Patents by Inventor Marcia L. Stockton

Marcia L. Stockton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7212828
    Abstract: Security of wireless networks is improved by rejecting traffic from a wireless device located outside a defined spatial boundary. The device's spatial position with respect to the boundary is determined using directional antenna arrays on a plurality of measurement points, and calculating where the vectors intersect. Having thus determined a device's location, access to a wireless network can be denied if the device is outside a predetermined spatial boundary. Or, the device's location inside or outside of the spatial boundary can be used for monitoring a changeable location of one or more client devices in a wireless network, for example as a theft detection or theft deterrent mechanism.
    Type: Grant
    Filed: December 31, 2002
    Date of Patent: May 1, 2007
    Assignee: International Business Machines Corporation
    Inventors: John R. Hind, Marcia L. Stockton
  • Patent number: 7206791
    Abstract: A method and system for managing meta data for a computing device are disclosed. The method includes collecting meta data resulting from use of the computing device, the meta data including application data usable in an application and context data for identifying context in which the application data are used. The method further includes determining statistical information associated with the collected meta data, wherein the statistical information indicates relationships between the collected meta data, storing the collected meta data and the statistical information in a storage of the computing device, and retrieving, from the storage, application data that would be most appropriate for a current context of using the application based on the context data and the statistical information.
    Type: Grant
    Filed: January 17, 2002
    Date of Patent: April 17, 2007
    Assignee: International Business Machines Corporation
    Inventors: John R. Hind, Marcia L. Stockton
  • Patent number: 7130843
    Abstract: A method, system and program product for locating personal information over a network are provided. Specifically, under the present invention, personal information is entered using an interface. Then, a search string(s) based on the entered information is formed by processing the personal information according to a definable algorithm(s). Once the search string(s) is formed, a search based on the string(s) is conducted over a network to identify any network destinations storing the personal information. The identified network destinations can then be notified to remove/delete the personal information.
    Type: Grant
    Filed: May 20, 2002
    Date of Patent: October 31, 2006
    Assignee: International Business Machines Corporation
    Inventor: Marcia L. Stockton
  • Patent number: 7099873
    Abstract: An intermediate content transcoder. An intermediate content transcoder can include a communicative receiver configured to receive master content while in transit from a content source to at least one content sink in a content distribution network, and a communicative transmitter configured to transmit transcoded content to one or more of the content sinks. A set of content transformations also can be provided. Furthermore, the intermediate content transcoder can include a set of conditions for selecting individual ones of the content transformations to be applied to master content received through the communicative receiver. Finally, the intermediate content transcoder can include a transcoder configured to apply the selected individual ones of the content transformations to the master content. The application of the content transformations can produce transcoded content. The communicative transmitter, in turn, can forward the produced transcoded content to one or more of the content sinks.
    Type: Grant
    Filed: May 29, 2002
    Date of Patent: August 29, 2006
    Assignee: International Business Machines Corporation
    Inventors: Rajesh S. Agarwalla, Bryan E. Aupperle, Thirumale Niranjan, Srikanth Ramamurthy, Marcia L. Stockton
  • Patent number: 7089299
    Abstract: Methods, systems, and computer program products for programmatically determining whether components of a program are suitable for deployment in particular locations such as at the edge of a network. In preferred embodiments, program characteristics and operating environment characteristics, along with information about their interactions, are programmatically combined at deployment time to determine whether application components are edgeable. The disclosed approach enables people such as programmers (who are familiar with the program characteristics) and systems administrators (who are familiar with the operating environment characteristics) to each provide some control over the edgeability determination, along with other systems experts (who know how these features interact). Alternatively, this information or portions thereof may be supplied programmatically.
    Type: Grant
    Filed: January 15, 2002
    Date of Patent: August 8, 2006
    Assignee: International Business Machines Corporation
    Inventors: Madhu Chetuparambil, James R. Giles, Shankar Ramaswamy, Marcia L. Stockton, Dinesh Verma
  • Patent number: 7058718
    Abstract: A method of producing a blended SYN cookie can include identifying within a SYN packet a source network address and desired communications session parameters. Subsequently, an index value into a table of pre-configured sets of communications session parameters can be retrieved. Notably, the index value can reference one of the sets which approximates the desired communications parameters. A hash value can be computed based upon the source network address, a constant seed and current date and time data. Finally, the computed hash value can be combined with the index value, the combination forming the blended SYN cookie.
    Type: Grant
    Filed: January 15, 2002
    Date of Patent: June 6, 2006
    Assignee: International Business Machines Corporation
    Inventors: Stephen M. Fontes, John R. Hind, Thomas Narten, Marcia L. Stockton
  • Patent number: 7012528
    Abstract: Techniques are disclosed for detecting shoplifting or theft, particularly in a retail environment, using radio-frequency identification (“RFID”). Preferred embodiments leverage RFID tags on merchandise and RFID data that is written at the point of sale on the merchandise-borne RFID tags themselves, on the customer's receipt, or both. Some embodiments also leverage RFID tags on customer identification or “loyalty” cards. After writing RFID data on the merchandise-borne tags and/or receipt, a matching operation is performed at an RFID reader when the shopper and his merchandise exit the premises, in order to determine whether the shopper has paid for the items in his possession.
    Type: Grant
    Filed: September 19, 2003
    Date of Patent: March 14, 2006
    Assignee: International Business Machines Corporation
    Inventors: James M. Mathewson, II, Marcia L. Stockton
  • Patent number: 7005988
    Abstract: Techniques are disclosed for detecting shoplifting or theft, particularly in a retail environment, using radio-frequency identification (“RFID”). Preferred embodiments leverage RFID tags on merchandise and RFID data that is written at the point of sale on the merchandise-borne RFID tags themselves, on the customer's receipt, or both. Some embodiments also leverage RFID tags on customer identification or “loyalty” cards. After writing RFID data on the merchandise-borne tags and/or receipt, a matching operation is performed at an RFID reader when the shopper and his merchandise exit the premises, in order to determine whether the shopper has paid for the items in his possession.
    Type: Grant
    Filed: September 19, 2003
    Date of Patent: February 28, 2006
    Assignee: International Business Machines Corporation
    Inventors: James M. Mathewson, II, Marcia L. Stockton
  • Publication number: 20040254827
    Abstract: Methods, systems and computer program products that indirectly profile users of a web service by providing a plurality of user customization options for the web service associated with corresponding user demographics so as to allow indirect user profiling based on a user's selection of at least one of the plurality of user customization options.
    Type: Application
    Filed: June 13, 2003
    Publication date: December 16, 2004
    Inventors: John R. Hind, Marcia L. Stockton
  • Publication number: 20040203910
    Abstract: Security of wireless networks is improved by rejecting traffic from a wireless device located outside a defined spatial boundary. The device's spatial position with respect to the boundary is determined using directional antenna arrays on a plurality of measurement points, and calculating where the vectors intersect. Having thus determined a device's location, access to a wireless network can be denied if the device is outside a predetermined spatial boundary. Or, the device's location inside or outside of the spatial boundary can be used for other purposes, such as theft detection.
    Type: Application
    Filed: December 31, 2002
    Publication date: October 14, 2004
    Applicant: International Business Machines Corporation
    Inventors: John R. Hind, Marcia L. Stockton
  • Publication number: 20040203908
    Abstract: Security of wireless networks is improved by rejecting traffic from a wireless device located outside a defined spatial boundary. The device's spatial position with respect to the boundary is determined using directional antenna arrays on a plurality of measurement points, and calculating where the vectors intersect. Having thus determined a device's location, access to a wireless network can be denied if the device is outside a predetermined spatial boundary. Or, the device's location inside or outside of the spatial boundary can be used for monitoring a changeable location of one or more client devices in a wireless network, for example as a theft detection or theft deterrent mechanism.
    Type: Application
    Filed: December 31, 2002
    Publication date: October 14, 2004
    Applicant: International Business Machines Corporation
    Inventors: John R. Hind, Marcia L. Stockton
  • Publication number: 20040078593
    Abstract: The present invention randomly relays a protected web request from a client, through a set of peers, to a privacy proxy. Once received, the web request is proxied to a web services provider. When a provider reply is received by the privacy proxy, it is protected and relayed back through a set of peers to the client.
