Patents by Inventor Jessica C. Murillo

Jessica C. Murillo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150074125
    Abstract: A computer identifies at least one common content element used by each of at least two users from at least one communication by each of the at least two users. Responsive to one of the at least two users constructing content for a potential communication to the other of the at least two users, the computer accesses the at least one common content element for use by at least one content prediction service enabled for presenting one or more possible content elements comprising the at least one common content element for user selection during construction of the content for the potential communication.
    Type: Application
    Filed: September 9, 2013
    Publication date: March 12, 2015
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gerald F. MCBREARTY, Shawn P. MULLEN, Jessica C. MURILLO, Johnny M. SHIEH
  • Publication number: 20140331284
    Abstract: Embodiments relate to administering access to a wireless network by detecting a connective proximity of a device to the network, determining that the device is an authorized device based on information, connecting the authorized device to the network, and causing the connection of the authorized device to the network to be provided as an output status.
    Type: Application
    Filed: May 2, 2013
    Publication date: November 6, 2014
    Inventors: Susann M. Keohane, Jessica C. Murillo, Johnny M. Shieh
  • Patent number: 8856519
    Abstract: Provided are techniques for encrypting a resource associated with an application with a first key; generating, at an install time of the application, a first hash code for an executable daemon associated with the application; encrypting the first key with the first hash code to produce a protected first key; generating, at a load time of an application, a second hash code for the executable daemon; deriving the first key by decrypting the protected first key using the second hash code to produce a derived first key; and accessing the resource by the executable daemon by employing the derived first key. Examples of protected resource include, but are not limited to, databases, communication devices and a lightweight directory access protocol server.
    Type: Grant
    Filed: April 24, 2013
    Date of Patent: October 7, 2014
    Assignee: International Business Machines Corporation
    Inventors: Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Publication number: 20140280640
    Abstract: A difference between a source email message and at least one target email message is determined and then displayed in a popup window. A first selected message in a message thread is designated as a source message. The thread is searched for a target message that comprises a next oldest message in the thread. Identifying data in the source message is compared to identifying data in the target message for generating difference data. Content of both the source message and target message is also compared. A popup window is generated over the target message and the content difference is displayed in the popup window.
    Type: Application
    Filed: November 14, 2013
    Publication date: September 18, 2014
    Applicant: International Business Machines Corporation
    Inventors: Susann M. Keohane, Shawn P. Mullen, Jessica C. Murillo, Gerald F. McBrearty, Johnny M. Shieh
  • Publication number: 20140282079
    Abstract: A difference between a source email message and at least one target email message is determined and then displayed in a popup window. A first selected message in a message thread is designated as a source message. The thread is searched for a target message that comprises a next oldest message in the thread. Identifying data in the source message is compared to identifying data in the target message for generating difference data. Content of both the source message and target message is also compared. A popup window is generated over the target message and the content difference is displayed in the popup window.
    Type: Application
    Filed: March 12, 2013
    Publication date: September 18, 2014
    Applicant: International Business Machines Corporation
    Inventors: Susann M. Keohane, Shawn P. Mullen, Jessica C. Murillo, Gerald F. McBrearty, Johnny M. Shieh
  • Publication number: 20140267337
    Abstract: An approach is provided in which a source entity generates scene fill metadata corresponding to scene transition points included in media content. The scene fill metadata includes a “required buffer amount,” which indicates an amount of the media content for which a destination entity should buffer prior to displaying one or more upcoming scenes. In turn, the source entity provides the scene fill metadata to a destination entity.
    Type: Application
    Filed: September 15, 2013
    Publication date: September 18, 2014
    Applicant: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gerald F. McBreartry, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Publication number: 20140282690
    Abstract: An approach is provided in which a source entity generates scene fill metadata corresponding to scene transition points included in media content. The scene fill metadata includes a “required buffer amount,” which indicates an amount of the media content for which a destination entity should buffer prior to displaying one or more upcoming scenes. In turn, the source entity provides the scene fill metadata to a destination entity.
