maintenance service. The processor(s) identify a time window in which a user of the SDV will not need the SDV, and then direct the SDV to autonomously drive to the service facility during the time window in which the user of the SDV will not need the SDV.
    Type: Grant
    Filed: November 12, 2015
    Date of Patent: October 17, 2017
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Patent number: 9767300
    Abstract: A computer encrypts only a restricted tag element from among a plurality of content elements to be electronically published as a message for access by a plurality of users, wherein decryption of the encrypted restricted tag element is limited to a selection of at least one user from among the plurality of users. The computer outputs the plurality of content elements for electronic publication through an interface accessible to the plurality of users, wherein the plurality of users are enabled to access the plurality of content elements of the message published through the interface, wherein only the selection of at least one user is enabled to decrypt the encrypted restricted tag element in the plurality of content elements to access the underlying restricted tag element within the message published through the interface.
    Type: Grant
    Filed: November 30, 2015
    Date of Patent: September 19, 2017
    Assignee: GLOBALFOUNDRIES INC.
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Jessica C. Murillo, Johnny M. Shieh
  • Patent number: 9756065
    Abstract: A method for sequencing virtual machines in a shared pool of configurable network computing resources comprises sequencing at least one computing element for one or more virtual machines into a respective one or more profiles. Each virtual machine corresponds to a respective profile. The method also includes storing the one or more profiles in a security database and identifying a first group of virtual machines and a second group of virtual machines. The first group of virtual machines corresponds to a security incident in the shared pool of configurable network computing resources. The method also comprises comparing profiles of the first group of virtual machines with profiles of the second group of virtual machines and determining an alteration plan based on the comparison of profiles of the first group with profiles of the second group. The alternation plan is related to the profiles of the second group of virtual machines.
    Type: Grant
    Filed: September 28, 2015
    Date of Patent: September 5, 2017
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Patent number: 9697378
    Abstract: A method of storing a data object received from a network is described. An encrypted data object encrypted with a first encryption key is received. It is determined whether the encrypted data object is to be stored in an encrypted file system that requires encryption of a data object with a second encryption key. The first encryption key is encrypted with a third encryption key when it is determined the encrypted data object is to be stored in the encrypted file system. The first encryption key is attached to the encrypted data object. The data object encrypted by the first encryption key is stored in the encrypted file system.
    Type: Grant
    Filed: December 13, 2013
    Date of Patent: July 4, 2017
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Publication number: 20170139412
    Abstract: A method and/or computer program product autonomously drives a self-driving vehicle (SDV) to a service facility. One or more processors receive sensor readings from an SDV equipment maintenance sensor on the SDV. The SDV equipment maintenance sensor detects a state of equipment on the SDV indicative of a need for maintenance service for the SDV. The processor(s) identify a service facility capable of providing the maintenance service, and determine an amount of time required for the SDV to travel to and from a current location of the SDV to the service facility and to receive the maintenance service. The processor(s) identify a time window in which a user of the SDV will not need the SDV, and then direct the SDV to autonomously drive to the service facility during the time window in which the user of the SDV will not need the SDV.
    Type: Application
    Filed: November 12, 2015
    Publication date: May 18, 2017
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Publication number: 20170093898
    Abstract: A method for sequencing virtual machines in a shared pool of configurable network computing resources comprises sequencing at least one computing element for one or more virtual machines into a respective one or more profiles. Each virtual machine corresponds to a respective profile. The method also includes storing the one or more profiles in a security database and identifying a first group of virtual machines and a second group of virtual machines. The first group of virtual machines corresponds to a security incident in the shared pool of configurable network computing resources. The method also comprises comparing profiles of the first group of virtual machines with profiles of the second group of virtual machines and determining an alteration plan based on the comparison of profiles of the first group with profiles of the second group. The alternation plan is related to the profiles of the second group of virtual machines.
    Type: Application
    Filed: September 28, 2015
    Publication date: March 30, 2017
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Patent number: 9584479
    Abstract: According to one exemplary embodiment, a method for load balancing between a virtual component within a virtual environment and a Host Intrusion Prevention System (HIPS) is provided. The method may include receiving a trusted connection table from the HIPS, wherein the trusted connection table contains a plurality of trusted connection information. The method may also include receiving a network packet from a virtual switch, wherein the network packet has a plurality of connection information. The method may then include determining if the plurality of connection information matches the plurality of trusted connection information. The method may further include sending the network packet to a destination based on determining that the plurality of connection information matches the plurality of trusted connection information.
    Type: Grant
    Filed: June 11, 2015
    Date of Patent: February 28, 2017
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Patent number: 9497165
    Abstract: According to one exemplary embodiment, a method for load balancing between a virtual component within a virtual environment and a Host Intrusion Prevention System (HIPS) is provided. The method may include receiving a trusted connection table from the HIPS, wherein the trusted connection table contains a plurality of trusted connection information. The method may also include receiving a network packet from a virtual switch, wherein the network packet has a plurality of connection information. The method may then include determining if the plurality of connection information matches the plurality of trusted connection information. The method may further include sending the network packet to a destination based on determining that the plurality of connection information matches the plurality of trusted connection information.
    Type: Grant
    Filed: March 26, 2015
    Date of Patent: November 15, 2016
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Patent number: 9491194
    Abstract: Provided are techniques to enable a virtual input/output server (VIOS) to establish cryptographically secure signals with target LPARs to detect an imposter or spoofing LPAR. The secure signal, or “heartbeat,” may be configured as an Internet Key Exchange/Internet Protocol Security (IKE/IPSec) encapsulated packet (ESP) connection or tunnel. Within the tunnel, the VIOS pings each target LPAR and, if a heartbeat is interrupted, the VIOS makes a determination as to whether the tunnel is broken, the corresponding LPAR is down or a media access control (MAC) spoofing attach is occurring. The determination is made by sending a heartbeat that is designed to fail unless the heartbeat is received by a spoofing device.
    Type: Grant
    Filed: July 15, 2015
    Date of Patent: November 8, 2016
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Patent number: 9472241
    Abstract: Each data integrity value, from among a plurality of data integrity values each associated with a separate unit of a program comprising a plurality of units, is checked against a separate recorded portion of a recording of the program corresponding to one of the plurality of units, wherein the recording of the program is recorded from a broadcast of the program. Responsive to a particular data integrity value from among the plurality of data integrity values not matching when checked against a particular separate recorded portion of the program corresponding to a particular unit from among the plurality of units, the recording is corrected by replacing only the particular separate recorded portion of the program from a second recording of only the particular unit from a subsequent broadcast of the program.
    Type: Grant
    Filed: September 9, 2013
    Date of Patent: October 18, 2016
    Assignee: GLOBALFOUNDRIES INC.
    Inventors: Susann M. Keohane, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Patent number: 9465876
    Abstract: A computer identifies at least one common content element used by each of at least two users from at least one communication by each of the at least two users. Responsive to one of the at least two users constructing content for a potential communication to the other of the at least two users, the computer accesses the at least one common content element for use by at least one content prediction service enabled for presenting one or more possible content elements comprising the at least one common content element for user selection during construction of the content for the potential communication.
    Type: Grant
    Filed: September 9, 2013
    Date of Patent: October 11, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Publication number: 20160285825
    Abstract: According to one exemplary embodiment, a method for load balancing between a virtual component within a virtual environment and a Host Intrusion Prevention System (HIPS) is provided. The method may include receiving a trusted connection table from the HIPS, wherein the trusted connection table contains a plurality of trusted connection information. The method may also include receiving a network packet from a virtual switch, wherein the network packet has a plurality of connection information. The method may then include determining if the plurality of connection information matches the plurality of trusted connection information. The method may further include sending the network packet to a destination based on determining that the plurality of connection information matches the plurality of trusted connection information.
    Type: Application
    Filed: June 11, 2015
    Publication date: September 29, 2016
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Publication number: 20160285828
    Abstract: According to one exemplary embodiment, a method for load balancing between a virtual component within a virtual environment and a Host Intrusion Prevention System (HIPS) is provided. The method may include receiving a trusted connection table from the HIPS, wherein the trusted connection table contains a plurality of trusted connection information. The method may also include receiving a network packet from a virtual switch, wherein the network packet has a plurality of connection information. The method may then include determining if the plurality of connection information matches the plurality of trusted connection information. The method may further include sending the network packet to a destination based on determining that the plurality of connection information matches the plurality of trusted connection information.
    Type: Application
    Filed: March 26, 2015
    Publication date: September 29, 2016
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh