Patents by Inventor Marcia Stockton
Marcia Stockton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20070182557Abstract: Techniques are disclosed for detecting shoplifting or theft, particularly in a retail environment, using radio-frequency identification (“RFID”). Preferred embodiments leverage RFID tags on merchandise and RFID data that is written at the point of sale on the merchandise-borne RFID tags themselves, on the customer's receipt, or both. Some embodiments also leverage RFID tags on customer identification or “loyalty” cards. After writing RFID data on the merchandise-borne tags and/or receipt, a matching operation is performed at an RFID reader when the shopper and his merchandise exit the premises, in order to determine whether the shopper has paid for the items in his possession.Type: ApplicationFiled: April 10, 2007Publication date: August 9, 2007Inventor: Marcia Stockton
-
Publication number: 20070152033Abstract: Techniques are disclosed for writing data directly onto a product to record each ownership transfer. As a result, the product itself now carries a traceable, auditable, non-forgeable, non-repudiable proof of ownership (and, optionally, ownership history) that can be used in a variety of ways. This recorded ownership transfer information provides an electronic receipt, which may be used by the present owner to prove his or her ownership. (Optionally, other types of transfers may be recorded in addition to, or instead of, ownership transfers.) A transfer agent or registrar creates a unique transaction identifier to represent the transfer, and preferably creates a cryptographic signature over fields representing the transfer. This information is then recorded in a repository that is external from the product.Type: ApplicationFiled: March 13, 2007Publication date: July 5, 2007Inventors: John Hind, Marcia Stockton
-
Publication number: 20060075336Abstract: An improved solution for providing content over a network is described. In particular, a tag is inserted into display content indicating slow-loading data that is to be incorporated. When the display content is requested, a placeholder is inserted into the display content in place of the tag and the display content is provided for display at a client. Subsequently, the slow-loading data can be obtained and incorporated into the display content, which can be provided for display at the client.Type: ApplicationFiled: September 29, 2004Publication date: April 6, 2006Applicant: International Business Machines CorporationInventors: Helen Gawor, John Hind, Steven Ims, Marcia Stockton
-
Publication number: 20060041754Abstract: A method, system and apparatus for detecting and preventing content distribution site impersonation. In this regard, a method for detecting and preventing content distribution site spoofing can include the steps of loading a markup language document and a corresponding digital signature for processing and ensuring that the digital signature originates from a pre-specified source of the markup language document incorporated within the markup language document. The method further can include the steps of dynamically computing a hash value for the markup language document and comparing the dynamically computed hash value to a hash value encrypted within the digital signature. Finally, the method can include the step of detecting content distribution site spoofing either if the digital signature does not originate from the pre-specified source, or if the dynamically computed hash value does not match the hash value encrypted within the digital signature.Type: ApplicationFiled: August 23, 2004Publication date: February 23, 2006Applicant: International Business Machines CorporationInventors: John Hind, Marcia Stockton
-
Publication number: 20060033620Abstract: Techniques are disclosed for detecting shoplifting or theft, particularly in a retail environment, using radio-frequency identification (“RFID”). Preferred embodiments leverage RFID tags on merchandise and RFID data that is written at the point of sale on the merchandise-borne RFID tags themselves, on the customer's receipt, or both. Some embodiments also leverage RFID tags on customer identification or “loyalty” cards. After writing RFID data on the merchandise-borne tags and/or receipt, a matching operation is performed at an RFID reader when the shopper and his merchandise exit the premises, in order to determine whether the shopper has paid for the items in his possession.Type: ApplicationFiled: September 19, 2003Publication date: February 16, 2006Applicant: International Business Machines CorporationInventors: James Mathewson, Marcia Stockton
-
Publication number: 20050114270Abstract: Techniques are disclosed for writing data directly onto a product to record each ownership transfer. As a result, the product itself now carries a traceable, auditable, non-forgeable, non-repudiable proof of ownership (and, optionally, ownership history) that can be used in a variety of ways. This recorded ownership transfer information provides an electronic receipt, which may be used by the present owner to prove his or her ownership. (Optionally, other types of transfers may be recorded in addition to, or instead of, ownership transfers.) A transfer agent or registrar creates a unique transaction identifier to represent the transfer, and preferably creates a cryptographic signature over fields representing the transfer. This information is then recorded in a repository that is external from the product.Type: ApplicationFiled: November 21, 2003Publication date: May 26, 2005Applicant: International Business Machines CorporationInventors: John Hind, Marcia Stockton
-
Publication number: 20050073417Abstract: Techniques are disclosed for detecting shoplifting or theft, particularly in a retail environment, using radio-frequency identification (“RFID”). Preferred embodiments leverage RFID tags on merchandise and RFID data that is written at the point of sale on the merchandise-borne RFID tags themselves, on the customer's receipt, or both. Some embodiments also leverage RFID tags on customer identification or “loyalty” cards. After writing RFID data on the merchandise-borne tags and/or receipt, a matching operation is performed at an RFID reader when the shopper and his merchandise exit the premises, in order to determine whether the shopper has paid for the items in his possession.Type: ApplicationFiled: September 19, 2003Publication date: April 7, 2005Applicant: International Business Machines CorporationInventors: James Mathewson, Marcia Stockton
-
Publication number: 20050073416Abstract: Techniques are disclosed for detecting shoplifting or theft, particularly in a retail environment, using radio-frequency identification (“RFID”). Preferred embodiments leverage RFID tags on merchandise and RFID data that is written at the point of sale on the merchandise-borne RFID tags themselves, on the customer's receipt, or both. Some embodiments also leverage RFID tags on customer identification or “loyalty” cards. After writing RFID data on the merchandise-borne tags and/or receipt, a matching operation is performed at an RFID reader when the shopper and his merchandise exit the premises, in order to determine whether the shopper has paid for the items in his possession.Type: ApplicationFiled: September 19, 2003Publication date: April 7, 2005Applicant: International Business Machines CorporationInventors: James Mathewson, Marcia Stockton
-
Publication number: 20050061870Abstract: Techniques are disclosed for detecting shoplifting or theft, particularly in a retail environment, using radio-frequency identification (“RFID”). Preferred embodiments leverage RFID tags on merchandise and RFID data that is written at the point of sale on the merchandise-borne RFID tags themselves, on the customer's receipt, or both. Some embodiments also leverage RFID tags on customer identification or “loyalty” cards. After writing RFID data on the merchandise-borne tags and/or receipt, a matching operation is performed at an RFID reader when the shopper and his merchandise exit the premises, in order to determine whether the shopper has paid for the items in his possession.Type: ApplicationFiled: September 19, 2003Publication date: March 24, 2005Applicant: International Business Machines CorporationInventor: Marcia Stockton
-
Publication number: 20050061874Abstract: Techniques are disclosed for detecting shoplifting or theft, particularly in a retail environment, using radio-frequency identification (“RFID”). Preferred embodiments leverage RFID tags on merchandise and RFID data that is written at the point of sale on the merchandise-borne RFID tags themselves, on the customer's receipt, or both. Some embodiments also leverage RFID tags on customer identification or “loyalty” cards. After writing RFID data on the merchandise-borne tags and/or receipt, a matching operation is performed at an RFID reader when the shopper and his merchandise exit the premises, in order to determine whether the shopper has paid for the items in his possession.Type: ApplicationFiled: September 19, 2003Publication date: March 24, 2005Applicant: International Business Machines CorporationInventors: James Mathewson, Marcia Stockton
-
Publication number: 20050055644Abstract: Under the present invention, supplemental web content (e.g., an advertisement) referenced in a requested markup language document is detected and reduced in quality (i.e., obscured). In reducing the supplemental web content in quality, the present invention can employ any number of techniques such as removing color, animation or sound, reducing contrast or resolution, blurring the content, etc. In any event, the requested markup language document is rendered with the reduced quality supplemental web content. The supplemental web content can then be restored to its original quality, if the user so desires, based upon a prompt.Type: ApplicationFiled: September 4, 2003Publication date: March 10, 2005Applicant: International Business Machines CorporationInventor: Marcia Stockton
-
Publication number: 20050044508Abstract: Method, system and program product for customizing a user interface. A group of users of the application can be defined. For each user in the group, a use count for one or more user interface elements is recorded. The recorded use counts can be used to calculate a use weight for the group of users, which is then used to modify the corresponding user interface element.Type: ApplicationFiled: August 21, 2003Publication date: February 24, 2005Applicant: International Business Machines CorporationInventor: Marcia Stockton
-
Publication number: 20050044185Abstract: A method for circumventing the operation of content blocking logic in a markup language document delivery system. In the method of the invention, the operation of content blocking logic can be determined. Responsive to this determination, a reference to content disposed in markup can be located and the reference to the content can be replaced with an alias. Finally, the markup can be served to a requesting browser. In this way, the replacement of the reference with the alias circumvents the operation of the content blocking logic.Type: ApplicationFiled: August 18, 2003Publication date: February 24, 2005Applicant: International Business Machines CorporationInventors: John Hind, Marcia Stockton
-
Publication number: 20050039034Abstract: Methods, systems, computer program products, and methods of doing business whereby document components are secured or controlled using “security containers” which encapsulate the components (and other component metadata). A “security container” encapsulates the component (i.e., content) that is to be controlled within a higher-level construct such as a compound document. The security container also contains rules for interacting with the encapsulated component, and one or more encryption keys usable for decrypting the component and rules for authorized requesters.Type: ApplicationFiled: July 31, 2003Publication date: February 17, 2005Applicant: International Business Machines CorporationInventors: Ronald Doyle, John Hind, Marcia Stockton
-
Publication number: 20050021947Abstract: Under the present invention, one or more isolation zones are defined. Each isolation zone includes one or more computer programs grouped together, and can be defined manually by a user/administrator or automatically based on historical behavior. Once the isolation zone(s) are defined, a security prompt is displayed whenever an attempt is made to insert content across an isolation zone boundary. The security prompt can request confirmation by the user, or it can request a security credential before allowing the attempted content insertion.Type: ApplicationFiled: June 5, 2003Publication date: January 27, 2005Applicant: International Business Machines CorporationInventors: Ronald Doyle, John Hind, Marcia Stockton
-
Publication number: 20050021468Abstract: A computer mass storage system that hosts multiple users is managed by obtaining agreement with a user to provide a level of erasure of hosted data from the computer's mass storage system. The hosted data is then erased according to the level of erasure that was agreed upon. One of multiple levels of security also may be agreed upon and provided.Type: ApplicationFiled: July 21, 2003Publication date: January 27, 2005Inventor: Marcia Stockton