1
Karen Ruth Kluttz, Sandeep Kishan Singhal: Methods, systems and computer program products for multi-level encryption. International Business Machines Corporation, A Bruce Clay Esq, Myers Bigel Sibley & Sajovec P A, July 22, 2003: US06598161 (190 worldwide citation)

Methods, systems and computer program products are provided which encrypt a document by dividing the document into at least a first portion having a first security level and a second portion having a second security level. The document is then encrypted utilizing at least two encryption keys so as t ...


2
Jeffery S Chase, Ronald P Doyle: Autonomic selection of a request routing policy based upon cache effectiveness. International Business Machines Corporation, A Bruce Clay Esq, Steven M Greenberg Esq, Carey Rodriguez Greenberg & Paul, June 23, 2009: US07552235 (148 worldwide citation)

The present invention is a system, method and apparatus for autonomic request routing policy selection. The system of the invention can include a multiplicity of pre-configured request routing policies and a data store of cache metrics for the pre-configured request routing policies. A routing polic ...


3
Satish Gungabeesoon: Accessing legacy applications from the Internet. International Business Machines Corporation, A Bruce Clay Esq, Hoffman Warnick & D Alessandro, February 28, 2006: US07007278 (55 worldwide citation)

Interactive legacy applications can be run from a network, such as the Internet, without requiring any code changes in the application. Typically, legacy applications are critical to a business, are self-contained on the computer, have mixed business and user interface logic, and were written before ...


4
Yongcheng Li, Yih Shin Tan, Brian Webb: Methods, systems, and computer program products for applying styles to host screens based on host screen content. International Business Machines Corporation, A Bruce Clay Esq, Myers Bigel Sibley & Sajovec P A, November 4, 2003: US06643825 (19 worldwide citation)

Screens generated by a host application are reformatted for viewing by applying styles to the host screens in response to recognized components included therein. In particular, a style defines a desired look and layout to be applied to a respective host screen. The styles are applied to the respecti ...


5
Arthur R Francis, Donald Washburn: Systems, methods and computer program products for chaining Java servlets across networks. International Business Machines Corporation, A Bruce Clay Esq, Myers Bigel Sibley & Sajovec, November 4, 2003: US06643708 (18 worldwide citation)

Systems, methods and computer program products are provided for using fully qualified universal resource locators (URLs) to chain together servlets across multiple remotely located Java® Virtual Machines (JVMs) in a network in order to implement application partitioning across the network. Each serv ...


6
Brian Charles Cope: Request tracking for analysis of website navigation. International Business Machines Corporation, A Bruce Clay Esq, Steven M Greenberg Esq, Carey Rodriguez Greenberg & Paul, March 18, 2008: US07346703 (16 worldwide citation)

A user's sequence of Web Browser requests when navigating within a single Web site are tracked. Requests for access to resources within the Web site are compared with redirection criteria and, if matching, are redirected to a request tracker which determines a session identifier (generating a new se ...


7
Simon P Warrington: System and method for managing web page components. International Business Machines Corporation, A Bruce Clay Esq, Hoffman Warnick & D Alessandro, March 20, 2007: US07194682 (16 worldwide citation)

A method and apparatus facilitate the creation and maintenance of web pages which include reusable, upgradeable components. The apparatus provides a simple client object which can identify and contain properties for reusable components from a library. The client object does not itself need to be upg ...


8
Brian K Martin: State machine for accessing a stealth firewall. International Business Machines Corporation, A Bruce Clay Esq, Steven M Greenberg Esq, Carey Rodriguez Greenberg & Paul, April 17, 2007: US07207061 (15 worldwide citation)

A stealth firewall. The stealth firewall can include a first network interface to an external network; a second network interface to an internal network; a packet filter for restricting access to the internal network, the packet filter ignoring requests from the external network to access the intern ...


9
John S Cox, Gennaro A Cuomo, Brian Keith Martin: Scenario based testing and load generation for web applications. International Business Machines Corporation, A Bruce Clay Esq, Steven M Greenberg Esq, November 13, 2007: US07295953 (15 worldwide citation)

In a Web application testing method which has been configured in accordance with the present invention, a network message from one of several network clients can be intercepted. Session data in the network message can be identified and state information retrieved for the session in the Web applicati ...


10
Jason R McGee, Michael John Morton, Brent A Peters: Instant messaging blind join. International Business Machines Corporation, A Bruce Clay Esq, Steven M Greenberg Esq, Christopher & Weisberg P A, June 6, 2006: US07058682 (12 worldwide citation)

A blind join apparatus, method and system for use with an instant messaging client. The blind join apparatus can include at least one set of pre-configured blind join options specifying a level of participation permitted by an invitee invited to anonymously join an instant messaging session in progr ...