Patents by Inventor Susann M. Keohane
Susann M. Keohane has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8271056Abstract: A battery conservation component synchronizes with a user's schedule or calendar. The battery conservation component may disable functions or features to ensure that the device has sufficient battery life for selected calendar events. The battery conservation component may warn the user if a battery charge is necessary to make selected calendar events. The battery conservation component may be applied to a wide variety of portable devices with time-sensitive events. For example, the battery conservation component may be applied to a device with vehicle navigation and estimate time-sensitive events based on waypoints in the vehicle's route. The battery conservation component may synchronize with a user's travel itinerary. Alternatively, the battery conservation component may suggest alternative functions or features based on a time-sensitive event, such as suggesting a shorter movie on a flight or road trip.Type: GrantFiled: January 17, 2008Date of Patent: September 18, 2012Assignee: International Business Machines CorporationInventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Patent number: 8271268Abstract: A method, system and computer-readable medium for generating, caching and transmitting textual equivalents of information contained in an audio signal are presented. The method includes generating a textual equivalent of at least a portion of a speech-based audio signal in one device into a textual equivalent, storing a portion of the textual equivalent in first device's memory and transmitting the stored textual equivalent to a another device.Type: GrantFiled: April 18, 2007Date of Patent: September 18, 2012Assignee: Nuance Communications, Inc.Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny Meng-Han Shieh
-
Publication number: 20120222113Abstract: Provided are techniques for to enable a virtual input/output server (VIOS) to establish cryptographically secure signals with target LPARs to detect an imposter or spoofing LPAR. The secure signal, or “heartbeat,” may be configured as an Internet Key Exchange/Internet Protocol Security (IKE/IPSec) encapsulated packet (ESP) connection or tunnel. Within the tunnel, the VIOS pings each target LPAR and, if a heartbeat is interrupted, the VIOS makes a determination as to whether the tunnel is broken, the corresponding LPAR is down or a media access control (MAC) spoofing attach is occurring. The determination is made by sending a heartbeat that is designed to fail unless the heartbeat is received by a spoofing device.Type: ApplicationFiled: May 8, 2012Publication date: August 30, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Publication number: 20120185609Abstract: A multiending controller within a network detects a URL entry including at least a portion of a particular domain name. The multiending controller automatically selects multiple possible domain names for at least said portion of said particular domain name, wherein each of the multiple possible domain names includes a separate one of multiple ending types available for a domain. The multiending controller directs output of the multiple possible domain names for selection by a user.Type: ApplicationFiled: March 28, 2012Publication date: July 19, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica Murillo, Johnny M. Shieh
-
Patent number: 8200696Abstract: A domain name system (DNS) resolver within a network detects a URL entry including at least a portion of a particular domain name. The DNS resolver automatically selects multiple possible domain names for at least said portion of said particular domain name, wherein each of the multiple possible domain names includes a separate one of multiple ending types available for a domain. The multiending controller directs concurrent output of a separate selectable thumbnail representation of a separate webpage accessible from each of the selection of multiple possible domain names within an interface of a browser.Type: GrantFiled: May 26, 2005Date of Patent: June 12, 2012Assignee: International Business Machines CorporationInventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica Murillo, Johnny M. Shieh
-
Publication number: 20120110092Abstract: A computer system can implement a mechanism for email thread monitoring and automatic forwarding of related email messages. In one embodiment, a first email message is provided from an email application of a computer system to a plurality of email addresses. An indication is detected, at the email application, that a first email address of the plurality of email addresses is to be provided a copy of subsequent email messages associated with the first email message. Subsequent email messages received at, and transmitted by, the email application are monitored to determine whether one or more of the subsequent email messages are associated with the first email message. In response to determining that a second email message from the subsequent email messages is associated with the first email message, a copy of the second email message is automatically provided to the first email address of the plurality of email addresses.Type: ApplicationFiled: October 29, 2010Publication date: May 3, 2012Applicant: International Business Machines CorporationInventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica K. Murillo, Johnny M. Shieh
-
Publication number: 20120047240Abstract: A mechanism is provided for performance tuning for software as a performance level service. At the request of a customer, a cloud provider may use a performance tuning component to determine performance parameters to increase performance of an application running on a given hardware platform. The cloud provider may then generate a tuning configuration and associate the tuning configuration with the customer such that when the cloud provider deploys a customer's software to a partition in a host system, the cloud provider sends the tuning configuration with the deployment package. The performance tuning component at the host system then applies the performance parameters in the tuning configuration to increase performance.Type: ApplicationFiled: August 20, 2010Publication date: February 23, 2012Applicant: International Business Machines CorporationInventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Patent number: 8041680Abstract: Backing up a database, including providing, in the database by a DBMS, at least one record with at least one backup field, the backup field being a data element that controls the backing up of the record, and backing up, by a backup module, the a record in dependence upon a value of the backup field.Type: GrantFiled: June 8, 2007Date of Patent: October 18, 2011Assignee: International Business Machines CorporationInventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Patent number: 8001599Abstract: A method for providing an alert when a potentially or likely malicious web site is browsed to by a user. The method maintains web site identification details. If a web site purporting to be a known, previously identified, encountered and utilized web site is browsed to and requests information, the user is alerted to the precise differences between the stored web site historical identity and the identity of the present requester.Type: GrantFiled: July 15, 2008Date of Patent: August 16, 2011Assignee: International Business Machines CorporationInventors: Gerald F. McBrearty, Jessica C. Murillo, Johnny Meng-Han Shieh, Susann M. Keohane, Shawn P. Mullen
-
Publication number: 20110161653Abstract: Provided are techniques for to enable a virtual input/output server (VIOS) to establish cryptographically secure signals with target LPARs to detect an imposter or spoofing LPAR. The secure signal, or “heartbeat,” may be configured as an Internet Key Exchange/Internet Protocol Security (IKE/IPSec) encapsulated packet (ESP) connection or tunnel. Within the tunnel, the VIOS pings each target LPAR and, if a heartbeat is interrupted, the VIOS makes a determination as to whether the tunnel is broken, the corresponding LPAR is down or a media access control (MAC) spoofing attach is occurring. The determination is made by sending a heartbeat that is designed to fail unless the heartbeat is received by a spoofing device.Type: ApplicationFiled: December 24, 2009Publication date: June 30, 2011Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Patent number: 7881710Abstract: A portable communication device detects a current speed of travel of the portable communication device independent of any vehicle temporarily transporting the portable communication device. A speed based setting controller of the portable communication device compares the current speed to at least one threshold value set at the portable communication device. Responsive to the current speed exceeding the threshold value, the speed based setting controller automatically assigns a separate speed based setting to a current setting for each feature assigned to the threshold value, wherein each current setting for each feature designates the operability of that feature within the portable communication device, such that the current setting for each feature adjusts with a speed of travel as detected by the portable communication device.Type: GrantFiled: February 18, 2008Date of Patent: February 1, 2011Assignee: International Business Machines CorporationInventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Johnny M. Shieh
-
Patent number: 7831923Abstract: Mechanisms for providing visual keyboard guides according to a programmable set of keys are provided. With the mechanisms of the illustrative embodiments, a user may select for which keys of a keyboard the user wishes to receive visual guides on a display of a data processing device associated with the keyboard. Thereafter, when the user's fingers are in proximity to keys of the keyboard, a comparison of the keys in proximity to the user's instrument to the keys for which visual guides are to be provided is made. If the keys in proximity to the user's instrument match keys for which visual guides are to be provided, a visual guide is displayed on the display of the data processing device. A graphical user interface may be provided to the user for setting which keys are to have associated visual guides.Type: GrantFiled: November 28, 2006Date of Patent: November 9, 2010Assignee: International Business Machines CorporationInventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Patent number: 7779363Abstract: A function management tool detects a user selection to drag and drop a particular selectable button from a first interface of the management tool to a second interface of an instance of a running application of multiple existing applications accessible at a computer system, wherein the management tool runs separately from the plurality of existing applications, wherein a separate pre-designated function is associated with each selectable button. Responsive to the management tool detecting the user select the dragged and dropped selectable button from within the second interface of the instance of the running application of the plurality of existing applications, the management tool controls the instance of the running application of the plurality of existing applications according to a particular pre-designated function of the dragged and dropped selectable button.Type: GrantFiled: December 5, 2006Date of Patent: August 17, 2010Assignee: International Business Machines CorporationInventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica Murillo, Johnny M. Shieh
-
Patent number: 7765589Abstract: A method, apparatus, and computer instructions for authorizing a user to access grid resources. A request is received from the user to access a resource on the data processing system. This request includes a certificate. An authentication process is performed using the certificate when the request is received. In response to successfully authenticating the user in the authentication process, a first host name for the certificate is requested from a trusted source. A reply containing the first host name is received. Access to the resource is provided if the first host name returned by the trusted source matches a second host name for the user from which the request originated.Type: GrantFiled: May 20, 2008Date of Patent: July 27, 2010Assignee: Trend Micro IncorporatedInventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica K. Murillo, Johnny M. Shieh
-
Publication number: 20100161367Abstract: Disclosed is a method for customizing online calendar entries. A contact list for an online calendar is created including individuals and groups. An exception list is created from the individuals and/or groups on the contact list. When an online invitation is created, but not yet sent, conflict resolution tools allow the creator of the invitation to check all invitee's calendar entries for potential conflicts. A conflict resolution tool checks the calendar of an invitee for potential availability of a time corresponding to an open time slot. A conflict resolution tool responds to the online invitation with an acceptance response. A user can customize the acceptance response. The customized acceptance response is linked to the exception list. If a subsequent online invitation is received from an individual or group member on the exception list during the blocked time slot, the blocked time slot is detected as open, and scheduling of events during the blocked time slot is allowed.Type: ApplicationFiled: December 22, 2008Publication date: June 24, 2010Inventors: Susann M. Keohane, Gerald F. Mcbrearty, Shawm P. Mullen, Jessica C. Murillo, Johnny M. Shieh
-
Patent number: 7680893Abstract: A method, system and computer program product that creates a transport dictionary, which links preferential terms and definitions to the Multipurpose Internet Mail Extension (MIME) of an outgoing electronic mail (email). Prior to sending a message, users are provided the option of transporting words or acronyms unique to the dictionary of the sender and recipient, which have been utilized in the outgoing email message. Linking dictionary preferences to the outgoing email provides clarity to terms utilized in the email message and decreases the amount of time a responder has to spend skipping, adding, or defining terms that are unique to the incoming MUA dictionary.Type: GrantFiled: January 5, 2007Date of Patent: March 16, 2010Assignee: International Business Machines CorporationInventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica Murillo, Johnny M. Shieh
-
Patent number: 7672875Abstract: The server system, communicatively connected to multiple client systems via a network, facilitates at least one web page for download to the client systems, where the web page offers multiple products for purchase. Responsive to the server system detecting a particular product selection from a particular client system, the server system downloads to the particular client system a first package offer of the client selected product and at least one second product from among at least one vendor selected product at a first price at a first discounted rate for purchase of both the client selected particular product and the at least one second product. In addition, the server system includes a selectable option for replacing the first package offer in the download of the first package offer.Type: GrantFiled: June 6, 2005Date of Patent: March 2, 2010Assignee: International Business Machines CorporationInventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica Murillo, Johnny M. Shieh
-
Publication number: 20100017878Abstract: A method for providing an alert when a potentially or likely malicious web site is browsed to by a user. The method maintains web site identification details. If a web site purporting to be a known, previously identified, encountered and utilized web site is browsed to and requests information, the user is alerted to the precise differences between the stored web site historical identity and the identity of the present requester.Type: ApplicationFiled: July 15, 2008Publication date: January 21, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gerald F. McBrearty, Jessica C. Murillo, Johnny Meng-Han Shieh, Susann M. Keohane, Shawn P. Mullen
-
Patent number: 7628321Abstract: Controlling electronic withdrawals by a drawee including receiving in the drawee from a withdrawal device a withdrawal request, where the withdrawal request includes a withdrawal device identifier, a drawer identifier, and a withdrawal amount; retrieving from storage in computer memory of the drawee data representing limitations on electronic withdrawals for the drawer, wherein the limitations include a limitation on drawer location; and authorizing, by the drawee, an electronic withdrawal in dependence upon the limitations, including the limitation on drawer location. In typical embodiments, the limitations on electronic withdrawals may include limitations on withdrawal type account, withdrawal period, and maximum withdrawal amount. In typical embodiments, the limitation on drawer location may include a geographic area that includes one or more locations of withdrawal devices.Type: GrantFiled: December 3, 2007Date of Patent: December 8, 2009Assignee: International Business Machines CorporationInventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica Murillo, Johnny M. Shieh
-
Publication number: 20090222796Abstract: Tracing of the interaction of third party processes on resources used by a program under trace is performed. A viral tag is associated with the program under trace. When the program “touches” a portion of memory, the memory manager associates the viral tag with the memory locations in this portion of memory. When subsequent processes “touch” the tagged memory locations, they acquire the viral tag and then spread it to other memory locations that these subsequent processes touch. The viral tag may be slightly modified so as to identify it as being based on the original viral tag but having been acquired by another process. Each time the viral tag is spread to another program, the viral tag may be slightly modified to indicate that the viral tag is now associated with another entity although is still associated with the original viral tag.Type: ApplicationFiled: February 29, 2008Publication date: September 3, 2009Applicant: International Business Machines CorporationInventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny M. Shieh