Patents by Inventor Emily J. Ratliff
Emily J. Ratliff has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9146722Abstract: A system and method for efficiently reinstalling computer software, which tracks frequency of utilization for each software application loaded onto the computer and reinstalls applications based on frequency of utilization, with the option to reinstall a computer operating system first or to reinstall computer applications along with libraries, so that computer users can resume working as soon as possible instead of waiting many hours for the entire reinstallation image to complete before a computer system reboot allows for continuation of computer usage.Type: GrantFiled: April 16, 2008Date of Patent: September 29, 2015Assignee: International Business Machines CorporationInventors: Charisse Lu, Emily J. Ratliff, Johnny Shieh
-
Patent number: 8627494Abstract: A method and system are provided to classify and convey data to satisfy a client request. The classification system is a two dimensional data classification system, including a first dimension pertaining to subject matter and a second dimension pertaining to data security. A partition is dynamically created, and data that satisfies the request populates the created partition to convey parsed data based satisfying both dimensions of the request.Type: GrantFiled: September 17, 2009Date of Patent: January 7, 2014Assignee: International Business Machines CorporationInventors: Daniel H. Jones, Thomas G. Lendacky, Emily J Ratliff, George C. Wilson
-
Publication number: 20110067113Abstract: A method and system are provided to classify and convey data to satisfy a client request. The classification system is a two dimensional data classification system, including a first dimension pertaining to subject matter and a second dimension pertaining to data security. A partition is dynamically created, and data that satisfies the request populates the created partition to convey parsed data based satisfying both dimensions of the request.Type: ApplicationFiled: September 17, 2009Publication date: March 17, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Daniel H. Jones, Thomas G. Lendacky, Emily J. Ratliff, George C. Wilson
-
Patent number: 7845006Abstract: A method of reducing the window of malicious exploitation between vulnerability publication and the installation of a software patch. One or more probe points are inserted into a code path in an application (or operating system if applicable) that contains one or more vulnerabilities (or coding errors). The probe points mark locations of the security vulnerabilities utilizing software interrupts to enable the original code base of the code path to remain unmodified. A probe handler utility subsequently monitors the execution of the code path and generates an alert if the execution reaches a probe point in the code path, thus indicating whether the application exhibits a particular vulnerability. The probe handler selectively performs one of multiple customizable corrective actions, thereby securing the application until an applicable software patch can be installed.Type: GrantFiled: January 23, 2007Date of Patent: November 30, 2010Assignee: International Business Machines CorporationInventors: Prasadarao Akulavenkatavara, Janice M. Girouard, Emily J. Ratliff
-
Patent number: 7813482Abstract: A method, system, and program provide for voice mail management. A voice mail filtering controller calculates a separate Bayesian score for each voice mail message from among multiple voice mail message entries received into a voice mailbox for a user, wherein each separate Bayesian score indicates a probability that the associated voice mail message is unwanted by said user. During playback, the voice mail filtering controller automatically deletes a selection of the voice mail messages each with a separate Bayesian score greater than a particular Bayesian score of the last played voice mail message from the voice mailbox.Type: GrantFiled: December 12, 2005Date of Patent: October 12, 2010Assignee: International Business Machines CorporationInventors: Janice M. Girouard, Dustin Kirkland, Emily J. Ratliff, Kimberly D. Simon
-
Publication number: 20100058486Abstract: The present disclosure is directed to a method for limiting access to a virtual sensitive compartmented information facility (SCIF) and secure transport of information between two virtual SCIFs. The method may comprise creating a virtual SCIF, allowing access to the to the virtual SCIF to only those virtual subjects having the proper security clearance as analyzed by an access rule set loaded into an object request broker, creating a second virtual SCIF, creating a key lockable secure container to transport the information from the first virtual SCIF to the second virtual SCIF, and restricting access to the key to unlock the secure container in the second virtual SCIF.Type: ApplicationFiled: August 28, 2008Publication date: March 4, 2010Applicant: International Business Machines CorporationInventors: George C. Wilson, Daniel H. Jones, Emily J. Ratliff, Thomas G. Lendacky
-
Publication number: 20090265702Abstract: A system and method for efficiently reinstalling computer software, which tracks frequency of utilization for each software application loaded onto the computer and reinstalls applications based on frequency of utilization, with the option to reinstall a computer operating system first or to reinstall computer applications along with libraries, so that computer users can resume working as soon as possible instead of waiting many hours for the entire reinstallation image to complete before a computer system reboot allows for continuation of computer usage.Type: ApplicationFiled: April 16, 2008Publication date: October 22, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: CHARISSE LU, EMILY J. RATLIFF, JOHNNY SHIEH
-
Publication number: 20090193343Abstract: A method of avoiding virtual world fatigue by generating an active avatar in an avatar wallet. The method includes creating and storing an active avatar in the avatar wallet, selecting target worlds for the active avatar to visit, modifying the initial appearance, the user information, the contact map and the characteristic sharing information of the active avatar in accordance with user preferences with respect to each of the target worlds so as to generate a version of the active avatar for each of the target worlds, and initiating a submission of a version of the active avatar to the corresponding target world such that the version is automatically tailored to allowable avatar properties of the corresponding target world.Type: ApplicationFiled: January 24, 2008Publication date: July 30, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Daniel H. Jones, Thomas G. Lendacky, Emily J. Ratliff, George C. Wilson
