Patents by Inventor Charles J. Williams
Charles J. Williams has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8308063Abstract: The claimed subject matter relates to an architecture or arrangement that can limit access to sensitive information by means of encryption. In particular, data obtained from a payment instrument at, e.g., a Point-Of-Sale (POS) location can be encrypted at an early stage such that a POS (or another) application does not have access to the data in an unencrypted form and/or does not have access to a means for decrypting the data. For example, a Public Key Infrastructure (PKI) arrangement can be employed such that a back-end payment processor can define encryption algorithms, associate itself with a public key, and maintain a private key for decryption. The public key can be delivered to the POS location and employed for data encryption, and, moreover, the PKI can be regulated by the more trusted parties.Type: GrantFiled: July 8, 2011Date of Patent: November 13, 2012Assignee: Microsoft CorporationInventors: Sergey Bykov, Charles J. Williams, Craig Jensen
-
Patent number: 8225119Abstract: The described implementations relate to energy-aware server management. One implementation involves an adaptive control unit configured to manage energy usage in a server farm by transitioning individual servers between active and inactive states while maintaining response times for the server farm at a predefined level.Type: GrantFiled: February 23, 2009Date of Patent: July 17, 2012Assignee: Microsoft CorporationInventors: Navendu Jain, Charles J. Williams, James Larus, Dan Reed
-
Publication number: 20110264587Abstract: The claimed subject matter relates to an architecture or arrangement that can limit access to sensitive information by means of encryption. In particular, data obtained from a payment instrument at, e.g., a Point-Of-Sale (POS) location can be encrypted at an early stage such that a POS (or another) application does not have access to the data in an unencrypted form and/or does not have access to a means for decrypting the data. For example, a Public Key Infrastructure (PKI) arrangement can be employed such that a back-end payment processor can define encryption algorithms, associate itself with a public key, and maintain a private key for decryption. The public key can be delivered to the POS location and employed for data encryption, and, moreover, the PKI can be regulated by the more trusted parties.Type: ApplicationFiled: July 8, 2011Publication date: October 27, 2011Applicant: MICROSOFT CORPORATIONInventors: Sergey Bykov, Charles J. Williams, Craig Jensen
-
Publication number: 20110230979Abstract: A control system is described that includes a scalable collection of one or more symmetric control units. The control units govern separate respective aspects of a target system, such as a data center. Each control unit can include a set of pluggable modules, including learning functionality, decision functionality, event processing functionality, sensor functionality, and actuator functionality. The scalable and extensible nature of the control system allows the control system to be quickly and efficiently deployed in response to changes in the target system being controlled.Type: ApplicationFiled: March 19, 2010Publication date: September 22, 2011Applicant: Microsoft CorporationInventors: Danny A. Reed, Suyash Sinha, Mohamed E. Fathalla, Charles J. Williams, Boyd L. Hays
-
Patent number: 7975916Abstract: The claimed subject matter relates to an architecture or arrangement that can limit access to sensitive information by means of encryption. In particular, data obtained from a payment instrument at, e.g., a Point-Of-Sale (POS) location can be encrypted at an early stage such that a POS (or another) application does not have access to the data in an unencrypted form and/or does not have access to a means for decrypting the data. For example, a Public Key Infrastructure (PKI) arrangement can be employed such that a back-end payment processor can define encryption algorithms, associate itself with a public key, and maintain a private key for decryption. The public key can be delivered to the POS location and employed for data encryption, and, moreover, the PKI can be regulated by the more trusted parties.Type: GrantFiled: November 17, 2008Date of Patent: July 12, 2011Assignee: Microsoft CorporationInventors: Sergey Bykov, Charles J. Williams, Craig Jensen
-
Patent number: 7721284Abstract: The deployment of multiple embedded operating system components provides a designer with flexibility when customizing an embedded operating system for a target computing device. The embedded operating system components provide extra features to expand the functionality of the target computing device. The ease with which the designer may select various embedded operating system components to deploy from an originating computing device to the target computing device simplifies the design process. Configuration data of a core embedded operating system and configuration data of the deployed embedded operating system components are merged and any conflicts between configuration data are automatically resolved without rebooting the target computing device.Type: GrantFiled: April 27, 2006Date of Patent: May 18, 2010Assignee: Microsoft CorporationInventors: Sergey I. Bykov, Charles J. Williams, Craig Jensen, Harlan Husmann, Janine A. Harrison
