Patents by Inventor Mary Ellen Zurko
Mary Ellen Zurko has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20130178190Abstract: An embodiment of the invention includes initially registering information with a data system, wherein the registered information pertains to a user of a mobile device and includes credential information, and further includes a message address associated with the user. An enrollment request, together with the specified credential information, is sent to a management server. Responsive thereto, the server sends a message of specified type to the message address associated with the user, wherein such message includes a pin code. The pin code is then sent from the device to the server, and responsive to receiving the pin code, the server is operated to deliver a security token, for use in authenticating the mobile device to selectively access the particular data processing system.Type: ApplicationFiled: January 5, 2012Publication date: July 11, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Joseph Celi, JR., Olgierd S. Pieczul, Mary Ellen Zurko
-
Patent number: 8479268Abstract: A system, and computer usable program product for securing asynchronous client server transactions are provided in the illustrative embodiments. A request including an application identifier and a version of a second application is received at a first application. A service identifier is generated if a session with the second application is valid. A registry is generated at the first application. A catalog is generated based on the registry and the service identifier and the catalog are sent to the second application. A sub-request including the service identifier is received as part of an asynchronous client server transaction. Validity of the sub-request is determined by determining whether the service identifier has expired, whether the sub-request requests a service that is permissible according to the catalog, whether the service identifier is used in conjunction with the second application, or a combination thereof. If the sub-request is valid, the service is provided.Type: GrantFiled: December 15, 2009Date of Patent: July 2, 2013Assignee: International Business Machines CorporationInventors: Steven A Bade, Harold Moss, Mary Ellen Zurko
-
Patent number: 8474019Abstract: A method for securing asynchronous client server transactions is provided in the illustrative embodiments. A request including an application identifier and a version of a second application is received at a first application. A service identifier is generated if a session with the second application is valid. A registry is generated at the first application. A catalog is generated based on the registry and the service identifier and the catalog are sent to the second application. A sub-request including the service identifier is received as part of an asynchronous client server transaction. Validity of the sub-request is determined by determining whether the service identifier has expired, whether the sub-request requests a service that is permissible according to the catalog, whether the service identifier is used in conjunction with the second application, or a combination thereof. If the sub-request is valid, the service is provided.Type: GrantFiled: March 6, 2012Date of Patent: June 25, 2013Assignee: International Business Machines CorporationInventors: Steven A Bade, Harold Moss, Mary Ellen Zurko
-
Patent number: 8474006Abstract: These and other objectives are attained with a method and system for evaluating an access policy change. The method comprises the step of providing an access control mechanism having a first policy, and an audit log having entries of accesses made under that first policy. The method comprises the further steps of submitting a second policy to the access control mechanism, comparing the log entries to the second policy, and based on the results of the comparing step, taking one of a predetermined number of actions.Type: GrantFiled: October 28, 2009Date of Patent: June 25, 2013Assignee: International Business Machines CorporationInventors: Mary Ellen Zurko, George R. Blakley, III
-
Publication number: 20130054780Abstract: Despite the best intentions of a cloud service provider, digital assets of may be moved to a geographic location that deviates from a geographic preference, policy, or setting of the owner of the digital assets. A monitoring tool can monitor network location of a digital asset hosted by a cloud service provider. Movement of the digital asset from a first network location to a second network location is detected. In response to detecting that the digital asset moves, a geographic location that corresponds to the second network location is determined. It is then determined that the geographic location deviates from a geographic setting configured for the digital asset. A notification that the digital asset has been moved to the geographic location that deviates from the geographic setting is generated.Type: ApplicationFiled: August 26, 2011Publication date: February 28, 2013Applicant: International Business Machines CorporationInventors: Steven A. Bade, Harold Moss, III, Mary Ellen Zurko
-
Patent number: 8386572Abstract: A system and method for circumventing a do-not-disturb status of an instant messaging user including defining a trusted user. A do-not-disturb status of an instant messaging user is identified. The trusted user is allowed to circumvent the do-not-disturb status of the instant messaging user.Type: GrantFiled: December 31, 2008Date of Patent: February 26, 2013Assignee: International Business Machines CorporationInventors: Gary Denner, Cynthia E. Barber-Mingo, Ruthie D. Lyle, Patrick Joseph O'Sullivan, Mary Ellen Zurko
-
Publication number: 20130014239Abstract: A user authenticates to a Web- or cloud-based application from a browser-based client. The browser-based client has an associated rich client. After a session is initiated from the browser-based client (and a credential obtained), the user can discover that the rich client is available and cause it to obtain the credential (or a new one) for use in authenticating the user to the application (using the rich client) automatically, i.e., without additional user input. An application interface provides the user with a display by which the user can configure the rich client authentication operation, such as specifying whether the rich client should be authenticated automatically if it detected as running, whether and what extent access to the application by the rich client is to be restricted, if and when access to the application by the rich client is to be revoked, and the like.Type: ApplicationFiled: July 8, 2011Publication date: January 10, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Olgierd Stanislaw Pieczul, Mark Alexander McGloin, Mary Ellen Zurko
