Patents by Inventor Thomas H. Gnech

Thomas H. Gnech has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20110145346
    Abstract: A computer implemented method and system is provided for managing emails within an email system or email box. At the creation of a new email at the email system, an identification of its content (CID) is calculated, the result of that calculation being stored in a header of that email to be forwarded together with the new email. It is checked at the email system when receiving an email to determine whether the email includes a CID identifying the content of that email. If this is not the case, then a CID of the content of the received email is calculated, the resulting CID being stored in the header of that email together with the email. A comparison between the received email and the already stored emails at the email system is performed by comparing the corresponding CID of the received email with the CID of the stored emails. The email system is reorganized by superseding duplicate emails having the same CID.
    Type: Application
    Filed: October 22, 2010
    Publication date: June 16, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Thomas H. Gnech, III, Joachim Rese
  • Publication number: 20110145930
    Abstract: Controlling a user access through a computer network within a protected data environment of a computer environment. An exception list comprising an Identifier (URI) stored within the protected data environment for granting user access of an unauthorized user is defined. At least one allowed access property relation for user access is defined when accessed by the unauthorized user. A URI of a user access request of unauthorized user is checked in the exception list. A One-Time URI is created. The One-Time URI is assigned to the electronic data resource according to the allowed property relation. The requested is delivered to the unauthorized user by using the assigned One-Time URI.
    Type: Application
    Filed: December 3, 2010
    Publication date: June 16, 2011
    Applicant: International Business Machines Corporation
    Inventors: Thomas H. Gnech, Steffen Koenig, Enrico Mayer
  • Publication number: 20110145915
    Abstract: A method and technique for managing authentication procedures for a user having access to several applications within a computing environment includes registering at an authentication manager different applications to which a user shall be given an authentication access by defining at the authentication manager a specific address identification allowing addressing the application specific authentication rules, logging the user to the authentication manager, the user requesting access to an application accessible by the authentication manager, and using the application specific address identification stored at the authentication manager to retrieve the application specific authentication rules for authenticating the user to the requested application.
    Type: Application
    Filed: November 19, 2010
    Publication date: June 16, 2011
    Applicant: International Business Machines Corporation
    Inventors: Thomas H. Gnech, Rainer Himmelsbach, Oliver Petrik, Heike Schmidt
  • Publication number: 20100262589
    Abstract: A method includes associating a state identifier with a page of a user interface; associating an element identifier with an element of the page of the user interface; and tracking a state of the element based on the state identifier and the element identifier throughout a user session of the user interface.
    Type: Application
    Filed: April 9, 2009
    Publication date: October 14, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Thomas H. Gnech, Steffen Koenig, Oliver Petrik, Holger J. Scheller
  • Publication number: 20100057787
    Abstract: A method, system, and computer program product for implementing cloning operations in a distributed computing system are provided. The method includes preparing a database component of the system for a cloning operation. The preparation includes stopping activities occurring on the system except for the cloning operation, identifying current system state information from the database component and an application component of the system, and creating a self-contained system image of the database component that includes an image file of the database component and the current system state information. The method also includes restoring the system state of the application component by loading the self-contained system image on the database component, installing the image file of the database component on the database component, and updating the system state information on the database component and the application component from the self-contained system image, prior to restarting the system.
    Type: Application
    Filed: August 28, 2008
    Publication date: March 4, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Thomas H. Gnech, Steffen Koenig, Oliver Petrik, Holger J. Scheller