Patent application number | Description | Published |
20080235777 | SYSTEM AND COMPUTER PROGRAM PRODUCT FOR DENYING UNAUTHORIZED ACCESS TO A PRIVATE DATA PROCESSING NETWORK - Systems and methods for denying access to a data processing system by an intruder are provided. Input/output (I/O) on the intruder's connection may be taken over and responses mimicking a local terminal session passed back. On an attempted reconnect by the intruder, the user name and password used by the intruder to access the system may be captured. The password may then be changed on the edge system and the intruder's terminal session disconnected, or alternatively, continue to log the intruder's activity. | 09-25-2008 |
20080256208 | MANAGING ON-DEMAND EMAIL STORAGE - A method, system, and program for managing on-demand email storage are provided. An email service provider allocates a predetermined amount of storage space to an intended recipient. When an email is received for the intended recipient at the email service provider, the email service provider determines whether the predetermined storage space has sufficient capacity for storage of the email. If the predetermined storage space is insufficient for storage of the email, then the email service provider allocates on-demand storage space to the intended recipient. The email service provider then stores the email in the on-demand storage space, such that the email is stored, rather than discarded, when the predetermined storage space reaches full capacity. Before allocating on-demand storage space, the email service provider may compare the email characteristics with predefined criteria set by the intended recipient for emails to be stored in on-demand storage space. | 10-16-2008 |
20080263666 | METHOD AND APPARATUS FOR DETECTING PORT SCANS WITH FAKE SOURCE ADDRESS - A computer implemented method, apparatus, and computer program product for port scan protection. A reply data packet having a modified transmission control protocol header is generated to form a modified reply data packet, in response to detecting a port scan. The modified reply data packet will illicit a response from a recipient of the modified data packet. The reply data packet is sent to a first Internet protocol address associated with the port scan. A second Internet protocol address is identified from a header of the response to the modified reply data packet. The second Internet protocol address is an actual Internet protocol address of a source of the port scan. All network traffic from the second Internet protocol address may be blocked to prevent an attack on any open ports from the source of the port scan. | 10-23-2008 |
20080288601 | SYSTEM AND METHOD FOR CONDITIONED DELIVERY OF ELECTRONIC MAIL - A system and method for conditioned distribution of e-mail is provided. Delivery of an e-mail message to selected second recipients (equivalently addressees) may be conditioned on a set of preselected conditions, in particular to a set of conditions associated with the delivery of the e-mail to a set of first recipients. In response to message delivery notifications corresponding to the set of first recipients, a determination is made if the delivery conditions are satisfied, and delivery to the set of second recipients made accordingly. Delivery to a set of third recipients may be likewise conditioned on another set of conditions. | 11-20-2008 |
20080306997 | METHOD AND APPARATUS FOR MANAGING CALENDAR CONFLICTS - A computer implemented method, apparatus, and computer usable program code for managing calendar conflicts. A plurality of calendar invitations waiting to be processed is identified to form a plurality of unprocessed calendar invitations. Calendar invitations are grouped within the plurality of unprocessed calendar invitations together that conflict with each other to form a group of conflicting calendar invitations. Each conflicting calendar invitation in the group of conflicting calendar invitations is presented in association with other calendar invitations in the group for resolution. | 12-11-2008 |
20080307235 | METHOD OF PRESENTING FEEDBACK TO USER OF CHANCES OF PASSWORD CRACKING, AS THE PASSWORD IS BEING CREATED - A method, system and computer program product for automatically displaying the potential risk associated with cracking a password. While creating or modifying a password, feedback is provided describing the risk associated with cracking the password. Risk assessment may be presented as a percentage, accompanied by an explanation of why the value was ascertained. Risk feedback during password creation provides an opportunity to improve computer, document, and file security. | 12-11-2008 |
20090063610 | VIBRATING USB DATA KEY ACCESSORY - A user inputs event information into a data processing system which is stored in an application memory of an application. Message information contained in each incoming message received by a messaging service is compared to the event information. In the event that the message information corresponds to the event information a notification of the event is sent to a short-range wireless transmitter. The wireless transmitter transmits notification of the event to a remote receiver. Upon receipt of the wireless signal, the remote receiver triggers an alert notification notifying the user that data processing system has received the specified event. | 03-05-2009 |
20090070591 | Grid Mutual Authorization Through Proxy Certificate Generation - A mechanism for mutual authorization of a secondary resource in a grid of resource computers is provided. When a primary resource attempts to offload a grid computing job to a secondary resource, the primary resource sends a proxy certificate request to the user machine. Responsive to a proxy certificate request, the user machine performs authorization with the secondary resource. If authorization with the secondary resource is successful, the user machine generates and returns a valid proxy certificate. The primary resource then performs mutual authentication with the secondary resource. If the authorization with the secondary resource fails, the user machine generates and returns an invalid proxy certificate. Mutual authentication between the primary resource and the secondary resource will fail due to the invalid proxy certificate. The primary resource then selects another secondary resource and repeats the process until a resource is found that passes the mutual authorization with the user machine. | 03-12-2009 |
20090077631 | ALLOWING A DEVICE ACCESS TO A NETWORK IN A TRUSTED NETWORK CONNECT ENVIRONMENT - A computer implemented method of allowing a device access to a network in a trusted network connect environment. Responsive to receiving a request from the device to access the network, a type of the device is determined. Responsive to determining the type of the device, a policy for the device is determined based on the type of the device. Responsive to determining the policy for the device based on the type of the device, determining whether an integrity of the device satisfies the policy. Responsive to determining that the device does not satisfy the policy, performing a remediation action on the device. Responsive to determining that the device satisfies the policy, allowing the device access to the network. | 03-19-2009 |
20090094357 | ROGUE ROUTER HUNTER - A computer implemented method, data processing system, and computer program product for discovering an unauthorized router in a network. The process in the illustrative embodiments first obtains a physical address of a suspected router or destination device. A data packet is created which comprises at least a destination media access control field, a destination internet protocol field, and a time-to-live field, wherein the destination media access control field comprises the physical address of the destination device, wherein the destination internet protocol field comprises a bogus internet protocol address, and wherein the time-to-live field comprises a value indicating the data packet has exceeded a time limit. The data packet is sent to the destination device using the physical address in the destination media access control field. If a time exceeded message is received from the destination device, the destination device is determined to be enabled for routing. | 04-09-2009 |
20090094536 | SYSTEM AND METHOD FOR ADDING MEMBERS TO CHAT GROUPS BASED ON ANALYSIS OF CHAT CONTENT - A system, method, and program product is provided that selects an instant messaging message that includes one or more words in a text area. The instant message is a communication with an instant messaging participant that corresponds to an instant messaging participant identifier. A count is kept of the words that match keywords that are associated with a selected instant messaging group data store that is stored in a nonvolatile data area. If the count exceeds a particular threshold, the instant messaging participant identifier is added to the selected instant messaging group. | 04-09-2009 |
20090125848 | TOUCH SURFACE-SENSITIVE EDIT SYSTEM - A method, medium and implementing processing system are provided in which displayed text is manipulated using two fingers within an editing application to select a region of text or objects. In an example, two fingers are placed on a touch-sensitive display or touch pad and the region of text between the fingers is selected. The selected text can be manipulated as otherwise selected text is currently manipulated, e.g. cut, paste and copy functions can be performed. The movement of the fingers also performs this manipulation. In one example, if the fingers are brought to together, the selected text is cut, or a split screen could occur. If the fingers are placed together and then parted, the action would be to part the text to make room for a picture or other insert. | 05-14-2009 |
20090126018 | PASSWORD EXPIRATION BASED ON VULNERABILITY DETECTION - Illustrative embodiments provide a computer implemented method, a data processing system and a computer program product for password expiration based on vulnerability detection. The computer implemented method comprises receiving a request for a password after re-activating a user account and requesting a password generator, to create a hashed password. The method further comprises comparing the hashed password to a previously created password of a user, to determine a match entry. Responsive to determining a match entry, expiring an account of the user with respect to the match entry. | 05-14-2009 |
20090150194 | Method to Disable Use of Selected Applications Based on Proximity or User Identification - An application for disabling the use of selected applications is provided. A server receives identification information from a user. The location of the user is determined. If the user is determined to be in a reserved location, the use of one or more applications is disabled, for the user. | 06-11-2009 |
20090157793 | APPARATUS, SYSTEM AND METHOD OF EXECUTING MONOLITHIC APPLICATION PROGRAMS ON GRID COMPUTING SYSTEMS - An apparatus, system and method of executing a monolithic application program successfully on a grid computing system are provided. Before the program is executed on the grid computing system, the program is executed on a computer on which the program has previously been successfully executed. During its execution, the program is monitored to collect its runtime information. The runtime information is provided to the grid computing system. With this information the grid computing system is able to successfully execute the program. | 06-18-2009 |
20090307245 | Uninterrupted Data Access During the Migration of Data Between Physical File Systems - A Migration Thin Virtual File System (“MTVLS”) conducts file migration using a thin virtual layer that is size selectable and provides an uninterruptible migration path from the old file system to the new file system without an increase in the time to receive data. The MTVLS selects a file from the source file system, opens a corresponding file in the target system, mounts the thin virtual layer over the source file and the target file, and migrates that data from the source file to the target file. | 12-10-2009 |
20100017693 | Visual Macro Showing How Some Icon or Object or Text was Constructed - A Visual Macro Program records and replays desired actions performed by a user in creating or editing a document. The recorded actions are appended to the document as an attachment that can be replayed by a user at a later time by enabling a tag associated with the recorded actions. | 01-21-2010 |
20100185604 | Search Results Embedded in a Table-Of-Contents - A computer implemented method, a computer program product, and a data processing system for presenting search results in the context of a table-of-contents. A keyword search term and a stratum-level are identified. An occurrence of the keyword search term is then identified from a searched document. The occurrence of the keyword search term is then presented within a context of a table-of-contents of the searched document, wherein the occurrence of the keyword search term is presented according to the indicated stratum-level. | 07-22-2010 |
20120143852 | ADMINISTRATION OF SEARCH RESULTS - A web browser displays a set of search results from a web search, each search result indicating a link to a web page. Responsive to selection of a first of the set of search results for exclusion from display, a subset of one or more of the set of search results that indicate related links is identified. The related links comprise links have a same domain name as the link of the first search result. The first search result and the subset of the set of search results are excluded. The search results are displayed without the excluded ones of the set of search results. | 06-07-2012 |
20120284272 | Automated Electronic Message Filing System - A sender selection is detected at a sender computer system within a user interface of at least one suggested folder name for a composed electronic message for a recipient receiving the electronic message to select as a folder name for filing the electronic message. The at least one suggested folder name is attached to the electronic message at the sender computer system for distribution to the recipient. The electronic message is sent with the suggested filing folder name from the sender computer system to a recipient, wherein a recipient receiving the electronic message receives the at least one suggested folder name specified by the sender in the electronic message for selecting a folder for filing the electronic message in a messaging filing directory for the recipient. | 11-08-2012 |
20120284273 | Automated Electronic Message Filing System - A receipt receives an electronic message from a sender, wherein said electronic message comprises at least one suggested folder name specified by the sender for the recipient to select as a folder name for filing the electronic message, wherein the at least one suggested folder name is detected by a sender computer system from a selection by the sender within a user interface of the sender computer system of the at least one suggested folder name for the electronic message and inserted into the electronic message. The electronic message is filtered to detect the at least one suggested folder name for filing the electronic message in a messaging filing directory. Responsive to the recipient selecting to file the electronic message, the electronic message is filed in at least one folder with the suggested folder name from among a plurality of folders. | 11-08-2012 |
20130251264 | ANALYSIS OF HAND-DRAWN INPUT GROUPS - A method for analyzing groups of hand-drawn inputs receives from a set of computing devices a corresponding set of hand-drawn inputs. A user in a group of users interacts with a device in the set of devices to provide a hand-drawn input in the set of hand-drawn inputs corresponding to the device. The method analyzes a subset of the set of hand-drawn inputs to determine an accuracy of the hand-drawn inputs in the subset. The method generating a result responsive to the analyzing and presents the result. | 09-26-2013 |
20140006322 | ADAPTIVE COGNITIVE SUPPORT SYSTEM | 01-02-2014 |