Patents by Inventor Patrick Mullen

Patrick Mullen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7406505
    Abstract: A method, system, and program for managing on-demand email storage are provided. An email service provider allocates a predetermined amount of storage space to an intended recipient. When an email is received for the intended recipient at the email service provider, the email service provider determines whether the predetermined storage space has sufficient capacity for storage of the email. If the predetermined storage space is insufficient for storage of the email, then the email service provider allocates on-demand storage space to the intended recipient. The email service provider then stores the email in the on-demand storage space, such that the email is stored, rather than discarded, when the predetermined storage space reaches full capacity. Before allocating on-demand storage space, the email service provider may compare the email characteristics with predefined criteria set by the intended recipient for emails to be stored in on-demand storage space.
    Type: Grant
    Filed: April 29, 2004
    Date of Patent: July 29, 2008
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Murillo, Johnny Meng-Han Shieh
  • Publication number: 20080178264
    Abstract: A computer implemented method, apparatus, and computer program product for authenticating a user to a network. In response to receiving a request from a user to access a protected resource, the process sends a unique bit sequence into a network connection utilized by the user. Next, the process authenticates the user to access the protected resource in response to receiving a verification that the unique bit sequence was received by an access point that authenticated the user when the user logged on to the network.
    Type: Application
    Filed: January 20, 2007
    Publication date: July 24, 2008
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
  • Patent number: 7404206
    Abstract: An OSI layer 2 network device on the edge of a network such as a SAN is configured to replace the original source address of traffic entering the network with a known identifier or address, which is used to signify that entry point as the traffic source to the other nodes of the network. Nodes of the network recognize the new source address as a valid source address. The network device also maintains state (e.g., association of original source address with new source address/identifier) so as to translate addresses to enable reply traffic to be sent back to the original sender.
    Type: Grant
    Filed: July 16, 2002
    Date of Patent: July 22, 2008
    Assignee: YottaYotta, Inc.
    Inventors: Sima Noghanian, Patrick Mullen, Himanshu Dwivedi, Geoff Hayward, Bob Beck
  • Publication number: 20080168556
    Abstract: A method, apparatus, and computer instructions for responding to a denial of service attack. The method comprising from a remote data processing system detects an occurrence of the denial of service attack in which invalid credentials are presented to the data processing system. Connections from the remote data processing system to the data processing system are blocked in response to detecting the occurrence of the denial of service attack. A command is selectively sent to a server data processing system to block connections from the remote data processing system, in response to detecting the occurrence the denial of service attack.
    Type: Application
    Filed: March 17, 2008
    Publication date: July 10, 2008
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Kelley Murillo, Johnny Meng-Han Shieh
  • Publication number: 20080159511
    Abstract: An approach for using a centralized conference call manager is provided for initiating conference calls. Users register with the centralized conference call manager to set up a conference call at a future date and time. When the designated time/date arrive, the centralized conference call manager contacts the various intended attendees using a variety of contact locations (e.g., office telephone, mobile telephone, home telephone, etc.). The system further allows an intended attendee to, when contacted by the centralized conference call manager, provide a different contact number that the conference call manager will use instead. An anticipated attendee can decline the call and provide a verbal reason for not being able to attend. The centralized conference call manager records the reason and, when requested, plays the reason back to the other attendees.
    Type: Application
    Filed: March 15, 2008
    Publication date: July 3, 2008
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Kelley Murillo, Johnny Meng-Han Shieh
  • Publication number: 20080147800
    Abstract: A computer implemented method, apparatus, and computer usable program code for managing e-mail messages. A local copy of the e-mail message is stored on the data processing system for a selected period of time in response to sending an e-mail message to a recipient from a data processing system. A determination is made as to whether the local copy of the e-mail message is present in response to receiving a notification that the recipient is unable to respond. The local copy of the e-mail message is retrieved if the local copy of the e-mail message is present to form a retrieved e-mail message. The retrieved e-mail message is presented.
    Type: Application
    Filed: December 13, 2006
    Publication date: June 19, 2008
    Inventors: SUSANN MARIE KEOHANE, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
  • Publication number: 20080140777
    Abstract: A method, system, and program for selective mirrored site access from a communication are provided. When composing a communication, multiple mirrored site addresses are embedded with a target site address. The sender may request to enter the mirrored site addresses or a browser supplies the mirrored site addresses. At each client system receiving the communication, selections of site addresses accessible for each intended recipient are detected. Thus, each client system, when outputting the communication, displays the selection of mirrored site address accessible to the intended recipient accessing that client system.
