Patents by Inventor Jessica C. Murillo

Jessica C. Murillo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160224956
    Abstract: A system for transferring digital rights managed (DRM) files from a first seller device to a buyer device involves a buyer device configured to receive a file package having the DRM file. Some file packages may also have a DRM file access key. The system also has a first seller device having the DRM file stored thereon and configured to receive a request to purchase the DRM file (the request having a DRM file identifier); receive a buyer identifier associated with the request; transfer the file package to a buyer device to the buyer device; detect through a network connection, a digital rights management server; and send, responsive to detecting the digital rights management server, a sale record to the digital rights management server, where the sale record includes the DRM file identifier and the buyer identifier.
    Type: Application
    Filed: January 29, 2015
    Publication date: August 4, 2016
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Publication number: 20160224957
    Abstract: A system for transferring digital rights managed (DRM) files from a first seller device to a buyer device involves a buyer device configured to receive a file package having the DRM file. Some file packages may also have a DRM file access key. The system also has a first seller device having the DRM file stored thereon and configured to receive a request to purchase the DRM file (the request having a DRM file identifier); receive a buyer identifier associated with the request; transfer the file package to a buyer device to the buyer device; detect through a network connection, a digital rights management server; and send, responsive to detecting the digital rights management server, a sale record to the digital rights management server, where the sale record includes the DRM file identifier and the buyer identifier.
    Type: Application
    Filed: March 30, 2016
    Publication date: August 4, 2016
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Patent number: 9336403
    Abstract: A computer encrypts only a restricted tag element from among a plurality of content elements to be electronically published as a message for access by a plurality of users, wherein decryption of the encrypted restricted tag element is limited to a selection of at least one user from among the plurality of users. The computer outputs the plurality of content elements for electronic publication through an interface accessible to the plurality of users, wherein the plurality of users are enabled to access the plurality of content elements of the message published through the interface, wherein only the selection of at least one user is enabled to decrypt the encrypted restricted tag element in the plurality of content elements to access the underlying restricted tag element within the message published through the interface.
    Type: Grant
    Filed: November 26, 2013
    Date of Patent: May 10, 2016
    Assignee: GLOBALFOUNDRIES Inc.
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Jessica C. Murillo, Johnny M. Shieh
  • Patent number: 9319364
    Abstract: A difference between a source email message and at least one target email message is determined and then displayed in a popup window. A first selected message in a message thread is designated as a source message. The thread is searched for a target message that comprises a next oldest message in the thread. Identifying data in the source message is compared to identifying data in the target message for generating difference data. Content of both the source message and target message is also compared. A popup window is generated over the target message and the content difference is displayed in the popup window.
    Type: Grant
    Filed: November 14, 2013
    Date of Patent: April 19, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susann M. Keohane, Shawn P. Mullen, Jessica C. Murillo, Gerald F. McBrearty, Johnny M. Shieh
  • Publication number: 20160085983
    Abstract: A computer encrypts only a restricted tag element from among a plurality of content elements to be electronically published as a message for access by a plurality of users, wherein decryption of the encrypted restricted tag element is limited to a selection of at least one user from among the plurality of users. The computer outputs the plurality of content elements for electronic publication through an interface accessible to the plurality of users, wherein the plurality of users are enabled to access the plurality of content elements of the message published through the interface, wherein only the selection of at least one user is enabled to decrypt the encrypted restricted tag element in the plurality of content elements to access the underlying restricted tag element within the message published through the interface.
    Type: Application
    Filed: November 30, 2015
    Publication date: March 24, 2016
    Inventors: SUSANN M. KEOHANE, GERALD F. MCBREARTY, JESSICA C. MURILLO, JOHNNY M. SHIEH
  • Patent number: 9292678
    Abstract: A mechanism is provided for unlocking a locked computing device based on a knowledge of a user. Responsive to detecting an intent to utilize the locked computing device, a subset of the images is randomly selecting in an identified tag category from a plurality of tagged images, the subset of images comprising a plurality of tags in the identified tag category. An order in which the user must gesture to the plurality of tags in the subset of images is randomly selected. The subset of images and the order in which the user must gesture to the plurality of tags in the subset of images to the user is presented to the user. Responsive to the user gesturing to a subset of tags in the subset of images in the selected order, the locked computing device is unlocked.
    Type: Grant
    Filed: March 19, 2014
    Date of Patent: March 22, 2016
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Publication number: 20160034717
    Abstract: An approach is provided in which an information handling system identifies areas of sensitive content in a digital image that is intended to be sent to a recipient. The information handling system retrieves rules corresponding to both the intended recipient and the sensitive content, and modifies the digital image based upon the identified rules. The modification of the digital image includes protecting the sensitive content, such as blurring a person's face on the digital image. In turn, the information handling system sends the modified digital image to the intended first recipient.
    Type: Application
    Filed: July 30, 2014
    Publication date: February 4, 2016
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Publication number: 20150319145
    Abstract: Provided are techniques to enable a virtual input/output server (VIOS) to establish cryptographically secure signals with target LPARs to detect an imposter or spooling LPAR. The secure signal, or “heartbeat,” may be configured as an Internet Key Exchange/Internet Protocol Security (IKE/IPSec) encapsulated packet (ESP) connection or tunnel. Within the tunnel, the VIOS pings each target LPAR and, if a heartbeat is interrupted, the VIOS makes a determination as to Whether the tunnel is broken, the corresponding LPAR is down or a media access control (MAC) spoofing attach is occurring. The determination is made by sending as heartbeat that is designed to fail unless the heartbeat is received by as spooling device.
    Type: Application
    Filed: July 15, 2015
    Publication date: November 5, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Patent number: 9167069
    Abstract: Embodiments of the invention relate to management of notifications responsive to the arrival and departure of mobile devices in a defined area. A prioritized list is shared among mobile devices in a defined area. Upon detection, mobile devices add their respective selected notifications to the prioritized list. A mobile device entering the defined area receives the prioritized list and in response to detecting a shared selected notification on the prioritized list, one of the mobile devices in the area changes its selected notification to an alternative notification. A second mobile device entering the defined area would likewise receive the prioritized list and change its selected notification to a second alternative notification responsive to a shared selected notification on the list. At such time as a device leaves the area, the list is again updated and all notifications exclusive to the device are removed from the list.
    Type: Grant
    Filed: October 30, 2013
    Date of Patent: October 20, 2015
    Assignee: International Business Machines Corporation
    Inventors: Shawn P. Mullen, Jessica C Murillo, Johnny M. Shieh
  • Patent number: 9160832
    Abstract: Embodiments of the invention relate to management of notifications responsive to the arrival and departure of mobile devices in a defined area. A prioritized list is shared among mobile devices in a defined area. Upon detection, mobile devices add their respective selected notifications to the prioritized list. A mobile device entering the defined area receives the prioritized list and in response to detecting a shared selected notification on the prioritized list, one of the mobile devices in the area changes its selected notification to an alternative notification. A second mobile device entering the defined area would likewise receive the prioritized list and change its selected notification to a second alternative notification responsive to a shared selected notification on the list. At such time as a device leaves the area, the list is again updated and all notifications exclusive to the device are removed from the list.
    Type: Grant
    Filed: January 9, 2013
    Date of Patent: October 13, 2015
    Assignee: International Business Machines Corporation
    Inventors: Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Patent number: 9148395
    Abstract: A difference between a source email message and at least one target email message is determined and then displayed in a popup window. A first selected message in a message thread is designated as a source message. The thread is searched for a target message that comprises a next oldest message in the thread. Identifying data in the source message is compared to identifying data in the target message for generating difference data. Content of both the source message and target message is also compared. A popup window is generated over the target message and the content difference is displayed in the popup window.
    Type: Grant
    Filed: March 12, 2013
    Date of Patent: September 29, 2015
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Shawn P. Mullen, Jessica C. Murillo, Gerald F. McBrearty, Johnny M. Shieh
  • Publication number: 20150269376
    Abstract: A mechanism is provided for unlocking a locked computing device based on a knowledge of a user. Responsive to detecting an intent to utilize the locked computing device, a subset of the images is randomly selecting in an identified tag category from a plurality of tagged images, the subset of images comprising a plurality of tags in the identified tag category. An order in which the user must gesture to the plurality of tags in the subset of images is randomly selected. The subset of images and the order in which the user must gesture to the plurality of tags in the subset of images to the user is presented to the user. Responsive to the user gesturing to a subset of tags in the subset of images in the selected order, the locked computing device is unlocked.
    Type: Application
    Filed: March 19, 2014
    Publication date: September 24, 2015
    Applicant: International Business Machines Corporation
    Inventors: Susann M. Keohane, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Patent number: 9130987
    Abstract: Provided are techniques for to enable a virtual input/output server (VIOS) to establish cryptographically secure signals with target LPARs to detect an imposter or spoofing LPAR. The secure signal, or “heartbeat,” may be configured as an Internet Key Exchange/Internet Protocol Security (IKE/IPSec) encapsulated packet (ESP) connection or tunnel. Within the tunnel, the VIOS pings each target LPAR and, if a heartbeat is interrupted, the VIOS makes a determination as to whether the tunnel is broken, the corresponding LPAR is down or a media access control (MAC) spoofing attach is occurring. The determination is made by sending a heartbeat that is designed to fail unless the heartbeat is received by a spoofing device.
