Patents by Inventor Julie H. King

Julie H. King has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8639896
    Abstract: A core dump is processed to locate and optionally alter sensitive information. A core dump copy is created from at least a portion of an original core dump. Also, at least one input parameter is provided that corresponds to select information to be identified in the core dump copy and address information associated with the core dump copy is defined that corresponds to at least one of addresses where the select information can be altered and addresses where the select information should not be altered. Each occurrence of the select information located within the core dump copy is identified and optionally replaced with predetermined replacement data if the occurrence of the select information is within the addresses where the select information can be altered.
    Type: Grant
    Filed: August 2, 2006
    Date of Patent: January 28, 2014
    Assignee: International Business Machines Corporation
    Inventors: Judith H. Bank, Tamera L. Davis, Julie H. King, Kaylee M. Thomsen, Yuping Connie Wu, Xinyi Xu, Chunhui Yang
  • Patent number: 8006098
    Abstract: The present invention provides methods, systems, computer program products, and methods of doing business whereby legacy host application/system access is integrated with single sign-on in a modern distributed computing environment. A security token used for signing on to the modern computing environment is leveraged, and is mapped to user credentials for the legacy host environment. These user credentials are programmatically inserted into a legacy host data stream, thereby giving the end user the look and feel of seamless access to all applications/systems, including not only modern computing applications/systems but also those residing on (or accessible through) legacy hosts. In addition to providing users with the advantages of single sign-on, the disclosed techniques enable limiting the number of user identifiers and passwords an enterprise has to manage.
    Type: Grant
    Filed: April 24, 2008
    Date of Patent: August 23, 2011
    Assignee: International Business Machines Corporation
    Inventors: Bryan E. Aupperle, Julie H. King, Sidhar R. Muppidi
  • Publication number: 20080263365
    Abstract: The present invention provides methods, systems, computer program products, and methods of doing business whereby legacy host application/system access is integrated with single sign-on in a modern distributed computing environment. A security token used for signing on to the modern computing environment is leveraged, and is mapped to user credentials for the legacy host environment. These user credentials are programmatically inserted into a legacy host data stream, thereby giving the end user the look and feel of seamless access to all applications/systems, including not only modern computing applications/systems but also those residing on (or accessible through) legacy hosts. In addition to providing users with the advantages of single sign-on, the disclosed techniques enable limiting the number of user identifiers and passwords an enterprise has to manage.
    Type: Application
    Filed: April 24, 2008
    Publication date: October 23, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Bryan E. Aupperle, Julie H. King, Sridhar R. Muppidi
  • Patent number: 7426642
    Abstract: The present invention provides methods, systems, computer program products, and methods of doing business whereby legacy host application/system access is integrated with single sign-on in a modem distributed computing environment. A security token used for signing on to the modem computing environment is leveraged, and is mapped to user credentials for the legacy host environment. These user credentials are programmatically inserted into a legacy host data stream, thereby giving the end user the look and feel of seamless access to all applications/systems, including not only modem computing applications/systems but also those residing on (or accessible through) legacy hosts. In addition to providing users with the advantages of single sign-on, the disclosed techniques enable limiting the number of user identifiers and passwords an enterprise has to manage.
    Type: Grant
    Filed: November 14, 2002
    Date of Patent: September 16, 2008
    Assignee: International Business Machines Corporation
    Inventors: Bryan E. Aupperle, Julie H. King, Sridhar R. Muppidi
  • Publication number: 20080126301
    Abstract: A core dump is processed to locate and optionally alter sensitive information. A core dump copy is created from at least a portion of an original core dump. Also, at least one input parameter is provided that corresponds to select information to be identified in the core dump copy and address information associated with the core dump copy is defined that corresponds to at least one of addresses where the select information can be altered and addresses where the select information should not be altered. Each occurrence of the select information located within the core dump copy is identified and optionally replaced with predetermined replacement data if the occurrence of the select information is within the addresses where the select information can be altered.