-
Publication number: 20090126795Abstract: I propose a 3-D (three dimensional) alternative energy panel I call the “Earth Energy Cell”. It will be able to use several means of earth energy. Solar Wind Thermal Induction It will be able to collect light from 360 Degrees. Not from only one south facing direction.Type: ApplicationFiled: January 10, 2009Publication date: May 21, 2009Inventor: Charles J. Williams
-
Publication number: 20090083189Abstract: The claimed subject matter relates to an architecture or arrangement that can limit access to sensitive information by means of encryption. In particular, data obtained from a payment instrument at, e.g., a Point-Of-Sale (POS) location can be encrypted at an early stage such that a POS (or another) application does not have access to the data in an unencrypted form and/or does not have access to a means for decrypting the data. For example, a Public Key Infrastructure (PKI) arrangement can be employed such that a back-end payment processor can define encryption algorithms, associate itself with a public key, and maintain a private key for decryption. The public key can be delivered to the POS location and employed for data encryption, and, moreover, the PKI can be regulated by the more trusted parties.Type: ApplicationFiled: November 17, 2008Publication date: March 26, 2009Applicant: MICROSOFT CORPORATIONInventors: Sergey Bykov, Charles J. Williams, Craig Jensen
-
Publication number: 20090055322Abstract: A personal information exchange module in a standardized form is used as a plug-in to a personal handheld device for information exchange such as financial transactions, facility access, medical information exchange, and the like while protecting sensitive code and data associated with the module by separating those from the operating environment of the personal handheld device. Functional capabilities of the module may also be adjusted based on available power from the personal handheld device.Type: ApplicationFiled: August 23, 2007Publication date: February 26, 2009Applicant: Microsoft CorporationInventors: Sergey I. Bykov, Charles J. Williams
-
Patent number: 7451926Abstract: The claimed subject matter relates to an architecture or arrangement that can limit access to sensitive information by means of encryption. In particular, data obtained from a payment instrument at, e.g., a Point-Of-Sale (POS) location can be encrypted at an early stage such that a POS (or another) application does not have access to the data in an unencrypted form and/or does not have access to a means for decrypting the data. For example, a Public Key Infrastructure (PKI) arrangement can be employed such that a back-end payment processor can define encryption algorithms, associate itself with a public key, and maintain a private key for decryption. The public key can be delivered to the POS location and employed for data encryption, and, moreover, the PKI can be regulated by the more trusted parties.Type: GrantFiled: November 3, 2006Date of Patent: November 18, 2008Assignee: Microsoft CorporationInventors: Sergey Bykov, Charles J. Williams, Craig Jensen
-
Publication number: 20080228566Abstract: Systems and methods that combine coupon processing with payment processing (e.g., a credit/debit card transaction). Payment processing entities can function as the coupon clearinghouse between coupon issuers and merchants. Accordingly, processing costs can be mitigated as coupons are no longer processed separately from other tenders, (e.g., coupons can be processed same manner electronic transactions related to payments are processed, and by the same service provider.Type: ApplicationFiled: March 15, 2007Publication date: September 18, 2008Applicant: MICROSOFT CORPORATIONInventors: Charles J. Williams, Sergey I. Bykov
-
Publication number: 20080223918Abstract: Systems and methods of payment processing via employing a payment token(s) that is supplied to smart portable devices, which are carried by customers. Such a token can be in form of a unique identifier(s) (which is generated by an issuing bank and received by the smart portable devices), and is associated with a payment amount for a merchant. Moreover, the point of sale (POS) terminal can accept the token offline, and hence a requirement for availability of communication between the POS and a payment processor/issuing bank can be mitigated.Type: ApplicationFiled: March 15, 2007Publication date: September 18, 2008Applicant: MICROSOFT CORPORATIONInventors: Charles J. Williams, Sergey I. Bykov
-
Publication number: 20080228568Abstract: Systems and methods that supply associations between advertisements—and—relevance of coupons for customers. Accordingly, the customer is empowered to interact with an advertising system, and the coupons obtained are considered desirable by the customer (e.g., non-spam). The advertisement system includes a presentation component (which presents advertisement to customers); a contextualization component (which analyzes context of purchase related to the advertisement such as location, profile, and basket of the customer), and a dispenser component (which dispenses the coupons based on customer initiation—e.g., pressing a button).Type: ApplicationFiled: March 16, 2007Publication date: September 18, 2008Applicant: MICROSOFT CORPORATIONInventors: Charles J. Williams, Sergey I. Bykov, Timothy E. Belvin
-
Publication number: 20080228567Abstract: Systems and methods that electronically redeem coupons via an online storage component, which stores coupon data for a consumer and regardless of which issuer has issued the coupon. Such online storage medium can store coupons online (e.g., in a single location) without being tied to a particular service, and can readily provide redemption (e.g., an automatic redemption). The consumer and other retail entities (e.g., coupon issuers, merchants, and the like) can populate the online storage medium periodically, or in response to predetermined events (e.g., physical location of consumer, associated demographics, and the like.Type: ApplicationFiled: March 16, 2007Publication date: September 18, 2008Applicant: MICROSOFT CORPORATIONInventors: Charles J. Williams, Sergey I. Bykov, Timothy E. Belvin
-
Publication number: 20080109372Abstract: The claimed subject matter relates to an architecture or arrangement that can limit access to sensitive information by means of encryption. In particular, data obtained from a payment instrument at, e.g., a Point-Of-Sale (POS) location can be encrypted at an early stage such that a POS (or another) application does not have access to the data in an unencrypted form and/or does not have access to a means for decrypting the data. For example, a Public Key Infrastructure (PKI) arrangement can be employed such that a back-end payment processor can define encryption algorithms, associate itself with a public key, and maintain a private key for decryption. The public key can be delivered to the POS location and employed for data encryption, and, moreover, the PKI can be regulated by the more trusted parties.Type: ApplicationFiled: November 3, 2006Publication date: May 8, 2008Applicant: MICROSOFT CORPORATIONInventors: Sergey Bykov, Charles J. Williams, Craig Jensen
-
Patent number: 4816097Abstract: A method of manufacturing a non-metallic honeycomb having a perforated septum embedded therein in a plane extending perpendicularly to cell walls of the honeycomb, the cell walls of the honeycomb each having discontinuous opposite outer edge surfaces, including the steps of protecting the cell walls with a protectant mixture applied to one of the outer edge surfaces; and laser drilling the septum with a plurality of laser beams originating from a point exterior to the cell walls opposite the covered edge surface in a direction parallel to said cell walls and perpendicular to the plane of the septum, the protectant mixture covering an area of the outer edge surface sufficient to prevent damage to the cell walls.Type: GrantFiled: April 5, 1988Date of Patent: March 28, 1989Assignee: The Boeing CompanyInventors: Charles J. Williams, Robert A. Coleman
-
Patent number: 4429991Abstract: Means and methods are provided for examining bills and detecting flaws therein, such as length and width variations, holes, tears and dog-ears or folded corners. Electrical signals are generated by light sensing circuits and compared with signals representing the standard physical characteristics of the bill to indicate deviations therefrom.Type: GrantFiled: August 17, 1981Date of Patent: February 7, 1984Assignee: The Perkin-Elmer CorporationInventor: Charles J. Williams
-
Patent number: 4267478Abstract: A method and apparatus for pre-setting the position of a piezoelectric actuator used in controlling the path length of the laser beam of a ring laser gyroscope is disclosed. The path length controller of this invention minimizes the necessary rectilinear motion of the actuator by presetting the actuator position according to the environmental or start-up temperature of the ring laser gyroscope to anticipate changes in the laser path length resulting from changes in the environmental temperature and/or self heating effect when the gyroscope is in operation.Type: GrantFiled: November 17, 1978Date of Patent: May 12, 1981Assignee: The Singer CompanyInventors: Bo H. G. Ljung, Charles J. Williams
-
Patent number: 4255057Abstract: An apparatus for detecting quality of currency or the like. Signals representative of the transmissivity and reflectivity of a bill are subtracted from a signal representative of unity. The resulting signal, which is representative of absorptivity of light by the bill, is accumulated over the length of the bill and compared to a reference to produce digital signals representative of fit or unfit bills.Type: GrantFiled: October 4, 1979Date of Patent: March 10, 1981Assignee: The Perkin-Elmer CorporationInventor: Charles J. Williams
-
Patent number: D1024252Type: GrantFiled: August 4, 2022Date of Patent: April 23, 2024Assignee: Springfield, Inc.Inventors: Christopher Martin Baumbach, Peter J. Leach, Stephen H. McKelvain, Charles David Williams