-
Patent number: 7519658Abstract: A method, system and apparatus provide for automatic blogging of media viewing using an enhanced remote controller having networking capabilities that support social networking and blogging. The enhanced remote controller, suitable for use while viewing media programming and content, allows a viewer to autoblog about currently experienced media programming in real-time without having to resort to direct interaction with a computer to perform the autoblogging. The enhanced remote controller allows the viewer to both communicate with a blogging server, and thus to a blogging service, as well as to display responses to and from other bloggers with whom the viewer is communicating. These blog communications may be accomplished without the viewer having to leave the broadcast receiver of the television.Type: GrantFiled: May 2, 2008Date of Patent: April 14, 2009Assignee: International Business Machines CorporationInventors: Howard N. Anglin, Yvonne M. Young, Elizabeth Silvia, Emily J. Ratliff, Chaitanya Kandagatla
-
Publication number: 20080178287Abstract: A method of reducing the window of malicious exploitation between vulnerability publication and the installation of a software patch. One or more probe points are inserted into a code path in an application (or operating system if applicable) that contains one or more vulnerabilities (or coding errors). The probe points mark locations of the security vulnerabilities utilizing software interrupts to enable the original code base of the code path to remain unmodified. A probe handler utility subsequently monitors the execution of the code path and generates an alert if the execution reaches a probe point in the code path, thus indicating whether the application exhibits a particular vulnerability. The probe handler selectively performs one of multiple customizable corrective actions, thereby securing the application until an applicable software patch can be installed.Type: ApplicationFiled: January 23, 2007Publication date: July 24, 2008Inventors: Prasadarao Akulavenkatavara, Janice M. Girouard, Emily J. Ratliff
-
Method and System for Providing Notification of Nefarious Remote Control of a Data Processing System
Publication number: 20080059588Abstract: A system, method and computer program product for providing notification of nefarious remote control of a data processing system are disclosed. The method includes, in response to determining that a received email message contains an item of spam content, noting a source of the received email message to a harm database to increment a harm counter and, in response to determining that the harm counter has exceeded a harm threshold, notifying a designated administrator for said source.Type: ApplicationFiled: September 1, 2006Publication date: March 6, 2008Inventors: Emily J. Ratliff, Loulwa F. Salem, Kimberly D. Simon -
Publication number: 20080027866Abstract: A method, system, and computer readable medium for authenticating file system content. In one embodiment of the method of invention, file system content is received or retrieved for content authentication. Security relevant portions of the file content are identified in accordance with specified parse production rules that tokenize the original file content. Next, the identified security relevant portions of the file content are isolated and extracted from the original file content. The extracted security relevant portions of the file content are authenticated by generating a hash value for the extracted portions and comparing the hash value against a prior output of that hash function applied to a trusted snapshot of the same security relevant file content.Type: ApplicationFiled: July 26, 2006Publication date: January 31, 2008Inventors: MICHAEL A. HALCROW, EMILY J. RATLIFF
-
Publication number: 20070244903Abstract: A method, system, and program are provided for collectively managing media bookmarks. A bookmark management system uploads user specified bookmarks designating play locations with media items from media systems and stores the bookmarks in a searchable database. The bookmark management system stores bookmarks in the searchable database according to at least one bookmark attribute. Media systems may search the searchable database of the bookmark management system according bookmark attributes and request downloads of the stored bookmarks. The bookmark management system downloads selected bookmarks to requesting media system, wherein the requesting media system enables play of a media item associated with the downloaded bookmarks from the searchable playback locations specified in the bookmarks.Type: ApplicationFiled: April 18, 2006Publication date: October 18, 2007Inventors: Emily J. Ratliff, Loulwa F. Salem, Kimberly D. Simon
-
Patent number: 6751736Abstract: E-commerce web page forms contain an encrypted and encoded string, which contains basic information about a product for sale on the web page. Optional product data (e.g. size, color) is selected by an online shopper and transmitted with the basic information when the form is submitted to a cash register server. The form may also contain store ID information which is used to the look up the secret string needed to decrypt the product information. A method for generating the encrypted encoded string for use in the web page is described. Confidentiality is provided with regard to purchases over the Internet.Type: GrantFiled: March 14, 2000Date of Patent: June 15, 2004Assignee: International Business Machines CorporationInventors: Mark T. Bowman, Leslie P. Hauck, Christopher J. Monahan, Mary L. Monahan, Victor S. Moore, Keith Morea, Emily J. Ratliff
-
Patent number: 6460163Abstract: In an E-commerce method for selling digital content over the Internet an FTP-like protocol is provided to carry out the delivery (download) of a purchased digital content item from a server computer to a client computer operated by the purchaser. The FTP-like communication protocol provides for error recovery during the download that does not require restarting the download from the beginning. After the download is completed the integrity of the downloaded file is checked. And the result of the check is communicated to the server which records that the digital content item has been successfully delivered to the purchaser.Type: GrantFiled: April 5, 2000Date of Patent: October 1, 2002Assignee: International Business Machines CorporationInventors: Mark T. Bowman, Leslie P. Hauck, Christopher J. Monahan, Mary L. Monahan, Victor S. Moore, Keith Morea, Emily J. Ratliff