Patents by Inventor Marcia L. Stockton

Marcia L. Stockton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9571484
    Abstract: Embodiments of the present invention address deficiencies of the art in respect to configuring a computing appliance and provide a method, system and computer program product for device certificate based virtual appliance configuration. In one embodiment of the invention, a virtual appliance secure configuration method can be provided. The method can include mounting non-volatile storage to the virtual appliance, retrieving a device certificate from the mounted storage and extracting a signature from the device certificate, activating the virtual appliance in a network domain and acquiring an adapter address and unique identifier for the virtual appliance, and authenticating the signature with the adapter address and unique identifier to ensure a unique active instance of the virtual appliance.
    Type: Grant
    Filed: May 26, 2015
    Date of Patent: February 14, 2017
    Assignee: International Business Machines Corporation
    Inventors: Ronald P. Doyle, John R. Hind, Marcia L. Stockton
  • Publication number: 20150281220
    Abstract: Embodiments of the present invention address deficiencies of the art in respect to configuring a computing appliance and provide a method, system and computer program product for device certificate based virtual appliance configuration. In one embodiment of the invention, a virtual appliance secure configuration method can be provided. The method can include mounting non-volatile storage to the virtual appliance, retrieving a device certificate from the mounted storage and extracting a signature from the device certificate, activating the virtual appliance in a network domain and acquiring an adapter address and unique identifier for the virtual appliance, and authenticating the signature with the adapter address and unique identifier to ensure a unique active instance of the virtual appliance.
    Type: Application
    Filed: May 26, 2015
    Publication date: October 1, 2015
    Inventors: Ronald P. Doyle, John R. Hind, Marcia L. Stockton
  • Patent number: 9055041
    Abstract: Embodiments of the present invention address deficiencies of the art in respect to configuring a computing appliance and provide a method, system and computer program product for device certificate based virtual appliance configuration. In one embodiment of the invention, a virtual appliance secure configuration method can be provided. The method can include mounting non-volatile storage to the virtual appliance, retrieving a device certificate from the mounted storage and extracting a signature from the device certificate, activating the virtual appliance in a network domain and acquiring an adapter address and unique identifier for the virtual appliance, and authenticating the signature with the adapter address and unique identifier to ensure a unique active instance of the virtual appliance.
    Type: Grant
    Filed: August 31, 2007
    Date of Patent: June 9, 2015
    Assignee: International Business Machines Corporation
    Inventors: Ronald P. Doyle, John R. Hind, Marcia L. Stockton
  • Patent number: 9043896
    Abstract: Embodiments of the present invention address deficiencies of the art in respect to configuring a computing appliance and provide a method, system and computer program product for device certificate based virtual appliance configuration. In one embodiment of the invention, a virtual appliance secure configuration method can be provided. The method can include mounting non-volatile storage to the virtual appliance, retrieving a device certificate from the mounted storage and extracting a signature from the device certificate, activating the virtual appliance in a network domain and acquiring an adapter address and unique identifier for the virtual appliance, and authenticating the signature with the adapter address and unique identifier to ensure a unique active instance of the virtual appliance.
    Type: Grant
    Filed: August 31, 2007
    Date of Patent: May 26, 2015
    Assignee: International Business Machines Corporation
    Inventors: Ronald P. Doyle, John R. Hind, Marcia L. Stockton
  • Patent number: 8832276
    Abstract: A method for circumventing the operation of content blocking logic in a markup language document delivery system. In the method of the invention, the operation of content blocking logic can be determined. Responsive to this determination, a reference to content disposed in markup can be located and the reference to the content can be replaced with an alias. Finally, the markup can be served to a requesting browser. In this way, the replacement of the reference with the alias circumvents the operation of the content blocking logic.
    Type: Grant
    Filed: August 18, 2003
    Date of Patent: September 9, 2014
    Assignee: International Business Machines Corporation
    Inventors: John R. Hind, Marcia L. Stockton
  • Patent number: 8432257
    Abstract: Techniques are disclosed for writing data directly onto a product to record each ownership transfer. As a result, the product itself now carries a traceable, auditable, non-forgeable, non-repudiable proof of ownership (and, optionally, ownership history) that can be used in a variety of ways. This recorded ownership transfer information provides an electronic receipt, which may be used by the present owner to prove his or her ownership. (Optionally, other types of transfers may be recorded in addition to, or instead of, ownership transfers.) A transfer agent or registrar may create a unique transaction identifier to represent the transfer, and preferably creates a cryptographic signature over fields representing the transfer. This information may be recorded in a repository that is external from the product.
