Patents by Inventor Gerald Francis McBrearty

Gerald Francis McBrearty has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 6714970
    Abstract: Protecting open Web sites from known malicious users in a World Wide Web (Web) communication network with access to a plurality of open Web sites responsive to requests from users at IP addresses throughout the Web. There is provided in association with a protected open Web site, a stored list of the IP addresses of known malicious users combined with means for comparing the IP addresses of each user requesting access to the protected open Web site to said list of IP addresses of the known malicious users. There are also implementations responsive to the comparing means for diverting to an alias address for the protected Web site any request from the IP address of a malicious user. The alias address is provided by a function associated with the protected open Web site. The present invention is applicable in circumstances where the malicious users or “crackers” are already known.
    Type: Grant
    Filed: October 26, 2000
    Date of Patent: March 30, 2004
    Assignee: International Business Machines Corporation
    Inventors: William Alton Fiveash, Gerald Francis McBrearty, Shawn Patrick Mullen, Johnny Meng-Han Shieh
  • Patent number: 6714953
    Abstract: A system and method for including export information in the file system extended attribute data area is provided. File export information is determined by a system administrator or automated process. The determined export information is stored in an extended attribute data area corresponding with the file. When a computer system issues mount commands for the file systems to be mounted, the file system provides export information included in the extended attributes to the kernel whereupon the kernel exports the file system. Maintenance of file export information is thereby reduced. Backup, replications, and restorations of file systems is simplified by maintaining the export information along with the files being backed, replicated, or restored. For example, when the system administrator backs up a file, the export information in the extended attributes is backed-up as well. When the file system is retrieved, the export information is also retrieved within the extended attributes.
    Type: Grant
    Filed: June 21, 2001
    Date of Patent: March 30, 2004
    Assignee: International Business Machines Corporation
    Inventors: Mark Allen Grubbs, Gerald Francis McBrearty, Wu Zheng
  • Publication number: 20040015585
    Abstract: A method, system and token are described which control access to a token server system. In a first aspect, a method and system for controlling access to a file system of a token server comprise encoding a time specific permission into a token. In a second aspect, a token server system comprises at least one client and a token server accessible by the at least one client. The token server provides a token to the at least one client to allow the client to have access to the data on the token server. The token includes a time specific permission. In a third aspect, a token for use in a token server system comprises a group of privileges and security identifiers. The token includes a time specific permission. A system and method in accordance with the present invention controls access to networked systems, but does not totally disable or change a system to accommodate temporary outages of access.
    Type: Application
    Filed: May 30, 2002
    Publication date: January 22, 2004
    Applicant: International Business Machines Corporation
    Inventors: Gerald Francis McBrearty, Shawn Patrick Mullen, Johnny Meng-Han Shieh
  • Publication number: 20040015863
    Abstract: A method, system, and product are disclosed for automatically generating a symbol-based debug script, which is executable by a debug program, for debugging a software program. Function symbols included in the software program are identified. The functions represented by the function symbols may be executed during an execution of the software program. A debug script is then automatically generated which, when executed by a debug program, will record each one of the functions symbols which represent a function called by the software program during execution of the software program by the debug program.
    Type: Application
    Filed: May 24, 2001
    Publication date: January 22, 2004
    Applicant: IBM Corporation
    Inventors: Gerald Francis McBrearty, Shawn Patrick Mullen, Johnny Meng-Han Shieh
  • Publication number: 20040015860
    Abstract: Recording the history of the sequential development of each of the plurality of binary files forming the program by developing an initial version of a binary file, then developing a sequential plurality of subsequent changed versions of said binary file, assigning an identifier to each of the subsequent versions of the binary file and storing all of said identified versions of said binary file. The binary file identifiers are preferably binary identifiers, especially bar code identifiers. The assigning of a binary identifier to a version of a binary file is responsive to the completion of said version of said binary file and, preferably, is, thus, automatically responsive.
    Type: Application
    Filed: March 15, 2001
    Publication date: January 22, 2004
    Applicant: International Business Machines Corporation
    Inventors: Julie Levell Craft, Gerald Francis McBrearty, Shawn Patrick Mullen, Johnny Meng-Han Shieh
  • Publication number: 20040015668
    Abstract: A method, system, and program product for controlling multi-node access to a disk storage system. In accordance with the method of the present invention, an active access authorization is set for a first node. The active access authorization enables read and write access by the first node to user and meta data within the disk storage system. A passive access authorization is set for a second node. The passive access authorization enables read-only access by the second node to logical volume management meta data within the disk storage system.
    Type: Application
    Filed: July 18, 2002
    Publication date: January 22, 2004
    Applicant: International Business Machines Corporation
    Inventors: Gerald Francis McBrearty, Thomas van Weaver
  • Publication number: 20040010552
    Abstract: A display interface at a sending terminal including the conventional means enabling the sender of an electronic mail document to specify users to receive the document; but, in addition, provides means enabling the sender of the electronic mail document to specify users not receive the document. Then, users specified not to receive the electronic mail document are precluded from receiving the document. Thus, the sender is enabled to specify users not to receive a copy, forward or print of the document. A display interface is also provided at a receiving terminal that includes means enabling the receiver of an electronic mail document to further specify users to be forwarded the document; and also means enabling the receiver of the electronic mail document to specify users not to be forwarded the document.
