Patents by Inventor Marcia L. Stockton
Marcia L. Stockton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9571484Abstract: Embodiments of the present invention address deficiencies of the art in respect to configuring a computing appliance and provide a method, system and computer program product for device certificate based virtual appliance configuration. In one embodiment of the invention, a virtual appliance secure configuration method can be provided. The method can include mounting non-volatile storage to the virtual appliance, retrieving a device certificate from the mounted storage and extracting a signature from the device certificate, activating the virtual appliance in a network domain and acquiring an adapter address and unique identifier for the virtual appliance, and authenticating the signature with the adapter address and unique identifier to ensure a unique active instance of the virtual appliance.Type: GrantFiled: May 26, 2015Date of Patent: February 14, 2017Assignee: International Business Machines CorporationInventors: Ronald P. Doyle, John R. Hind, Marcia L. Stockton
-
Publication number: 20150281220Abstract: Embodiments of the present invention address deficiencies of the art in respect to configuring a computing appliance and provide a method, system and computer program product for device certificate based virtual appliance configuration. In one embodiment of the invention, a virtual appliance secure configuration method can be provided. The method can include mounting non-volatile storage to the virtual appliance, retrieving a device certificate from the mounted storage and extracting a signature from the device certificate, activating the virtual appliance in a network domain and acquiring an adapter address and unique identifier for the virtual appliance, and authenticating the signature with the adapter address and unique identifier to ensure a unique active instance of the virtual appliance.Type: ApplicationFiled: May 26, 2015Publication date: October 1, 2015Inventors: Ronald P. Doyle, John R. Hind, Marcia L. Stockton
-
Patent number: 9055041Abstract: Embodiments of the present invention address deficiencies of the art in respect to configuring a computing appliance and provide a method, system and computer program product for device certificate based virtual appliance configuration. In one embodiment of the invention, a virtual appliance secure configuration method can be provided. The method can include mounting non-volatile storage to the virtual appliance, retrieving a device certificate from the mounted storage and extracting a signature from the device certificate, activating the virtual appliance in a network domain and acquiring an adapter address and unique identifier for the virtual appliance, and authenticating the signature with the adapter address and unique identifier to ensure a unique active instance of the virtual appliance.Type: GrantFiled: August 31, 2007Date of Patent: June 9, 2015Assignee: International Business Machines CorporationInventors: Ronald P. Doyle, John R. Hind, Marcia L. Stockton
-
Patent number: 9043896Abstract: Embodiments of the present invention address deficiencies of the art in respect to configuring a computing appliance and provide a method, system and computer program product for device certificate based virtual appliance configuration. In one embodiment of the invention, a virtual appliance secure configuration method can be provided. The method can include mounting non-volatile storage to the virtual appliance, retrieving a device certificate from the mounted storage and extracting a signature from the device certificate, activating the virtual appliance in a network domain and acquiring an adapter address and unique identifier for the virtual appliance, and authenticating the signature with the adapter address and unique identifier to ensure a unique active instance of the virtual appliance.Type: GrantFiled: August 31, 2007Date of Patent: May 26, 2015Assignee: International Business Machines CorporationInventors: Ronald P. Doyle, John R. Hind, Marcia L. Stockton
-
Patent number: 8832276Abstract: A method for circumventing the operation of content blocking logic in a markup language document delivery system. In the method of the invention, the operation of content blocking logic can be determined. Responsive to this determination, a reference to content disposed in markup can be located and the reference to the content can be replaced with an alias. Finally, the markup can be served to a requesting browser. In this way, the replacement of the reference with the alias circumvents the operation of the content blocking logic.Type: GrantFiled: August 18, 2003Date of Patent: September 9, 2014Assignee: International Business Machines CorporationInventors: John R. Hind, Marcia L. Stockton
-
Patent number: 8432257Abstract: Techniques are disclosed for writing data directly onto a product to record each ownership transfer. As a result, the product itself now carries a traceable, auditable, non-forgeable, non-repudiable proof of ownership (and, optionally, ownership history) that can be used in a variety of ways. This recorded ownership transfer information provides an electronic receipt, which may be used by the present owner to prove his or her ownership. (Optionally, other types of transfers may be recorded in addition to, or instead of, ownership transfers.) A transfer agent or registrar may create a unique transaction identifier to represent the transfer, and preferably creates a cryptographic signature over fields representing the transfer. This information may be recorded in a repository that is external from the product.Type: GrantFiled: April 8, 2012Date of Patent: April 30, 2013Assignee: Toshiba Global Commerce Solutions Holdings CorporationInventors: John R. Hind, Marcia L. Stockton
-
Patent number: 8258924Abstract: Techniques are disclosed for writing data directly onto a product to record each ownership transfer. As a result, the product itself now carries a traceable, auditable, non-forgeable, non-repudiable proof of ownership (and, optionally, ownership history) that can be used in a variety of ways. This recorded ownership transfer information provides an electronic receipt, which may be used by the present owner to prove his or her ownership. (Optionally, other types of transfers may be recorded in addition to, or instead of, ownership transfers.) A transfer agent or registrar creates a unique transaction identifier to represent the transfer, and preferably creates a cryptographic signature over fields representing the transfer. This information is then recorded in a repository that is external from the product.Type: GrantFiled: March 13, 2007Date of Patent: September 4, 2012Assignee: International Business Machines CorporationInventors: John R. Hind, Marcia L. Stockton
-
Publication number: 20120197804Abstract: Techniques are disclosed for writing data directly onto a product to record each ownership transfer. As a result, the product itself now carries a traceable, auditable, non-forgeable, non-repudiable proof of ownership (and, optionally, ownership history) that can be used in a variety of ways. This recorded ownership transfer information provides an electronic receipt, which may be used by the present owner to prove his or her ownership. (Optionally, other types of transfers may be recorded in addition to, or instead of, ownership transfers.) A transfer agent or registrar may create a unique transaction identifier to represent the transfer, and preferably creates a cryptographic signature over fields representing the transfer. This information may be recorded in a repository that is external from the product.Type: ApplicationFiled: April 8, 2012Publication date: August 2, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John R. Hind, Marcia L. Stockton
-
Patent number: 8099600Abstract: A method, system and apparatus for detecting and preventing content distribution site impersonation. In this regard, a method for detecting and preventing content distribution site spoofing can include the steps of loading a markup language document and a corresponding digital signature for processing and ensuring that the digital signature originates from a pre-specified source of the markup language document incorporated within the markup language document. The method further can include the steps of dynamically computing a hash value for the markup language document and comparing the dynamically computed hash value to a hash value encrypted within the digital signature. Finally, the method can include the step of detecting content distribution site spoofing either if the digital signature does not originate from the pre-specified source, or if the dynamically computed hash value does not match the hash value encrypted within the digital signature.Type: GrantFiled: August 23, 2004Date of Patent: January 17, 2012Assignee: International Business Machines CorporationInventors: John R. Hind, Marcia L. Stockton
-
Patent number: 7895523Abstract: Under the present invention, supplemental web content (e.g., an advertisement) referenced in a requested markup language document is detected and reduced in quality (i.e., obscured). In reducing the supplemental web content in quality, the present invention can employ any number of techniques such as removing color, animation or sound, reducing contrast or resolution, blurring the content, etc. In any event, the requested markup language document is rendered with the reduced quality supplemental web content. The supplemental web content can then be restored to its original quality, if the user so desires, based upon a prompt.Type: GrantFiled: September 4, 2003Date of Patent: February 22, 2011Assignee: International Business Machines CorporationInventor: Marcia L. Stockton
-
Patent number: 7685645Abstract: Methods, systems, computer program products, and methods of doing business whereby document components are secured or controlled using “security containers” which encapsulate the components (and other component metadata). A “security container” encapsulates the component (i.e., content) that is to be controlled within a higher-level construct such as a compound document. The security container also contains rules for interacting with the encapsulated component, and one or more encryption keys usable for decrypting the component and rules for authorized requesters.Type: GrantFiled: April 14, 2008Date of Patent: March 23, 2010Assignee: International Business Machines CorporationInventors: Ronald P. Doyle, John R. Hind, Marcia L. Stockton
-
Patent number: 7530489Abstract: Techniques are disclosed for detecting shoplifting or theft, particularly in a retail environment, using radio-frequency identification (“RFID”). Preferred embodiments leverage RFID tags on merchandise and RFID data that is written at the point of sale on the merchandise-borne RFID tags themselves, on the customer's receipt, or both. Some embodiments also leverage RFID tags on customer identification or “loyalty” cards. After writing RFID data on the merchandise-borne tags and/or receipt, a matching operation is performed at an RFID reader when the shopper and his merchandise exit the premises, in order to determine whether the shopper has paid for the items in his possession.Type: GrantFiled: April 10, 2007Date of Patent: May 12, 2009Assignee: International Business Machines CorporationInventor: Marcia L. Stockton
-
Patent number: 7515717Abstract: Methods, systems, computer program products, and methods of doing business whereby document components are secured or controlled using “security containers” which encapsulate the components (and other component metadata). A “security container” encapsulates the component (i.e., content) that is to be controlled within a higher-level construct such as a compound document. The security container also contains rules for interacting with the encapsulated component, and one or more encryption keys usable for decrypting the component and rules for authorized requesters.Type: GrantFiled: July 31, 2003Date of Patent: April 7, 2009Assignee: International Business Machines CorporationInventors: Ronald P. Doyle, John R. Hind, Marcia L. Stockton
-
Publication number: 20090063849Abstract: Embodiments of the present invention address deficiencies of the art in respect to configuring a computing appliance and provide a method, system and computer program product for device certificate based virtual appliance configuration. In one embodiment of the invention, a virtual appliance secure configuration method can be provided. The method can include mounting non-volatile storage to the virtual appliance, retrieving a device certificate from the mounted storage and extracting a signature from the device certificate, activating the virtual appliance in a network domain and acquiring an adapter address and unique identifier for the virtual appliance, and authenticating the signature with the adapter address and unique identifier to ensure a unique active instance of the virtual appliance.Type: ApplicationFiled: August 31, 2007Publication date: March 5, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ronald P. Doyle, John R. Hind, Marcia L. Stockton
-
Publication number: 20090060187Abstract: Embodiments of the present invention address deficiencies of the art in respect to configuring a computing appliance and provide a method, system and computer program product for device certificate based virtual appliance configuration. In one embodiment of the invention, a virtual appliance secure configuration method can be provided. The method can include mounting non-volatile storage to the virtual appliance, retrieving a device certificate from the mounted storage and extracting a signature from the device certificate, activating the virtual appliance in a network domain and acquiring an adapter address and unique identifier for the virtual appliance, and authenticating the signature with the adapter address and unique identifier to ensure a unique active instance of the virtual appliance.Type: ApplicationFiled: August 31, 2007Publication date: March 5, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ronald P. Doyle, John R. Hind, Marcia L. Stockton
-
Patent number: 7457946Abstract: The present invention provides a method and program product for randomly relaying a protected web request from a client, through a set of peers, to a privacy proxy. Once received, the web request is proxied to a web services provider. When a provider reply is received by the privacy proxy, it is protected and relayed back through a set of peers to the client.Type: GrantFiled: October 17, 2002Date of Patent: November 25, 2008Assignee: International Business Machines CorporationInventors: John R. Hind, Marcia L. Stockton
-
Publication number: 20080243538Abstract: A computer mass storage system that hosts multiple users is managed by obtaining agreement with a user to provide a level of erasure of hosted data from the computer's mass storage system. The hosted data is then erased according to the level of erasure that was agreed upon. One of multiple levels of security also may be agreed upon and provided.Type: ApplicationFiled: June 20, 2008Publication date: October 2, 2008Inventor: MARCIA L. STOCKTON
-
Publication number: 20080215897Abstract: Methods, systems, computer program products, and methods of doing business whereby document components are secured or controlled using “security containers” which encapsulate the components (and other component metadata). A “security container” encapsulates the component (i.e., content) that is to be controlled within a higher-level construct such as a compound document. The security container also contains rules for interacting with the encapsulated component, and one or more encryption keys usable for decrypting the component and rules for authorized requesters.Type: ApplicationFiled: April 14, 2008Publication date: September 4, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ronald P. Doyle, John R. Hind, Marcia L. Stockton
-
Patent number: 7240824Abstract: Techniques are disclosed for detecting shoplifting or theft, particularly in a retail environment, using radio-frequency identification (“RFID”). Preferred embodiments leverage RFID tags on merchandise and RFID data that is written at the point of sale on the merchandise-borne RFID tags themselves, on the customer's receipt, or both. Some embodiments also leverage RFID tags on customer identification or “loyalty” cards. After writing RFID data on the merchandise-borne tags and/or receipt, a matching operation is performed at an RFID reader when the shopper and his merchandise exit the premises, in order to determine whether the shopper has paid for the items in his possession.Type: GrantFiled: September 19, 2003Date of Patent: July 10, 2007Assignee: International Business Machines CorporationInventor: Marcia L. Stockton
-
Patent number: 7225167Abstract: Techniques are disclosed for writing data directly onto a product to record each ownership transfer. As a result, the product itself now carries a traceable, auditable, non-forgeable, non-repudiable proof of ownership (and, optionally, ownership history) that can be used in a variety of ways. This recorded ownership transfer information provides an electronic receipt, which may be used by the present owner to prove his or her ownership. (Optionally, other types of transfers may be recorded in addition to, or instead of, ownership transfers.) A transfer agent or registrar creates a unique transaction identifier to represent the transfer, and preferably creates a cryptographic signature over fields representing the transfer. This information is then recorded in a repository that is external from the product.Type: GrantFiled: November 21, 2003Date of Patent: May 29, 2007Assignee: International Business Machines CorporationInventors: John R. Hind, Marcia L. Stockton