    Type: Application
    Filed: August 2, 2006
    Publication date: May 29, 2008
    Applicant: International Business Machines Corporation
    Inventors: Judith H. Bank, Tamera L. Davis, Julie H. King, Kaylee M. Thomsen, Yuping Connie Wu, Xinyi Xu, Chunhui Yang
  • Patent number: 6976164
    Abstract: The present invention provides a method, system, and computer program product which enables changing user credentials that are used to access legacy host applications and/or systems which provide legacy host data during a secure host access session which is authenticated using a digital certificate and is protected by a host-based security system, such as RACF (Resource Access Control Facility, a product offered by the IBM Corporation), where these changed credentials are used to authenticate a user after previously-provided credentials have been used for authentication earlier in the same session. The changed credentials may belong to the same user, where that user happens to have a different user ID and/or password for different legacy host applications and wishes to change from accessing one legacy host application to accessing another. Or, the changed credentials may be used to enable a different user to interact with the same legacy host application used by the previously-authenticated user.
    Type: Grant
    Filed: July 19, 2000
    Date of Patent: December 13, 2005
    Assignee: International Business Machines Corporation
    Inventors: Julie H. King, Susan D. Kirkman, Daniel J. Labrecque, Linwood H. Overby, Jr., Steven Wayne Pogue
  • Patent number: 6934848
    Abstract: The present invention provides a method, system, and computer program product for enabling a user to provide a single system sign-on for accessing one or more legacy host applications and/or one or more systems which provide legacy host data (such as legacy database systems) during a secure host access session which is authenticated using a digital certificate and is protected by a host-based security system, such as RACF (Resource Access Control Facility, a product offered by the IBM Corporation), where the same set of credentials must be provided more than once during the secure session. The subsequent provision of the credentials may be transparent to the user, and does not require change to existing legacy applications or systems.
    Type: Grant
    Filed: July 19, 2000
    Date of Patent: August 23, 2005
    Assignee: International Business Machines Corporation
    Inventors: Julie H. King, Susan D. Kirkman, Daniel J. Labrecque, Linwood H. Overby, Jr., Steven Wayne Pogue
  • Patent number: 6823452
    Abstract: A method, system, and computer program product for using a digital certificate to access legacy host applications and/or data which are protected by a host-based security system such as RACF (Resource Access Control Facility, a product offered by the IBM Corporation) and which typically require a separate user identification and password. Use of the present invention enables the client to access the host applications and/or data using a single system log on, without requiring modification to host programs.
    Type: Grant
    Filed: December 17, 1999
    Date of Patent: November 23, 2004
    Assignee: International Business Machines Corporation
    Inventors: Ronald P. Doyle, Julie H. King, Steven W. Pogue
  • Publication number: 20040205612
    Abstract: Methods, systems, and computer program products for programmatically generating presentation style information for use when subsequently rendering a collection of legacy host data values. In preferred embodiments, the style information is a style sheet document, and the generation is based upon values stored in a prior art map that is defined for used when displaying the collection of legacy host data values. Improvements are therefore provided in the user interface techniques which allow users to interact with legacy host applications. The generated presentation style information may be treated as a default presentation style, and may be modified (for example, by a user) for a more customized presentation style. The programmatic generation may be performed in a tool created specifically for this purpose, or in logic which augments an existing tool (such as a style sheet editor).
    Type: Application
    Filed: April 10, 2002
    Publication date: October 14, 2004
    Applicant: International Business Machines Corporation
    Inventors: Julie H. King, Susan D. Kirkman, Steven W. Pogue
  • Publication number: 20040098595
    Abstract: The present invention provides methods, systems, computer program products, and methods of doing business whereby legacy host application/system access is integrated with single sign-on in a modem distributed computing environment. A security token used for signing on to the modem computing environment is leveraged, and is mapped to user credentials for the legacy host environment. These user credentials are programmatically inserted into a legacy host data stream, thereby giving the end user the look and feel of seamless access to all applications/systems, including not only modem computing applications/systems but also those residing on (or accessible through) legacy hosts. In addition to providing users with the advantages of single sign-on, the disclosed techniques enable limiting the number of user identifiers and passwords an enterprise has to manage.
    Type: Application
    Filed: November 14, 2002
    Publication date: May 20, 2004
    Applicant: International Business Machines Corporation
    Inventors: Bryan E. Aupperle, Julie H. King, Sridhar R. Muppidi