Patents by Inventor Shawn Patrick Mullen

Shawn Patrick Mullen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7512659
    Abstract: A system, method, and computer program product for managing e-mail and real-time messaging activity between a first client and a second client. In accordance with one embodiment, the method includes the first or second client detecting an nth e-mail thread response to an original e-mail message delivered between the first client and second client, wherein n is greater than or equal to one. In response to detecting occurrence of an nth e-mail thread response, a real-time electronic messaging session is invoked between the first and second clients. In an alternate embodiment of the invention, the first client sends a real-time message to the second client during a real-time messaging session between the first and second clients. In response to a specified real-time messaging session termination event, an e-mail message containing the sent real-time message is sent to the second client.
    Type: Grant
    Filed: December 16, 2004
    Date of Patent: March 31, 2009
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Murillo, Johnny Meng-Han Shieh
  • Patent number: 7512887
    Abstract: A method of creating multiple, alternative presentations within a single electronic presentation, by assigning one or more presentation constraint parameters to the electronic slides, and generating a sequence for presenting less than all of the electronic slides based on the presentation constraint parameters. Different sequences can be generated using different presentation constraint parameters that are assigned to the electronic slides. For example, a first electronic slide could be included in a first sequence, and a second electronic slide (or multiple slides) can be substituted for the first electronic slide in a second sequence. A sequence can be generated by adjusting a scalable constraint associated with the presentation constraint parameters to determine which electronic slides to include. The presentation constraint parameters can include a time factor and a content level.
    Type: Grant
    Filed: July 22, 2004
    Date of Patent: March 31, 2009
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Kelley Murillo, Johnny Meng-Han Shieh
  • Patent number: 7512790
    Abstract: Files, such as HTML files, are managed by performing a permitted command or action initiated on a current file on all its co-requisite files as identified in an extended attribute field stored within the current file. Thus, when an HTML file is emailed or transferred, all requisite files necessary to properly render the web page at the client are assured to be sent. The extended attribute field indicates the parent-child relationship of the co-requisite files and only performs the action on child files. The extended attribute field within the current file also indicates the actions that can be performed on each of its co-requisite files.
    Type: Grant
    Filed: April 17, 2003
    Date of Patent: March 31, 2009
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Kelley Murillo, Johnny Meng-Han Shieh
  • Publication number: 20090077631
    Abstract: A computer implemented method of allowing a device access to a network in a trusted network connect environment. Responsive to receiving a request from the device to access the network, a type of the device is determined. Responsive to determining the type of the device, a policy for the device is determined based on the type of the device. Responsive to determining the policy for the device based on the type of the device, determining whether an integrity of the device satisfies the policy. Responsive to determining that the device does not satisfy the policy, performing a remediation action on the device. Responsive to determining that the device satisfies the policy, allowing the device access to the network.
    Type: Application
    Filed: September 13, 2007
    Publication date: March 19, 2009
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
  • Publication number: 20090077468
    Abstract: A method of communicating with a remote site on a network by establishing different user personas respectively associated with different remote sites on the network, each user persona containing one or more attributes used in accessing the remote sites, and then accessing a specific one of the remote sites using the attributes in a specific one of the user personas that is associated with the specific remote site. The specific remote site can be associated with the specific user persona by a universal resource locator (URL), e.g., for web sites on the Internet, and the accessing is automatically performed in response to matching of the URL of the specific remote site to the URL associated with the specific user persona. A default persona can be used for any remote site having no specifically associated user persona.
    Type: Application
    Filed: September 9, 2008
    Publication date: March 19, 2009
    Inventors: Neal Richard Marion, Shawn Patrick Mullen, George F. Ramsay, III, James Stanley Tesauro
  • Patent number: 7506023
    Abstract: A system, apparatus and method that relate a real-time clock of a first computer system to a real-time clock of a second computer system are provided. When the first computer system is using files created by the second computer system, it requests that the second computer provides its current local time. The first computer records the time of the request, the time the response to the request is received as well as the requested current local time. Using these different recorded times, the first computer is able to compute a time difference (if any) between its real-time clock and the real-time clock of the second computer system.
    Type: Grant
    Filed: June 13, 2002
    Date of Patent: March 17, 2009
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Kelley Murillo, Johnny Meng-Han Shieh
  • Publication number: 20090070591
    Abstract: A mechanism for mutual authorization of a secondary resource in a grid of resource computers is provided. When a primary resource attempts to offload a grid computing job to a secondary resource, the primary resource sends a proxy certificate request to the user machine. Responsive to a proxy certificate request, the user machine performs authorization with the secondary resource. If authorization with the secondary resource is successful, the user machine generates and returns a valid proxy certificate. The primary resource then performs mutual authentication with the secondary resource. If the authorization with the secondary resource fails, the user machine generates and returns an invalid proxy certificate. Mutual authentication between the primary resource and the secondary resource will fail due to the invalid proxy certificate. The primary resource then selects another secondary resource and repeats the process until a resource is found that passes the mutual authorization with the user machine.
