Patents by Inventor Marcia L. Stockton
Marcia L. Stockton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7212828Abstract: Security of wireless networks is improved by rejecting traffic from a wireless device located outside a defined spatial boundary. The device's spatial position with respect to the boundary is determined using directional antenna arrays on a plurality of measurement points, and calculating where the vectors intersect. Having thus determined a device's location, access to a wireless network can be denied if the device is outside a predetermined spatial boundary. Or, the device's location inside or outside of the spatial boundary can be used for monitoring a changeable location of one or more client devices in a wireless network, for example as a theft detection or theft deterrent mechanism.Type: GrantFiled: December 31, 2002Date of Patent: May 1, 2007Assignee: International Business Machines CorporationInventors: John R. Hind, Marcia L. Stockton
-
Patent number: 7206791Abstract: A method and system for managing meta data for a computing device are disclosed. The method includes collecting meta data resulting from use of the computing device, the meta data including application data usable in an application and context data for identifying context in which the application data are used. The method further includes determining statistical information associated with the collected meta data, wherein the statistical information indicates relationships between the collected meta data, storing the collected meta data and the statistical information in a storage of the computing device, and retrieving, from the storage, application data that would be most appropriate for a current context of using the application based on the context data and the statistical information.Type: GrantFiled: January 17, 2002Date of Patent: April 17, 2007Assignee: International Business Machines CorporationInventors: John R. Hind, Marcia L. Stockton
-
Patent number: 7130843Abstract: A method, system and program product for locating personal information over a network are provided. Specifically, under the present invention, personal information is entered using an interface. Then, a search string(s) based on the entered information is formed by processing the personal information according to a definable algorithm(s). Once the search string(s) is formed, a search based on the string(s) is conducted over a network to identify any network destinations storing the personal information. The identified network destinations can then be notified to remove/delete the personal information.Type: GrantFiled: May 20, 2002Date of Patent: October 31, 2006Assignee: International Business Machines CorporationInventor: Marcia L. Stockton
-
Patent number: 7099873Abstract: An intermediate content transcoder. An intermediate content transcoder can include a communicative receiver configured to receive master content while in transit from a content source to at least one content sink in a content distribution network, and a communicative transmitter configured to transmit transcoded content to one or more of the content sinks. A set of content transformations also can be provided. Furthermore, the intermediate content transcoder can include a set of conditions for selecting individual ones of the content transformations to be applied to master content received through the communicative receiver. Finally, the intermediate content transcoder can include a transcoder configured to apply the selected individual ones of the content transformations to the master content. The application of the content transformations can produce transcoded content. The communicative transmitter, in turn, can forward the produced transcoded content to one or more of the content sinks.Type: GrantFiled: May 29, 2002Date of Patent: August 29, 2006Assignee: International Business Machines CorporationInventors: Rajesh S. Agarwalla, Bryan E. Aupperle, Thirumale Niranjan, Srikanth Ramamurthy, Marcia L. Stockton
-
Patent number: 7089299Abstract: Methods, systems, and computer program products for programmatically determining whether components of a program are suitable for deployment in particular locations such as at the edge of a network. In preferred embodiments, program characteristics and operating environment characteristics, along with information about their interactions, are programmatically combined at deployment time to determine whether application components are edgeable. The disclosed approach enables people such as programmers (who are familiar with the program characteristics) and systems administrators (who are familiar with the operating environment characteristics) to each provide some control over the edgeability determination, along with other systems experts (who know how these features interact). Alternatively, this information or portions thereof may be supplied programmatically.Type: GrantFiled: January 15, 2002Date of Patent: August 8, 2006Assignee: International Business Machines CorporationInventors: Madhu Chetuparambil, James R. Giles, Shankar Ramaswamy, Marcia L. Stockton, Dinesh Verma
-
Patent number: 7058718Abstract: A method of producing a blended SYN cookie can include identifying within a SYN packet a source network address and desired communications session parameters. Subsequently, an index value into a table of pre-configured sets of communications session parameters can be retrieved. Notably, the index value can reference one of the sets which approximates the desired communications parameters. A hash value can be computed based upon the source network address, a constant seed and current date and time data. Finally, the computed hash value can be combined with the index value, the combination forming the blended SYN cookie.Type: GrantFiled: January 15, 2002Date of Patent: June 6, 2006Assignee: International Business Machines CorporationInventors: Stephen M. Fontes, John R. Hind, Thomas Narten, Marcia L. Stockton
-
Patent number: 7012528Abstract: Techniques are disclosed for detecting shoplifting or theft, particularly in a retail environment, using radio-frequency identification (“RFID”). Preferred embodiments leverage RFID tags on merchandise and RFID data that is written at the point of sale on the merchandise-borne RFID tags themselves, on the customer's receipt, or both. Some embodiments also leverage RFID tags on customer identification or “loyalty” cards. After writing RFID data on the merchandise-borne tags and/or receipt, a matching operation is performed at an RFID reader when the shopper and his merchandise exit the premises, in order to determine whether the shopper has paid for the items in his possession.Type: GrantFiled: September 19, 2003Date of Patent: March 14, 2006Assignee: International Business Machines CorporationInventors: James M. Mathewson, II, Marcia L. Stockton
-
Patent number: 7005988Abstract: Techniques are disclosed for detecting shoplifting or theft, particularly in a retail environment, using radio-frequency identification (“RFID”). Preferred embodiments leverage RFID tags on merchandise and RFID data that is written at the point of sale on the merchandise-borne RFID tags themselves, on the customer's receipt, or both. Some embodiments also leverage RFID tags on customer identification or “loyalty” cards. After writing RFID data on the merchandise-borne tags and/or receipt, a matching operation is performed at an RFID reader when the shopper and his merchandise exit the premises, in order to determine whether the shopper has paid for the items in his possession.Type: GrantFiled: September 19, 2003Date of Patent: February 28, 2006Assignee: International Business Machines CorporationInventors: James M. Mathewson, II, Marcia L. Stockton
-
Publication number: 20040254827Abstract: Methods, systems and computer program products that indirectly profile users of a web service by providing a plurality of user customization options for the web service associated with corresponding user demographics so as to allow indirect user profiling based on a user's selection of at least one of the plurality of user customization options.Type: ApplicationFiled: June 13, 2003Publication date: December 16, 2004Inventors: John R. Hind, Marcia L. Stockton
-
Publication number: 20040203910Abstract: Security of wireless networks is improved by rejecting traffic from a wireless device located outside a defined spatial boundary. The device's spatial position with respect to the boundary is determined using directional antenna arrays on a plurality of measurement points, and calculating where the vectors intersect. Having thus determined a device's location, access to a wireless network can be denied if the device is outside a predetermined spatial boundary. Or, the device's location inside or outside of the spatial boundary can be used for other purposes, such as theft detection.Type: ApplicationFiled: December 31, 2002Publication date: October 14, 2004Applicant: International Business Machines CorporationInventors: John R. Hind, Marcia L. Stockton
-
Publication number: 20040203908Abstract: Security of wireless networks is improved by rejecting traffic from a wireless device located outside a defined spatial boundary. The device's spatial position with respect to the boundary is determined using directional antenna arrays on a plurality of measurement points, and calculating where the vectors intersect. Having thus determined a device's location, access to a wireless network can be denied if the device is outside a predetermined spatial boundary. Or, the device's location inside or outside of the spatial boundary can be used for monitoring a changeable location of one or more client devices in a wireless network, for example as a theft detection or theft deterrent mechanism.Type: ApplicationFiled: December 31, 2002Publication date: October 14, 2004Applicant: International Business Machines CorporationInventors: John R. Hind, Marcia L. Stockton
-
Publication number: 20040078593Abstract: The present invention randomly relays a protected web request from a client, through a set of peers, to a privacy proxy. Once received, the web request is proxied to a web services provider. When a provider reply is received by the privacy proxy, it is protected and relayed back through a set of peers to the client.Type: ApplicationFiled: October 17, 2002Publication date: April 22, 2004Applicant: International Business Machines CorporationInventors: John R. Hind, Marcia L. Stockton
-