    Type: Grant
    Filed: May 8, 2012
    Date of Patent: September 8, 2015
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Patent number: 9098625
    Abstract: Tracing of the interaction of third party processes on resources used by a program under trace is performed. A viral tag is associated with the program under trace. When the program “touches” a portion of memory, the memory manager associates the viral tag with the memory locations in this portion of memory. When subsequent processes “touch” the tagged memory locations, they acquire the viral tag and then spread it to other memory locations that these subsequent processes touch. The viral tag may be slightly modified so as to identify it as being based on the original viral tag but having been acquired by another process. Each time the viral tag is spread to another program, the viral tag may be slightly modified to indicate that the viral tag is now associated with another entity although is still associated with the original viral tag.
    Type: Grant
    Filed: February 29, 2008
    Date of Patent: August 4, 2015
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Patent number: 9088609
    Abstract: Provided are techniques for to enable a virtual input/output server (VIOS) to establish cryptographically secure signals with target LPARs to detect an imposter or spoofing LPAR. The secure signal, or “heartbeat,” may be configured as an Internet Key Exchange/Internet Protocol Security (IKE/IPSec) encapsulated packet (ESP) connection or tunnel. Within the tunnel, the VIOS pings each target LPAR and, if a heartbeat is interrupted, the VIOS makes a determination as to whether the tunnel is broken, the corresponding LPAR is down or a media access control (MAC) spoofing attach is occurring. The determination is made by sending a heartbeat that is designed to fail unless the heartbeat is received by a spoofing device.
    Type: Grant
    Filed: December 24, 2009
    Date of Patent: July 21, 2015
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Koehane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Publication number: 20150169894
    Abstract: A method of storing a data object received from a network is described. An encrypted data object encrypted with a first encryption key is received. It is determined whether the encrypted data object is to be stored in an encrypted file system that requires encryption of a data object with a second encryption key. The first encryption key is encrypted with a third encryption key when it is determined the encrypted data object is to be stored in the encrypted file system. The first encryption key is attached to the encrypted data object. The data object encrypted by the first encryption key is stored in the encrypted file system.
    Type: Application
    Filed: December 13, 2013
    Publication date: June 18, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susann M. Keohane, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Publication number: 20150150147
    Abstract: A computer encrypts only a restricted tag element from among a plurality of content elements to be electronically published as a message for access by a plurality of users, wherein decryption of the encrypted restricted tag element is limited to a selection of at least one user from among the plurality of users. The computer outputs the plurality of content elements for electronic publication through an interface accessible to the plurality of users, wherein the plurality of users are enabled to access the plurality of content elements of the message published through the interface, wherein only the selection of at least one user is enabled to decrypt the encrypted restricted tag element in the plurality of content elements to access the underlying restricted tag element within the message published through the interface.
    Type: Application
    Filed: November 26, 2013
    Publication date: May 28, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: SUSANN M. KEOHANE, GERALD F. MCBREARTY, JESSICA C. MURILLO, JOHNNY M. SHIEH
  • Patent number: 9043882
    Abstract: Embodiments relate to administering access to a wireless network by detecting a connective proximity of a device to the network, determining that the device is an authorized device based on information, connecting the authorized device to the network, and causing the connection of the authorized device to the network to be provided as an output status.
    Type: Grant
    Filed: May 2, 2013
    Date of Patent: May 26, 2015
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Jessica C. Murillo, Johnny M. Shieh
  • Publication number: 20150071620
    Abstract: Each data integrity value, from among a plurality of data integrity values each associated with a separate unit of a program comprising a plurality of units, is checked against a separate recorded portion of a recording of the program corresponding to one of the plurality of units, wherein the recording of the program is recorded from a broadcast of the program. Responsive to a particular data integrity value from among the plurality of data integrity values not matching when checked against a particular separate recorded portion of the program corresponding to a particular unit from among the plurality of units, the recording is corrected by replacing only the particular separate recorded portion of the program from a second recording of only the particular unit from a subsequent broadcast of the program.
    Type: Application
    Filed: December 6, 2013
    Publication date: March 12, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: SUSANN M. KEOHANE, SHAWN P. MULLEN, JESSICA C. MURILLO, JOHNNY M. SHIEH
  • Publication number: 20150071611
    Abstract: Each data integrity value, from among a plurality of data integrity values each associated with a separate unit of a program comprising a plurality of units, is checked against a separate recorded portion of a recording of the program corresponding to one of the plurality of units, wherein the recording of the program is recorded from a broadcast of the program. Responsive to a particular data integrity value from among the plurality of data integrity values not matching when checked against a particular separate recorded portion of the program corresponding to a particular unit from among the plurality of units, the recording is corrected by replacing only the particular separate recorded portion of the program from a second recording of only the particular unit from a subsequent broadcast of the program.
    Type: Application
    Filed: September 9, 2013
    Publication date: March 12, 2015
    Applicant: International Business Machines Corporation
    Inventors: SUSANN M. KEOHANE, SHAWN P. MULLEN, JESSICA C. MURILLO, JOHNNY M. SHIEH