1
Bernard J Halter, Alphonse M Bracco, Donald B Johnson, An V Le, Stephen M Matyas, Rostislaw Prymak deceased, James D Randall, John D Wilkins: Method and system for multimedia access control enablement. International Business Machines Corporation, John E Hoel, June 7, 1994: US05319705 (688 worldwide citation)

A method and system are disclosed for securely distributing a plurality of software files from a software distribution processor to a user processor, while selectively enabling the user processor to only use a subset of a lesser plurality of the software files. This is achieved by employing a custom ...


2
Alan R Tannenbaum, John M Zetts, Yu L An, Gordon W Arbeitman, Evon C Greanias, Guy F Verrier: Graphical user interface with gesture recognition in a multiapplication environment. International Business Machines Corporation, Jeffrey S LaBaw, John E Hoel, October 12, 1993: US05252951 (483 worldwide citation)

An advanced user interface for use with a computer system operating on an integrated operating environment. The integrated operating environment allows a plurality of application programs to be running simultaneously, one of which is designated the active application program to which all input data ...


3
Evon C Greanias, C Richard Guarnieri, John J Seeland Jr, Guy F Verrier, Robert L Donaldson: Combined finger touch and stylus detection system for use on the viewing surface of a visual display device. International Business Machines Corporation, John E Hoel, August 11, 1987: US04686332 (462 worldwide citation)

A combined finger touch and stylus detection system is disclosed for use on the viewing surface of the visual display device. Transparent conductors arranged in horizontal and vertical grid are supported on a flexible, transparent overlay membrane which is adaptable to a variety of displays. A uniqu ...


4
Paul C Hershey, Donald B Johnson, An V Le, Stephen M Matyas, John G Waclawsky, John D Wilkins: Network security system and method using a parallel finite state machine adaptive active monitor and responder. International Business Machines Corporation, Joseph C Redmond Jr, John E Hoel, John D Flynn, May 9, 1995: US05414833 (372 worldwide citation)

A system and method provide a security agent, consisting of a monitor and a responder, that respond to a detected security event in a data communications network, by producing and transmitting a security alert message to a network security manager. The alert is a security administration action which ...


5
Matthew S Hecht, Abhai Johri, Tsung T Wei, Douglas H Steves: Distributed security auditing subsystem for an operating system. International Business Machines Corporation, John E Hoel, July 16, 1991: US05032979 (351 worldwide citation)

The distributed auditing subsystem invention runs in a UNIX-like operating system environment with a hierarchical file system. The invention provides an audit trail of accesses to the objects it protects and maintains and protects that audit trail from modification or unauthorized access or destruct ...


6
Elie Cassorla, Jacqueline P de Vries, Michael E Moran, James J Slater, Jay Unger: Method for associating annotation with electronically published material. International Business Machines Corporation, John E Hoel, September 8, 1992: US05146552 (302 worldwide citation)

The operating principle permits a reader of an electronically published document to create notes, bookmarks, or annotations and relate them to a particular location in the document. The record of such annotations or "place marks" can be stored within or separately from the published material. Annota ...


7
Elena M Zamora: Computer method for automatic extraction of commonly specified information from business correspondence. International Business Machines Corporation, John E Hoel, October 23, 1990: US04965763 (285 worldwide citation)

A Parametric Information Extraction (PIE) system has been developed to identify automatically commonly specified information such as author, date, recipient, address, subject statement, etc. from documents in free format. The program-generated data can be used directly or can be supplemented manuall ...


8
Richard M Morten, Ted P Smith: Method and apparatus for linking an SNA host to a remote SNA host over a packet switched communications network. International Business Machines Corporation, John E Hoel, June 4, 1991: US05021949 (255 worldwide citation)

The invention disclosed herein provides the basic operating capabilities of SNA data communications for host based application-to-application sessions across a packet switched network such as the Defense Data Network (DDN). The problem that is presented by the integration of these two technologies i ...


9
Stephen M Matyas, Jonathan Oseas: Code protection using cryptography. International Business Machines Corporation, John E Hoel, Joseph C Clark George E Redmond Jr, July 12, 1988: US04757534 (240 worldwide citation)

A cryptographic method for discouraging the copying and sharing of purchased software programs allows an encrypted program to be run on only a designated computer or, alternatively, to be run on any computer but only by the user possessing a designated smart card. Each program offering sold by the s ...


10
Amy S C Cohen, Christopher F Gleason, Donald R Hyatt, Michael E Moran, Jeffrey N Stevens, Alan J Wecker: Data processing method to provide a generalized link from a reference point in an on-line book to an arbitrary multimedia object which can be dynamically updated. International Business Machines Corporation, John E Hoel, Edward H Duffield, November 22, 1994: US05367621 (236 worldwide citation)

A generalized link is provided in a data processing system to enable referencing from a point within an organized hierarchy of an on-line softcopy text, to an arbitrary multimedia object. The multimedia object may be represented by data which is also contained within the softcopy book or alternately ...



Click the thumbnails below to visualize the patent trend.