Publication number: 20030225723Abstract: An intermediate content transcoder. An intermediate content transcoder can include a communicative receiver configured to receive master content while in transit from a content source to at least one content sink in a content distribution network, and a communicative transmitter configured to transmit transcoded content to one or more of the content sinks. A set of content transformations also can be provided. Furthermore, the intermediate content transcoder can include a set of conditions for selecting individual ones of the content transformations to be applied to master content received through the communicative receiver. Finally, the intermediate content transcoder can include a transcoder configured to apply the selected individual ones of the content transformations to the master content. The application of the content transformations can produce transcoded content. The communicative transmitter, in turn, can forward the produced transcoded content to one or more of the content sinks.Type: ApplicationFiled: May 29, 2002Publication date: December 4, 2003Applicant: International Business Machines CorporationInventors: Rajesh S. Agarwalla, Bryan E. Aupperle, Thirumale Niranjan, Srikanth Ramamurthy, Marcia L. Stockton
-
Publication number: 20030217060Abstract: A method, system and program product for locating personal information over a network are provided. Specifically, under the present invention, personal information is entered using an interface. Then, a search string(s) based on the entered information is formed by processing the personal information according to a definable algorithm(s). Once the search string(s) is formed, a search based on the string(s) is conducted over a network to identify any network destinations storing the personal information. The identified network destinations can then be notified to remove/delete the personal information.Type: ApplicationFiled: May 20, 2002Publication date: November 20, 2003Applicant: International Business Machines CorporationInventor: Marcia L. Stockton
-
Publication number: 20030135765Abstract: A method and system for managing meta data for a computing device are disclosed. The method includes collecting meta data resulting from use of the computing device, the meta data including application data usable in an application and context data for identifying context in which the application data are used. The method further includes determining statistical information associated with the collected meta data, wherein the statistical information indicates relationships between the collected meta data, storing the collected meta data and the statistical information in a storage of the computing device, and retrieving, from the storage, application data that would be most appropriate for a current context of using the application based on the context data and the statistical information.Type: ApplicationFiled: January 17, 2002Publication date: July 17, 2003Applicant: International Business Machines CorporationInventors: John R. Hind, Marcia L. Stockton
-
Publication number: 20030135591Abstract: Methods, systems, and computer program products for programmatically determining whether components of a program are suitable for deployment in particular locations such as at the edge of a network. In preferred embodiments, program characteristics and operating environment characteristics, along with information about their interactions, are programmatically combined at deployment time to determine whether application components are edgeable. The disclosed approach enables people such as programmers (who are familiar with the program characteristics) and systems administrators (who are familiar with the operating environment characteristics) to each provide some control over the edgeability determination, along with other systems experts (who know how these features interact). Alternatively, this information or portions thereof may be supplied programmatically.Type: ApplicationFiled: January 15, 2002Publication date: July 17, 2003Applicant: International Business Machines CorporationInventors: Madhu Chetuparambil, James R. Giles, Shankar Ramaswamy, Marcia L. Stockton, Dinesh Verma
-
Publication number: 20030135507Abstract: A method and system for managing meta data using a central repository are disclosed. The method manages meta data for a user using the central repository at a central repository subsystem, wherein the central repository is accessible by a computing device through a communication network. The method includes the steps of connecting to the central repository through the communications network based on a user input; updating a local repository of the computing device with at least one segment from the central repository that is associated with the user to produce a meta data collection associated with the user; and utilizing, by the computing device, the meta data collection during a current user session at the computing device to assist the user in using the computing device.Type: ApplicationFiled: January 17, 2002Publication date: July 17, 2003Applicant: International Business Machines CorporationInventors: John R. Hind, Marcia L. Stockton
-
Publication number: 20030135625Abstract: A method of producing a blended SYN cookie can include identifying within a SYN packet a source network address and desired communications session parameters. Subsequently, an index value into a table of pre-configured sets of communications session parameters can be retrieved. Notably, the index value can reference one of the sets which approximates the desired communications parameters. A hash value can be computed based upon the source network address, a constant seed and current date and time data. Finally, the computed hash value can be combined with the index value, the combination forming the blended SYN cookie.Type: ApplicationFiled: January 15, 2002Publication date: July 17, 2003Applicant: International Business Machines CorporationInventors: Stephen M. Fontes, John R. Hind, Thomas Narten, Marcia L. Stockton