    Type: Application
    Filed: November 7, 2008
    Publication date: March 12, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica-Kelley Murillo, Johnny Meng-Han Shieh
  • Publication number: 20090063684
    Abstract: Responding to an event at a server that supports workload partitions. An event is detected. The event is an activity that can degrade an ability of the server to function according to an intended purpose. The event is triggered by a communication from a client to the server. Responsive to detecting the event, a connection of the client to the server is temporarily suspended. A first workload partition is created. The connection is re-established between the client and the server. Responsive to re-establishing the connection, all data is routed from the client to the first workload partition. In an illustrative example, the event is allowed to continue on the first workload partition while forensic data is collected on the event.
    Type: Application
    Filed: August 31, 2007
    Publication date: March 5, 2009
    Inventors: Christopher Ray Ingram, Shawn Patrick Mullen
  • Publication number: 20090063801
    Abstract: Exemplary methods, systems, and products are described that operate generally by moving subroutine return address protection to the processor itself, in effect proving atomic locks for subroutine return addresses stored in a stack, subject to application control. More particularly, exemplary methods, systems, and products are described that write protect subroutine return addresses by calling a subroutine, including storing in a stack memory address a subroutine return address and locking, by a computer processor, the stack memory address against write access. Calling a subroutine may include receiving in the computer processor an instruction to lock the stack memory address. Locking the stack memory address may be carried out by storing the stack memory address in a protected memory lockword. A protected memory lockword may be implemented as a portion of a protected content addressable memory.
    Type: Application
    Filed: November 3, 2008
    Publication date: March 5, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINESS CORPORATION
    Inventors: Denise MARIE Genty, Shawn Patrick Mullen, James Stanley Tesauro
  • Publication number: 20090063610
    Abstract: A user inputs event information into a data processing system which is stored in an application memory of an application. Message information contained in each incoming message received by a messaging service is compared to the event information. In the event that the message information corresponds to the event information a notification of the event is sent to a short-range wireless transmitter. The wireless transmitter transmits notification of the event to a remote receiver. Upon receipt of the wireless signal, the remote receiver triggers an alert notification notifying the user that data processing system has received the specified event.
    Type: Application
    Filed: August 27, 2007
    Publication date: March 5, 2009
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
  • Patent number: 7499988
    Abstract: A method and system for providing storage area network SAN level boot/installation services for appliances on a SAN. A generic maintenance “bootlv” is mirrored on at least one disk (or set of disks) that are located out on the SAN. The disk(s) are encoded with similar boot functions as a conventional boot CD. The disk(s) provides physical storage for a volume group that has the base install images and all of the optional Programming Product (OPP) images selected by the system administrator to be included in the install volume group. In one embodiment, a volume group made up of several disks is able to boot up and run from any one of the several disks since the bootlv is mirrored/copied on each of the disks.
    Type: Grant
    Filed: October 16, 2003
    Date of Patent: March 3, 2009
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Kelley Murillo, Johnny Meng-Han Shieh
  • Patent number: 7496755
    Abstract: A user device initiates a network access authentication operation via a network access device with a network access authentication server, e.g., a Remote Authentication Dial-In User Service (RADIUS) server, which also generates an X.509 proxy certificate and includes the proxy certificate with the information, such as a set of network access parameters, that is returned to the user device in response to a successful completion of the network access authentication operation. The user device extracts and stores the proxy certificate. The network access parameters are used by the user device to communicate via the network access device on a network, which supports a grid. When the user device accesses a resource in the grid, the proxy certificate is already available, thereby obviating the need to generate a new proxy certificate and allowing a user of the user device to experience an integrated single-sign-on for network access and grid access.
    Type: Grant
    Filed: July 1, 2003
    Date of Patent: February 24, 2009
    Assignee: International Business Machines Corporation
    Inventors: Denise Marie Genty, Shawn Patrick Mullen
  • Patent number: 7496847
    Abstract: Displaying a computer resource through a preferred browser, including invoking a URL that identifies a computer resource; identifying, among a plurality of available browsers, a preferred browser for the resource; and displaying the resource through the preferred browser. Typical embodiments also include storing the URL in association with an identification of the preferred browser. In such embodiments, identifying a preferred browser for the resource also includes identifying the preferred browser in dependence upon the URL. Identifying the preferred browser may include requesting the resource through a default browser and receiving the resource in the default browser, the resource having meta-data comprising an identification of the preferred browser. Such embodiments also typically include storing the URL in association with the identification of the preferred browser.