    Type: Application
    Filed: March 12, 2013
    Publication date: September 18, 2014
    Applicant: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gerald F. McBreartry, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Publication number: 20140194104
    Abstract: Embodiments of the invention relate to management of notifications responsive to the arrival and departure of mobile devices in a defined area. A prioritized list is shared among mobile devices in a defined area. Upon detection, mobile devices add their respective selected notifications to the prioritized list. A mobile device entering the defined area receives the prioritized list and in response to detecting a shared selected notification on the prioritized list, one of the mobile devices in the area changes its selected notification to an alternative notification. A second mobile device entering the defined area would likewise receive the prioritized list and change its selected notification to a second alternative notification responsive to a shared selected notification on the list. At such time as a device leaves the area, the list is again updated and all notifications exclusive to the device are removed from the list.
    Type: Application
    Filed: October 30, 2013
    Publication date: July 10, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Publication number: 20140194101
    Abstract: Embodiments of the invention relate to management of notifications responsive to the arrival and departure of mobile devices in a defined area. A prioritized list is shared among mobile devices in a defined area. Upon detection, mobile devices add their respective selected notifications to the prioritized list. A mobile device entering the defined area receives the prioritized list and in response to detecting a shared selected notification on the prioritized list, one of the mobile devices in the area changes its selected notification to an alternative notification. A second mobile device entering the defined area would likewise receive the prioritized list and change its selected notification to a second alternative notification responsive to a shared selected notification on the list. At such time as a device leaves the area, the list is again updated and all notifications exclusive to the device are removed from the list.
    Type: Application
    Filed: January 9, 2013
    Publication date: July 10, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Patent number: 8725874
    Abstract: The ideal client-server for a collaborative application in a client-server network environment is dynamically determined. An Ideal Server utility compares the capabilities of the computer system of an entering client with the computer system of the current client-server to determine which system is best equipped to control the execution of the application. Whenever a new client enters/participates in the application session, the Ideal Server utility evaluates the system capabilities of the new client (the candidate client-server) and compares the new client's system capabilities with the system capabilities of the current client-server. If the new client possesses better capabilities than the current client-server, the new client is provided the role of the client-server. A transfer of the application to the candidate client-server is initiated. Once the transfer is completed, the application resumes processing on the new client-server.
    Type: Grant
    Filed: September 27, 2007
    Date of Patent: May 13, 2014
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Publication number: 20140006801
    Abstract: Provided are techniques for encrypting a resource associated with an application with a first key; generating, at an install time of the application, a first hash code for an executable daemon associated with the application; encrypting the first key with the first hash code to produce a protected first key; generating, at a load time of an application, a second hash code for the executable daemon; deriving the first key by decrypting the protected first key using the second hash code to produce a derived first key; and accessing the resource by the executable daemon by employing the derived first key.
    Type: Application
    Filed: April 24, 2013
    Publication date: January 2, 2014
    Applicant: International Business Machines Corporation
    Inventors: Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Publication number: 20140006079
    Abstract: Methods, systems, and computer program products may schedule viewing of a recorded event. The method may include receiving, by an electronic apparatus, an electronic request for an invitee to attend an event that will be recorded, and determining, by the electronic apparatus, that the invitee cannot attend the event. The method may additionally include determining, by the electronic apparatus, one or more open time intervals on an electronic calendar of the invitee to view a recording of the event, and selecting, by the electronic apparatus, at least one open time interval from the determined one or more open time intervals. The method may further include scheduling, by the electronic apparatus, viewing of the recording during the selected open time interval on the electronic calendar.
    Type: Application
    Filed: June 28, 2012
    Publication date: January 2, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susann M. Keohane, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Patent number: 8621052
    Abstract: A mechanism is provided for performance tuning for software as a performance level service. At the request of a customer, a cloud provider may use a performance tuning component to determine performance parameters to increase performance of an application running on a given hardware platform. The cloud provider may then generate a tuning configuration and associate the tuning configuration with the customer such that when the cloud provider deploys a customer's software to a partition in a host system, the cloud provider sends the tuning configuration with the deployment package. The performance tuning component at the host system then applies the performance parameters in the tuning configuration to increase performance.
    Type: Grant
    Filed: August 20, 2010
    Date of Patent: December 31, 2013
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Publication number: 20130179203
    Abstract: A method for restricting access to project data includes determining that a user has failed to indicate an intention to attend a meeting by failing to respond to a meeting notice or by indicating that the user will not participate in the meeting. The meeting notice includes an invitation sent electronically to the user to attend a meeting, and the user has electronic access to data by way of permissions associated with a user account assigned to the user. The meeting is related to the data. The method includes recording a failure-to-attend event in response to determining that the user has failed to indicate an intention to attend a meeting. The method includes blocking the user from accessing the user account in response to a quantity of failure-to-attend events reaching non-attendance criteria.
    Type: Application
    Filed: January 9, 2012
    Publication date: July 11, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Publication number: 20130179260
    Abstract: Embodiments of the invention relate to dynamic assessment of a prior purchase pattern to predict a future purchase. The prior purchase pattern is tracked and mapped to a geographic position system. Based upon a current physical location or a known future location, both a future purchase and purchase location are ascertained and communicated to a mobile device in communication with the geographic position system.
    Type: Application
    Filed: January 9, 2012
    Publication date: July 11, 2013
    Applicant: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Patent number: 8271056
    Abstract: A battery conservation component synchronizes with a user's schedule or calendar. The battery conservation component may disable functions or features to ensure that the device has sufficient battery life for selected calendar events. The battery conservation component may warn the user if a battery charge is necessary to make selected calendar events. The battery conservation component may be applied to a wide variety of portable devices with time-sensitive events. For example, the battery conservation component may be applied to a device with vehicle navigation and estimate time-sensitive events based on waypoints in the vehicle's route. The battery conservation component may synchronize with a user's travel itinerary. Alternatively, the battery conservation component may suggest alternative functions or features based on a time-sensitive event, such as suggesting a shorter movie on a flight or road trip.
    Type: Grant
    Filed: January 17, 2008
    Date of Patent: September 18, 2012
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Patent number: 8271268
    Abstract: A method, system and computer-readable medium for generating, caching and transmitting textual equivalents of information contained in an audio signal are presented. The method includes generating a textual equivalent of at least a portion of a speech-based audio signal in one device into a textual equivalent, storing a portion of the textual equivalent in first device's memory and transmitting the stored textual equivalent to a another device.
    Type: Grant
    Filed: April 18, 2007
    Date of Patent: September 18, 2012
    Assignee: Nuance Communications, Inc.
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny Meng-Han Shieh
  • Publication number: 20120222113
    Abstract: Provided are techniques for to enable a virtual input/output server (VIOS) to establish cryptographically secure signals with target LPARs to detect an imposter or spoofing LPAR. The secure signal, or “heartbeat,” may be configured as an Internet Key Exchange/Internet Protocol Security (IKE/IPSec) encapsulated packet (ESP) connection or tunnel. Within the tunnel, the VIOS pings each target LPAR and, if a heartbeat is interrupted, the VIOS makes a determination as to whether the tunnel is broken, the corresponding LPAR is down or a media access control (MAC) spoofing attach is occurring. The determination is made by sending a heartbeat that is designed to fail unless the heartbeat is received by a spoofing device.
    Type: Application
    Filed: May 8, 2012
    Publication date: August 30, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Publication number: 20120047240
    Abstract: A mechanism is provided for performance tuning for software as a performance level service. At the request of a customer, a cloud provider may use a performance tuning component to determine performance parameters to increase performance of an application running on a given hardware platform. The cloud provider may then generate a tuning configuration and associate the tuning configuration with the customer such that when the cloud provider deploys a customer's software to a partition in a host system, the cloud provider sends the tuning configuration with the deployment package. The performance tuning component at the host system then applies the performance parameters in the tuning configuration to increase performance.
    Type: Application
    Filed: August 20, 2010
    Publication date: February 23, 2012
    Applicant: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Patent number: 8041680
    Abstract: Backing up a database, including providing, in the database by a DBMS, at least one record with at least one backup field, the backup field being a data element that controls the backing up of the record, and backing up, by a backup module, the a record in dependence upon a value of the backup field.
    Type: Grant
    Filed: June 8, 2007
    Date of Patent: October 18, 2011
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh