Patents by Inventor Shawn P. Mullen

Shawn P. Mullen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8935457
    Abstract: A physical host executes a hypervisor or virtual machine monitor (VMM) that instantiates at least one virtual machine (VM) and a virtual input/output server (VIOS). The VIOS determines by reference to a policy data structure a disposition of a packet of network communication with the VM, where the disposition includes one of dropping the packet and forwarding the packet. Thereafter, the determined disposition is applied to a subsequent packet in a same packet flow as the packet.
    Type: Grant
    Filed: July 29, 2011
    Date of Patent: January 13, 2015
    Assignee: International Business Machines Corporation
    Inventors: Jeffrey J. Feng, Terry J. Hoffman, Shawn P. Mullen, Bhargavi B. Reddy
  • Patent number: 8875133
    Abstract: To migrate two or more virtual machines in a source hypervisor to a target hypervisor, a list of active and connected virtual machines in the source hypervisor is acquired. Connections between the source virtual machines are rerouted to a buffer so that data flowing between the source virtual machines is captured. The source virtual machines are migrated to a target hypervisor and are connected in the same manner as in the source hypervisor. The buffered data is migrated to the respective migrated virtual machines, and the target virtual machines are activated. The virtual machines can be migrated in order of data flow dependency such that the least dependent virtual machine is migrated first.
    Type: Grant
    Filed: February 28, 2013
    Date of Patent: October 28, 2014
    Assignee: International Business Machines Corporation
    Inventors: Alan Hayward, Shawn P. Mullen
  • Patent number: 8856519
    Abstract: Provided are techniques for encrypting a resource associated with an application with a first key; generating, at an install time of the application, a first hash code for an executable daemon associated with the application; encrypting the first key with the first hash code to produce a protected first key; generating, at a load time of an application, a second hash code for the executable daemon; deriving the first key by decrypting the protected first key using the second hash code to produce a derived first key; and accessing the resource by the executable daemon by employing the derived first key. Examples of protected resource include, but are not limited to, databases, communication devices and a lightweight directory access protocol server.
    Type: Grant
    Filed: April 24, 2013
    Date of Patent: October 7, 2014
    Assignee: International Business Machines Corporation
    Inventors: Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Patent number: 8850430
    Abstract: To migrate two or more virtual machines in a source hypervisor to a target hypervisor, a list of active and connected virtual machines in the source hypervisor is acquired. Connections between the source virtual machines are rerouted to a buffer so that data flowing between the source virtual machines is captured. The source virtual machines are migrated to a target hypervisor and are connected in the same manner as in the source hypervisor. The buffered data is migrated to the respective migrated virtual machines, and the target virtual machines are activated. The virtual machines can be migrated in order of data flow dependency such that the least dependent virtual machine is migrated first.
    Type: Grant
    Filed: January 24, 2012
    Date of Patent: September 30, 2014
    Assignee: International Business Machines Corporation
    Inventors: Alan Hayward, Shawn P. Mullen
  • Publication number: 20140282079
    Abstract: A difference between a source email message and at least one target email message is determined and then displayed in a popup window. A first selected message in a message thread is designated as a source message. The thread is searched for a target message that comprises a next oldest message in the thread. Identifying data in the source message is compared to identifying data in the target message for generating difference data. Content of both the source message and target message is also compared. A popup window is generated over the target message and the content difference is displayed in the popup window.
    Type: Application
    Filed: March 12, 2013
    Publication date: September 18, 2014
    Applicant: International Business Machines Corporation
    Inventors: Susann M. Keohane, Shawn P. Mullen, Jessica C. Murillo, Gerald F. McBrearty, Johnny M. Shieh
  • Publication number: 20140280640
    Abstract: A difference between a source email message and at least one target email message is determined and then displayed in a popup window. A first selected message in a message thread is designated as a source message. The thread is searched for a target message that comprises a next oldest message in the thread. Identifying data in the source message is compared to identifying data in the target message for generating difference data. Content of both the source message and target message is also compared. A popup window is generated over the target message and the content difference is displayed in the popup window.
    Type: Application
    Filed: November 14, 2013
    Publication date: September 18, 2014
    Applicant: International Business Machines Corporation
    Inventors: Susann M. Keohane, Shawn P. Mullen, Jessica C. Murillo, Gerald F. McBrearty, Johnny M. Shieh
  • Publication number: 20140267337
    Abstract: An approach is provided in which a source entity generates scene fill metadata corresponding to scene transition points included in media content. The scene fill metadata includes a “required buffer amount,” which indicates an amount of the media content for which a destination entity should buffer prior to displaying one or more upcoming scenes. In turn, the source entity provides the scene fill metadata to a destination entity.
    Type: Application
    Filed: September 15, 2013
    Publication date: September 18, 2014
    Applicant: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gerald F. McBreartry, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Publication number: 20140282690
    Abstract: An approach is provided in which a source entity generates scene fill metadata corresponding to scene transition points included in media content. The scene fill metadata includes a “required buffer amount,” which indicates an amount of the media content for which a destination entity should buffer prior to displaying one or more upcoming scenes. In turn, the source entity provides the scene fill metadata to a destination entity.
    Type: Application
    Filed: March 12, 2013
    Publication date: September 18, 2014
    Applicant: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gerald F. McBreartry, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Publication number: 20140194104
    Abstract: Embodiments of the invention relate to management of notifications responsive to the arrival and departure of mobile devices in a defined area. A prioritized list is shared among mobile devices in a defined area. Upon detection, mobile devices add their respective selected notifications to the prioritized list. A mobile device entering the defined area receives the prioritized list and in response to detecting a shared selected notification on the prioritized list, one of the mobile devices in the area changes its selected notification to an alternative notification. A second mobile device entering the defined area would likewise receive the prioritized list and change its selected notification to a second alternative notification responsive to a shared selected notification on the list. At such time as a device leaves the area, the list is again updated and all notifications exclusive to the device are removed from the list.
    Type: Application
    Filed: October 30, 2013
    Publication date: July 10, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Publication number: 20140194101
    Abstract: Embodiments of the invention relate to management of notifications responsive to the arrival and departure of mobile devices in a defined area. A prioritized list is shared among mobile devices in a defined area. Upon detection, mobile devices add their respective selected notifications to the prioritized list. A mobile device entering the defined area receives the prioritized list and in response to detecting a shared selected notification on the prioritized list, one of the mobile devices in the area changes its selected notification to an alternative notification. A second mobile device entering the defined area would likewise receive the prioritized list and change its selected notification to a second alternative notification responsive to a shared selected notification on the list. At such time as a device leaves the area, the list is again updated and all notifications exclusive to the device are removed from the list.
    Type: Application
    Filed: January 9, 2013
    Publication date: July 10, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Publication number: 20140173598
    Abstract: Attesting a virtual machine that is migrating from a first environment to a second environment includes in response to initiation of migration of the virtual machine from the first environment to the second environment, accessing one or more stored trust values generated during the trusted boot of the virtual machine in the first environment, determining if the accessed trust values define a security setting sufficient for the second environment, and if the accessed trust values do not define a security setting sufficient for the second environment, performing a predetermined action in relation to the migration of the virtual machine to the second environment.
    Type: Application
    Filed: February 28, 2013
    Publication date: June 19, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: DAVID Haikney, Shawn P. Mullen, James W. Walker
  • Patent number: 8725874
    Abstract: The ideal client-server for a collaborative application in a client-server network environment is dynamically determined. An Ideal Server utility compares the capabilities of the computer system of an entering client with the computer system of the current client-server to determine which system is best equipped to control the execution of the application. Whenever a new client enters/participates in the application session, the Ideal Server utility evaluates the system capabilities of the new client (the candidate client-server) and compares the new client's system capabilities with the system capabilities of the current client-server. If the new client possesses better capabilities than the current client-server, the new client is provided the role of the client-server. A transfer of the application to the candidate client-server is initiated. Once the transfer is completed, the application resumes processing on the new client-server.
    Type: Grant
    Filed: September 27, 2007
    Date of Patent: May 13, 2014
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Patent number: 8626852
    Abstract: A computer system can implement a mechanism for email thread monitoring and automatic forwarding of related email messages. In one embodiment, a first email message is provided from an email application of a computer system to a plurality of email addresses. An indication is detected, at the email application, that a first email address of the plurality of email addresses is to be provided a copy of subsequent email messages associated with the first email message. Subsequent email messages received at, and transmitted by, the email application are monitored to determine whether one or more of the subsequent email messages are associated with the first email message. In response to determining that a second email message from the subsequent email messages is associated with the first email message, a copy of the second email message is automatically provided to the first email address of the plurality of email addresses.
    Type: Grant
    Filed: October 29, 2010
    Date of Patent: January 7, 2014
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica K. Murillo, Johnny M. Shieh
  • Publication number: 20140006801
    Abstract: Provided are techniques for encrypting a resource associated with an application with a first key; generating, at an install time of the application, a first hash code for an executable daemon associated with the application; encrypting the first key with the first hash code to produce a protected first key; generating, at a load time of an application, a second hash code for the executable daemon; deriving the first key by decrypting the protected first key using the second hash code to produce a derived first key; and accessing the resource by the executable daemon by employing the derived first key.
    Type: Application
    Filed: April 24, 2013
    Publication date: January 2, 2014
    Applicant: International Business Machines Corporation
    Inventors: Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Publication number: 20140006079
    Abstract: Methods, systems, and computer program products may schedule viewing of a recorded event. The method may include receiving, by an electronic apparatus, an electronic request for an invitee to attend an event that will be recorded, and determining, by the electronic apparatus, that the invitee cannot attend the event. The method may additionally include determining, by the electronic apparatus, one or more open time intervals on an electronic calendar of the invitee to view a recording of the event, and selecting, by the electronic apparatus, at least one open time interval from the determined one or more open time intervals. The method may further include scheduling, by the electronic apparatus, viewing of the recording during the selected open time interval on the electronic calendar.
    Type: Application
    Filed: June 28, 2012
    Publication date: January 2, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susann M. Keohane, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Patent number: 8621052
    Abstract: A mechanism is provided for performance tuning for software as a performance level service. At the request of a customer, a cloud provider may use a performance tuning component to determine performance parameters to increase performance of an application running on a given hardware platform. The cloud provider may then generate a tuning configuration and associate the tuning configuration with the customer such that when the cloud provider deploys a customer's software to a partition in a host system, the cloud provider sends the tuning configuration with the deployment package. The performance tuning component at the host system then applies the performance parameters in the tuning configuration to increase performance.
    Type: Grant
    Filed: August 20, 2010
    Date of Patent: December 31, 2013
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Patent number: 8515995
    Abstract: A multiending controller within a network detects a URL entry including at least a portion of a particular domain name. The multiending controller automatically selects multiple possible domain names for at least said portion of said particular domain name, wherein each of the multiple possible domain names includes a separate one of multiple ending types available for a domain. The multiending controller directs output of the multiple possible domain names for selection by a user.
    Type: Grant
    Filed: March 28, 2012
    Date of Patent: August 20, 2013
    Assignee: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica Murillo, Johnny M. Shieh
  • Patent number: 8494167
    Abstract: The present invention provides a computer implemented method, data processing system, and computer program product to restore an encrypted file. A computer receives a command to restore an encrypted file, wherein the encrypted file was previously backed up. The computer identifies a user associated with the encrypted file. The computer looks up a first keystore of the user based on the user, the first keystore having an active private key. The computer determines that a public key of the encrypted file fails to match an active public key of the first keystore. The computer restores a second keystore of the user to form a restored private key, wherein the second keystore was previously backed up. The computer responsive to a determination that the public key of the encrypted file fails to match the active public key of the first keystore, decrypts the encrypted file encryption key based on the restored private key to form a file encryption key.
    Type: Grant
    Filed: October 30, 2007
    Date of Patent: July 23, 2013
    Assignee: International Business Machines Corporation
    Inventors: Neeta Garimella, Alexei Kojenov, Shawn P. Mullen, Ravi A. Shankar, John Viksne
  • Publication number: 20130179203
    Abstract: A method for restricting access to project data includes determining that a user has failed to indicate an intention to attend a meeting by failing to respond to a meeting notice or by indicating that the user will not participate in the meeting. The meeting notice includes an invitation sent electronically to the user to attend a meeting, and the user has electronic access to data by way of permissions associated with a user account assigned to the user. The meeting is related to the data. The method includes recording a failure-to-attend event in response to determining that the user has failed to indicate an intention to attend a meeting. The method includes blocking the user from accessing the user account in response to a quantity of failure-to-attend events reaching non-attendance criteria.
    Type: Application
    Filed: January 9, 2012
    Publication date: July 11, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
  • Publication number: 20130179260
    Abstract: Embodiments of the invention relate to dynamic assessment of a prior purchase pattern to predict a future purchase. The prior purchase pattern is tracked and mapped to a geographic position system. Based upon a current physical location or a known future location, both a future purchase and purchase location are ascertained and communicated to a mobile device in communication with the geographic position system.
    Type: Application
    Filed: January 9, 2012
    Publication date: July 11, 2013
    Applicant: International Business Machines Corporation
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh