Patents by Inventor Johnny Meng-Han Shieh

Johnny Meng-Han Shieh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20080306997
    Abstract: A computer implemented method, apparatus, and computer usable program code for managing calendar conflicts. A plurality of calendar invitations waiting to be processed is identified to form a plurality of unprocessed calendar invitations. Calendar invitations are grouped within the plurality of unprocessed calendar invitations together that conflict with each other to form a group of conflicting calendar invitations. Each conflicting calendar invitation in the group of conflicting calendar invitations is presented in association with other calendar invitations in the group for resolution.
    Type: Application
    Filed: June 8, 2007
    Publication date: December 11, 2008
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
  • Publication number: 20080307235
    Abstract: A method, system and computer program product for automatically displaying the potential risk associated with cracking a password. While creating or modifying a password, feedback is provided describing the risk associated with cracking the password. Risk assessment may be presented as a percentage, accompanied by an explanation of why the value was ascertained. Risk feedback during password creation provides an opportunity to improve computer, document, and file security.
    Type: Application
    Filed: June 8, 2007
    Publication date: December 11, 2008
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
  • Publication number: 20080288601
    Abstract: A system and method for conditioned distribution of e-mail is provided. Delivery of an e-mail message to selected second recipients (equivalently addressees) may be conditioned on a set of preselected conditions, in particular to a set of conditions associated with the delivery of the e-mail to a set of first recipients. In response to message delivery notifications corresponding to the set of first recipients, a determination is made if the delivery conditions are satisfied, and delivery to the set of second recipients made accordingly. Delivery to a set of third recipients may be likewise conditioned on another set of conditions.
    Type: Application
    Filed: July 20, 2008
    Publication date: November 20, 2008
    Applicant: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Murillo, Johnny Meng-Han Shieh
  • Publication number: 20080263666
    Abstract: A computer implemented method, apparatus, and computer program product for port scan protection. A reply data packet having a modified transmission control protocol header is generated to form a modified reply data packet, in response to detecting a port scan. The modified reply data packet will illicit a response from a recipient of the modified data packet. The reply data packet is sent to a first Internet protocol address associated with the port scan. A second Internet protocol address is identified from a header of the response to the modified reply data packet. The second Internet protocol address is an actual Internet protocol address of a source of the port scan. All network traffic from the second Internet protocol address may be blocked to prevent an attack on any open ports from the source of the port scan.
    Type: Application
    Filed: April 23, 2007
    Publication date: October 23, 2008
    Inventors: SUSANN MARIE KEOHANE, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
  • Publication number: 20080262845
    Abstract: A method, system and computer-readable medium for generating, caching and transmitting textual equivalents of information contained in an audio signal are presented. The method includes generating a textual equivalent of at least a portion of a speech-based audio signal in one device into a textual equivalent, storing a portion of the textual equivalent in first device's memory and transmitting the stored textual equivalent to a another device.
    Type: Application
    Filed: April 18, 2007
    Publication date: October 23, 2008
    Inventors: Susann M. Keohane, Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny Meng-Han Shieh
  • Publication number: 20080256208
    Abstract: A method, system, and program for managing on-demand email storage are provided. An email service provider allocates a predetermined amount of storage space to an intended recipient. When an email is received for the intended recipient at the email service provider, the email service provider determines whether the predetermined storage space has sufficient capacity for storage of the email. If the predetermined storage space is insufficient for storage of the email, then the email service provider allocates on-demand storage space to the intended recipient. The email service provider then stores the email in the on-demand storage space, such that the email is stored, rather than discarded, when the predetermined storage space reaches full capacity. Before allocating on-demand storage space, the email service provider may compare the email characteristics with predefined criteria set by the intended recipient for emails to be stored in on-demand storage space.
    Type: Application
    Filed: June 22, 2008
    Publication date: October 16, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Murillo, Johnny Meng-Han Shieh
  • Publication number: 20080235777
    Abstract: Systems and methods for denying access to a data processing system by an intruder are provided. Input/output (I/O) on the intruder's connection may be taken over and responses mimicking a local terminal session passed back. On an attempted reconnect by the intruder, the user name and password used by the intruder to access the system may be captured. The password may then be changed on the edge system and the intruder's terminal session disconnected, or alternatively, continue to log the intruder's activity.
    Type: Application
    Filed: May 3, 2008
    Publication date: September 25, 2008
    Applicant: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Murillo, Johnny Meng-Han Shieh
  • Publication number: 20080222476
    Abstract: A system and method of utilizing a network to correct flawed media data. The media device includes a processor, a memory, a network adapter, a removable media interface, an error-correction module, and a communication module. The network device enables the media device to connect to the network and server. The removable media interface enables a user to couple a removable medium to the media device. After a user inserts a removable medium into the removable media interface, the processor and error-correction module examines the removable medium for physical errors. If the number of detected errors exceeds a predetermined threshold, the media device, via the network adapter and the communication module, queries a server for correction data. This correction data may be utilized by the media device to enable successful processing of the data stored on the removable medium.
    Type: Application
    Filed: May 21, 2008
    Publication date: September 11, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORP.
    Inventors: Mark J. Hamzy, Johnny Meng-Han Shieh
  • Publication number: 20080201545
    Abstract: A method of tying related process threads within non-related applications together in terms of memory paging behavior. In a data processing system, a first process thread is related to one or more “partner” threads within separate high latency storage locations. The kernel analyzes the memory “page-in” patterns of multiple threads and identifies one or more partner threads of the first thread based on user input, observed memory page-in patterns, and/or pre-defined identification information within the thread data structures. The kernel marks the first thread and its corresponding related partner threads with a unique thread identifier. When the first thread is subsequently paged into a lower latency memory, the kernel also pages-in the related partner threads that are marked with the unique thread identifier in lockstep. Tying related threads from non-related applications together in terms of memory paging behavior thus eliminates memory management delays.
    Type: Application
    Filed: February 20, 2007
    Publication date: August 21, 2008
    Inventors: Gerald F. McBrearty, Shawn P. Mullen, Jessica C. Murillo, Johnny Meng-Han Shieh
  • Publication number: 20080195927
    Abstract: Enabling the user to link a selected sequence of hypertext World Wide Web (Web) documents into a string and to store the string at his receiving Web display station so that these documents will be available for his use. An implementation at a receiving display station is provided for designating a received Web document as a starter document and for selecting a subsequently received Web document as a first next document. An implementation is provided for creating a hyperlink in the starter document to the first next document, together with means for storing said starter and next documents at said receiving display station. The invention further provides for an extension of the selected documents into a string through selecting one or more subsequently received Web documents as a subsequent next document and creating a hyperlink in the first next document to the subsequent next document.
    Type: Application
    Filed: February 22, 2008
    Publication date: August 14, 2008
    Applicant: International Business Machines Corporation
    Inventors: Gerald Francis McBrearty, Johnny Meng-Han Shieh
  • Publication number: 20080189562
    Abstract: A computer implemented method, an apparatus, and computer usable program code for reducing the amount of power used when executing a set of applications is provided. A controller determines an operating condition for the data processing system. Responsive to the operating condition being above a threshold, the controller switches the set of applications to a low power path. Responsive to the operating condition being below the threshold and the set of applications operating at the low power path, the controller switches the set of applications to a normal operating path.
    Type: Application
    Filed: February 7, 2007
    Publication date: August 7, 2008
    Inventors: Gerald Francis McBrearty, Ian Damain Romanick, Johnny Meng-Han Shieh
  • Publication number: 20080189495
    Abstract: A computer implemented method, an apparatus, and a computer usable program product are provided for reestablishing the hotness, or the retention priority, of a page. When a page is paged out of memory, the page's then-current retention priority is saved. When the page is paged in again later, the retention priority of the page is updated to the retention priority that was saved at or before the time the page was last paged out.
    Type: Application
    Filed: February 2, 2007
    Publication date: August 7, 2008
    Inventors: Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
  • Patent number: 7406505
    Abstract: A method, system, and program for managing on-demand email storage are provided. An email service provider allocates a predetermined amount of storage space to an intended recipient. When an email is received for the intended recipient at the email service provider, the email service provider determines whether the predetermined storage space has sufficient capacity for storage of the email. If the predetermined storage space is insufficient for storage of the email, then the email service provider allocates on-demand storage space to the intended recipient. The email service provider then stores the email in the on-demand storage space, such that the email is stored, rather than discarded, when the predetermined storage space reaches full capacity. Before allocating on-demand storage space, the email service provider may compare the email characteristics with predefined criteria set by the intended recipient for emails to be stored in on-demand storage space.
    Type: Grant
    Filed: April 29, 2004
    Date of Patent: July 29, 2008
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Murillo, Johnny Meng-Han Shieh
  • Publication number: 20080178264
    Abstract: A computer implemented method, apparatus, and computer program product for authenticating a user to a network. In response to receiving a request from a user to access a protected resource, the process sends a unique bit sequence into a network connection utilized by the user. Next, the process authenticates the user to access the protected resource in response to receiving a verification that the unique bit sequence was received by an access point that authenticated the user when the user logged on to the network.
    Type: Application
    Filed: January 20, 2007
    Publication date: July 24, 2008
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
  • Publication number: 20080168556
    Abstract: A method, apparatus, and computer instructions for responding to a denial of service attack. The method comprising from a remote data processing system detects an occurrence of the denial of service attack in which invalid credentials are presented to the data processing system. Connections from the remote data processing system to the data processing system are blocked in response to detecting the occurrence of the denial of service attack. A command is selectively sent to a server data processing system to block connections from the remote data processing system, in response to detecting the occurrence the denial of service attack.
    Type: Application
    Filed: March 17, 2008
    Publication date: July 10, 2008
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Kelley Murillo, Johnny Meng-Han Shieh
  • Publication number: 20080159511
    Abstract: An approach for using a centralized conference call manager is provided for initiating conference calls. Users register with the centralized conference call manager to set up a conference call at a future date and time. When the designated time/date arrive, the centralized conference call manager contacts the various intended attendees using a variety of contact locations (e.g., office telephone, mobile telephone, home telephone, etc.). The system further allows an intended attendee to, when contacted by the centralized conference call manager, provide a different contact number that the conference call manager will use instead. An anticipated attendee can decline the call and provide a verbal reason for not being able to attend. The centralized conference call manager records the reason and, when requested, plays the reason back to the other attendees.
    Type: Application
    Filed: March 15, 2008
    Publication date: July 3, 2008
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Kelley Murillo, Johnny Meng-Han Shieh
  • Publication number: 20080147800
    Abstract: A computer implemented method, apparatus, and computer usable program code for managing e-mail messages. A local copy of the e-mail message is stored on the data processing system for a selected period of time in response to sending an e-mail message to a recipient from a data processing system. A determination is made as to whether the local copy of the e-mail message is present in response to receiving a notification that the recipient is unable to respond. The local copy of the e-mail message is retrieved if the local copy of the e-mail message is present to form a retrieved e-mail message. The retrieved e-mail message is presented.
    Type: Application
    Filed: December 13, 2006
    Publication date: June 19, 2008
    Inventors: SUSANN MARIE KEOHANE, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
  • Publication number: 20080140777
    Abstract: A method, system, and program for selective mirrored site access from a communication are provided. When composing a communication, multiple mirrored site addresses are embedded with a target site address. The sender may request to enter the mirrored site addresses or a browser supplies the mirrored site addresses. At each client system receiving the communication, selections of site addresses accessible for each intended recipient are detected. Thus, each client system, when outputting the communication, displays the selection of mirrored site address accessible to the intended recipient accessing that client system.
    Type: Application
    Filed: February 14, 2008
    Publication date: June 12, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: SUSANN MARIE KEOHANE, GERALD FRANCIS MCBREARTY, SHAWN PATRICK MULLEN, JESSICA MURILLO, JOHNNY MENG-HAN SHIEH
  • Publication number: 20080141291
    Abstract: A storage medium that is one of a compact disk and a digital versatile disk. The storage medium includes a first portion, the first portion being an area of the storage medium that is read-only only. The storage medium includes a second portion, the second portion being another area of the storage medium upon which a second set of data can be written.
    Type: Application
    Filed: December 12, 2006
    Publication date: June 12, 2008
    Inventor: JOHNNY MENG-HAN SHIEH
  • Patent number: 7386887
    Abstract: Systems and methods for denying access to a data processing system by an intruder are provided. Input/output (I/O) on the intruder's connection may be taken over and responses mimicking a local terminal session passed back. On an attempted reconnect by the intruder, the user name and password used by the intruder to access the system may be captured. The password may then be changed on the edge system and the intruder's terminal session disconnected, or alternatively, continue to log the intruder's activity.
    Type: Grant
    Filed: July 1, 2003
    Date of Patent: June 10, 2008
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Murillo, Johnny Meng-Han Shieh