Patents by Inventor Shawn Mullen

Shawn Mullen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8375425
    Abstract: A computer implemented method, data processing system and computer program product are disclosed for password expiration based on vulnerability detection. A request for a password is received during re-activation of a first account that belongs to a particular user. A test password is compared to a previously created password that belongs to the particular user to determine if a match occurred. Responsive to determining that there is a match, a second account that belongs to the particular user with respect to the match is expired.
    Type: Grant
    Filed: November 14, 2007
    Date of Patent: February 12, 2013
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Patrick Shawn Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
  • Publication number: 20090235166
    Abstract: A system and method for presenting individual slides of a presentation on one composite slide wherein the composite slide may be integrated within the presentation. Each individual slide is represented as a thumbnail view on the composite slide and is capable of launching the full version of the presentation by directly linking to the individual slide represented by the thumbnail. The system and method eliminates the need to scroll through each slide of the presentation to find a slide of interest. The system and method also allows the presentation slides to be rearranged or grouped in the composite slide without affecting the order of the individual slide in the presentation.
    Type: Application
    Filed: March 17, 2008
    Publication date: September 17, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susann Keohane, Johnny Meng-Han Shieh, Shawn Mullen, Gerald F. McBrearty, Jessica C. Murillo
  • Publication number: 20090126018
    Abstract: Illustrative embodiments provide a computer implemented method, a data processing system and a computer program product for password expiration based on vulnerability detection. The computer implemented method comprises receiving a request for a password after re-activating a user account and requesting a password generator, to create a hashed password. The method further comprises comparing the hashed password to a previously created password of a user, to determine a match entry. Responsive to determining a match entry, expiring an account of the user with respect to the match entry.
    Type: Application
    Filed: November 14, 2007
    Publication date: May 14, 2009
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Patrick Shawn Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
  • Publication number: 20080147469
    Abstract: An electronic calendar management system for managing a plurality of meeting invitees to limit meeting attendance to a predetermined number of attendees. A meeting planner schedules a meeting using an electronic calendar. A meeting attendee profile (MAP) is defined, comprising parameters that determine the criteria for selecting meeting invitees. The parameters of the MAP are applied against a pool of potential invitee profiles stored in a database to select invitees to the meeting. An electronic mail (email) meeting invitation is then generated and sent to the selected invitees. Invitee responses for each MAP are managed to limit meeting attendance to a predetermined number of attendees. The MAP can be revised by a remedial action, such as the generation of a revised email meeting invitation.
    Type: Application
    Filed: December 13, 2006
    Publication date: June 19, 2008
    Inventors: Jessica C. Murillo, Gerald F. McBrearty, Susann Keohane, Johnny Shieh, Shawn Mullen
  • Publication number: 20080114677
    Abstract: A method, system and computer program product for enabling user-customization of an ATM display/receipt for a transaction carried out at an automated teller machine (ATM). The customer/user of the ATM creates/selects specific alerts to be outputted during subsequent ATM transactions. The alerts/notices are linked to the customer account. During subsequent access to the user's account via an ATM, the pre-selected alert/notice is displayed to the user or printed on the transaction receipt.
    Type: Application
    Filed: January 2, 2008
    Publication date: May 15, 2008
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20080082444
    Abstract: Controlling electronic withdrawals by a drawee including receiving in the drawee from a withdrawal device a withdrawal request, where the withdrawal request includes a withdrawal device identifier, a drawer identifier, and a withdrawal amount; retrieving from storage in computer memory of the drawee data representing limitations on electronic withdrawals for the drawer, wherein the limitations include a limitation on drawer location; and authorizing, by the drawee, an electronic withdrawal in dependence upon the limitations, including the limitation on drawer location. In typical embodiments, the limitations on electronic withdrawals may include limitations on withdrawal type account, withdrawal period, and maximum withdrawal amount. In typical embodiments, the limitation on drawer location may include a geographic area that includes one or more locations of withdrawal devices.
    Type: Application
    Filed: December 3, 2007
    Publication date: April 3, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20080067233
    Abstract: Controlling electronic withdrawals by a withdrawal device including creating in the withdrawal device a data structure representing a withdrawal request, where the data structure includes fields for a withdrawal device identifier, a drawer identifier, a drawee identifier, and a withdrawal amount; transmitting from the withdrawal device to a drawee a request for limitations on electronic withdrawals for the drawer, where the limitations include a limitation on drawer location; receiving in the withdrawal device from storage in computer memory of the drawee data representing the limitations on electronic withdrawals for the drawer, including the limitation on drawer location; and authorizing, by the withdrawal device, an electronic withdrawal in dependence upon the limitations, including the limitation on drawer location.
    Type: Application
    Filed: November 20, 2007
    Publication date: March 20, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20080052234
    Abstract: A method, system and computer program product for enabling user-customization of an ATM display/receipt for a transaction carried out at an automated teller machine (ATM). The customer/user of the ATM creates/selects specific alerts to be outputted during subsequent ATM transactions. The alerts/notices are linked to the customer account. During subsequent access to the user's account via an ATM, the pre-selected alert/notice is displayed to the user or printed on the transaction receipt.
    Type: Application
    Filed: August 30, 2007
    Publication date: February 28, 2008
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20070253549
    Abstract: An encryption apparatus and method for providing an encrypted file system are provided. The encryption apparatus and method of the illustrative embodiments uses a combination of encryption methodologies so as to reduce the amount of decryption and re-encryption that is necessary to a file in the Encrypted File System in the event that the file needs to be modified. The encryption methodologies are interleaved, or alternated, with regard to each block of plaintext. In one illustrative embodiment, Plaintext Block Chaining (PBC) and Cipher Block Chaining (CBC) encryption methodologies are alternated for encrypting a sequence of blocks of data. The encryption of a block of plaintext is dependent upon the plaintext or a cipher generated for the plaintext of a previous block of data in the sequence of blocks of data so that the encryption is more secure than known Electronic Code Book encryption methodologies.
    Type: Application
    Filed: April 18, 2006
    Publication date: November 1, 2007
    Inventors: Ufuk Celikkan, William Conklin, Shawn Mullen, Ravi Shankar
  • Publication number: 20070255964
    Abstract: A system, method, and computer-usable medium for detecting movement of a portable computer; comparing the detected movement of the portable computer to a predetermined threshold; determining if the portable computer is coupled to a docking station; and in response to determining the portable computer is coupled to the docking station, enabling security to secure data stored on the portable computer.
    Type: Application
    Filed: April 27, 2006
    Publication date: November 1, 2007
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20070168876
    Abstract: A method, system, and computer program product for selecting an object from nested group of objects. Upon the determination of an incorrect selection, the selection of an object that is different from the current selected object is accomplished using a predetermined path.
    Type: Application
    Filed: January 18, 2006
    Publication date: July 19, 2007
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20070169178
    Abstract: A system and method for dynamically adjusting or modifying the password expiration period for a given user based upon how a user accesses the password-protected resource. The tighter the physical control of how a user can access a resource results in a loosening or maintaining of the password expiration period to be a relatively long period of time, whereas the looser the physical control of how a user can access a resource results in a tightening of the password expiration period to be a relatively short period of time. The password expiration period is adjusted based on both actual usage patterns as well as variances in such usage patterns.
    Type: Application
    Filed: January 19, 2006
    Publication date: July 19, 2007
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20070168445
    Abstract: A computer implemented method, apparatus, and computer usable program code to detect an indication that a conversation between users in an instant messaging system should be saved. Endpoints and keyword data are extracted from the conversation in response to detecting the indication. An abstract generating from the endpoints and keyword data. The conversation is stored in association with the abstract.
    Type: Application
    Filed: January 18, 2006
    Publication date: July 19, 2007
    Inventors: Denise Genty, Shawn Mullen, James Tesauro
  • Publication number: 20070168311
    Abstract: A computer implemented method, data processing system, and computer program product for monitoring system events and providing real-time response to security threats. System data is collected by monitors in the computing system. The expert system of the present invention compares the data against information in a knowledge base to identify a security threat to a system resource in a form of a system event and an action for mitigating effects of the system event. A determination is made as to whether a threat risk value of the system event is greater than an action risk value of the action for mitigating the system event. If the threat risk value is greater, a determination is made as to whether a trust value set by a user is greater than the action risk value. If the trust value is greater, the expert system executes the action against the security threat.
    Type: Application
    Filed: January 18, 2006
    Publication date: July 19, 2007
    Inventors: Denise Genty, Shawn Mullen, Bhargavi Reddy, Jacqueline Wilson
  • Publication number: 20070118908
    Abstract: A mechanism is provided for identifying a snooping device in a network environment. A snoop echo response extractor generates an echo request packet with a bogus MAC address that will only be received by a snooping device. The snoop echo response extractor also uses an IP address that will cause the snooping device to respond to the echo request.
    Type: Application
    Filed: November 22, 2005
    Publication date: May 24, 2007
    Inventors: Tristan Brown, Shawn Mullen, Venkat Venkatsubra
  • Publication number: 20070101401
    Abstract: A method, apparatus, and computer usable program code to receive a request from a user to access a network to form a received request, wherein the received request contains encrypted access information encrypted by a hardware security module on a client data processing system using a first key. The decryption of the encrypted access information occurs using the second key associated with the first key to form the decrypted information. An authorization process is performed using the decrypted information. The user is allowed access to the resource if the authorization process is successful.
    Type: Application
    Filed: October 27, 2005
    Publication date: May 3, 2007
    Inventors: Denise Genty, Shawn Mullen, James Tesauro
  • Publication number: 20070061405
    Abstract: A chat presence state adjustment indicating an availability of a particular user to participate in new chat sessions is automatically performed in a computer system. The computer system, which is in communication with a network, includes at least one of a chat server that facilitates chat communications between multiple client systems logged onto by multiple users and a particular client system logged onto by a particular user from among the multiple user. The computer system includes an avoidance controller that first detects a selection of chat sessions avoided by the particular user over a period of time from among the total chat session directed to the particular user over the period of time. In particular, the avoidance controller detects that the user avoids each of the selection of chat sessions through at least one separate type of avoidance activity.
    Type: Application
    Filed: September 15, 2005
    Publication date: March 15, 2007
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20070038953
    Abstract: A method, system, and computer program product for visually indicating the last line(s) of text on a page displayed in a window so that the user can see this visual indication as they are scrolling the text. The user also has the ability to specify a hard stop for the scrolling once the visual indication has reached a desired position.
    Type: Application
    Filed: August 11, 2005
    Publication date: February 15, 2007
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20070029380
    Abstract: An application for disabling the use of selected applications is provided. A server receives identification information from a user. The location of the user is determined. If the user is determined to be in a reserved location, the use of one or more applications is disabled, for the user.
    Type: Application
    Filed: August 4, 2005
    Publication date: February 8, 2007
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Jessica Murillo, Johnny Shieh
  • Publication number: 20070026850
    Abstract: A portable communication device detects a current speed of travel of the portable communication device independent of any vehicle temporarily transporting the portable communication device. A speed based setting controller of the portable communication device compares the current speed to at least one threshold value set at the portable communication device. Responsive to the current speed exceeding the threshold value, the speed based setting controller automatically assigns a separate speed based setting to a current setting for each feature assigned to the threshold value, wherein each current setting for each feature designates the operability of that feature within the portable communication device, such that the current setting for each feature adjusts with a speed of travel as detected by the portable communication device.
    Type: Application
    Filed: July 28, 2005
    Publication date: February 1, 2007
    Inventors: Susann Keohane, Gerald McBrearty, Shawn Mullen, Johnny Shieh