Erich S. Magee - Cary NC, US Lisa H. Magee - Cary NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 15/16
US Classification:
709206, 709204, 709205, 709207, 358 115
Abstract:
A computer system and associated method to distribute an electronic communication object. The electronic communication object comprises a main communication and a first sub-communication object. The first sub-communication object is embedded within a main communication object. The main communication object comprises a first set of attributes and a first addressee. The first sub-communication object comprises a second set of attributes and a second addressee. A hierarchal relationship exists between the main communication object and the first sub-communication object such that the first sub-communication object inherits one or more of the first set of attributes from the main communication object if said one or more of the second set of attributes is not specified in the first sub-communication object. The main communication object and a first outline of the first sub-communication object is sent to the first addressee. The first sub-communication object is sent to the second addressee.
Annette Garland Irby - Clover VA, US Richard Philip Lacks - Raleigh NC, US Lisa Hayes Magee - Cary NC, US Timothy Wayne Owings - Lake Worth FL, US Tarn Martin Rosenbaum - Raleigh NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 11/00
US Classification:
714 47, 714 25, 714 39, 714 48
Abstract:
A monitoring system and method. The monitoring system receives specified rules related to at least one component within a computing system. The monitoring system receives first data comprising information related to at least one component within a computing system. The monitoring system comprises a repository. The first data is stored within the repository. The first data is analyzed by the monitoring system using specified rules to determine a first health status of the at least one component. The monitoring server indicates for a user the first health status.
Source Code Repair Method For Malicious Code Detection
James Edward Fox - Apex NC, US Erich Shannon Magee - Cary NC, US Lisa Hayes Magee - Cary NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 11/00
US Classification:
726 24, 726 22
Abstract:
A repair mechanism within a code management library system for repairing build code that is infected with malicious code. When a virus pattern is detected in a component of a source code, other components in the source code containing dependencies upon the first component are identified. This identification may be based on rules defined from relationships between the infected component and the other components in the source code. The component and the other components that are identified as having dependencies upon the infected component are retracted from the software product build. The infected component and the other identified components are then replaced with a previous archive of the code build. The software product build of the source code may then be performed.
Source Code Management Method For Malicious Code Detection
James Edward Fox - Apex NC, US Erich Shannon Magee - Cary NC, US Lisa Hayes Magee - Cary NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 11/30 G06F 11/00
US Classification:
713188, 713187, 726 22, 726 24
Abstract:
A system and method enhancing source code management with existing virus detection methods in a library management system to detect potentially malicious code. Malicious code that is introduced into a software product may be detected before the code is able to damage stored data and other software by preventing a product build with the malicious code. Source code received at a code management library system from a set of software developers in a collaborative development environment is moved into a staging area. A determination is made in the staging area as to whether malicious code exists in the source code. If malicious code exists, the library management system does not forward the source code to the software product build and notifies a system administrator of the presence of the malicious code.
Erich S. Magee - Cary NC, US Lisa H. Magee - Cary NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 15/16
US Classification:
379206, 709206, 715752
Abstract:
A computer system and associated method to distribute an electronic communication object. The electronic communication object comprises a main communication and a first sub-communication object. The first sub-communication object is embedded within a main communication object. The main communication object comprises a first set of attributes and a first addressee. The first sub-communication object comprises a second set of attributes and a second addressee. A hierarchal relationship exists between the main communication object and the first sub-communication object such that the first sub-communication object inherits one or more of the first set of attributes from the main communication object if said one or more of the second set of attributes is not specified in the first sub-communication object. The main communication object and a first outline of the first sub-communication object is sent to the first addressee. The first sub-communication object is sent to the second addressee.
Kyle Brown - Apex NC, US James Fox - Apex NC, US Robert Leah - Cary NC, US Lisa Magee - Morrisville NC, US Erich Magee - Morrisville NC, US Steven Miller - Apex NC, US Mark Weitzel - Durham NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F015/173 G06F015/16 G06F009/44
US Classification:
709/224000, 709/315000, 709/203000
Abstract:
Methods, systems, and computer program products for providing a heuristics service using a generically-consumable, reusable heuristics manager object. This heuristics manager object provides a “black box” approach to statistically-triggered heuristics, and eliminates the need to write application-specific code for compiling statistics and performing complicated analysis of those statistics within each application program. In one embodiment, the heuristics manager object is provided as a web-accessible service, which may be registered in a network-accessible registry such as a UDDI registry. Enterprises may subscribe to this service for monitoring and analyzing statistics pertaining to one or more of the enterprise's applications, thereby providing a novel method of doing business for the provider of the heuristics service.
Source Code Classification Method For Malicious Code Detection
James Fox - Apex NC, US Erich Magee - Cary NC, US Lisa Magee - Cary NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 9/32
US Classification:
713188000
Abstract:
A classification mechanism within the source code management system for customizing malicious code searches. This classification mechanism is used to limit the number of searches that are performed on incoming source code, as some malicious code searches may only need to be performed on particular modules, classes, components, etc. of the software product. When a library system is being set up to receive new source code, security classifications are created for the source code. Upon receiving the source code from a software developer, each component in the source code is associated to a security classification. A virus check is then performed on the components in the source code based on the associated security classifications. In this manner, only certain components may need to be checked for certain virus patterns, and other components may be checked for other virus patterns.
Tagline: ICE ICE BABY - nols; Me, Myself, and I: :.: .Lisaaa hey to my wee jerry n tom lol luv yas! (n to sorcha llf) "take a picture im on the wee mans bk" lol ...