    Type: Grant
    Filed: April 29, 2004
    Date of Patent: February 24, 2009
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Koehane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Murillo, Johnny Meng-Han Shieh
  • Patent number: 7493358
    Abstract: An apparatus, system and method of executing a monolithic application program successfully on a grid computing system are provided. Before the program is executed on the grid computing system, the program is executed on a computer on which the program has previously been successfully executed. During its execution, the program is monitored to collect its runtime information. The runtime information is provided to the grid computing system. With this information the grid computing system is able to successfully execute the program.
    Type: Grant
    Filed: September 18, 2003
    Date of Patent: February 17, 2009
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Murillo, Johnny Meng-Han Shieh
  • Patent number: 7490763
    Abstract: An application for disabling the use of selected applications is provided. A server receives identification information from a user. The location of the user is determined. If the user is determined to be in a reserved location, the use of one or more applications is disabled, for the user.
    Type: Grant
    Filed: August 4, 2005
    Date of Patent: February 17, 2009
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Murillo, Johnny Meng-Han Shieh
  • Patent number: 7483526
    Abstract: A method for using a centralized conference call manager is provided for initiating conference calls. Users register with the centralized conference call manager to set up a conference call at a future date and time. When the designated time/date arrive, the centralized conference call manager contacts the various intended attendees using a variety of contact locations (e.g., office telephone, mobile telephone, home telephone, etc.). The system further allows an intended attendee to, when contacted by the centralized conference call manager, provide a different contact number that the conference call manager will use instead. An anticipated attendee can decline the call and provide a verbal reason for not being able to attend. The centralized conference call manager records the reason and, when requested, plays the reason back to the other attendees.
    Type: Grant
    Filed: June 10, 2004
    Date of Patent: January 27, 2009
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Kelley Murillo, Johnny Meng-Han Shieh
  • Publication number: 20090007277
    Abstract: The present invention provides a system and method for automatically hiding sensitive information, obtainable from a process table, from other processes that should not access the sensitive information. The system and method include a sensitive command attribute table that is used by a system administrator to designate the commands and command attributes that will typically be associated with sensitive information. The sensitive command attribute table is used when a command is entered that requests information from the process table to be displayed or output. In response, a search of the process table entries is made to determine if a command and/or its attribute in the process table matches an entry in the sensitive command attribute table. If so, the command, its attributes, and/or its attribute values are blanked from the output of the process table information.
    Type: Application
    Filed: May 22, 2008
    Publication date: January 1, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Denise Marie Genty, Shawn Patrick Mullen, James Stanley Tesauro
  • Patent number: 7467272
    Abstract: Exemplary methods, systems, and products are described that operate generally by moving subroutine return address protection to the processor itself, in effect proving atomic locks for subroutine return addresses stored in a stack, subject to application control. More particularly, exemplary methods, systems, and products are described that write protect subroutine return addresses by calling a subroutine, including storing in a stack memory address a subroutine return address and locking, by a computer processor, the stack memory address against write access. Calling a subroutine may include receiving in the computer processor an instruction to lock the stack memory address. Locking the stack memory address may be carried out by storing the stack memory address in a protected memory lockword. A protected memory lockword may be implemented as a portion of a protected content addressable memory.
    Type: Grant
    Filed: December 16, 2004
    Date of Patent: December 16, 2008
    Assignee: International Business Machines Corporation
    Inventors: Denise Marie Genty, Shawn Patrick Mullen, James Stanley Tesauro
  • Patent number: 7467303
    Abstract: A method for mutual authorization of a secondary resource in a grid of resource computers is provided. When a primary resource attempts to offload a grid computing job to a secondary resource, the primary resource sends a proxy certificate request to the user machine. Responsive to a proxy certificate request, the user machine performs authorization with the secondary resource. If authorization with the secondary resource is successful, the user machine generates and returns a valid proxy certificate. The primary resource then performs mutual authentication with the secondary resource. If the authorization with the secondary resource fails, the user machine generates and returns an invalid proxy certificate. Mutual authentication between the primary resource and the secondary resource will fail due to the invalid proxy certificate. The primary resource then selects another secondary resource and repeats the process until a resource is found that passes the mutual authorization with the user machine.
    Type: Grant
    Filed: March 25, 2004
    Date of Patent: December 16, 2008
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Kelley Murillo, Johnny Meng-Han Shieh
  • Publication number: 20080306997
    Abstract: A computer implemented method, apparatus, and computer usable program code for managing calendar conflicts. A plurality of calendar invitations waiting to be processed is identified to form a plurality of unprocessed calendar invitations. Calendar invitations are grouped within the plurality of unprocessed calendar invitations together that conflict with each other to form a group of conflicting calendar invitations. Each conflicting calendar invitation in the group of conflicting calendar invitations is presented in association with other calendar invitations in the group for resolution.
    Type: Application
    Filed: June 8, 2007
    Publication date: December 11, 2008
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh