Patents by Inventor Shawn Patrick Mullen

Shawn Patrick Mullen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7752443
    Abstract: A user device initiates a network access authentication operation via a network access device with a network access authentication server, e.g., a Remote Authentication Dial-In User Service (RADIUS) server, which also generates an X.509 proxy certificate and includes the proxy certificate with the information, such as a set of network access parameters, that is returned to the user device in response to a successful completion of the network access authentication operation. The user device extracts and stores the proxy certificate. The network access parameters are used by the user device to communicate via the network access device on a network, which supports a grid. When the user device accesses a resource in the grid, the proxy certificate is already available, thereby obviating the need to generate a new proxy certificate and allowing a user of the user device to experience an integrated single-sign-on for network access and grid access.
    Type: Grant
    Filed: January 8, 2009
    Date of Patent: July 6, 2010
    Assignee: International Business Machines Corporation
    Inventors: Denise Marie Genty, Shawn Patrick Mullen
  • Patent number: 7747451
    Abstract: A system, method, data structure, and computer-readable medium for processing a command entered into a command processor interface in a data processing system. In accordance with the method of the present invention, a command is entered by a user into a command processor interface input line. A command path specified by the command processor interface is utilized for searching for the entered command. The command path includes at least one local path and a grid command directive. The grid command directive may include a grid service field containing a grid service specifier, and a host name field containing a locatable name or address of a processing or grid lookup resource. The grid command directive further includes a command field containing a grid resource lookup command. The command path searching includes sequentially processing the at least one local path and the grid command directive until an execution resource associated with the command is located.
    Type: Grant
    Filed: December 16, 2004
    Date of Patent: June 29, 2010
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Murillo, Johnny Meng-Han Shieh
  • Patent number: 7746988
    Abstract: A method, system and telephone answering device for processing control scripts attached to voice messages provides a mechanism by which a caller can leave an interactive list of contact information. The scripts provide for control of a display and input responses from a keypad or other input device so that an entry on the contact information list can be activated in response to user input, thus returning the call. The list information displayed may be arbitrary textual associations with the underlying contact number. The contact information may also include e-mail addresses, so that activation of an e-mail list element will activate a text messaging service, if available. For wireless telephone devices, the method implementing the present invention may be operable at the service provider only, so that standard wireless telephones may be programmed to provide the interactive list from a provider-side interpretation of the scripts.
    Type: Grant
    Filed: June 10, 2004
    Date of Patent: June 29, 2010
    Assignee: International Business Machines Corporation
    Inventors: Susan Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Kelley Murillo, Johnny Meng-Han Shieh
  • Patent number: 7725342
    Abstract: A plurality of acceptance messages associated with a first scheduled event having a scheduled event time are received. Each of the plurality of acceptance messages are associated with a respective user. A schedule conflict of a user associated with an acceptance message of the plurality of acceptance messages is identified. Responsive to identifying the schedule conflict, a probable attendance is calculated from the plurality of acceptance messages.
    Type: Grant
    Filed: March 25, 2004
    Date of Patent: May 25, 2010
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica K. Murillo, Johnny Meng-Han Shieh
  • Patent number: 7712660
    Abstract: An application for disabling the use of selected applications is provided. A server receives identification information from a user. The location of the user is determined. If the user is determined to be in a reserved location, the use of one or more applications is disabled, for the user.
    Type: Grant
    Filed: January 8, 2009
    Date of Patent: May 11, 2010
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Murillo, Johnny Meng-Han Shieh
  • Patent number: 7716061
    Abstract: The present invention provides a method, apparatus, and computer instructions for obtaining status information for processes executing in a grid. Responsive to a submission of a job from the data processing system to a remote node on the grid, a job identifier is received from the remote node. The job identifier is saved in a set of job identifiers. Responsive to a request for a status of jobs submitted from the data processing system, a job status request for each job identifier in the set of job identifiers for processes still executing is submitted using the set of job identifiers to form a set of job status requests. Responses to the set of job status requests are received. The responses are then presented.
    Type: Grant
    Filed: March 27, 2003
    Date of Patent: May 11, 2010
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Kelley Murillo, Johnny Meng-Han Shieh
  • Publication number: 20100017693
    Abstract: A Visual Macro Program records and replays desired actions performed by a user in creating or editing a document. The recorded actions are appended to the document as an attachment that can be replayed by a user at a later time by enabling a tag associated with the recorded actions.
    Type: Application
    Filed: July 16, 2008
    Publication date: January 21, 2010
    Applicant: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Jessica Carol Murillo, Johnny Meng-Han Shieh, Shawn Patrick Mullen
  • Patent number: 7647402
    Abstract: Protecting data files from being stolen or compromised in a data processing operation having stored data in a plurality of data files by receiving user requests for access to data files, determining whether said requests are unauthorized intrusions into the requested data files and, responsive to a determination that a request is an unauthorized intrusion, changing the identification of the requested data files by renaming the files. Preferably, the rename should be one which does not identify the contents of the file, i.e. the rename disguises the file contents. Then, it is also desirable that the renamed file be moved to a new “hidden” directory. In such a case, the renamed file is also assigned a covert name which indicates a covert location in the new directory. Then, there is provided a log referencing each renamed file to the covert name of the respective file so as to indicate the covert location of said file in said new directory.
    Type: Grant
    Filed: March 8, 2001
    Date of Patent: January 12, 2010
    Assignee: International Business Machines Corporation
    Inventors: Gerald Francis McBrearty, Shawn Patrick Mullen, Johnny Meng-Han Shieh, Michael William Wortman
  • Publication number: 20090307245
    Abstract: A Migration Thin Virtual File System (“MTVLS”) conducts file migration using a thin virtual layer that is size selectable and provides an uninterruptible migration path from the old file system to the new file system without an increase in the time to receive data. The MTVLS selects a file from the source file system, opens a corresponding file in the target system, mounts the thin virtual layer over the source file and the target file, and migrates that data from the source file to the target file.
    Type: Application
    Filed: June 10, 2008
    Publication date: December 10, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shawn Patrick Mullen, Jessica Carol Murillo, Gerald Francis McBrearty, Johnny Meng-Han Shieh, Susann Marie Keohane
  • Patent number: 7621443
    Abstract: A method, system and computer program product for enabling user-customization of an ATM display/receipt for a transaction carried out at an automated teller machine (ATM). The customer/user of the ATM creates/selects specific alerts to be outputted during subsequent ATM transactions. The alerts/notices are linked to the customer account. During subsequent access to the user's account via an ATM, the pre-selected alert/notice is displayed to the user or printed on the transaction receipt.
    Type: Grant
    Filed: August 30, 2007
    Date of Patent: November 24, 2009
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Murillo, Johnny Meng-Han Shieh
  • Publication number: 20090282348
    Abstract: The illustrative embodiments provide a computer implemented method and computer program product for managing a meeting cancellation. A selection of a meeting entry on a calendar for cancellation is received and a cancellation notification is sent to all invitees of the meeting. The meeting entry is marked as cancelled on each calendar of each invitee. Upon receiving a confirmation of the cancellation notification from an invitee, a percentage of cancellation confirmations received is calculated and the meeting entry is marked with the percentage of cancellation confirmations received.
    Type: Application
    Filed: May 9, 2008
    Publication date: November 12, 2009
    Applicant: International Business Machines Corporation
    Inventors: Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
  • Publication number: 20090208002
    Abstract: Replay attacks in an encrypted file system are prevented by generating a session key and providing the session key to one or more drive managers and an encrypted file system process. When a drive request is received by the encrypted file system process the drive request is encrypted using the generated session key. The encrypted drive request is sent to a drive manager. The drive manager attempts to decrypt the drive request using the session key. If the encrypted drive request is successfully decrypted, then the drive manager performs the requested operation. On the other hand, if the request is not decrypted successfully, then the request is not performed by the drive manager. Drive managers can include both disk device drivers and a logical volume managers.
    Type: Application
    Filed: February 20, 2008
    Publication date: August 20, 2009
    Inventors: Susann Marie Koehane, Gerald Francis McBrearty, Jessica Carol Murillo, Shawn Patrick Mullen, Johnny Meng-Han Shieh
  • Patent number: 7577623
    Abstract: A computer implemented method, data processing system, and computer program product for monitoring system events and providing real-time response to security threats. System data is collected by monitors in the computing system. The expert system of the present invention compares the data against information in a knowledge base to identify a security threat to a system resource in a form of a system event and an action for mitigating effects of the system event. A determination is made as to whether a threat risk value of the system event is greater than an action risk value of the action for mitigating the system event. If the threat risk value is greater, a determination is made as to whether a trust value set by a user is greater than the action risk value. If the trust value is greater, the expert system executes the action against the security threat.
    Type: Grant
    Filed: April 28, 2008
    Date of Patent: August 18, 2009
    Assignee: International Business Machines Corporation
    Inventors: Denise Marie Genty, Shawn Patrick Mullen, Bhargavi Bheemreddy Reddy, Jacqueline Hegedus Wilson
  • Publication number: 20090157793
    Abstract: An apparatus, system and method of executing a monolithic application program successfully on a grid computing system are provided. Before the program is executed on the grid computing system, the program is executed on a computer on which the program has previously been successfully executed. During its execution, the program is monitored to collect its runtime information. The runtime information is provided to the grid computing system. With this information the grid computing system is able to successfully execute the program.
    Type: Application
    Filed: January 13, 2009
    Publication date: June 18, 2009
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Murillo, Johnny Meng-Han Shieh
  • Publication number: 20090150194
    Abstract: An application for disabling the use of selected applications is provided. A server receives identification information from a user. The location of the user is determined. If the user is determined to be in a reserved location, the use of one or more applications is disabled, for the user.
    Type: Application
    Filed: January 8, 2009
    Publication date: June 11, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Murillo, Johnny Meng-Han Shieh
  • Patent number: 7533804
    Abstract: A method, system and computer program product for enabling user-customization of an ATM display/receipt for a transaction carried out at an automated teller machine (ATM). The customer/user of the ATM creates/selects specific alerts to be outputted during subsequent ATM transactions. The alerts/notices are linked to the customer account. During subsequent access to the user's account via an ATM, the pre-selected alert/notice is displayed to the user or printed on the transaction receipt.
    Type: Grant
    Filed: January 2, 2008
    Date of Patent: May 19, 2009
    Assignee: International Business Machines Corporation
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Murillo, Johnny Meng-Han Shieh
  • Publication number: 20090125848
    Abstract: A method, medium and implementing processing system are provided in which displayed text is manipulated using two fingers within an editing application to select a region of text or objects. In an example, two fingers are placed on a touch-sensitive display or touch pad and the region of text between the fingers is selected. The selected text can be manipulated as otherwise selected text is currently manipulated, e.g. cut, paste and copy functions can be performed. The movement of the fingers also performs this manipulation. In one example, if the fingers are brought to together, the selected text is cut, or a split screen could occur. If the fingers are placed together and then parted, the action would be to part the text to make room for a picture or other insert.
    Type: Application
    Filed: November 14, 2007
    Publication date: May 14, 2009
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
  • Publication number: 20090113533
    Abstract: A user device initiates a network access authentication operation via a network access device with a network access authentication server, e.g., a Remote Authentication Dial-In User Service (RADIUS) server, which also generates an X.509 proxy certificate and includes the proxy certificate with the information, such as a set of network access parameters, that is returned to the user device in response to a successful completion of the network access authentication operation. The user device extracts and stores the proxy certificate. The network access parameters are used by the user device to communicate via the network access device on a network, which supports a grid. When the user device accesses a resource in the grid, the proxy certificate is already available, thereby obviating the need to generate a new proxy certificate and allowing a user of the user device to experience an integrated single-sign-on for network access and grid access.
    Type: Application
    Filed: January 8, 2009
    Publication date: April 30, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Denise Marie Genty, Shawn Patrick Mullen
  • Publication number: 20090094536
    Abstract: A system, method, and program product is provided that selects an instant messaging message that includes one or more words in a text area. The instant message is a communication with an instant messaging participant that corresponds to an instant messaging participant identifier. A count is kept of the words that match keywords that are associated with a selected instant messaging group data store that is stored in a nonvolatile data area. If the count exceeds a particular threshold, the instant messaging participant identifier is added to the selected instant messaging group.
    Type: Application
    Filed: October 5, 2007
    Publication date: April 9, 2009
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
  • Publication number: 20090094357
    Abstract: A computer implemented method, data processing system, and computer program product for discovering an unauthorized router in a network. The process in the illustrative embodiments first obtains a physical address of a suspected router or destination device. A data packet is created which comprises at least a destination media access control field, a destination internet protocol field, and a time-to-live field, wherein the destination media access control field comprises the physical address of the destination device, wherein the destination internet protocol field comprises a bogus internet protocol address, and wherein the time-to-live field comprises a value indicating the data packet has exceeded a time limit. The data packet is sent to the destination device using the physical address in the destination media access control field. If a time exceeded message is received from the destination device, the destination device is determined to be enabled for routing.
    Type: Application
    Filed: October 5, 2007
    Publication date: April 9, 2009
    Inventors: Susann Marie Keohane, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh