Patents by Inventor Susann M. Keohane
Susann M. Keohane has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9098625Abstract: Tracing of the interaction of third party processes on resources used by a program under trace is performed. A viral tag is associated with the program under trace. When the program “touches” a portion of memory, the memory manager associates the viral tag with the memory locations in this portion of memory. When subsequent processes “touch” the tagged memory locations, they acquire the viral tag and then spread it to other memory locations that these subsequent processes touch. The viral tag may be slightly modified so as to identify it as being based on the original viral tag but having been acquired by another process. Each time the viral tag is spread to another program, the viral tag may be slightly modified to indicate that the viral tag is now associated with another entity although is still associated with the original viral tag.Type: GrantFiled: February 29, 2008Date of Patent: August 4, 2015Assignee: International Business Machines CorporationInventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Patent number: 9098532Abstract: Mechanisms are provided for generating alternative text descriptions for images in electronic documents. An original image embedded in an electronic document is analyzed to generate a data pattern for the image. A matching operation is performed to identify similar images in other electronic documents from sources of electronic documents based on the generated data pattern. Textual description information associated with the similar images is extracted from data associated with the similar image. An alternative text description for the original image is generated based on the extracted textual description information associated with the similar images. The alternative text description for the original image is stored in association with the original image.Type: GrantFiled: November 29, 2012Date of Patent: August 4, 2015Assignee: International Business Machines CorporationInventors: Brian J. Cragun, Marc K. Johlic, Susann M. Keohane
-
Publication number: 20150169894Abstract: A method of storing a data object received from a network is described. An encrypted data object encrypted with a first encryption key is received. It is determined whether the encrypted data object is to be stored in an encrypted file system that requires encryption of a data object with a second encryption key. The first encryption key is encrypted with a third encryption key when it is determined the encrypted data object is to be stored in the encrypted file system. The first encryption key is attached to the encrypted data object. The data object encrypted by the first encryption key is stored in the encrypted file system.Type: ApplicationFiled: December 13, 2013Publication date: June 18, 2015Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Susann M. Keohane, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Publication number: 20150150147Abstract: A computer encrypts only a restricted tag element from among a plurality of content elements to be electronically published as a message for access by a plurality of users, wherein decryption of the encrypted restricted tag element is limited to a selection of at least one user from among the plurality of users. The computer outputs the plurality of content elements for electronic publication through an interface accessible to the plurality of users, wherein the plurality of users are enabled to access the plurality of content elements of the message published through the interface, wherein only the selection of at least one user is enabled to decrypt the encrypted restricted tag element in the plurality of content elements to access the underlying restricted tag element within the message published through the interface.Type: ApplicationFiled: November 26, 2013Publication date: May 28, 2015Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: SUSANN M. KEOHANE, GERALD F. MCBREARTY, JESSICA C. MURILLO, JOHNNY M. SHIEH
-
Patent number: 9043882Abstract: Embodiments relate to administering access to a wireless network by detecting a connective proximity of a device to the network, determining that the device is an authorized device based on information, connecting the authorized device to the network, and causing the connection of the authorized device to the network to be provided as an output status.Type: GrantFiled: May 2, 2013Date of Patent: May 26, 2015Assignee: International Business Machines CorporationInventors: Susann M. Keohane, Jessica C. Murillo, Johnny M. Shieh
-
Publication number: 20150127665Abstract: A mechanism is provided in a data processing system for personalized quantitative measure of accessibility. For a given web site or web application, the mechanism accesses existing crowd sourced user ratings. The mechanism generates a crowd source score for the given web site or web application based on the crowd sourced user ratings. The mechanism generates a compliance score for the given web site or web application based on compliance data published for the given web site or web application. The mechanism obtains a static analysis score for the given web site or web application. The mechanism generates weights for a given user based on user profile information of the given user and applies the weights to the crowd source score, the compliance score, and the static analysis score to form weighted data. The mechanism generates a personalized accessibility score based on the weighted data.Type: ApplicationFiled: November 6, 2013Publication date: May 7, 2015Applicant: International Business Machines CorporationInventors: Susann M. Keohane, Maureen E. Kraft, Holly L. Nielsen, Shunguo Yan
-
Publication number: 20150071620Abstract: Each data integrity value, from among a plurality of data integrity values each associated with a separate unit of a program comprising a plurality of units, is checked against a separate recorded portion of a recording of the program corresponding to one of the plurality of units, wherein the recording of the program is recorded from a broadcast of the program. Responsive to a particular data integrity value from among the plurality of data integrity values not matching when checked against a particular separate recorded portion of the program corresponding to a particular unit from among the plurality of units, the recording is corrected by replacing only the particular separate recorded portion of the program from a second recording of only the particular unit from a subsequent broadcast of the program.Type: ApplicationFiled: December 6, 2013Publication date: March 12, 2015Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: SUSANN M. KEOHANE, SHAWN P. MULLEN, JESSICA C. MURILLO, JOHNNY M. SHIEH
-
Publication number: 20150071611Abstract: Each data integrity value, from among a plurality of data integrity values each associated with a separate unit of a program comprising a plurality of units, is checked against a separate recorded portion of a recording of the program corresponding to one of the plurality of units, wherein the recording of the program is recorded from a broadcast of the program. Responsive to a particular data integrity value from among the plurality of data integrity values not matching when checked against a particular separate recorded portion of the program corresponding to a particular unit from among the plurality of units, the recording is corrected by replacing only the particular separate recorded portion of the program from a second recording of only the particular unit from a subsequent broadcast of the program.Type: ApplicationFiled: September 9, 2013Publication date: March 12, 2015Applicant: International Business Machines CorporationInventors: SUSANN M. KEOHANE, SHAWN P. MULLEN, JESSICA C. MURILLO, JOHNNY M. SHIEH
-
Publication number: 20140331284Abstract: Embodiments relate to administering access to a wireless network by detecting a connective proximity of a device to the network, determining that the device is an authorized device based on information, connecting the authorized device to the network, and causing the connection of the authorized device to the network to be provided as an output status.Type: ApplicationFiled: May 2, 2013Publication date: November 6, 2014Inventors: Susann M. Keohane, Jessica C. Murillo, Johnny M. Shieh
-
Publication number: 20140282079Abstract: A difference between a source email message and at least one target email message is determined and then displayed in a popup window. A first selected message in a message thread is designated as a source message. The thread is searched for a target message that comprises a next oldest message in the thread. Identifying data in the source message is compared to identifying data in the target message for generating difference data. Content of both the source message and target message is also compared. A popup window is generated over the target message and the content difference is displayed in the popup window.Type: ApplicationFiled: March 12, 2013Publication date: September 18, 2014Applicant: International Business Machines CorporationInventors: Susann M. Keohane, Shawn P. Mullen, Jessica C. Murillo, Gerald F. McBrearty, Johnny M. Shieh
-
Publication number: 20140282690Abstract: An approach is provided in which a source entity generates scene fill metadata corresponding to scene transition points included in media content. The scene fill metadata includes a “required buffer amount,” which indicates an amount of the media content for which a destination entity should buffer prior to displaying one or more upcoming scenes. In turn, the source entity provides the scene fill metadata to a destination entity.Type: ApplicationFiled: March 12, 2013Publication date: September 18, 2014Applicant: International Business Machines CorporationInventors: Susann M. Keohane, Gerald F. McBreartry, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Publication number: 20140267337Abstract: An approach is provided in which a source entity generates scene fill metadata corresponding to scene transition points included in media content. The scene fill metadata includes a “required buffer amount,” which indicates an amount of the media content for which a destination entity should buffer prior to displaying one or more upcoming scenes. In turn, the source entity provides the scene fill metadata to a destination entity.Type: ApplicationFiled: September 15, 2013Publication date: September 18, 2014Applicant: International Business Machines CorporationInventors: Susann M. Keohane, Gerald F. McBreartry, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Publication number: 20140280640Abstract: A difference between a source email message and at least one target email message is determined and then displayed in a popup window. A first selected message in a message thread is designated as a source message. The thread is searched for a target message that comprises a next oldest message in the thread. Identifying data in the source message is compared to identifying data in the target message for generating difference data. Content of both the source message and target message is also compared. A popup window is generated over the target message and the content difference is displayed in the popup window.Type: ApplicationFiled: November 14, 2013Publication date: September 18, 2014Applicant: International Business Machines CorporationInventors: Susann M. Keohane, Shawn P. Mullen, Jessica C. Murillo, Gerald F. McBrearty, Johnny M. Shieh
-
Publication number: 20140146053Abstract: Mechanisms are provided for generating alternative text descriptions for images in electronic documents. An original image embedded in an electronic document is analyzed to generate a data pattern for the image. A matching operation is performed to identify similar images in other electronic documents from sources of electronic documents based on the generated data pattern. Textual description information associated with the similar images is extracted from data associated with the similar image. An alternative text description for the original image is generated based on the extracted textual description information associated with the similar images. The alternative text description for the original image is stored in association with the original image.Type: ApplicationFiled: November 29, 2012Publication date: May 29, 2014Applicant: International Business Machines CorporationInventors: Brian J. Cragun, Marc K. Johlic, Susann M. Keohane
-
Patent number: 8725874Abstract: The ideal client-server for a collaborative application in a client-server network environment is dynamically determined. An Ideal Server utility compares the capabilities of the computer system of an entering client with the computer system of the current client-server to determine which system is best equipped to control the execution of the application. Whenever a new client enters/participates in the application session, the Ideal Server utility evaluates the system capabilities of the new client (the candidate client-server) and compares the new client's system capabilities with the system capabilities of the current client-server. If the new client possesses better capabilities than the current client-server, the new client is provided the role of the client-server. A transfer of the application to the candidate client-server is initiated. Once the transfer is completed, the application resumes processing on the new client-server.Type: GrantFiled: September 27, 2007Date of Patent: May 13, 2014Assignee: International Business Machines CorporationInventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Patent number: 8626852Abstract: A computer system can implement a mechanism for email thread monitoring and automatic forwarding of related email messages. In one embodiment, a first email message is provided from an email application of a computer system to a plurality of email addresses. An indication is detected, at the email application, that a first email address of the plurality of email addresses is to be provided a copy of subsequent email messages associated with the first email message. Subsequent email messages received at, and transmitted by, the email application are monitored to determine whether one or more of the subsequent email messages are associated with the first email message. In response to determining that a second email message from the subsequent email messages is associated with the first email message, a copy of the second email message is automatically provided to the first email address of the plurality of email addresses.Type: GrantFiled: October 29, 2010Date of Patent: January 7, 2014Assignee: International Business Machines CorporationInventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica K. Murillo, Johnny M. Shieh
-
Publication number: 20140006079Abstract: Methods, systems, and computer program products may schedule viewing of a recorded event. The method may include receiving, by an electronic apparatus, an electronic request for an invitee to attend an event that will be recorded, and determining, by the electronic apparatus, that the invitee cannot attend the event. The method may additionally include determining, by the electronic apparatus, one or more open time intervals on an electronic calendar of the invitee to view a recording of the event, and selecting, by the electronic apparatus, at least one open time interval from the determined one or more open time intervals. The method may further include scheduling, by the electronic apparatus, viewing of the recording during the selected open time interval on the electronic calendar.Type: ApplicationFiled: June 28, 2012Publication date: January 2, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Susann M. Keohane, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Patent number: 8621052Abstract: A mechanism is provided for performance tuning for software as a performance level service. At the request of a customer, a cloud provider may use a performance tuning component to determine performance parameters to increase performance of an application running on a given hardware platform. The cloud provider may then generate a tuning configuration and associate the tuning configuration with the customer such that when the cloud provider deploys a customer's software to a partition in a host system, the cloud provider sends the tuning configuration with the deployment package. The performance tuning component at the host system then applies the performance parameters in the tuning configuration to increase performance.Type: GrantFiled: August 20, 2010Date of Patent: December 31, 2013Assignee: International Business Machines CorporationInventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Patent number: 8515995Abstract: A multiending controller within a network detects a URL entry including at least a portion of a particular domain name. The multiending controller automatically selects multiple possible domain names for at least said portion of said particular domain name, wherein each of the multiple possible domain names includes a separate one of multiple ending types available for a domain. The multiending controller directs output of the multiple possible domain names for selection by a user.Type: GrantFiled: March 28, 2012Date of Patent: August 20, 2013Assignee: International Business Machines CorporationInventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica Murillo, Johnny M. Shieh
-
Publication number: 20130179260Abstract: Embodiments of the invention relate to dynamic assessment of a prior purchase pattern to predict a future purchase. The prior purchase pattern is tracked and mapped to a geographic position system. Based upon a current physical location or a known future location, both a future purchase and purchase location are ascertained and communicated to a mobile device in communication with the geographic position system.Type: ApplicationFiled: January 9, 2012Publication date: July 11, 2013Applicant: International Business Machines CorporationInventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh