Patents by Inventor Jeffrey T. Sheridan

Jeffrey T. Sheridan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20120210446
    Abstract: A method for controlling access to client data by support providers is disclosed herein. In one embodiment, such a method includes initiating a session on a server computer in response to receipt of a request for assistance from a client, the session having client data associated therewith. A session key is generated for the session. The session key includes a session identifier and a support provider identifier corresponding to an assignee. The session key may further include a client identifier corresponding to the client. Requests to access the client data include an assignee key including a session identifier and a support provider identifier, and potentially a client identifier if needed. The assignee key is compared to the session key. If correspondence is found between the identifiers in the assignee key and the session key, access is granted.
    Type: Application
    Filed: April 23, 2012
    Publication date: August 16, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: David C. Reed, Jeffrey T. Sheridan, Max D. Smith
  • Publication number: 20120021721
    Abstract: A method for controlling access to client data by support providers is disclosed herein. In one embodiment, such a method includes initiating a session on a server computer in response to receipt of a request for assistance from a client, the session having client data associated therewith. A session key is generated for the session. The session key includes a session identifier and a support provider identifier corresponding to an assignee. The session key may further include a client identifier corresponding to the client. Requests to access the client data include an assignee key including a session identifier and a support provider identifier, and potentially a client identifier if needed. The assignee key is compared to the session key. If correspondence is found between the identifiers in the assignee key and the session key, access is granted. A corresponding apparatus and computer program product are also disclosed herein.
    Type: Application
    Filed: July 24, 2010
    Publication date: January 26, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: David C. Reed, Jeffrey T. Sheridan, Max D. Smith
  • Publication number: 20100185688
    Abstract: A method for identifying records of variable length within a data block containing corrupted data is disclosed herein. In certain embodiments, such a method may include scanning backward from an end of a data block containing variable-length records. The backward scan may proceed, one record at a time, to identify a first span of good (i.e., non-corrupt) records. The method may further include scanning forward from a front of the data block, also proceeding one record at a time, to identify a second span of good records. The method may include identifying a problem region by identifying data that resides between the first span and the second span. The method may also include creating a new record between the first span and the second span that contains the problem region. A corresponding computer program product, apparatus, and system are also disclosed.
    Type: Application
    Filed: January 19, 2009
    Publication date: July 22, 2010
    Applicant: International Business Machines Corporation
    Inventors: Joseph V. Malinowski, David C. Reed, Jeffrey T. Sheridan, Max D. Smith