    Type: Application
    Filed: February 14, 2008
    Publication date: June 12, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: SUSANN MARIE KEOHANE, GERALD FRANCIS MCBREARTY, SHAWN PATRICK MULLEN, JESSICA MURILLO, JOHNNY MENG-HAN SHIEH
  • Patent number: 7386887
    Abstract: Systems and methods for denying access to a data processing system by an intruder are provided. Input/output (I/O) on the intruder's connection may be taken over and responses mimicking a local terminal session passed back. On an attempted reconnect by the intruder, the user name and password used by the intruder to access the system may be captured. The password may then be changed on the edge system and the intruder's terminal session disconnected, or alternatively, continue to log the intruder's activity.
    Type: Grant
    Filed: July 1, 2003
    Date of Patent: June 10, 2008
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Murillo, Johnny Meng-Han Shieh
  • Publication number: 20080134332
    Abstract: A computer implemented method, apparatus, and computer usable program code for screening data packets. A determination is made as to whether a signature of a trusted security element is present in a header of the data packet in response to receiving a data packet. The signature indicates that a previous security action has been performed on the data packet. A security action is performed on the data packet based on the previous security action performed on the data packet in response to the signature of the trusted security element being present.
    Type: Application
    Filed: December 4, 2006
    Publication date: June 5, 2008
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
  • Patent number: 7380129
    Abstract: A method, apparatus, and computer instructions for authorizing a user to access grid resources. A request is received from the user to access a resource on the data processing system. This request includes a certificate. An authentication process is performed using the certificate when the request is received. In response to successfully authenticating the user in the authentication process, a first host name for the certificate is requested from a trusted source. A reply containing the first host name is received. Access to the resource is provided if the first host name returned by the trusted source matches a second host name for the user from which the request originated.
    Type: Grant
    Filed: April 22, 2004
    Date of Patent: May 27, 2008
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Kelley Murillo, Johnny Meng-Han Shieh
  • Patent number: 7380281
    Abstract: The present invention provides a system and method for automatically hiding sensitive information, obtainable from a process table, from other processes that should not access the sensitive information. The system and method include a sensitive command attribute table that is used by a system administrator to designate the commands and command attributes that will typically be associated with sensitive information. The sensitive command attribute table is used when a command is entered that requests information from the process table to be displayed or output. In response, a search of the process table entries is made to determine if a command and/or its attribute in the process table matches an entry in the sensitive command attribute table. If so, the command, its attributes, and/or its attribute values are blanked from the output of the process table information.
    Type: Grant
    Filed: May 6, 2004
    Date of Patent: May 27, 2008
    Assignee: International Business Machines Corporation
    Inventors: Denise Marie Genty, Shawn Patrick Mullen, James Stanley Tesauro
  • Patent number: 7360684
    Abstract: Controlling electronic withdrawals by a transaction processor including receiving in the transaction processor from a withdrawal device a withdrawal request, where the withdrawal request includes a withdrawal device identifier, a drawer identifier, a drawee identifier, and a withdrawal amount; transmitting from the transaction processor to a drawee a request for limitations on electronic withdrawals for the drawer, where the limitations include a limitation on drawer location; receiving in the transaction processor from storage in computer memory of the drawee data representing the limitations on electronic withdrawals for the drawer, including the limitation on drawer location; and authorizing, by the transaction processor, an electronic withdrawal in dependence upon the limitations, including the limitation on drawer location.
    Type: Grant
    Filed: October 7, 2004
    Date of Patent: April 22, 2008
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Murillo, Johnny Meng-Han Shieh
  • Patent number: 7360685
    Abstract: Controlling electronic withdrawals by a withdrawal device including creating in the withdrawal device a data structure representing a withdrawal request, where the data structure includes fields for a withdrawal device identifier, a drawer identifier, a drawee identifier, and a withdrawal amount; transmitting from the withdrawal device to a drawee a request for limitations on electronic withdrawals for the drawer, where the limitations include a limitation on drawer location; receiving in the withdrawal device from storage in computer memory of the drawee data representing the limitations on electronic withdrawals for the drawer, including the limitation on drawer location; and authorizing, by the withdrawal device, an electronic withdrawal in dependence upon the limitations, including the limitation on drawer location.
    Type: Grant
    Filed: October 7, 2004
    Date of Patent: April 22, 2008
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Murillo, Johnny Meng-Han Shieh
  • Patent number: 7363513
    Abstract: A method, apparatus, and computer instructions for responding to a denial of service attack. The method comprising from a remote data processing system detects an occurrence of the denial of service attack in which invalid credentials are presented to the data processing system. Connections from the remote data processing system to the data processing system are blocked in response to detecting the occurrence of the denial of service attack. A command is selectively sent to a server data processing system to block connections from the remote data processing system, in response to detecting the occurrence the denial of service attack.
    Type: Grant
    Filed: April 15, 2004
    Date of Patent: April 22, 2008
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Kelley Murillo, Johnny Meng-Han Shieh
  • Publication number: 20080088923
    Abstract: A polarizer comprising at least one subwavelength optical microstructure that includes linear prisms, and wherein said microstructure is partially covered with a light-transmissive inhibiting surface.
    Type: Application
    Filed: September 10, 2007
    Publication date: April 17, 2008
    Inventors: Robert Nilsen, Patrick Mullen, Michael Hanrahan, Edward Phillips
  • Patent number: 7356566
    Abstract: A method, system, and program for selective mirrored site access from a communication are provided. When composing a communication, multiple mirrored site addresses are embedded with a target site address. The sender may request to enter the mirrored site addresses or a browser supplies the mirrored site addresses. At each client system receiving the communication, selections of site addresses accessible for each intended recipient are detected. Thus, each client system, when outputting the communication, displays the selection of mirrored site address accessible to the intended recipient accessing that client system.
    Type: Grant
    Filed: October 9, 2003
    Date of Patent: April 8, 2008
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Murillo, Johnny Meng-Han Shieh
  • Patent number: 7346859
    Abstract: Administration of keyboard input in a computer having a display device supporting a graphical user interface (“GUI”), including storing keyboard input intended by a user for a second widget when keyboard focus is on a first widget, wherein the first widget receives no keyboard input; changing keyboard focus to the second widget; and providing the stored keyboard input to the second widget.
    Type: Grant
    Filed: March 31, 2004
    Date of Patent: March 18, 2008
    Assignee: Lenovo Singapore, Ltd.
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Murillo, Johnny Meng-Han Shieh
  • Publication number: 20080059586
    Abstract: A computer implemented method, apparatus and computer usable program code for processing e-mail messages. In response to a selection of a particular e-mail message from a sender as being undesired, a message identifier is stored in the e-mail message, wherein the message identifier uniquely identifies the e-mail message and any subsequent replies based on the e-mail message. Further, in response to receiving another e-mail message, the another e-mail message is processed using a policy to filter out e-mail messages containing the message identifier, wherein subsequent e-mail messages from the sender without the message identifier are unfiltered.
    Type: Application
    Filed: August 18, 2006
    Publication date: March 6, 2008
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Kelley Murillo, Johnny Meng-Han Shieh
  • Patent number: 7336280
    Abstract: Described is a method and system in which storyboard objects coordinate the animation of multiple elements and/or media displayed on a computer graphics display. Storyboards relate properties of elements in an element tree to a timeline, such that the properties associated with a storyboard are animated/play together as a group by starting, stopping, seeking or pausing the storyboard. Triggers, such as controlled by user interaction with the displayed information, including property triggers that change values in response to a state change, and event triggers that fire events, may cause the storyboard to start, stop, pause and seek. Storyboards may be used in XAML-based programs, and may be directly associated with elements, or indirectly associated with elements via styles. Complex properties and changeables are supported. Media playback may be controlled via storyboards, and thereby coordinated with other media playback and/or animations.
    Type: Grant
    Filed: November 18, 2004
    Date of Patent: February 26, 2008
    Assignee: Microsoft Corporation
    Inventors: Elizabeth K. Nelson, Greg D. Schechter, Leonardo E. Blanco, Matthew W. Calkins, Michael J. Hillberg, Namita Gupta, Sriram Subramanian, Kurt Jacob, Kenneth L. Young, Patrick Mullen
  • Patent number: 7328839
    Abstract: A method, system and computer program product for enabling user-customization of an ATM display/receipt for a transaction carried out at an automated teller machine (ATM). The customer/user of the ATM creates/selects specific alerts to be outputted during subsequent ATM transactions. The alerts/notices are linked to the customer account. During subsequent access to the user's account via an ATM, the pre-selected alert/notice is displayed to the user or printed on the transaction receipt.
    Type: Grant
    Filed: October 21, 2004
    Date of Patent: February 12, 2008
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Murillo, Johnny Meng-Han Shieh