Patents by Inventor Patrick Mullen

Patrick Mullen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20090063610
    Abstract: A user inputs event information into a data processing system which is stored in an application memory of an application. Message information contained in each incoming message received by a messaging service is compared to the event information. In the event that the message information corresponds to the event information a notification of the event is sent to a short-range wireless transmitter. The wireless transmitter transmits notification of the event to a remote receiver. Upon receipt of the wireless signal, the remote receiver triggers an alert notification notifying the user that data processing system has received the specified event.
    Type: Application
    Filed: August 27, 2007
    Publication date: March 5, 2009
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
  • Patent number: 7499988
    Abstract: A method and system for providing storage area network SAN level boot/installation services for appliances on a SAN. A generic maintenance “bootlv” is mirrored on at least one disk (or set of disks) that are located out on the SAN. The disk(s) are encoded with similar boot functions as a conventional boot CD. The disk(s) provides physical storage for a volume group that has the base install images and all of the optional Programming Product (OPP) images selected by the system administrator to be included in the install volume group. In one embodiment, a volume group made up of several disks is able to boot up and run from any one of the several disks since the bootlv is mirrored/copied on each of the disks.
    Type: Grant
    Filed: October 16, 2003
    Date of Patent: March 3, 2009
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Kelley Murillo, Johnny Meng-Han Shieh
  • Patent number: 7496755
    Abstract: A user device initiates a network access authentication operation via a network access device with a network access authentication server, e.g., a Remote Authentication Dial-In User Service (RADIUS) server, which also generates an X.509 proxy certificate and includes the proxy certificate with the information, such as a set of network access parameters, that is returned to the user device in response to a successful completion of the network access authentication operation. The user device extracts and stores the proxy certificate. The network access parameters are used by the user device to communicate via the network access device on a network, which supports a grid. When the user device accesses a resource in the grid, the proxy certificate is already available, thereby obviating the need to generate a new proxy certificate and allowing a user of the user device to experience an integrated single-sign-on for network access and grid access.
    Type: Grant
    Filed: July 1, 2003
    Date of Patent: February 24, 2009
    Assignee: International Business Machines Corporation
    Inventors: Denise Marie Genty, Shawn Patrick Mullen
  • Patent number: 7496847
    Abstract: Displaying a computer resource through a preferred browser, including invoking a URL that identifies a computer resource; identifying, among a plurality of available browsers, a preferred browser for the resource; and displaying the resource through the preferred browser. Typical embodiments also include storing the URL in association with an identification of the preferred browser. In such embodiments, identifying a preferred browser for the resource also includes identifying the preferred browser in dependence upon the URL. Identifying the preferred browser may include requesting the resource through a default browser and receiving the resource in the default browser, the resource having meta-data comprising an identification of the preferred browser. Such embodiments also typically include storing the URL in association with the identification of the preferred browser.
    Type: Grant
    Filed: April 29, 2004
    Date of Patent: February 24, 2009
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Koehane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Murillo, Johnny Meng-Han Shieh
  • Patent number: 7493358
    Abstract: An apparatus, system and method of executing a monolithic application program successfully on a grid computing system are provided. Before the program is executed on the grid computing system, the program is executed on a computer on which the program has previously been successfully executed. During its execution, the program is monitored to collect its runtime information. The runtime information is provided to the grid computing system. With this information the grid computing system is able to successfully execute the program.
    Type: Grant
    Filed: September 18, 2003
    Date of Patent: February 17, 2009
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Murillo, Johnny Meng-Han Shieh
  • Patent number: 7490763
    Abstract: An application for disabling the use of selected applications is provided. A server receives identification information from a user. The location of the user is determined. If the user is determined to be in a reserved location, the use of one or more applications is disabled, for the user.
    Type: Grant
    Filed: August 4, 2005
    Date of Patent: February 17, 2009
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Murillo, Johnny Meng-Han Shieh
  • Patent number: 7483526
    Abstract: A method for using a centralized conference call manager is provided for initiating conference calls. Users register with the centralized conference call manager to set up a conference call at a future date and time. When the designated time/date arrive, the centralized conference call manager contacts the various intended attendees using a variety of contact locations (e.g., office telephone, mobile telephone, home telephone, etc.). The system further allows an intended attendee to, when contacted by the centralized conference call manager, provide a different contact number that the conference call manager will use instead. An anticipated attendee can decline the call and provide a verbal reason for not being able to attend. The centralized conference call manager records the reason and, when requested, plays the reason back to the other attendees.
    Type: Grant
    Filed: June 10, 2004
    Date of Patent: January 27, 2009
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Kelley Murillo, Johnny Meng-Han Shieh
  • Publication number: 20090007277
    Abstract: The present invention provides a system and method for automatically hiding sensitive information, obtainable from a process table, from other processes that should not access the sensitive information. The system and method include a sensitive command attribute table that is used by a system administrator to designate the commands and command attributes that will typically be associated with sensitive information. The sensitive command attribute table is used when a command is entered that requests information from the process table to be displayed or output. In response, a search of the process table entries is made to determine if a command and/or its attribute in the process table matches an entry in the sensitive command attribute table. If so, the command, its attributes, and/or its attribute values are blanked from the output of the process table information.
    Type: Application
    Filed: May 22, 2008
    Publication date: January 1, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Denise Marie Genty, Shawn Patrick Mullen, James Stanley Tesauro
  • Patent number: 7467272
    Abstract: Exemplary methods, systems, and products are described that operate generally by moving subroutine return address protection to the processor itself, in effect proving atomic locks for subroutine return addresses stored in a stack, subject to application control. More particularly, exemplary methods, systems, and products are described that write protect subroutine return addresses by calling a subroutine, including storing in a stack memory address a subroutine return address and locking, by a computer processor, the stack memory address against write access. Calling a subroutine may include receiving in the computer processor an instruction to lock the stack memory address. Locking the stack memory address may be carried out by storing the stack memory address in a protected memory lockword. A protected memory lockword may be implemented as a portion of a protected content addressable memory.
    Type: Grant
    Filed: December 16, 2004
    Date of Patent: December 16, 2008
    Assignee: International Business Machines Corporation
    Inventors: Denise Marie Genty, Shawn Patrick Mullen, James Stanley Tesauro
  • Patent number: 7467303
    Abstract: A method for mutual authorization of a secondary resource in a grid of resource computers is provided. When a primary resource attempts to offload a grid computing job to a secondary resource, the primary resource sends a proxy certificate request to the user machine. Responsive to a proxy certificate request, the user machine performs authorization with the secondary resource. If authorization with the secondary resource is successful, the user machine generates and returns a valid proxy certificate. The primary resource then performs mutual authentication with the secondary resource. If the authorization with the secondary resource fails, the user machine generates and returns an invalid proxy certificate. Mutual authentication between the primary resource and the secondary resource will fail due to the invalid proxy certificate. The primary resource then selects another secondary resource and repeats the process until a resource is found that passes the mutual authorization with the user machine.
    Type: Grant
    Filed: March 25, 2004
    Date of Patent: December 16, 2008
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Kelley Murillo, Johnny Meng-Han Shieh
  • Publication number: 20080306997
    Abstract: A computer implemented method, apparatus, and computer usable program code for managing calendar conflicts. A plurality of calendar invitations waiting to be processed is identified to form a plurality of unprocessed calendar invitations. Calendar invitations are grouped within the plurality of unprocessed calendar invitations together that conflict with each other to form a group of conflicting calendar invitations. Each conflicting calendar invitation in the group of conflicting calendar invitations is presented in association with other calendar invitations in the group for resolution.
    Type: Application
    Filed: June 8, 2007
    Publication date: December 11, 2008
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
  • Publication number: 20080307235
    Abstract: A method, system and computer program product for automatically displaying the potential risk associated with cracking a password. While creating or modifying a password, feedback is provided describing the risk associated with cracking the password. Risk assessment may be presented as a percentage, accompanied by an explanation of why the value was ascertained. Risk feedback during password creation provides an opportunity to improve computer, document, and file security.
    Type: Application
    Filed: June 8, 2007
    Publication date: December 11, 2008
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
  • Patent number: 7461036
    Abstract: A computer implemented method for monitoring system events and providing real-time response to security threats. System data is collected by monitors in the computing system. The expert system of the present invention compares the data against information in a knowledge base to identify a security threat to a system resource in a form of a system event and an action for mitigating effects of the system event. A determination is made as to whether a threat risk value of the system event is greater than an action risk value of the action for mitigating the system event. If the threat risk value is greater, a determination is made as to whether a trust value set by a user is greater than the action risk value. If the trust value is greater, the expert system executes the action against the security threat.
    Type: Grant
    Filed: January 18, 2006
    Date of Patent: December 2, 2008
    Assignee: International Business Machines Corporation
    Inventors: Denise Marie Genty, Shawn Patrick Mullen, Bhargavi Bheemreddy Reddy, Jacqueline Hegedus Wilson
  • Publication number: 20080288601
    Abstract: A system and method for conditioned distribution of e-mail is provided. Delivery of an e-mail message to selected second recipients (equivalently addressees) may be conditioned on a set of preselected conditions, in particular to a set of conditions associated with the delivery of the e-mail to a set of first recipients. In response to message delivery notifications corresponding to the set of first recipients, a determination is made if the delivery conditions are satisfied, and delivery to the set of second recipients made accordingly. Delivery to a set of third recipients may be likewise conditioned on another set of conditions.
    Type: Application
    Filed: July 20, 2008
    Publication date: November 20, 2008
    Applicant: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Murillo, Johnny Meng-Han Shieh
  • Publication number: 20080263666
    Abstract: A computer implemented method, apparatus, and computer program product for port scan protection. A reply data packet having a modified transmission control protocol header is generated to form a modified reply data packet, in response to detecting a port scan. The modified reply data packet will illicit a response from a recipient of the modified data packet. The reply data packet is sent to a first Internet protocol address associated with the port scan. A second Internet protocol address is identified from a header of the response to the modified reply data packet. The second Internet protocol address is an actual Internet protocol address of a source of the port scan. All network traffic from the second Internet protocol address may be blocked to prevent an attack on any open ports from the source of the port scan.
    Type: Application
    Filed: April 23, 2007
    Publication date: October 23, 2008
    Inventors: SUSANN MARIE KEOHANE, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
  • Publication number: 20080256208
    Abstract: A method, system, and program for managing on-demand email storage are provided. An email service provider allocates a predetermined amount of storage space to an intended recipient. When an email is received for the intended recipient at the email service provider, the email service provider determines whether the predetermined storage space has sufficient capacity for storage of the email. If the predetermined storage space is insufficient for storage of the email, then the email service provider allocates on-demand storage space to the intended recipient. The email service provider then stores the email in the on-demand storage space, such that the email is stored, rather than discarded, when the predetermined storage space reaches full capacity. Before allocating on-demand storage space, the email service provider may compare the email characteristics with predefined criteria set by the intended recipient for emails to be stored in on-demand storage space.
    Type: Application
    Filed: June 22, 2008
    Publication date: October 16, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Murillo, Johnny Meng-Han Shieh
  • Publication number: 20080235777
    Abstract: Systems and methods for denying access to a data processing system by an intruder are provided. Input/output (I/O) on the intruder's connection may be taken over and responses mimicking a local terminal session passed back. On an attempted reconnect by the intruder, the user name and password used by the intruder to access the system may be captured. The password may then be changed on the edge system and the intruder's terminal session disconnected, or alternatively, continue to log the intruder's activity.
    Type: Application
    Filed: May 3, 2008
    Publication date: September 25, 2008
    Applicant: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Murillo, Johnny Meng-Han Shieh
  • Publication number: 20080229417
    Abstract: A computer implemented method, data processing system, and computer program product for monitoring system events and providing real-time response to security threats. System data is collected by monitors in the computing system. The expert system of the present invention compares the data against information in a knowledge base to identify a security threat to a system resource in a form of a system event and an action for mitigating effects of the system event. A determination is made as to whether a threat risk value of the system event is greater than an action risk value of the action for mitigating the system event. If the threat risk value is greater, a determination is made as to whether a trust value set by a user is greater than the action risk value. If the trust value is greater, the expert system executes the action against the security threat.
    Type: Application
    Filed: April 28, 2008
    Publication date: September 18, 2008
    Inventors: Denise Marie Genty, Shawn Patrick Mullen, Bhargavi Bheemreddy Reddy, Jacqueline Hegedus Wilson
  • Publication number: 20080189495
    Abstract: A computer implemented method, an apparatus, and a computer usable program product are provided for reestablishing the hotness, or the retention priority, of a page. When a page is paged out of memory, the page's then-current retention priority is saved. When the page is paged in again later, the retention priority of the page is updated to the retention priority that was saved at or before the time the page was last paged out.
    Type: Application
    Filed: February 2, 2007
    Publication date: August 7, 2008
    Inventors: Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
  • Patent number: D582737
    Type: Grant
    Filed: December 12, 2007
    Date of Patent: December 16, 2008
    Inventor: Patrick Mullen