Patents by Inventor Marcia Stockton

Marcia Stockton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070182557
    Abstract: Techniques are disclosed for detecting shoplifting or theft, particularly in a retail environment, using radio-frequency identification (“RFID”). Preferred embodiments leverage RFID tags on merchandise and RFID data that is written at the point of sale on the merchandise-borne RFID tags themselves, on the customer's receipt, or both. Some embodiments also leverage RFID tags on customer identification or “loyalty” cards. After writing RFID data on the merchandise-borne tags and/or receipt, a matching operation is performed at an RFID reader when the shopper and his merchandise exit the premises, in order to determine whether the shopper has paid for the items in his possession.
    Type: Application
    Filed: April 10, 2007
    Publication date: August 9, 2007
    Inventor: Marcia Stockton
  • Publication number: 20070152033
    Abstract: Techniques are disclosed for writing data directly onto a product to record each ownership transfer. As a result, the product itself now carries a traceable, auditable, non-forgeable, non-repudiable proof of ownership (and, optionally, ownership history) that can be used in a variety of ways. This recorded ownership transfer information provides an electronic receipt, which may be used by the present owner to prove his or her ownership. (Optionally, other types of transfers may be recorded in addition to, or instead of, ownership transfers.) A transfer agent or registrar creates a unique transaction identifier to represent the transfer, and preferably creates a cryptographic signature over fields representing the transfer. This information is then recorded in a repository that is external from the product.
    Type: Application
    Filed: March 13, 2007
    Publication date: July 5, 2007
    Inventors: John Hind, Marcia Stockton
  • Publication number: 20060075336
    Abstract: An improved solution for providing content over a network is described. In particular, a tag is inserted into display content indicating slow-loading data that is to be incorporated. When the display content is requested, a placeholder is inserted into the display content in place of the tag and the display content is provided for display at a client. Subsequently, the slow-loading data can be obtained and incorporated into the display content, which can be provided for display at the client.
    Type: Application
    Filed: September 29, 2004
    Publication date: April 6, 2006
    Applicant: International Business Machines Corporation
    Inventors: Helen Gawor, John Hind, Steven Ims, Marcia Stockton
  • Publication number: 20060041754
    Abstract: A method, system and apparatus for detecting and preventing content distribution site impersonation. In this regard, a method for detecting and preventing content distribution site spoofing can include the steps of loading a markup language document and a corresponding digital signature for processing and ensuring that the digital signature originates from a pre-specified source of the markup language document incorporated within the markup language document. The method further can include the steps of dynamically computing a hash value for the markup language document and comparing the dynamically computed hash value to a hash value encrypted within the digital signature. Finally, the method can include the step of detecting content distribution site spoofing either if the digital signature does not originate from the pre-specified source, or if the dynamically computed hash value does not match the hash value encrypted within the digital signature.
    Type: Application
    Filed: August 23, 2004
    Publication date: February 23, 2006
    Applicant: International Business Machines Corporation
    Inventors: John Hind, Marcia Stockton
  • Publication number: 20060033620
    Abstract: Techniques are disclosed for detecting shoplifting or theft, particularly in a retail environment, using radio-frequency identification (“RFID”). Preferred embodiments leverage RFID tags on merchandise and RFID data that is written at the point of sale on the merchandise-borne RFID tags themselves, on the customer's receipt, or both. Some embodiments also leverage RFID tags on customer identification or “loyalty” cards. After writing RFID data on the merchandise-borne tags and/or receipt, a matching operation is performed at an RFID reader when the shopper and his merchandise exit the premises, in order to determine whether the shopper has paid for the items in his possession.
    Type: Application
    Filed: September 19, 2003
    Publication date: February 16, 2006
    Applicant: International Business Machines Corporation
    Inventors: James Mathewson, Marcia Stockton
  • Publication number: 20050114270
    Abstract: Techniques are disclosed for writing data directly onto a product to record each ownership transfer. As a result, the product itself now carries a traceable, auditable, non-forgeable, non-repudiable proof of ownership (and, optionally, ownership history) that can be used in a variety of ways. This recorded ownership transfer information provides an electronic receipt, which may be used by the present owner to prove his or her ownership. (Optionally, other types of transfers may be recorded in addition to, or instead of, ownership transfers.) A transfer agent or registrar creates a unique transaction identifier to represent the transfer, and preferably creates a cryptographic signature over fields representing the transfer. This information is then recorded in a repository that is external from the product.
    Type: Application
    Filed: November 21, 2003
    Publication date: May 26, 2005
    Applicant: International Business Machines Corporation
    Inventors: John Hind, Marcia Stockton
  • Publication number: 20050073416
    Abstract: Techniques are disclosed for detecting shoplifting or theft, particularly in a retail environment, using radio-frequency identification (“RFID”). Preferred embodiments leverage RFID tags on merchandise and RFID data that is written at the point of sale on the merchandise-borne RFID tags themselves, on the customer's receipt, or both. Some embodiments also leverage RFID tags on customer identification or “loyalty” cards. After writing RFID data on the merchandise-borne tags and/or receipt, a matching operation is performed at an RFID reader when the shopper and his merchandise exit the premises, in order to determine whether the shopper has paid for the items in his possession.
    Type: Application
    Filed: September 19, 2003
    Publication date: April 7, 2005
    Applicant: International Business Machines Corporation
    Inventors: James Mathewson, Marcia Stockton
  • Publication number: 20050073417
    Abstract: Techniques are disclosed for detecting shoplifting or theft, particularly in a retail environment, using radio-frequency identification (“RFID”). Preferred embodiments leverage RFID tags on merchandise and RFID data that is written at the point of sale on the merchandise-borne RFID tags themselves, on the customer's receipt, or both. Some embodiments also leverage RFID tags on customer identification or “loyalty” cards. After writing RFID data on the merchandise-borne tags and/or receipt, a matching operation is performed at an RFID reader when the shopper and his merchandise exit the premises, in order to determine whether the shopper has paid for the items in his possession.
    Type: Application
    Filed: September 19, 2003
    Publication date: April 7, 2005
    Applicant: International Business Machines Corporation
    Inventors: James Mathewson, Marcia Stockton
  • Publication number: 20050061874
    Abstract: Techniques are disclosed for detecting shoplifting or theft, particularly in a retail environment, using radio-frequency identification (“RFID”). Preferred embodiments leverage RFID tags on merchandise and RFID data that is written at the point of sale on the merchandise-borne RFID tags themselves, on the customer's receipt, or both. Some embodiments also leverage RFID tags on customer identification or “loyalty” cards. After writing RFID data on the merchandise-borne tags and/or receipt, a matching operation is performed at an RFID reader when the shopper and his merchandise exit the premises, in order to determine whether the shopper has paid for the items in his possession.
    Type: Application
    Filed: September 19, 2003
    Publication date: March 24, 2005
    Applicant: International Business Machines Corporation
    Inventors: James Mathewson, Marcia Stockton
  • Publication number: 20050061870
    Abstract: Techniques are disclosed for detecting shoplifting or theft, particularly in a retail environment, using radio-frequency identification (“RFID”). Preferred embodiments leverage RFID tags on merchandise and RFID data that is written at the point of sale on the merchandise-borne RFID tags themselves, on the customer's receipt, or both. Some embodiments also leverage RFID tags on customer identification or “loyalty” cards. After writing RFID data on the merchandise-borne tags and/or receipt, a matching operation is performed at an RFID reader when the shopper and his merchandise exit the premises, in order to determine whether the shopper has paid for the items in his possession.
    Type: Application
    Filed: September 19, 2003
    Publication date: March 24, 2005
    Applicant: International Business Machines Corporation
    Inventor: Marcia Stockton
  • Publication number: 20050055644
    Abstract: Under the present invention, supplemental web content (e.g., an advertisement) referenced in a requested markup language document is detected and reduced in quality (i.e., obscured). In reducing the supplemental web content in quality, the present invention can employ any number of techniques such as removing color, animation or sound, reducing contrast or resolution, blurring the content, etc. In any event, the requested markup language document is rendered with the reduced quality supplemental web content. The supplemental web content can then be restored to its original quality, if the user so desires, based upon a prompt.
    Type: Application
    Filed: September 4, 2003
    Publication date: March 10, 2005
    Applicant: International Business Machines Corporation
    Inventor: Marcia Stockton
  • Publication number: 20050044185
    Abstract: A method for circumventing the operation of content blocking logic in a markup language document delivery system. In the method of the invention, the operation of content blocking logic can be determined. Responsive to this determination, a reference to content disposed in markup can be located and the reference to the content can be replaced with an alias. Finally, the markup can be served to a requesting browser. In this way, the replacement of the reference with the alias circumvents the operation of the content blocking logic.
    Type: Application
    Filed: August 18, 2003
    Publication date: February 24, 2005
    Applicant: International Business Machines Corporation
    Inventors: John Hind, Marcia Stockton
  • Publication number: 20050044508
    Abstract: Method, system and program product for customizing a user interface. A group of users of the application can be defined. For each user in the group, a use count for one or more user interface elements is recorded. The recorded use counts can be used to calculate a use weight for the group of users, which is then used to modify the corresponding user interface element.
    Type: Application
    Filed: August 21, 2003
    Publication date: February 24, 2005
    Applicant: International Business Machines Corporation
    Inventor: Marcia Stockton
  • Publication number: 20050039034
    Abstract: Methods, systems, computer program products, and methods of doing business whereby document components are secured or controlled using “security containers” which encapsulate the components (and other component metadata). A “security container” encapsulates the component (i.e., content) that is to be controlled within a higher-level construct such as a compound document. The security container also contains rules for interacting with the encapsulated component, and one or more encryption keys usable for decrypting the component and rules for authorized requesters.
    Type: Application
    Filed: July 31, 2003
    Publication date: February 17, 2005
    Applicant: International Business Machines Corporation
    Inventors: Ronald Doyle, John Hind, Marcia Stockton
  • Publication number: 20050021947
    Abstract: Under the present invention, one or more isolation zones are defined. Each isolation zone includes one or more computer programs grouped together, and can be defined manually by a user/administrator or automatically based on historical behavior. Once the isolation zone(s) are defined, a security prompt is displayed whenever an attempt is made to insert content across an isolation zone boundary. The security prompt can request confirmation by the user, or it can request a security credential before allowing the attempted content insertion.
    Type: Application
    Filed: June 5, 2003
    Publication date: January 27, 2005
    Applicant: International Business Machines Corporation
    Inventors: Ronald Doyle, John Hind, Marcia Stockton
  • Publication number: 20050021468
    Abstract: A computer mass storage system that hosts multiple users is managed by obtaining agreement with a user to provide a level of erasure of hosted data from the computer's mass storage system. The hosted data is then erased according to the level of erasure that was agreed upon. One of multiple levels of security also may be agreed upon and provided.
    Type: Application
    Filed: July 21, 2003
    Publication date: January 27, 2005
    Inventor: Marcia Stockton