Patents by Inventor Gerald Francis McBrearty

Gerald Francis McBrearty has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8041955
    Abstract: A mechanism for mutual authorization of a secondary resource in a grid of resource computers is provided. When a primary resource attempts to offload a grid computing job to a secondary resource, the primary resource sends a proxy certificate request to the user machine. Responsive to a proxy certificate request, the user machine performs authorization with the secondary resource. If authorization with the secondary resource is successful, the user machine generates and returns a valid proxy certificate. The primary resource then performs mutual authentication with the secondary resource. If the authorization with the secondary resource fails, the user machine generates and returns an invalid proxy certificate. Mutual authentication between the primary resource and the secondary resource will fail due to the invalid proxy certificate. The primary resource then selects another secondary resource and repeats the process until a resource is found that passes the mutual authorization with the user machine.
    Type: Grant
    Filed: November 7, 2008
    Date of Patent: October 18, 2011
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Kelley Murillo, Johnny Meng-Han Shieh
  • Patent number: 8037137
    Abstract: A data processing system for efficiently attaching files to electronic mail message. In a multi-level hierarchical file storage system within the data processing system wherein one or more files may be active, only those files, which are active, are initially proffered as candidates for attachment in response to a user's indicated desire to attach a file to an electronic mail message. If the user fails to select an active file for attachment, the user is prompted to select a file from the multi-level hierarchical file storage system for attachment. After attachment, the electronic mail message and attachment are transmitted.
    Type: Grant
    Filed: April 3, 2003
    Date of Patent: October 11, 2011
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Kelley Murillo, Johnny Meng-Han Shieh
  • Patent number: 8028010
    Abstract: A method, system, and program for adjusting the size of a file system and an inline file system log housed in a static logical volume. A computer system includes a logical volume allocated between an file system and its inline file system log. A request is received to adjust the inline log from a current size to a new size while maintaining the size of the logical volume. Storage space is then allocated from within the logical volume to the inline log according to the storage requirement for the new size. Allocating storage space may require decreasing or increasing the amount of storage formerly allocated to the inline log. Then, the inline log is reformatted to the allocated storage space, such that the storage allocated to the inline log for a file system is adjusted while the size of the logical volume housing the inline log and file system remains static.
    Type: Grant
    Filed: December 20, 2007
    Date of Patent: September 27, 2011
    Assignee: International Business Machines Corporation
    Inventors: Mark Allen Grubbs, Gerald Francis McBrearty, Duyen M Tong
  • Patent number: 8005903
    Abstract: A computer implemented method, apparatus, and computer usable program code for managing e-mail messages. A local copy of the e-mail message is stored on the data processing system for a selected period of time in response to sending an e-mail message to a recipient from a data processing system. A determination is made as to whether the local copy of the e-mail message is present in response to receiving a notification that the recipient is unable to respond. The local copy of the e-mail message is retrieved if the local copy of the e-mail message is present to form a retrieved e-mail message. The retrieved e-mail message is presented.
    Type: Grant
    Filed: December 13, 2006
    Date of Patent: August 23, 2011
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
  • Patent number: 7991877
    Abstract: A computer implemented method, data processing system, and computer program product for discovering an unauthorized router in a network. The process in the illustrative embodiments first obtains a physical address of a suspected router or destination device. A data packet is created which comprises at least a destination media access control field, a destination internet protocol field, and a time-to-live field, wherein the destination media access control field comprises the physical address of the destination device, wherein the destination internet protocol field comprises a bogus internet protocol address, and wherein the time-to-live field comprises a value indicating the data packet has exceeded a time limit. The data packet is sent to the destination device using the physical address in the destination media access control field. If a time exceeded message is received from the destination device, the destination device is determined to be enabled for routing.
    Type: Grant
    Filed: October 5, 2007
    Date of Patent: August 2, 2011
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
  • Patent number: 7987226
    Abstract: A method, a system and a computer program product for mapping a client's request to perform boot and/or dump operations to a set of backing files which enable boot and dump operations in a data processing system. A Target Routing Driver (TRD) utility creates multiple Network Installation Management (NIM) objects and/or Network Dump Management (NDM) objects including (1) an Internet Small Computer Systems Interface (iSCSI) boot station and (2) an iSCSI dump collection point. The boot station exports a single iSCSI software (S/W) target from which a set of Diskless Servers obtain a boot image which enables a boot operation. The dump collection point exports a single iSCSI S/W target which is used by Diskless Servers as a dump location. The TRD utility uses the single target (exported from a particular NDM object type) to utilize the minimal resource allocation which allows listening on a single connection.
    Type: Grant
    Filed: October 31, 2008
    Date of Patent: July 26, 2011
    Assignee: International Business Machines Corporation
    Inventors: Rodney Carlton Burnett, Gerald Francis McBrearty
  • Patent number: 7984095
    Abstract: An apparatus, system and method of executing a monolithic application program successfully on a grid computing system are provided. Before the program is executed on the grid computing system, the program is executed on a computer on which the program has previously been successfully executed. During its execution, the program is monitored to collect its runtime information. The runtime information is provided to the grid computing system. With this information the grid computing system is able to successfully execute the program.
    Type: Grant
    Filed: January 13, 2009
    Date of Patent: July 19, 2011
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Murillo, Johnny Meng-Han Shieh
  • Patent number: 7974286
    Abstract: A computer implemented method, apparatus, and computer usable program code for screening data packets. A determination is made as to whether a signature of a trusted security element is present in a header of the data packet in response to receiving a data packet. The signature indicates that a previous security action has been performed on the data packet. A security action is performed on the data packet based on the previous security action performed on the data packet in response to the signature of the trusted security element being present.
    Type: Grant
    Filed: December 4, 2006
    Date of Patent: July 5, 2011
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
  • Patent number: 7975238
    Abstract: Presenting to a user at a receiving Web station, who is viewing a received Web document or Web page, a very clear picture of which hyperlinks in each Web page are linked to a Web page/document that has already been bookmarked by the user. A system for tracking bookmarking in received Web documents that comprises the combination of apparatus associated with one of the receiving display stations for bookmarking of selected received Web documents to thereby store, as bookmarks, at the receiving display station, direct links to the sources of the Web documents, apparatus associated with this one receiving display station for comparing the stored bookmarks to hyperlinks in each received Web document to determine if the hyperlinks have been bookmarked, and an implementation which, in response to the apparatus for comparing, then visually distinguishes each bookmarked hyperlink in the received displayed Web document.
    Type: Grant
    Filed: March 19, 2003
    Date of Patent: July 5, 2011
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Kelley Murillo, Johnny Meng-Han Shieh
  • Patent number: 7962957
    Abstract: A computer implemented method, apparatus, and computer program product for port scan protection. A reply data packet having a modified transmission control protocol header is generated to form a modified reply data packet, in response to detecting a port scan. The modified reply data packet will elicit a response from a recipient of the modified data packet. The reply data packet is sent to a first Internet protocol address associated with the port scan. A second Internet protocol address is identified from a header of the response to the modified reply data packet. The second Internet protocol address is an actual Internet protocol address of a source of the port scan. All network traffic from the second Internet protocol address may be blocked to prevent an attack on any open ports from the source of the port scan.
    Type: Grant
    Filed: April 23, 2007
    Date of Patent: June 14, 2011
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
  • Patent number: 7917751
    Abstract: A security protocol that dynamically implements enhanced mount security of a filesystem when access to sensitive files on a networked filesystem is requested. When the user of a client system attempts to access a specially-tagged sensitive file, the server hosting the filesystem executes a software code that terminates the current mount and re-configures the server ports to accept a re-mount from the client via a more secure port. The server re-configured server port is provided the IP address of the client and matches the IP address during the re-mount operation. The switch to a secure mount is completed in a seamless manner so that authorized users are allowed to access sensitive files without bogging down the server with costly encryption and other resource-intensive security features. No significant delay is experienced by the user, while the sensitive file is shielded from un-authorized capture during transmission to the client system.
    Type: Grant
    Filed: May 22, 2003
    Date of Patent: March 29, 2011
    Assignee: International Business Machines Corporation
    Inventors: Susan Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Kelley Murillo, Johnny Meng-Han Shieh
  • Patent number: 7895528
    Abstract: A system and method for reversing a windows close action is provided. The system retains data corresponding to a window after the window is closed for some period of time. The parameters by which the closed window data is retained is user-configurable. When a window is closed, data corresponding to the closed window is not reclaimed by the operating system. Instead, the operating system notes that the window is no longer being managed by the operating system so that no new messages, or signals, are sent to or from the closed window. In addition, the visual aspects of the closed window are removed from the user's display so that, from the user's perspective, the closed window appears to have been closed as in a traditional GUI operating system. The system further reclaims memory from inactive windows according to user-configurable parameters.
    Type: Grant
    Filed: August 5, 2004
    Date of Patent: February 22, 2011
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Kelley Murillo, Johnny Meng-Han Shieh
  • Patent number: 7890603
    Abstract: A system, apparatus and method of performing e-mail message searches across multiple mailboxes are provided. The system, apparatus and method perform the e-mail message searches across multiple mailboxes by launching a search feature of a currently accessed mailbox where at least one search term for a search is entered. Then, if multiple mailboxes are to be simultaneously searched, each mailbox is identified. The mailboxes are identified by their address, the username and password that are used to access them. Each mailbox is then accessed using the provided address, username and password. After accessing the mailbox, its search feature is launched and the search criteria passed to each launched search feature in order to perform the search. The mailboxes may be further identified by a particular name.
    Type: Grant
    Filed: April 3, 2003
    Date of Patent: February 15, 2011
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Kelley Murillo, Johnny Meng-Han Shieh
  • Patent number: 7890554
    Abstract: A method, system and apparatus for exporting file systems without having to mount them first are provided. Most Unix-based servers usually mount some system operation critical files at startup. Thus, directories have to be mounted. One or more of these directories are usually used as mount points for mounting other file systems when needed. An extended attribute file is used to provide all information needed to export a file system. Thus, a server need not mount a file system to obtain this information. That is on startup, a server needs only refer to these extended attribute files to obtain the information needed to export the file systems.
    Type: Grant
    Filed: March 14, 2002
    Date of Patent: February 15, 2011
    Assignee: International Business Machines Corporation
    Inventors: William B. Brown, Mark Allen Grubbs, Gerald Francis McBrearty, Wu Zheng
  • Patent number: 7886339
    Abstract: A computer implemented method, apparatus, and computer program product for authenticating a user to a network. In response to receiving a request from a user to access a protected resource, the process sends a unique bit sequence into a network connection utilized by the user. Next, the process authenticates the user to access the protected resource in response to receiving a verification that the unique bit sequence was received by an access point that authenticated the user when the user logged on to the network.
    Type: Grant
    Filed: January 20, 2007
    Date of Patent: February 8, 2011
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
  • Patent number: 7877426
    Abstract: A performance-enhancing system and method of accessing file system objects are provided. The system and method entail determining a plurality of file system objects that are frequently being accessed. Each one of these file system objects has a pathname and an inode number. The inode number is used to locate the file system object on a storage system. The pathname of each file system object and its inode number are cross-referenced and cached. Having a whole pathname of a file cross-referenced with its inode number and entered into a memory allows the inode number to be obtained with one memory access instead of the many memory accesses that are usually required.
    Type: Grant
    Filed: July 17, 2003
    Date of Patent: January 25, 2011
    Assignee: International Business Machines Corporation
    Inventors: Mark Allen Grubbs, Gerald Francis McBrearty
  • Patent number: 7856662
    Abstract: Systems and methods for denying access to a data processing system by an intruder are provided. Input/output (I/O) on the intruder's connection may be taken over and responses mimicking a local terminal session passed back. On an attempted reconnect by the intruder, the user name and password used by the intruder to access the system may be captured. The password may then be changed on the edge system and the intruder's terminal session disconnected, or alternatively, continue to log the intruder's activity.
    Type: Grant
    Filed: May 3, 2008
    Date of Patent: December 21, 2010
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Murillo, Johnny Meng-Han Shieh
  • Patent number: 7853812
    Abstract: A computer implemented method, an apparatus, and computer usable program code for reducing the amount of power used when executing a set of applications is provided. A controller determines an operating condition for the data processing system. Responsive to the operating condition being above a threshold, the controller switches the set of applications to a low power path. Responsive to the operating condition being below the threshold and the set of applications operating at the low power path, the controller switches the set of applications to a normal operating path.
    Type: Grant
    Filed: February 7, 2007
    Date of Patent: December 14, 2010
    Assignee: International Business Machines Corporation
    Inventors: Gerald Francis McBrearty, Ian Damain Romanick, Johnny Meng-Han Shieh
  • Publication number: 20100293373
    Abstract: An approach is provided to receive a request at a first computer system from a second system. The first system generates an encryption key, modifies retrieved source code by inserting the generated encryption key into the source code, and compiles the modified source code into an executable. A hash value of the executable program is calculated and is stored along with the encryption key in a memory area. The executable and the hash value are sent to the second system over a network. The executable is executed and it generates an encrypted result using the hash value and the embedded encryption key. The encrypted result is sent back to the first system where it is authenticated using the stored encryption key and hash value.
    Type: Application
    Filed: May 15, 2009
    Publication date: November 18, 2010
    Applicant: International Business Machines Corporation
    Inventors: Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
  • Patent number: 7836261
    Abstract: Embodiments include retrieving data of a web page from a remote system in response to a request for the web page. It is determined that the web page is indicated in a data structure that indicates web pages not to be cached in a cache of a web browser on a data processing system. The data structure and the cache of the web browser are distinct from each other. The web page is presented with the web browser using the data retrieved from the remote system. The data of the web page is prevented from being cached in the cache of the web browser in accordance with said determining that the web page is indicated in the data structure that indicates web pages not to be cached in the cache of the web browser on the data processing system.
    Type: Grant
    Filed: January 12, 2004
    Date of Patent: November 16, 2010
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Johnny Meng-Han Shieh, Shawn Patrick Mullen, Jessica Kelley Murillo