    Type: Grant
    Filed: April 8, 2012
    Date of Patent: April 30, 2013
    Assignee: Toshiba Global Commerce Solutions Holdings Corporation
    Inventors: John R. Hind, Marcia L. Stockton
  • Patent number: 8258924
    Abstract: Techniques are disclosed for writing data directly onto a product to record each ownership transfer. As a result, the product itself now carries a traceable, auditable, non-forgeable, non-repudiable proof of ownership (and, optionally, ownership history) that can be used in a variety of ways. This recorded ownership transfer information provides an electronic receipt, which may be used by the present owner to prove his or her ownership. (Optionally, other types of transfers may be recorded in addition to, or instead of, ownership transfers.) A transfer agent or registrar creates a unique transaction identifier to represent the transfer, and preferably creates a cryptographic signature over fields representing the transfer. This information is then recorded in a repository that is external from the product.
    Type: Grant
    Filed: March 13, 2007
    Date of Patent: September 4, 2012
    Assignee: International Business Machines Corporation
    Inventors: John R. Hind, Marcia L. Stockton
  • Publication number: 20120197804
    Abstract: Techniques are disclosed for writing data directly onto a product to record each ownership transfer. As a result, the product itself now carries a traceable, auditable, non-forgeable, non-repudiable proof of ownership (and, optionally, ownership history) that can be used in a variety of ways. This recorded ownership transfer information provides an electronic receipt, which may be used by the present owner to prove his or her ownership. (Optionally, other types of transfers may be recorded in addition to, or instead of, ownership transfers.) A transfer agent or registrar may create a unique transaction identifier to represent the transfer, and preferably creates a cryptographic signature over fields representing the transfer. This information may be recorded in a repository that is external from the product.
    Type: Application
    Filed: April 8, 2012
    Publication date: August 2, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: John R. Hind, Marcia L. Stockton
  • Patent number: 8099600
    Abstract: A method, system and apparatus for detecting and preventing content distribution site impersonation. In this regard, a method for detecting and preventing content distribution site spoofing can include the steps of loading a markup language document and a corresponding digital signature for processing and ensuring that the digital signature originates from a pre-specified source of the markup language document incorporated within the markup language document. The method further can include the steps of dynamically computing a hash value for the markup language document and comparing the dynamically computed hash value to a hash value encrypted within the digital signature. Finally, the method can include the step of detecting content distribution site spoofing either if the digital signature does not originate from the pre-specified source, or if the dynamically computed hash value does not match the hash value encrypted within the digital signature.
    Type: Grant
    Filed: August 23, 2004
    Date of Patent: January 17, 2012
    Assignee: International Business Machines Corporation
    Inventors: John R. Hind, Marcia L. Stockton
  • Patent number: 7895523
    Abstract: Under the present invention, supplemental web content (e.g., an advertisement) referenced in a requested markup language document is detected and reduced in quality (i.e., obscured). In reducing the supplemental web content in quality, the present invention can employ any number of techniques such as removing color, animation or sound, reducing contrast or resolution, blurring the content, etc. In any event, the requested markup language document is rendered with the reduced quality supplemental web content. The supplemental web content can then be restored to its original quality, if the user so desires, based upon a prompt.
    Type: Grant
    Filed: September 4, 2003
    Date of Patent: February 22, 2011
    Assignee: International Business Machines Corporation
    Inventor: Marcia L. Stockton
  • Patent number: 7685645
    Abstract: Methods, systems, computer program products, and methods of doing business whereby document components are secured or controlled using “security containers” which encapsulate the components (and other component metadata). A “security container” encapsulates the component (i.e., content) that is to be controlled within a higher-level construct such as a compound document. The security container also contains rules for interacting with the encapsulated component, and one or more encryption keys usable for decrypting the component and rules for authorized requesters.
    Type: Grant
    Filed: April 14, 2008
    Date of Patent: March 23, 2010
    Assignee: International Business Machines Corporation
    Inventors: Ronald P. Doyle, John R. Hind, Marcia L. Stockton
  • Patent number: 7530489
    Abstract: Techniques are disclosed for detecting shoplifting or theft, particularly in a retail environment, using radio-frequency identification (“RFID”). Preferred embodiments leverage RFID tags on merchandise and RFID data that is written at the point of sale on the merchandise-borne RFID tags themselves, on the customer's receipt, or both. Some embodiments also leverage RFID tags on customer identification or “loyalty” cards. After writing RFID data on the merchandise-borne tags and/or receipt, a matching operation is performed at an RFID reader when the shopper and his merchandise exit the premises, in order to determine whether the shopper has paid for the items in his possession.
    Type: Grant
    Filed: April 10, 2007
    Date of Patent: May 12, 2009
    Assignee: International Business Machines Corporation
    Inventor: Marcia L. Stockton
  • Patent number: 7515717
    Abstract: Methods, systems, computer program products, and methods of doing business whereby document components are secured or controlled using “security containers” which encapsulate the components (and other component metadata). A “security container” encapsulates the component (i.e., content) that is to be controlled within a higher-level construct such as a compound document. The security container also contains rules for interacting with the encapsulated component, and one or more encryption keys usable for decrypting the component and rules for authorized requesters.
    Type: Grant
    Filed: July 31, 2003
    Date of Patent: April 7, 2009
    Assignee: International Business Machines Corporation
    Inventors: Ronald P. Doyle, John R. Hind, Marcia L. Stockton
  • Publication number: 20090063849
    Abstract: Embodiments of the present invention address deficiencies of the art in respect to configuring a computing appliance and provide a method, system and computer program product for device certificate based virtual appliance configuration. In one embodiment of the invention, a virtual appliance secure configuration method can be provided. The method can include mounting non-volatile storage to the virtual appliance, retrieving a device certificate from the mounted storage and extracting a signature from the device certificate, activating the virtual appliance in a network domain and acquiring an adapter address and unique identifier for the virtual appliance, and authenticating the signature with the adapter address and unique identifier to ensure a unique active instance of the virtual appliance.
    Type: Application
    Filed: August 31, 2007
    Publication date: March 5, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ronald P. Doyle, John R. Hind, Marcia L. Stockton
  • Publication number: 20090060187
    Abstract: Embodiments of the present invention address deficiencies of the art in respect to configuring a computing appliance and provide a method, system and computer program product for device certificate based virtual appliance configuration. In one embodiment of the invention, a virtual appliance secure configuration method can be provided. The method can include mounting non-volatile storage to the virtual appliance, retrieving a device certificate from the mounted storage and extracting a signature from the device certificate, activating the virtual appliance in a network domain and acquiring an adapter address and unique identifier for the virtual appliance, and authenticating the signature with the adapter address and unique identifier to ensure a unique active instance of the virtual appliance.
    Type: Application
    Filed: August 31, 2007
    Publication date: March 5, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ronald P. Doyle, John R. Hind, Marcia L. Stockton
  • Patent number: 7457946
    Abstract: The present invention provides a method and program product for randomly relaying a protected web request from a client, through a set of peers, to a privacy proxy. Once received, the web request is proxied to a web services provider. When a provider reply is received by the privacy proxy, it is protected and relayed back through a set of peers to the client.
    Type: Grant
    Filed: October 17, 2002
    Date of Patent: November 25, 2008
    Assignee: International Business Machines Corporation
    Inventors: John R. Hind, Marcia L. Stockton
  • Publication number: 20080243538
    Abstract: A computer mass storage system that hosts multiple users is managed by obtaining agreement with a user to provide a level of erasure of hosted data from the computer's mass storage system. The hosted data is then erased according to the level of erasure that was agreed upon. One of multiple levels of security also may be agreed upon and provided.
    Type: Application
    Filed: June 20, 2008
    Publication date: October 2, 2008
    Inventor: MARCIA L. STOCKTON
  • Publication number: 20080215897
    Abstract: Methods, systems, computer program products, and methods of doing business whereby document components are secured or controlled using “security containers” which encapsulate the components (and other component metadata). A “security container” encapsulates the component (i.e., content) that is to be controlled within a higher-level construct such as a compound document. The security container also contains rules for interacting with the encapsulated component, and one or more encryption keys usable for decrypting the component and rules for authorized requesters.
    Type: Application
    Filed: April 14, 2008
    Publication date: September 4, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ronald P. Doyle, John R. Hind, Marcia L. Stockton
  • Patent number: 7240824
    Abstract: Techniques are disclosed for detecting shoplifting or theft, particularly in a retail environment, using radio-frequency identification (“RFID”). Preferred embodiments leverage RFID tags on merchandise and RFID data that is written at the point of sale on the merchandise-borne RFID tags themselves, on the customer's receipt, or both. Some embodiments also leverage RFID tags on customer identification or “loyalty” cards. After writing RFID data on the merchandise-borne tags and/or receipt, a matching operation is performed at an RFID reader when the shopper and his merchandise exit the premises, in order to determine whether the shopper has paid for the items in his possession.
    Type: Grant
    Filed: September 19, 2003
    Date of Patent: July 10, 2007
    Assignee: International Business Machines Corporation
    Inventor: Marcia L. Stockton
  • Patent number: 7225167
    Abstract: Techniques are disclosed for writing data directly onto a product to record each ownership transfer. As a result, the product itself now carries a traceable, auditable, non-forgeable, non-repudiable proof of ownership (and, optionally, ownership history) that can be used in a variety of ways. This recorded ownership transfer information provides an electronic receipt, which may be used by the present owner to prove his or her ownership. (Optionally, other types of transfers may be recorded in addition to, or instead of, ownership transfers.) A transfer agent or registrar creates a unique transaction identifier to represent the transfer, and preferably creates a cryptographic signature over fields representing the transfer. This information is then recorded in a repository that is external from the product.
    Type: Grant
    Filed: November 21, 2003
    Date of Patent: May 29, 2007
    Assignee: International Business Machines Corporation
    Inventors: John R. Hind, Marcia L. Stockton