Patents by Inventor Mary Zurko

Mary Zurko has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070124381
    Abstract: A method and system for providing real time collaboration sessions among computer users. When a scheduling user selects a group of people for a real-time collaboration session, and some of the desired participants are not currently available, interface options are simultaneously provided that enable the user to either start the collaboration session with the currently available participants, or to invite all participants to join a session at future time determined to be the next time at which all desired users are available. The option of sending the electronic invitation may be provided to and accessed simultaneously with the display of the collaboration session interface, while the real-time collaboration session is underway. An invitation to immediately join a current real time collaboration session may further simultaneously provide the receiver with the options of either joining the session, or of responding by generating an electronic invitation to a future session.
    Type: Application
    Filed: November 22, 2005
    Publication date: May 31, 2007
    Inventor: Mary Zurko
  • Publication number: 20070118484
    Abstract: A method, system, and program product stored on a computer-readable medium, for conveying reliable identity in electronic collaboration that includes evaluating information element(s) of an electronic interaction (e.g., message) so as to obtain a “confidence value” of the identity of the sender of the electronic interaction, based on the evaluation of the information element(s) and then mapping, on a spectrum, either in a visual, aural, haptic olfactory, or a combination of modes, the “confidence value” to the electronic interaction sender. May be employed in e-mail, VoIP, instant messaging, and the like.
    Type: Application
    Filed: November 22, 2005
    Publication date: May 24, 2007
    Applicant: International Business Machines Corporation
    Inventors: Nathaniel Borenstein, Andrew Myers, Mary Zurko
  • Publication number: 20060259948
    Abstract: A method of handling electronic documents can include determining at least one safety parameter of an electronic document and classifying the electronic document based upon the at least one safety parameter. A restriction policy can be selected based upon the classifying step. The selected restriction policy can be implemented for handling the electronic document.
    Type: Application
    Filed: May 12, 2005
    Publication date: November 16, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Thomas Calow, Christoph Luecking, Martin Moore, Mary Zurko
  • Publication number: 20060212523
    Abstract: A method, system and apparatus for the policy based control of multiple message forwards. A method for policy based control of multiple message forwards can include reviewing a policy associated with a message to identify a set of recipients for a message. Responsive to a request to forward a substantially unmodified form of the message, the method also can include detecting based upon the reviewed policy an attempt to forward the substantially unmodified form of the message to a recipient who already has received the message.
    Type: Application
    Filed: March 21, 2005
    Publication date: September 21, 2006
    Applicant: International Business Machines Corporation
    Inventors: Fonda Daniels, Ruthie Lyle, Mary Zurko
  • Publication number: 20050198692
    Abstract: Described are a system and method for protecting a computing device from potentially harmful code in a document. One or more definitions of potentially harmful active content are provided in an editable text file. The document is compared with each definition of potentially harmful active content in the editable text file to identify potentially harmful active content within the document. The document is modified to render harmless any identified potentially harmful active content before presenting the document to the computing device.
    Type: Application
    Filed: March 2, 2004
    Publication date: September 8, 2005
    Applicant: International Business Machines Corporation
    Inventors: Mary Zurko, Veronica Morales, Robert Congdon
  • Publication number: 20050138367
    Abstract: The invention relates generally secure mail operations. More particularly, the invention provides a method for managing a user security credential, the method comprising: storing, in a file contained in a data store communicatively coupled to a mail server, a security credential associated with a user; authorizing a client to access the data store according to an access permission associated with the user; retrieving the security credential from the file; and initiating a security-related mail operation from the client using the security credential without the security credential leaving the server.
    Type: Application
    Filed: December 19, 2003
    Publication date: June 23, 2005
    Inventors: Robert Paganetti, Alan Eldridge, Charles Kaufman, Mary Zurko, Katherine Emling, Richard Davies
  • Publication number: 20050097354
    Abstract: A method for executing trusted commands, in which a trusted command is first received from a user at a user terminal and parsed by untrusted code; then passed to a trusted computing base for execution. The trusted computing base displays some indication of what is to be done back to the user for confirmation. Confirmation of the commands prevents unauthorized modification of the commands and increases system confidence. A randomly (or pseudo-randomly) generated process identifier is employed to verify the existence of a trusted path.
    Type: Application
    Filed: November 30, 2004
    Publication date: May 5, 2005
    Inventors: Mary Zurko, Thomas Casey, Morrie Gasser, Judith Hall, Clifford Kahn, Andrew Mason, Paul Sawyer, Leslie Kendall, Steven Lipner
  • Publication number: 20050039002
    Abstract: Under the present invention, a (computer) user logs into a distributed application provided on a server. After authentication, a security value (e.g., a pseudo-random number) is generated for the user. The security value is stored at the server, and then sent to the user along with session information. Thereafter, the security value is associated with a set (e.g., one or more) of commands of the distributed application. When one of the set of commands is received from the user, the URL corresponding thereto is checked for the security value. If the value is present, the command is permitted. However, if the security value is not present, the command is not permitted and an error message is returned to the user.
    Type: Application
    Filed: July 29, 2003
    Publication date: February 17, 2005
    Applicant: International Business Machines Corporation
    Inventors: Charles Kaufman, David Miller, Mary Zurko