Patents by Inventor Emily J. Ratliff

Emily J. Ratliff has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9146722
    Abstract: A system and method for efficiently reinstalling computer software, which tracks frequency of utilization for each software application loaded onto the computer and reinstalls applications based on frequency of utilization, with the option to reinstall a computer operating system first or to reinstall computer applications along with libraries, so that computer users can resume working as soon as possible instead of waiting many hours for the entire reinstallation image to complete before a computer system reboot allows for continuation of computer usage.
    Type: Grant
    Filed: April 16, 2008
    Date of Patent: September 29, 2015
    Assignee: International Business Machines Corporation
    Inventors: Charisse Lu, Emily J. Ratliff, Johnny Shieh
  • Patent number: 8627494
    Abstract: A method and system are provided to classify and convey data to satisfy a client request. The classification system is a two dimensional data classification system, including a first dimension pertaining to subject matter and a second dimension pertaining to data security. A partition is dynamically created, and data that satisfies the request populates the created partition to convey parsed data based satisfying both dimensions of the request.
    Type: Grant
    Filed: September 17, 2009
    Date of Patent: January 7, 2014
    Assignee: International Business Machines Corporation
    Inventors: Daniel H. Jones, Thomas G. Lendacky, Emily J Ratliff, George C. Wilson
  • Publication number: 20110067113
    Abstract: A method and system are provided to classify and convey data to satisfy a client request. The classification system is a two dimensional data classification system, including a first dimension pertaining to subject matter and a second dimension pertaining to data security. A partition is dynamically created, and data that satisfies the request populates the created partition to convey parsed data based satisfying both dimensions of the request.
    Type: Application
    Filed: September 17, 2009
    Publication date: March 17, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Daniel H. Jones, Thomas G. Lendacky, Emily J. Ratliff, George C. Wilson
  • Patent number: 7845006
    Abstract: A method of reducing the window of malicious exploitation between vulnerability publication and the installation of a software patch. One or more probe points are inserted into a code path in an application (or operating system if applicable) that contains one or more vulnerabilities (or coding errors). The probe points mark locations of the security vulnerabilities utilizing software interrupts to enable the original code base of the code path to remain unmodified. A probe handler utility subsequently monitors the execution of the code path and generates an alert if the execution reaches a probe point in the code path, thus indicating whether the application exhibits a particular vulnerability. The probe handler selectively performs one of multiple customizable corrective actions, thereby securing the application until an applicable software patch can be installed.
    Type: Grant
    Filed: January 23, 2007
    Date of Patent: November 30, 2010
    Assignee: International Business Machines Corporation
    Inventors: Prasadarao Akulavenkatavara, Janice M. Girouard, Emily J. Ratliff
  • Patent number: 7813482
    Abstract: A method, system, and program provide for voice mail management. A voice mail filtering controller calculates a separate Bayesian score for each voice mail message from among multiple voice mail message entries received into a voice mailbox for a user, wherein each separate Bayesian score indicates a probability that the associated voice mail message is unwanted by said user. During playback, the voice mail filtering controller automatically deletes a selection of the voice mail messages each with a separate Bayesian score greater than a particular Bayesian score of the last played voice mail message from the voice mailbox.
    Type: Grant
    Filed: December 12, 2005
    Date of Patent: October 12, 2010
    Assignee: International Business Machines Corporation
    Inventors: Janice M. Girouard, Dustin Kirkland, Emily J. Ratliff, Kimberly D. Simon
  • Publication number: 20100058486
    Abstract: The present disclosure is directed to a method for limiting access to a virtual sensitive compartmented information facility (SCIF) and secure transport of information between two virtual SCIFs. The method may comprise creating a virtual SCIF, allowing access to the to the virtual SCIF to only those virtual subjects having the proper security clearance as analyzed by an access rule set loaded into an object request broker, creating a second virtual SCIF, creating a key lockable secure container to transport the information from the first virtual SCIF to the second virtual SCIF, and restricting access to the key to unlock the secure container in the second virtual SCIF.
    Type: Application
    Filed: August 28, 2008
    Publication date: March 4, 2010
    Applicant: International Business Machines Corporation
    Inventors: George C. Wilson, Daniel H. Jones, Emily J. Ratliff, Thomas G. Lendacky
  • Publication number: 20090265702
    Abstract: A system and method for efficiently reinstalling computer software, which tracks frequency of utilization for each software application loaded onto the computer and reinstalls applications based on frequency of utilization, with the option to reinstall a computer operating system first or to reinstall computer applications along with libraries, so that computer users can resume working as soon as possible instead of waiting many hours for the entire reinstallation image to complete before a computer system reboot allows for continuation of computer usage.
    Type: Application
    Filed: April 16, 2008
    Publication date: October 22, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: CHARISSE LU, EMILY J. RATLIFF, JOHNNY SHIEH
  • Publication number: 20090193343
    Abstract: A method of avoiding virtual world fatigue by generating an active avatar in an avatar wallet. The method includes creating and storing an active avatar in the avatar wallet, selecting target worlds for the active avatar to visit, modifying the initial appearance, the user information, the contact map and the characteristic sharing information of the active avatar in accordance with user preferences with respect to each of the target worlds so as to generate a version of the active avatar for each of the target worlds, and initiating a submission of a version of the active avatar to the corresponding target world such that the version is automatically tailored to allowable avatar properties of the corresponding target world.
    Type: Application
    Filed: January 24, 2008
    Publication date: July 30, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Daniel H. Jones, Thomas G. Lendacky, Emily J. Ratliff, George C. Wilson
  • Patent number: 7519658
    Abstract: A method, system and apparatus provide for automatic blogging of media viewing using an enhanced remote controller having networking capabilities that support social networking and blogging. The enhanced remote controller, suitable for use while viewing media programming and content, allows a viewer to autoblog about currently experienced media programming in real-time without having to resort to direct interaction with a computer to perform the autoblogging. The enhanced remote controller allows the viewer to both communicate with a blogging server, and thus to a blogging service, as well as to display responses to and from other bloggers with whom the viewer is communicating. These blog communications may be accomplished without the viewer having to leave the broadcast receiver of the television.
    Type: Grant
    Filed: May 2, 2008
    Date of Patent: April 14, 2009
    Assignee: International Business Machines Corporation
    Inventors: Howard N. Anglin, Yvonne M. Young, Elizabeth Silvia, Emily J. Ratliff, Chaitanya Kandagatla
  • Publication number: 20080178287
    Abstract: A method of reducing the window of malicious exploitation between vulnerability publication and the installation of a software patch. One or more probe points are inserted into a code path in an application (or operating system if applicable) that contains one or more vulnerabilities (or coding errors). The probe points mark locations of the security vulnerabilities utilizing software interrupts to enable the original code base of the code path to remain unmodified. A probe handler utility subsequently monitors the execution of the code path and generates an alert if the execution reaches a probe point in the code path, thus indicating whether the application exhibits a particular vulnerability. The probe handler selectively performs one of multiple customizable corrective actions, thereby securing the application until an applicable software patch can be installed.
    Type: Application
    Filed: January 23, 2007
    Publication date: July 24, 2008
    Inventors: Prasadarao Akulavenkatavara, Janice M. Girouard, Emily J. Ratliff
  • Publication number: 20080059588
    Abstract: A system, method and computer program product for providing notification of nefarious remote control of a data processing system are disclosed. The method includes, in response to determining that a received email message contains an item of spam content, noting a source of the received email message to a harm database to increment a harm counter and, in response to determining that the harm counter has exceeded a harm threshold, notifying a designated administrator for said source.
    Type: Application
    Filed: September 1, 2006
    Publication date: March 6, 2008
    Inventors: Emily J. Ratliff, Loulwa F. Salem, Kimberly D. Simon
  • Publication number: 20080027866
    Abstract: A method, system, and computer readable medium for authenticating file system content. In one embodiment of the method of invention, file system content is received or retrieved for content authentication. Security relevant portions of the file content are identified in accordance with specified parse production rules that tokenize the original file content. Next, the identified security relevant portions of the file content are isolated and extracted from the original file content. The extracted security relevant portions of the file content are authenticated by generating a hash value for the extracted portions and comparing the hash value against a prior output of that hash function applied to a trusted snapshot of the same security relevant file content.
    Type: Application
    Filed: July 26, 2006
    Publication date: January 31, 2008
    Inventors: MICHAEL A. HALCROW, EMILY J. RATLIFF
  • Publication number: 20070244903
    Abstract: A method, system, and program are provided for collectively managing media bookmarks. A bookmark management system uploads user specified bookmarks designating play locations with media items from media systems and stores the bookmarks in a searchable database. The bookmark management system stores bookmarks in the searchable database according to at least one bookmark attribute. Media systems may search the searchable database of the bookmark management system according bookmark attributes and request downloads of the stored bookmarks. The bookmark management system downloads selected bookmarks to requesting media system, wherein the requesting media system enables play of a media item associated with the downloaded bookmarks from the searchable playback locations specified in the bookmarks.
    Type: Application
    Filed: April 18, 2006
    Publication date: October 18, 2007
    Inventors: Emily J. Ratliff, Loulwa F. Salem, Kimberly D. Simon
  • Patent number: 6751736
    Abstract: E-commerce web page forms contain an encrypted and encoded string, which contains basic information about a product for sale on the web page. Optional product data (e.g. size, color) is selected by an online shopper and transmitted with the basic information when the form is submitted to a cash register server. The form may also contain store ID information which is used to the look up the secret string needed to decrypt the product information. A method for generating the encrypted encoded string for use in the web page is described. Confidentiality is provided with regard to purchases over the Internet.
    Type: Grant
    Filed: March 14, 2000
    Date of Patent: June 15, 2004
    Assignee: International Business Machines Corporation
    Inventors: Mark T. Bowman, Leslie P. Hauck, Christopher J. Monahan, Mary L. Monahan, Victor S. Moore, Keith Morea, Emily J. Ratliff
  • Patent number: 6460163
    Abstract: In an E-commerce method for selling digital content over the Internet an FTP-like protocol is provided to carry out the delivery (download) of a purchased digital content item from a server computer to a client computer operated by the purchaser. The FTP-like communication protocol provides for error recovery during the download that does not require restarting the download from the beginning. After the download is completed the integrity of the downloaded file is checked. And the result of the check is communicated to the server which records that the digital content item has been successfully delivered to the purchaser.
    Type: Grant
    Filed: April 5, 2000
    Date of Patent: October 1, 2002
    Assignee: International Business Machines Corporation
    Inventors: Mark T. Bowman, Leslie P. Hauck, Christopher J. Monahan, Mary L. Monahan, Victor S. Moore, Keith Morea, Emily J. Ratliff