Patent application number | Description | Published |
20080235777 | SYSTEM AND COMPUTER PROGRAM PRODUCT FOR DENYING UNAUTHORIZED ACCESS TO A PRIVATE DATA PROCESSING NETWORK - Systems and methods for denying access to a data processing system by an intruder are provided. Input/output (I/O) on the intruder's connection may be taken over and responses mimicking a local terminal session passed back. On an attempted reconnect by the intruder, the user name and password used by the intruder to access the system may be captured. The password may then be changed on the edge system and the intruder's terminal session disconnected, or alternatively, continue to log the intruder's activity. | 09-25-2008 |
20080256208 | MANAGING ON-DEMAND EMAIL STORAGE - A method, system, and program for managing on-demand email storage are provided. An email service provider allocates a predetermined amount of storage space to an intended recipient. When an email is received for the intended recipient at the email service provider, the email service provider determines whether the predetermined storage space has sufficient capacity for storage of the email. If the predetermined storage space is insufficient for storage of the email, then the email service provider allocates on-demand storage space to the intended recipient. The email service provider then stores the email in the on-demand storage space, such that the email is stored, rather than discarded, when the predetermined storage space reaches full capacity. Before allocating on-demand storage space, the email service provider may compare the email characteristics with predefined criteria set by the intended recipient for emails to be stored in on-demand storage space. | 10-16-2008 |
20080263666 | METHOD AND APPARATUS FOR DETECTING PORT SCANS WITH FAKE SOURCE ADDRESS - A computer implemented method, apparatus, and computer program product for port scan protection. A reply data packet having a modified transmission control protocol header is generated to form a modified reply data packet, in response to detecting a port scan. The modified reply data packet will illicit a response from a recipient of the modified data packet. The reply data packet is sent to a first Internet protocol address associated with the port scan. A second Internet protocol address is identified from a header of the response to the modified reply data packet. The second Internet protocol address is an actual Internet protocol address of a source of the port scan. All network traffic from the second Internet protocol address may be blocked to prevent an attack on any open ports from the source of the port scan. | 10-23-2008 |
20080288601 | SYSTEM AND METHOD FOR CONDITIONED DELIVERY OF ELECTRONIC MAIL - A system and method for conditioned distribution of e-mail is provided. Delivery of an e-mail message to selected second recipients (equivalently addressees) may be conditioned on a set of preselected conditions, in particular to a set of conditions associated with the delivery of the e-mail to a set of first recipients. In response to message delivery notifications corresponding to the set of first recipients, a determination is made if the delivery conditions are satisfied, and delivery to the set of second recipients made accordingly. Delivery to a set of third recipients may be likewise conditioned on another set of conditions. | 11-20-2008 |
20080306997 | METHOD AND APPARATUS FOR MANAGING CALENDAR CONFLICTS - A computer implemented method, apparatus, and computer usable program code for managing calendar conflicts. A plurality of calendar invitations waiting to be processed is identified to form a plurality of unprocessed calendar invitations. Calendar invitations are grouped within the plurality of unprocessed calendar invitations together that conflict with each other to form a group of conflicting calendar invitations. Each conflicting calendar invitation in the group of conflicting calendar invitations is presented in association with other calendar invitations in the group for resolution. | 12-11-2008 |
20080307235 | METHOD OF PRESENTING FEEDBACK TO USER OF CHANCES OF PASSWORD CRACKING, AS THE PASSWORD IS BEING CREATED - A method, system and computer program product for automatically displaying the potential risk associated with cracking a password. While creating or modifying a password, feedback is provided describing the risk associated with cracking the password. Risk assessment may be presented as a percentage, accompanied by an explanation of why the value was ascertained. Risk feedback during password creation provides an opportunity to improve computer, document, and file security. | 12-11-2008 |
20090063610 | VIBRATING USB DATA KEY ACCESSORY - A user inputs event information into a data processing system which is stored in an application memory of an application. Message information contained in each incoming message received by a messaging service is compared to the event information. In the event that the message information corresponds to the event information a notification of the event is sent to a short-range wireless transmitter. The wireless transmitter transmits notification of the event to a remote receiver. Upon receipt of the wireless signal, the remote receiver triggers an alert notification notifying the user that data processing system has received the specified event. | 03-05-2009 |
20090070591 | Grid Mutual Authorization Through Proxy Certificate Generation - A mechanism for mutual authorization of a secondary resource in a grid of resource computers is provided. When a primary resource attempts to offload a grid computing job to a secondary resource, the primary resource sends a proxy certificate request to the user machine. Responsive to a proxy certificate request, the user machine performs authorization with the secondary resource. If authorization with the secondary resource is successful, the user machine generates and returns a valid proxy certificate. The primary resource then performs mutual authentication with the secondary resource. If the authorization with the secondary resource fails, the user machine generates and returns an invalid proxy certificate. Mutual authentication between the primary resource and the secondary resource will fail due to the invalid proxy certificate. The primary resource then selects another secondary resource and repeats the process until a resource is found that passes the mutual authorization with the user machine. | 03-12-2009 |
20090077631 | ALLOWING A DEVICE ACCESS TO A NETWORK IN A TRUSTED NETWORK CONNECT ENVIRONMENT - A computer implemented method of allowing a device access to a network in a trusted network connect environment. Responsive to receiving a request from the device to access the network, a type of the device is determined. Responsive to determining the type of the device, a policy for the device is determined based on the type of the device. Responsive to determining the policy for the device based on the type of the device, determining whether an integrity of the device satisfies the policy. Responsive to determining that the device does not satisfy the policy, performing a remediation action on the device. Responsive to determining that the device satisfies the policy, allowing the device access to the network. | 03-19-2009 |
20090094357 | ROGUE ROUTER HUNTER - A computer implemented method, data processing system, and computer program product for discovering an unauthorized router in a network. The process in the illustrative embodiments first obtains a physical address of a suspected router or destination device. A data packet is created which comprises at least a destination media access control field, a destination internet protocol field, and a time-to-live field, wherein the destination media access control field comprises the physical address of the destination device, wherein the destination internet protocol field comprises a bogus internet protocol address, and wherein the time-to-live field comprises a value indicating the data packet has exceeded a time limit. The data packet is sent to the destination device using the physical address in the destination media access control field. If a time exceeded message is received from the destination device, the destination device is determined to be enabled for routing. | 04-09-2009 |
20090094536 | SYSTEM AND METHOD FOR ADDING MEMBERS TO CHAT GROUPS BASED ON ANALYSIS OF CHAT CONTENT - A system, method, and program product is provided that selects an instant messaging message that includes one or more words in a text area. The instant message is a communication with an instant messaging participant that corresponds to an instant messaging participant identifier. A count is kept of the words that match keywords that are associated with a selected instant messaging group data store that is stored in a nonvolatile data area. If the count exceeds a particular threshold, the instant messaging participant identifier is added to the selected instant messaging group. | 04-09-2009 |
20090125848 | TOUCH SURFACE-SENSITIVE EDIT SYSTEM - A method, medium and implementing processing system are provided in which displayed text is manipulated using two fingers within an editing application to select a region of text or objects. In an example, two fingers are placed on a touch-sensitive display or touch pad and the region of text between the fingers is selected. The selected text can be manipulated as otherwise selected text is currently manipulated, e.g. cut, paste and copy functions can be performed. The movement of the fingers also performs this manipulation. In one example, if the fingers are brought to together, the selected text is cut, or a split screen could occur. If the fingers are placed together and then parted, the action would be to part the text to make room for a picture or other insert. | 05-14-2009 |
20090126018 | PASSWORD EXPIRATION BASED ON VULNERABILITY DETECTION - Illustrative embodiments provide a computer implemented method, a data processing system and a computer program product for password expiration based on vulnerability detection. The computer implemented method comprises receiving a request for a password after re-activating a user account and requesting a password generator, to create a hashed password. The method further comprises comparing the hashed password to a previously created password of a user, to determine a match entry. Responsive to determining a match entry, expiring an account of the user with respect to the match entry. | 05-14-2009 |
20090150194 | Method to Disable Use of Selected Applications Based on Proximity or User Identification - An application for disabling the use of selected applications is provided. A server receives identification information from a user. The location of the user is determined. If the user is determined to be in a reserved location, the use of one or more applications is disabled, for the user. | 06-11-2009 |
20090157793 | APPARATUS, SYSTEM AND METHOD OF EXECUTING MONOLITHIC APPLICATION PROGRAMS ON GRID COMPUTING SYSTEMS - An apparatus, system and method of executing a monolithic application program successfully on a grid computing system are provided. Before the program is executed on the grid computing system, the program is executed on a computer on which the program has previously been successfully executed. During its execution, the program is monitored to collect its runtime information. The runtime information is provided to the grid computing system. With this information the grid computing system is able to successfully execute the program. | 06-18-2009 |
20090199217 | METHOD AND SYSTEM FOR OVERRIDING POTENTIAL COMPETING OPTIMIZATION ALGORITHMS WITHIN LAYERS OF DEVICE DRIVERS - A method, system, and computer program product for managing data optimization routines in device drivers in a data transmission path. In a data transmission path, data optimization routines associated with device drivers are identified. When data is received in the data transmission path, a determination is made whether a data optimization routine associated with a device driver in the path comprises a same optimization or a competing optimization as a data optimization routine associated with one or more other device drivers in the path. If the data optimization routine for the device driver comprises a same or competing optimization routine as the data optimization routine associated with the other device drivers, one of the device drivers is selected to perform its associated data optimization routine on the data. A notification is sent to the other device drivers in the path to skip their associated data optimization routines on the data. | 08-06-2009 |
20090208002 | PREVENTING REPLAY ATTACKS IN ENCRYPTED FILE SYSTEMS - Replay attacks in an encrypted file system are prevented by generating a session key and providing the session key to one or more drive managers and an encrypted file system process. When a drive request is received by the encrypted file system process the drive request is encrypted using the generated session key. The encrypted drive request is sent to a drive manager. The drive manager attempts to decrypt the drive request using the session key. If the encrypted drive request is successfully decrypted, then the drive manager performs the requested operation. On the other hand, if the request is not decrypted successfully, then the request is not performed by the drive manager. Drive managers can include both disk device drivers and a logical volume managers. | 08-20-2009 |
20090265401 | Method, System and Computer Program Product for Shrinking a File System - Computer implemented method, system and computer program product for shrinking a file system in a data processing system. A computer implemented method for shrinking a file system in a data processing system includes designating an amount by which a file system comprised of a plurality of contiguous blocks is to be shrunk, and removing at least one contiguous intermediate block of the plurality of contiguous blocks from the file system to shrink the file system by the designated amount. | 10-22-2009 |
20090282348 | METHOD AND SYSTEM FOR ENHANCED MANAGEMENT OF MEETING CANCELLATIONS - The illustrative embodiments provide a computer implemented method and computer program product for managing a meeting cancellation. A selection of a meeting entry on a calendar for cancellation is received and a cancellation notification is sent to all invitees of the meeting. The meeting entry is marked as cancelled on each calendar of each invitee. Upon receiving a confirmation of the cancellation notification from an invitee, a percentage of cancellation confirmations received is calculated and the meeting entry is marked with the percentage of cancellation confirmations received. | 11-12-2009 |
20090307245 | Uninterrupted Data Access During the Migration of Data Between Physical File Systems - A Migration Thin Virtual File System (“MTVLS”) conducts file migration using a thin virtual layer that is size selectable and provides an uninterruptible migration path from the old file system to the new file system without an increase in the time to receive data. The MTVLS selects a file from the source file system, opens a corresponding file in the target system, mounts the thin virtual layer over the source file and the target file, and migrates that data from the source file to the target file. | 12-10-2009 |
20100017693 | Visual Macro Showing How Some Icon or Object or Text was Constructed - A Visual Macro Program records and replays desired actions performed by a user in creating or editing a document. The recorded actions are appended to the document as an attachment that can be replayed by a user at a later time by enabling a tag associated with the recorded actions. | 01-21-2010 |
20100115128 | TARGET ROUTING BY INITIATOR - An illustrative embodiment provides a computer-implemented method for target routing by initiator, using Internet small computer system interface. The computer-implemented method obtains a logical unit number configuration, containing a set of logical unit numbers, determines whether an initiator Internet protocol address, associated with a requester, has a mapping to a logical unit number in the set of logical unit numbers. The computer implemented method further sets a path for an input output/request from the requester to a backing file, according to the mapping, and returns success to the requester. | 05-06-2010 |
20100185604 | Search Results Embedded in a Table-Of-Contents - A computer implemented method, a computer program product, and a data processing system for presenting search results in the context of a table-of-contents. A keyword search term and a stratum-level are identified. An occurrence of the keyword search term is then identified from a searched document. The occurrence of the keyword search term is then presented within a context of a table-of-contents of the searched document, wherein the occurrence of the keyword search term is presented according to the indicated stratum-level. | 07-22-2010 |
20100293373 | INTEGRITY SERVICE USING REGENERATED TRUST INTEGRITY GATHER PROGRAM - An approach is provided to receive a request at a first computer system from a second system. The first system generates an encryption key, modifies retrieved source code by inserting the generated encryption key into the source code, and compiles the modified source code into an executable. A hash value of the executable program is calculated and is stored along with the encryption key in a memory area. The executable and the hash value are sent to the second system over a network. The executable is executed and it generates an encrypted result using the hash value and the embedded encryption key. The encrypted result is sent back to the first system where it is authenticated using the stored encryption key and hash value. | 11-18-2010 |
20120143852 | ADMINISTRATION OF SEARCH RESULTS - A web browser displays a set of search results from a web search, each search result indicating a link to a web page. Responsive to selection of a first of the set of search results for exclusion from display, a subset of one or more of the set of search results that indicate related links is identified. The related links comprise links have a same domain name as the link of the first search result. The first search result and the subset of the set of search results are excluded. The search results are displayed without the excluded ones of the set of search results. | 06-07-2012 |
20120284272 | Automated Electronic Message Filing System - A sender selection is detected at a sender computer system within a user interface of at least one suggested folder name for a composed electronic message for a recipient receiving the electronic message to select as a folder name for filing the electronic message. The at least one suggested folder name is attached to the electronic message at the sender computer system for distribution to the recipient. The electronic message is sent with the suggested filing folder name from the sender computer system to a recipient, wherein a recipient receiving the electronic message receives the at least one suggested folder name specified by the sender in the electronic message for selecting a folder for filing the electronic message in a messaging filing directory for the recipient. | 11-08-2012 |
20120284273 | Automated Electronic Message Filing System - A receipt receives an electronic message from a sender, wherein said electronic message comprises at least one suggested folder name specified by the sender for the recipient to select as a folder name for filing the electronic message, wherein the at least one suggested folder name is detected by a sender computer system from a selection by the sender within a user interface of the sender computer system of the at least one suggested folder name for the electronic message and inserted into the electronic message. The electronic message is filtered to detect the at least one suggested folder name for filing the electronic message in a messaging filing directory. Responsive to the recipient selecting to file the electronic message, the electronic message is filed in at least one folder with the suggested folder name from among a plurality of folders. | 11-08-2012 |
20130347088 | Remote Direct Memory Access Authentication of a Device - An approach is provided in which a server receives a first request from a client over a command port connection. The server, in turn, sends a first phase authentication token to the client over the command port and receives a second request from the client over a management port connection. In response, the server sends a second phase authentication token to the client over the management port connection, which the server receives back from the client over the command port connection. In turn, the server authenticates the client to utilize the command port connection accordingly. | 12-26-2013 |
20130347092 | Remote Direct Memory Access Authentication of a Device - An approach is provided in which a server receives a first request from a client over a command port connection. The server, in turn, sends a first phase authentication token to the client over the command port and receives a second request from the client over a management port connection. In response, the server sends a second phase authentication token to the client over the management port connection, which the server receives back from the client over the command port connection. In turn, the server authenticates the client to utilize the command port connection accordingly. | 12-26-2013 |