Patents by Inventor Johnny Meng-Han Shieh

Johnny Meng-Han Shieh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7533804
    Abstract: A method, system and computer program product for enabling user-customization of an ATM display/receipt for a transaction carried out at an automated teller machine (ATM). The customer/user of the ATM creates/selects specific alerts to be outputted during subsequent ATM transactions. The alerts/notices are linked to the customer account. During subsequent access to the user's account via an ATM, the pre-selected alert/notice is displayed to the user or printed on the transaction receipt.
    Type: Grant
    Filed: January 2, 2008
    Date of Patent: May 19, 2009
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Murillo, Johnny Meng-Han Shieh
  • Publication number: 20090126018
    Abstract: Illustrative embodiments provide a computer implemented method, a data processing system and a computer program product for password expiration based on vulnerability detection. The computer implemented method comprises receiving a request for a password after re-activating a user account and requesting a password generator, to create a hashed password. The method further comprises comparing the hashed password to a previously created password of a user, to determine a match entry. Responsive to determining a match entry, expiring an account of the user with respect to the match entry.
    Type: Application
    Filed: November 14, 2007
    Publication date: May 14, 2009
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Patrick Shawn Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
  • Publication number: 20090125848
    Abstract: A method, medium and implementing processing system are provided in which displayed text is manipulated using two fingers within an editing application to select a region of text or objects. In an example, two fingers are placed on a touch-sensitive display or touch pad and the region of text between the fingers is selected. The selected text can be manipulated as otherwise selected text is currently manipulated, e.g. cut, paste and copy functions can be performed. The movement of the fingers also performs this manipulation. In one example, if the fingers are brought to together, the selected text is cut, or a split screen could occur. If the fingers are placed together and then parted, the action would be to part the text to make room for a picture or other insert.
    Type: Application
    Filed: November 14, 2007
    Publication date: May 14, 2009
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
  • Publication number: 20090094536
    Abstract: A system, method, and program product is provided that selects an instant messaging message that includes one or more words in a text area. The instant message is a communication with an instant messaging participant that corresponds to an instant messaging participant identifier. A count is kept of the words that match keywords that are associated with a selected instant messaging group data store that is stored in a nonvolatile data area. If the count exceeds a particular threshold, the instant messaging participant identifier is added to the selected instant messaging group.
    Type: Application
    Filed: October 5, 2007
    Publication date: April 9, 2009
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
  • Publication number: 20090094357
    Abstract: A computer implemented method, data processing system, and computer program product for discovering an unauthorized router in a network. The process in the illustrative embodiments first obtains a physical address of a suspected router or destination device. A data packet is created which comprises at least a destination media access control field, a destination internet protocol field, and a time-to-live field, wherein the destination media access control field comprises the physical address of the destination device, wherein the destination internet protocol field comprises a bogus internet protocol address, and wherein the time-to-live field comprises a value indicating the data packet has exceeded a time limit. The data packet is sent to the destination device using the physical address in the destination media access control field. If a time exceeded message is received from the destination device, the destination device is determined to be enabled for routing.
    Type: Application
    Filed: October 5, 2007
    Publication date: April 9, 2009
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
  • Patent number: 7512887
    Abstract: A method of creating multiple, alternative presentations within a single electronic presentation, by assigning one or more presentation constraint parameters to the electronic slides, and generating a sequence for presenting less than all of the electronic slides based on the presentation constraint parameters. Different sequences can be generated using different presentation constraint parameters that are assigned to the electronic slides. For example, a first electronic slide could be included in a first sequence, and a second electronic slide (or multiple slides) can be substituted for the first electronic slide in a second sequence. A sequence can be generated by adjusting a scalable constraint associated with the presentation constraint parameters to determine which electronic slides to include. The presentation constraint parameters can include a time factor and a content level.
    Type: Grant
    Filed: July 22, 2004
    Date of Patent: March 31, 2009
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Kelley Murillo, Johnny Meng-Han Shieh
  • Patent number: 7512659
    Abstract: A system, method, and computer program product for managing e-mail and real-time messaging activity between a first client and a second client. In accordance with one embodiment, the method includes the first or second client detecting an nth e-mail thread response to an original e-mail message delivered between the first client and second client, wherein n is greater than or equal to one. In response to detecting occurrence of an nth e-mail thread response, a real-time electronic messaging session is invoked between the first and second clients. In an alternate embodiment of the invention, the first client sends a real-time message to the second client during a real-time messaging session between the first and second clients. In response to a specified real-time messaging session termination event, an e-mail message containing the sent real-time message is sent to the second client.
    Type: Grant
    Filed: December 16, 2004
    Date of Patent: March 31, 2009
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Murillo, Johnny Meng-Han Shieh
  • Patent number: 7512790
    Abstract: Files, such as HTML files, are managed by performing a permitted command or action initiated on a current file on all its co-requisite files as identified in an extended attribute field stored within the current file. Thus, when an HTML file is emailed or transferred, all requisite files necessary to properly render the web page at the client are assured to be sent. The extended attribute field indicates the parent-child relationship of the co-requisite files and only performs the action on child files. The extended attribute field within the current file also indicates the actions that can be performed on each of its co-requisite files.
    Type: Grant
    Filed: April 17, 2003
    Date of Patent: March 31, 2009
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Kelley Murillo, Johnny Meng-Han Shieh
  • Publication number: 20090077631
    Abstract: A computer implemented method of allowing a device access to a network in a trusted network connect environment. Responsive to receiving a request from the device to access the network, a type of the device is determined. Responsive to determining the type of the device, a policy for the device is determined based on the type of the device. Responsive to determining the policy for the device based on the type of the device, determining whether an integrity of the device satisfies the policy. Responsive to determining that the device does not satisfy the policy, performing a remediation action on the device. Responsive to determining that the device satisfies the policy, allowing the device access to the network.
    Type: Application
    Filed: September 13, 2007
    Publication date: March 19, 2009
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
  • Patent number: 7506023
    Abstract: A system, apparatus and method that relate a real-time clock of a first computer system to a real-time clock of a second computer system are provided. When the first computer system is using files created by the second computer system, it requests that the second computer provides its current local time. The first computer records the time of the request, the time the response to the request is received as well as the requested current local time. Using these different recorded times, the first computer is able to compute a time difference (if any) between its real-time clock and the real-time clock of the second computer system.
    Type: Grant
    Filed: June 13, 2002
    Date of Patent: March 17, 2009
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Kelley Murillo, Johnny Meng-Han Shieh
  • Publication number: 20090070591
    Abstract: A mechanism for mutual authorization of a secondary resource in a grid of resource computers is provided. When a primary resource attempts to offload a grid computing job to a secondary resource, the primary resource sends a proxy certificate request to the user machine. Responsive to a proxy certificate request, the user machine performs authorization with the secondary resource. If authorization with the secondary resource is successful, the user machine generates and returns a valid proxy certificate. The primary resource then performs mutual authentication with the secondary resource. If the authorization with the secondary resource fails, the user machine generates and returns an invalid proxy certificate. Mutual authentication between the primary resource and the secondary resource will fail due to the invalid proxy certificate. The primary resource then selects another secondary resource and repeats the process until a resource is found that passes the mutual authorization with the user machine.
    Type: Application
    Filed: November 7, 2008
    Publication date: March 12, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica-Kelley Murillo, Johnny Meng-Han Shieh
  • Publication number: 20090063610
    Abstract: A user inputs event information into a data processing system which is stored in an application memory of an application. Message information contained in each incoming message received by a messaging service is compared to the event information. In the event that the message information corresponds to the event information a notification of the event is sent to a short-range wireless transmitter. The wireless transmitter transmits notification of the event to a remote receiver. Upon receipt of the wireless signal, the remote receiver triggers an alert notification notifying the user that data processing system has received the specified event.
    Type: Application
    Filed: August 27, 2007
    Publication date: March 5, 2009
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
  • Patent number: 7499988
    Abstract: A method and system for providing storage area network SAN level boot/installation services for appliances on a SAN. A generic maintenance “bootlv” is mirrored on at least one disk (or set of disks) that are located out on the SAN. The disk(s) are encoded with similar boot functions as a conventional boot CD. The disk(s) provides physical storage for a volume group that has the base install images and all of the optional Programming Product (OPP) images selected by the system administrator to be included in the install volume group. In one embodiment, a volume group made up of several disks is able to boot up and run from any one of the several disks since the bootlv is mirrored/copied on each of the disks.
    Type: Grant
    Filed: October 16, 2003
    Date of Patent: March 3, 2009
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Kelley Murillo, Johnny Meng-Han Shieh
  • Patent number: 7500051
    Abstract: A computer implemented method, data processing system, and computer usable program code are provided for migrating a persistent cache. A priming request is received at an intermediary to prime the persistent cache of a first partition. Data is moved from a disk to the persistent cache and, responsive to the data being moved to the persistent cache, an unmounting command is issued to unmount a first file system in the first partition from the persistent cache. A mounting command is then issued to mount a second file system in a second partition to the persistent cache, wherein the second partition may now use the data contained in the persistent cache.
    Type: Grant
    Filed: September 13, 2006
    Date of Patent: March 3, 2009
    Assignee: International Business Machines Corporation
    Inventors: Renato J. Recio, Johnny Meng-Han Shieh, Jacobo A. Vargas
  • Patent number: 7496847
    Abstract: Displaying a computer resource through a preferred browser, including invoking a URL that identifies a computer resource; identifying, among a plurality of available browsers, a preferred browser for the resource; and displaying the resource through the preferred browser. Typical embodiments also include storing the URL in association with an identification of the preferred browser. In such embodiments, identifying a preferred browser for the resource also includes identifying the preferred browser in dependence upon the URL. Identifying the preferred browser may include requesting the resource through a default browser and receiving the resource in the default browser, the resource having meta-data comprising an identification of the preferred browser. Such embodiments also typically include storing the URL in association with the identification of the preferred browser.
    Type: Grant
    Filed: April 29, 2004
    Date of Patent: February 24, 2009
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Koehane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Murillo, Johnny Meng-Han Shieh
  • Patent number: 7493358
    Abstract: An apparatus, system and method of executing a monolithic application program successfully on a grid computing system are provided. Before the program is executed on the grid computing system, the program is executed on a computer on which the program has previously been successfully executed. During its execution, the program is monitored to collect its runtime information. The runtime information is provided to the grid computing system. With this information the grid computing system is able to successfully execute the program.
    Type: Grant
    Filed: September 18, 2003
    Date of Patent: February 17, 2009
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Murillo, Johnny Meng-Han Shieh
  • Patent number: 7490763
    Abstract: An application for disabling the use of selected applications is provided. A server receives identification information from a user. The location of the user is determined. If the user is determined to be in a reserved location, the use of one or more applications is disabled, for the user.
    Type: Grant
    Filed: August 4, 2005
    Date of Patent: February 17, 2009
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Murillo, Johnny Meng-Han Shieh
  • Patent number: 7483526
    Abstract: A method for using a centralized conference call manager is provided for initiating conference calls. Users register with the centralized conference call manager to set up a conference call at a future date and time. When the designated time/date arrive, the centralized conference call manager contacts the various intended attendees using a variety of contact locations (e.g., office telephone, mobile telephone, home telephone, etc.). The system further allows an intended attendee to, when contacted by the centralized conference call manager, provide a different contact number that the conference call manager will use instead. An anticipated attendee can decline the call and provide a verbal reason for not being able to attend. The centralized conference call manager records the reason and, when requested, plays the reason back to the other attendees.
    Type: Grant
    Filed: June 10, 2004
    Date of Patent: January 27, 2009
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Kelley Murillo, Johnny Meng-Han Shieh
  • Patent number: 7480855
    Abstract: An apparatus and method of highlighting a section of an HTML document based on who accesses the document are provided. When the document is accessed and displayed, a plurality of button associated each with a different part of the document is also displayed. When one of the buttons is asserted, the section of the document with which it is associated is highlighted.
    Type: Grant
    Filed: November 15, 2001
    Date of Patent: January 20, 2009
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Johnny Meng-Han Shieh
  • Patent number: 7467303
    Abstract: A method for mutual authorization of a secondary resource in a grid of resource computers is provided. When a primary resource attempts to offload a grid computing job to a secondary resource, the primary resource sends a proxy certificate request to the user machine. Responsive to a proxy certificate request, the user machine performs authorization with the secondary resource. If authorization with the secondary resource is successful, the user machine generates and returns a valid proxy certificate. The primary resource then performs mutual authentication with the secondary resource. If the authorization with the secondary resource fails, the user machine generates and returns an invalid proxy certificate. Mutual authentication between the primary resource and the secondary resource will fail due to the invalid proxy certificate. The primary resource then selects another secondary resource and repeats the process until a resource is found that passes the mutual authorization with the user machine.
    Type: Grant
    Filed: March 25, 2004
    Date of Patent: December 16, 2008
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Kelley Murillo, Johnny Meng-Han Shieh