    Type: Application
    Filed: October 17, 2002
    Publication date: April 22, 2004
    Applicant: International Business Machines Corporation
    Inventors: John R. Hind, Marcia L. Stockton
  • Publication number: 20030225723
    Abstract: An intermediate content transcoder. An intermediate content transcoder can include a communicative receiver configured to receive master content while in transit from a content source to at least one content sink in a content distribution network, and a communicative transmitter configured to transmit transcoded content to one or more of the content sinks. A set of content transformations also can be provided. Furthermore, the intermediate content transcoder can include a set of conditions for selecting individual ones of the content transformations to be applied to master content received through the communicative receiver. Finally, the intermediate content transcoder can include a transcoder configured to apply the selected individual ones of the content transformations to the master content. The application of the content transformations can produce transcoded content. The communicative transmitter, in turn, can forward the produced transcoded content to one or more of the content sinks.
    Type: Application
    Filed: May 29, 2002
    Publication date: December 4, 2003
    Applicant: International Business Machines Corporation
    Inventors: Rajesh S. Agarwalla, Bryan E. Aupperle, Thirumale Niranjan, Srikanth Ramamurthy, Marcia L. Stockton
  • Publication number: 20030217060
    Abstract: A method, system and program product for locating personal information over a network are provided. Specifically, under the present invention, personal information is entered using an interface. Then, a search string(s) based on the entered information is formed by processing the personal information according to a definable algorithm(s). Once the search string(s) is formed, a search based on the string(s) is conducted over a network to identify any network destinations storing the personal information. The identified network destinations can then be notified to remove/delete the personal information.
    Type: Application
    Filed: May 20, 2002
    Publication date: November 20, 2003
    Applicant: International Business Machines Corporation
    Inventor: Marcia L. Stockton
  • Publication number: 20030135765
    Abstract: A method and system for managing meta data for a computing device are disclosed. The method includes collecting meta data resulting from use of the computing device, the meta data including application data usable in an application and context data for identifying context in which the application data are used. The method further includes determining statistical information associated with the collected meta data, wherein the statistical information indicates relationships between the collected meta data, storing the collected meta data and the statistical information in a storage of the computing device, and retrieving, from the storage, application data that would be most appropriate for a current context of using the application based on the context data and the statistical information.
    Type: Application
    Filed: January 17, 2002
    Publication date: July 17, 2003
    Applicant: International Business Machines Corporation
    Inventors: John R. Hind, Marcia L. Stockton
  • Publication number: 20030135591
    Abstract: Methods, systems, and computer program products for programmatically determining whether components of a program are suitable for deployment in particular locations such as at the edge of a network. In preferred embodiments, program characteristics and operating environment characteristics, along with information about their interactions, are programmatically combined at deployment time to determine whether application components are edgeable. The disclosed approach enables people such as programmers (who are familiar with the program characteristics) and systems administrators (who are familiar with the operating environment characteristics) to each provide some control over the edgeability determination, along with other systems experts (who know how these features interact). Alternatively, this information or portions thereof may be supplied programmatically.
    Type: Application
    Filed: January 15, 2002
    Publication date: July 17, 2003
    Applicant: International Business Machines Corporation
    Inventors: Madhu Chetuparambil, James R. Giles, Shankar Ramaswamy, Marcia L. Stockton, Dinesh Verma
  • Publication number: 20030135507
    Abstract: A method and system for managing meta data using a central repository are disclosed. The method manages meta data for a user using the central repository at a central repository subsystem, wherein the central repository is accessible by a computing device through a communication network. The method includes the steps of connecting to the central repository through the communications network based on a user input; updating a local repository of the computing device with at least one segment from the central repository that is associated with the user to produce a meta data collection associated with the user; and utilizing, by the computing device, the meta data collection during a current user session at the computing device to assist the user in using the computing device.
    Type: Application
    Filed: January 17, 2002
    Publication date: July 17, 2003
    Applicant: International Business Machines Corporation
    Inventors: John R. Hind, Marcia L. Stockton
  • Publication number: 20030135625
    Abstract: A method of producing a blended SYN cookie can include identifying within a SYN packet a source network address and desired communications session parameters. Subsequently, an index value into a table of pre-configured sets of communications session parameters can be retrieved. Notably, the index value can reference one of the sets which approximates the desired communications parameters. A hash value can be computed based upon the source network address, a constant seed and current date and time data. Finally, the computed hash value can be combined with the index value, the combination forming the blended SYN cookie.
    Type: Application
    Filed: January 15, 2002
    Publication date: July 17, 2003
    Applicant: International Business Machines Corporation
    Inventors: Stephen M. Fontes, John R. Hind, Thomas Narten, Marcia L. Stockton