-
Patent number: 8285796Abstract: A system and method for circumventing a do-not-disturb status of an instant messaging user including defining requesting, from one or more do not disturb circumvention mediators, do-not-disturb status circumvention of an instant messaging user. Circumvention permission for the do-not-disturb status of the instant messaging user is received. The do-not-disturb status of the instant messaging user is circumvented based upon, at least in part, the circumvention permission.Type: GrantFiled: December 30, 2008Date of Patent: October 9, 2012Assignee: International Business Machines CorporationInventors: Gary Denner, Cynthia E. Barber-Mingo, Ruthie D. Lyle, Patrick Joseph O'Sullivan, Mary Ellen Zurko
-
Patent number: 8271593Abstract: A method and computer program product for defining one or more authorized users capable of granting do-not-disturb circumvention privileges, and receiving an indicator of a grant of do-not-disturb circumvention privileges to a circumventing user by the one or more authorized users. A do-not-disturb status of an instant messaging user is circumvented based upon, at least in part, the grant of do-not-disturb circumvention privileges.Type: GrantFiled: March 28, 2008Date of Patent: September 18, 2012Assignee: International Business Machines CorporationInventors: Patrick Joseph O'Sullivan, Gary Denner, Ruthie D. Lyle, Cynthia Barber-Mingo, Mary Ellen Zurko
-
Publication number: 20120233664Abstract: A method for securing asynchronous client server transactions is provided in the illustrative embodiments. A request including an application identifier and a version of a second application is received at a first application. A service identifier is generated if a session with the second application is valid. A registry is generated at the first application. A catalog is generated based on the registry and the service identifier and the catalog are sent to the second application. A sub-request including the service identifier is received as part of an asynchronous client server transaction. Validity of the sub-request is determined by determining whether the service identifier has expired, whether the sub-request requests a service that is permissible according to the catalog, whether the service identifier is used in conjunction with the second application, or a combination thereof. If the sub-request is valid, the service is provided.Type: ApplicationFiled: March 6, 2012Publication date: September 13, 2012Applicant: International Business Machines CorporationInventors: STEVEN A. BADE, Harold Moss, Mary Ellen Zurko
-
Publication number: 20120179817Abstract: A technique for addressing geographical location issues in a computing environment includes receiving, at a data processing system, location information indicating a permissible geographical location in which a virtual machine image for a consumer may be deployed. A request for an exception to deploy the virtual machine image outside of the permissible geographical location is issued, from the data processing system. An exception grant or an exception denial is received, at the data processing system, from the consumer in response to the request. The virtual machine image is deployed, using the data processing system, to one or more servers in the computing environment that are outside of the permissible geographical location in response to receipt of the exception grant. The virtual machine image is deployed, using the data processing system, to one or more servers in the computing environment that are within the permissible geographical location in response to receipt of the exception denial.Type: ApplicationFiled: January 6, 2011Publication date: July 12, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: STEVEN A. BADE, HAROLD MOSS, III, MARY ELLEN ZURKO
-
Publication number: 20120151568Abstract: A rich client performs single sign-on (SSO) to access a web- or cloud-based application. According to the described SSO approach, the rich client delegates to its native application server the task of obtaining a credential, such as a SAML assertion. The native server, acting on behalf of the user, obtains an assertion from a federated identity provider (IdP) that is then returned to the rich client. The rich client provides the assertion to a cloud-based proxy, which presents the assertion to an identity manager to attempt to prove that the user is entitled to access the web- or cloud-based application using the rich client. If the assertion can be verified, it is exchanged with a signed token, such as a token designed to protect against cross-site request forgery (CSRF). The rich client then accesses the web- or cloud-based application making a REST call that includes the signed token. The application, which recognizes the request as trustworthy, responds to the call with the requested data.Type: ApplicationFiled: December 13, 2010Publication date: June 14, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Olgierd Stanislaw Pieczul, Mark Alexander McGloin, Mary Ellen Zurko, David Scott Kern, Brent Allan Hepburn
-
Publication number: 20120117626Abstract: A method to manage access to end user-protected resources hosted in a shared pool of configurable computing resources, such as a cloud computing environment, begins by registering a particular application or service into the environment. The application or service is one that is being permitted to access resources on behalf of end users via a delegated authorization protocol, such as OAuth. For at least one end user associated with the organization, a permission is set, preferably by an organization entity, such as an organization administrator. The permission determines whether the application or service is permitted to access one or more resources associated with the end user. Then, in response to a request by the third party application to access a resource, where the request is received via the delegated authorization protocol, the permission is then used to determine whether the third party application is permitted to access the resource.Type: ApplicationFiled: November 10, 2010Publication date: May 10, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Robert Leslie Yates, Prashant S. Kulkarni, Mary Ellen Zurko
-
Publication number: 20120023395Abstract: A technique to provide runtime output sanitization filtering of web application content that contains multiple contexts in which dynamic output is included. To facilitate this operation, dynamically-generated content is prepared for sanitization in advance, preferably by being “marked” by the web application itself (or by middleware used by or associated with the application). Preferably, given dynamically-generated content is marked by enclosing it between dynamic content indicators. Then, after the document generation is completed but before it is output (delivered), the application-generated content is processed by a content sanitization filter. The filter uses the dynamic content identifiers to identify and locate the content that needs output escaping. The filter detects the appropriate context within which the dynamically-generated content has been placed, and it then applies the appropriate escaping.Type: ApplicationFiled: July 22, 2010Publication date: January 26, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Olgierd Pieczul, Mark Alexander McGloin, Mary Ellen Zurko
-
Publication number: 20120023394Abstract: A technique to provide runtime output sanitization filtering of web application content that contains multiple contexts in which dynamic output is included. To facilitate this operation, dynamically-generated content is prepared for sanitization in advance, preferably by being “marked” by the web application itself (or by middleware used by or associated with the application). Preferably, given dynamically-generated content is marked by enclosing it between dynamic content indicators. Then, after the document generation is completed but before it is output (delivered), the application-generated content is processed by a content sanitization filter. The filter uses the dynamic content identifiers to identify and locate the content that needs output escaping. The filter detects the appropriate context within which the dynamically-generated content has been placed, and it then applies the appropriate escaping.Type: ApplicationFiled: July 22, 2010Publication date: January 26, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Olgierd Pieczul, Mark Alexander McGloin, Mary Ellen Zurko
-
Publication number: 20120005720Abstract: A runtime approach receives a request from a target location. Data elements are received from a data store. Privacy data type categories corresponding to retrieved data elements are identified. Data flow category is identified based on the target location. Privacy actions are performed modifying some data elements based on the identified privacy data type categories and the data flow category so that the modified data elements comply with one or more data privacy rules pertaining to the target location. A design-time approach retrieves data types included in a software application data design. Privacy categories are selected that correspond to the retrieved data types. Flow categorization data is retrieved that correspond to software application processes. Privacy categories and flow categorization data are compared to privacy rules. A user is informed if privacy rules are violated to facilitate software application modification in order to comply with the privacy rules.Type: ApplicationFiled: July 1, 2010Publication date: January 5, 2012Applicant: International Business Machines CorporationInventors: Mark Alexander McGloin, Olgierd Stanislaw Pieczul, Mary Ellen Zurko
-
Publication number: 20110289556Abstract: A web application decomposed into one or more domain sandboxes ensures that the contents of each sandbox are protected from attacks on the web application outside that sandbox. Sandboxing is achieved on a per-element basis by identifying content that should be put under protection, generating a secure domain name for the identified content, and replacing the identified content with a unique reference (e.g., an iframe) to the generated secure domain. The identified content is then served only from the generated secure domain using a content handler.Type: ApplicationFiled: May 19, 2010Publication date: November 24, 2011Applicant: International Business Machines CorporationInventors: Olgierd Pieczul, Mark Alexander McGloin, Mary Ellen Zurko
-
Publication number: 20110289546Abstract: A method for decomposing a web application into one or more domain sandboxes ensures that the contents of each sandbox are protected from attacks on the web application outside that sandbox. Sandboxing is achieved on a per-element basis by identifying content that should be put under protection, generating a secure domain name for the identified content, and replacing the identified content with a unique reference (e.g., an iframe) to the generated secure domain. The identified content is then served only from the generated secure domain.Type: ApplicationFiled: May 19, 2010Publication date: November 24, 2011Applicant: International Business Machines CorporationInventors: Olgierd Pieczul, Mark Alexander McGloin, Mary Ellen Zurko
-
Publication number: 20110145891Abstract: A method, system, and computer usable program product for securing asynchronous client server transactions are provided in the illustrative embodiments. A request including an application identifier and a version of a second application is received at a first application. A service identifier is generated if a session with the second application is valid. A registry is generated at the first application. A catalog is generated based on the registry and the service identifier and the catalog are sent to the second application. A sub-request including the service identifier is received as part of an asynchronous client server transaction. Validity of the sub-request is determined by determining whether the service identifier has expired, whether the sub-request requests a service that is permissible according to the catalog, whether the service identifier is used in conjunction with the second application, or a combination thereof. If the sub-request is valid, the service is provided.Type: ApplicationFiled: December 15, 2009Publication date: June 16, 2011Applicant: International Business Machines CorporationInventors: Steven A. Bade, Harold Moss, Mary Ellen Zurko
-
Publication number: 20110137664Abstract: A method for providing schedule related information to external entities includes storing schedule data of a user on a server, the schedule data corresponding to a computerized calendar service; exposing, with the computerized calendar service, at least a portion of the schedule data to an entity other than the user; and enabling the entity to communicate an offer based on the schedule data to at least the user.Type: ApplicationFiled: December 9, 2009Publication date: June 9, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Nancy Ellen Kho, Judy J. Piper, Mary Ellen Zurko