    Type: Application
    Filed: July 11, 2002
    Publication date: January 15, 2004
    Applicant: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Kelley Murillo, Johnny Meng-Han Shieh
  • Patent number: 6675225
    Abstract: A method and system for an algorithm-based network snoop avoider is provided. A first data processing system and a second data processing system communicate on a physical network by transmitting data packets on the network using a virtual private network (VPN). Data packets are transmitted through a first VPN tunnel between the first data processing system with a first network address terminating a first end of the VPN tunnel and the second data processing system with a second network address terminating a second end of the first VPN tunnel. The VPN is automatically reconfigured to use alternate addresses on the network for the tunnel endpoints by automatically determining, in accordance with a predetermined algorithm, a third network address and a fourth network address and by automatically assigning the third network address to the first data processing system and the fourth network address to the second data processing system.
    Type: Grant
    Filed: August 26, 1999
    Date of Patent: January 6, 2004
    Assignee: International Business Machines Corporation
    Inventors: Denise Marie Genty, Gerald Francis McBrearty, Shawn Patrick Mullen, Johnny Meng-Han Shieh, Ramachandran Unnikrishnan
  • Publication number: 20040003113
    Abstract: A system, apparatus and method of notifying a user that there may be a possibility of communicating with a computer system other than an intended one are provided. When a host in use by the user is to request a DNS name service, the request is sent to two or more DNS servers. If all the servers return the same IP address, then there is a likelihood that the user may communicate with the intended computer system. If, however, two or more different IP addresses are returned, there is a high likelihood that the user may communicate with a computer system other than the intended one. When this occurs a warning is generated notifying the user of such a likelihood.
    Type: Application
    Filed: June 13, 2002
    Publication date: January 1, 2004
    Applicant: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Kelley Murillo, Johnny Meng-Han Shieh
  • Publication number: 20030236956
    Abstract: A system and method for capturing a point-in-time image of a file system utilized within a data storage system employing logical volumes mapped across physical volumes. The point-in-time backup process begins with receipt of a file system backup request. In response to receiving the file system backup request, buffered file system data is written or flushed to the logical volumes. Specifically, in response to the file system backup request, buffered user data is written to the logical volumes, buffered meta data associated with the buffered user data is written to a file system backup log within the logical volumes, and the buffered meta data is written to the logical volumes. A disk copy of the designated physical volumes is initiated in response to the writing of the buffered file system data to the logical volumes.
    Type: Application
    Filed: June 20, 2002
    Publication date: December 25, 2003
    Applicant: International Business Machines Corpoaration
    Inventors: Mark Allen Grubbs, Gerald Francis McBrearty, Grover Herbert Neuman
  • Publication number: 20030236799
    Abstract: A method, program and system for downloading and deleting applications associated with particular file types are provided. The invention comprises, when opening a browser, determining if a given file type has an associated application on the computer. If the file type does not have an associated application, the invention determines if the user has previously been asked about this file type. If the user has not previously been asked about this file type, the invention asks if the user wants to download the associated application for the file type. If user chooses to, the application is downloaded. When a user enters a request to delete a program from the computer, the invention determining if the program is the last one servicing a given file type on the computer. If the program is not the last one servicing this file type, this program is deleted. If the program is the last one servicing that file type, the invention searches the computer to determine if there are any files using that type.
    Type: Application
    Filed: June 20, 2002
    Publication date: December 25, 2003
    Applicant: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Kelley Murillo, Johnny Meng-Han Shieh
  • Publication number: 20030236954
    Abstract: A method, program, and system for prioritizing data read operations are provided. The invention comprises prioritizing a plurality of storage drives that contain duplicate data, and, responsive to a read request, reading data from the highest priority storage drive among the plurality of storage drives. If the highest priority drive is unavailable, or if the read operation is unsuccessful, data is read from the next highest priority drive that is available. The drive can be distributed over a network, with priority determined according to proximity to a given user.
    Type: Application
    Filed: June 20, 2002
    Publication date: December 25, 2003
    Applicant: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Kelley Murillo, Johnny Meng-Han Shieh
  • Publication number: 20030231216
    Abstract: A graphical navigation tree is provided that graphically illustrates all links (e.g., web sites) from all navigation paths that have been traversed since a web browser session was invoked. The navigation tree can be displayed constantly or be invoked only upon activation by the user. In addition, the user can be given the option of designating a particular web site on a particular navigation path with a mouse pointer and upon clicking the mouse key, be immediately brought to the URL corresponding to that web site. Further, some or all of the navigation tree may be designated for bookmarking and/or for electronic forwarding to others via, for example, email.
    Type: Application
    Filed: June 13, 2002
    Publication date: December 18, 2003
    Applicant: International Business Machines Corp.
    Inventors: Gerald Francis McBrearty, James Stanley Tesauro, Ravinder Paul Wadehra
  • Publication number: 20030233479
    Abstract: A system, apparatus and method that relate a real-time clock of a first computer system to a real-time clock of a second computer system are provided. When the first computer system is using files created by the second computer system, it requests that the second computer provides its current local time. The first computer records the time of the request, the time the response to the request is received as well as the requested current local time. Using these different recorded times, the first computer is able to compute a time difference (if any) between its real-time clock and the real-time clock of the second computer system.
    Type: Application
    Filed: June 13, 2002
    Publication date: December 18, 2003
    Applicant: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Kelley Murillo, Johnny Meng-Han Shieh
  • Publication number: 20030231196
    Abstract: An implementation for dynamically tracking received lengthy Web documents containing text, images, media and hyperlinks to other documents to determine the user interests in the various document portions with little or no effort on the part of novice computer users to carry out such tracking. The cumulative time that said user spends in each of a plurality of document portions during the navigation via scrolling of the received Web document is tracked, and the tracked cumulative time spent in each of said portions is visually indicating within the received Web document.
    Type: Application
    Filed: June 13, 2002
    Publication date: December 18, 2003
    Applicant: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Kelley Murillo, Johnny Meng-Han Shieh
  • Publication number: 20030229858
    Abstract: The present invention provides an improved method, apparatus, and computer instructions for providing source information from an object originating from a first document and inserted into a second document. The present invention automatically generates source information for an object that is cut or copied from a document and inserted into another document. The source information may be stored, hidden, or pasted into the second document, and also may automatically trigger the generation of a footnote for the second document. An application supplies the source information that the window manager extracts when an object is cut or copied from a document. The window manager requests the source information from the application displaying the first document. The application displaying the second document accepts the source information from the window manager when an object originating from the first document is inserted into the second document.
    Type: Application
    Filed: June 6, 2002
    Publication date: December 11, 2003
    Applicant: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Kelley Murillo, Johnny Meng-Han Shieh
  • Patent number: 6661432
    Abstract: A system and method for dynamically searching an identified web site. In one embodiment, a generic site search engine is invoked from any web page within the web site. Invoking the generic site search engine provides the user with an input display and displays resulting matches after searching pages from the web site. In another embodiment, a hidden HTML tag is used on web pages to identify the site specific search engine for the web site. When a user requests a site specific search engine from the user's web browser, the HTML tag is located and the corresponding web page containing the site specific search engine is opened. In another embodiment, if the HTML tag identifying the site specific search engine is not found, an analysis of the web site's root node is made to identify a site specific search engine. If a site specific search engine is identified through the analysis, the search engine web page is opened.
    Type: Grant
    Filed: August 31, 2000
    Date of Patent: December 9, 2003
    Assignee: International Business Machines Corporation
    Inventors: Gerald Francis McBrearty, Shawn Patrick Mullen, Johnny Meng-Han Shieh, Guja Prasad Venkataraman
  • Patent number: 6662268
    Abstract: Striped mirrors are re-synchronized by logical partition rather than by stripe unit for stale partitions. While re-synchronizing physical partitions, data is serialized across both the stripe unit and the real partition region. The re-sync Read operation uses the normal logical partition offsets to read on a physical partition boundary rather than using the stripe units. In so doing, a single disk in a striped mirror can be replaced without re-synchronizing the entire mirror. The resync Read is not broken up into individual stripe unit reads.
    Type: Grant
    Filed: September 2, 1999
    Date of Patent: December 9, 2003
    Assignee: International Business Machines Corporation
    Inventors: Gerald Francis McBrearty, Johnny Meng-Han Shieh
  • Publication number: 20030225858
    Abstract: A method, apparatus, and computer instructions for traversing Web pages. A referring link is identified to form an identified referring link in response to receiving a request for an anchor point in a particular Web page. The referring link is stored in association with the anchor point to form a set of referring links to the anchor point on the particular Web page. At least one of the set of referring links is sent to a requesting client.
    Type: Application
    Filed: May 30, 2002
    Publication date: December 4, 2003
    Applicant: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Kelley Murillo, Johnny Meng-Han Shieh
  • Publication number: 20030226008
    Abstract: A method and system for allowing for the secure transmission and reception of data in a processing system is disclosed. The method and system includes providing at least one crypto algorithm in a region of a system memory in the processing system; and assigning a cryptographic function of the at least one crypto algorithm to the region. A system and method in accordance with the present invention ties the encryption/decryption algorithm to specific DMA regions and the encryption key to the particular DMA transfer. This allows the system processors to offload the encryption and enable all network (and non-network) adapters to take advantage of this offload without hardware changes to the adapters.
    Type: Application
    Filed: May 30, 2002
    Publication date: December 4, 2003
    Applicant: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Kelley Murillo, Johnny Meng-Han Shieh