Patents by Inventor William B. Lee

William B. Lee has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240127206
    Abstract: An ATM is configured to interact with a mobile device and provide user access to one or more of the banking services available at the ATM using the mobile device. Banking-related information may be viewed and/or input at the ATM using the mobile device. The ATM may have multiple vertical levels of deposit slots, withdrawal trays and/or receipt dispensers. A level at the ATM at which the user interacts with the ATM for deposits, withdrawals, or receipts may be selected. The level may be specified by the user of the mobile device, at the ATM or using the mobile device, or may be determined by the ATM.
    Type: Application
    Filed: October 13, 2022
    Publication date: April 18, 2024
    Inventors: Arjun Thimmareddy, Bryan T. King, Alexander S. Lee, Vaishnavi Varma, Tony Aidoo, Paula M. Booze, Ramesh B. Chandanala, William R. Conrad, Juliet Abdul-Aziz, Gerard P. Gay
  • Patent number: 11948136
    Abstract: An ATM is configured to interact with a mobile device and provide user access to one or more of the banking services available at the ATM using the mobile device. Banking-related information may be viewed and/or input at the ATM using the mobile device. The ATM may have multiple vertical levels of deposit slots, withdrawal trays and/or receipt dispensers. A level at the ATM at which the user interacts with the ATM for deposits, withdrawals, or receipts may be selected. The level may be specified by the user of the mobile device, at the ATM or using the mobile device, or may be determined by the ATM.
    Type: Grant
    Filed: October 13, 2022
    Date of Patent: April 2, 2024
    Assignee: Bank of America Corporation
    Inventors: Arjun Thimmareddy, Bryan T. King, Alexander S. Lee, Vaishnavi Varma, Tony Aidoo, Paula M. Booze, Ramesh B. Chandanala, William R. Conrad, Juliet Abdul-Aziz, Gerard P. Gay
  • Publication number: 20240104533
    Abstract: A screen-less automated teller machine (ATM) may be configured to interact with a mobile device. The ATM may automatically detect the presence of the mobile device in a vicinity of the ATM and initiate contact with the mobile device, or a mobile device may initiate contact with the ATM. After verifying user permission to access the ATM, the mobile device may be enabled to provide user access to one or more of the banking services available at the ATM using the mobile device. As the ATM is screen-less, banking-related information may be viewed and/or input at the ATM using the mobile device. An application on the mobile device may be used to access and interact with the ATM using the mobile device.
    Type: Application
    Filed: September 22, 2022
    Publication date: March 28, 2024
    Inventors: Arjun Thimmareddy, Bryan T. King, Alexander S. Lee, Vaishnavi Varma, Tony Aidoo, Paula M. Booze, Ramesh B. Chandanala, William R. Conrad, Juliet Abdul-Aziz, Gerard P. Gay
  • Publication number: 20240095698
    Abstract: Methods for banking at an automated teller machine (ATM) using a mobile device. The ATM may automatically detect the presence of the mobile device in a vicinity of the ATM and initiate contact with the mobile device, or a mobile device may initiate contact with the ATM. After verifying user permission to access the ATM, the mobile device may be enabled to provide user access to one or more of the banking services available at the ATM using the mobile device and to view banking-related information on the mobile device. A mobile application on the mobile device may be used to access the ATM using the mobile device. While a mobile device is accessing the ATM, a screen on the ATM may become inactive for banking services and the option to select banking services directly at the ATM may be disabled.
    Type: Application
    Filed: September 15, 2022
    Publication date: March 21, 2024
    Inventors: Arjun Thimmareddy, Bryan T. King, Alexander S. Lee, Vaishnavi Varma, Tony Aidoo, Paula M. Booze, Ramesh B. Chandanala, William R. Conrad, Juliet Abdul-Aziz, Gerard P. Gay
  • Patent number: 10171239
    Abstract: Aspects of the subject matter described herein relate to disclosing recovery keys. In aspects, when a recovery key is disclosed, data is updated to indicate that the recovery key has been disclosed. A machine that has locked data may determine whether a recovery key for the locked data has been disclosed and whether a new key needs to be generated for the locked data. If a new key needs to be generated for the locked data, the machine may generate the new key and send it to a recovery store for storage. In addition, old keys that protect the locked data may be deleted after the new key has been generated and stored.
    Type: Grant
    Filed: November 7, 2016
    Date of Patent: January 1, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Sachin Goel, Stein Erik Dolan, William B. Lees
  • Publication number: 20170196296
    Abstract: Reduction of body odors arising from microbial activity in moist areas of the human body, particularly the foot area, is achieved by providing a substrate that is treated with an amphoteric metal compound solution, especially those containing copper, which provides a stable material that can be placed in proximity to a part of the body that typically develops body odor, the treated material providing extended efficacy in the prevention of odor caused by microorganisms despite continuous and repeated exposure of the treated substrate to sweat or laundering.
    Type: Application
    Filed: January 11, 2017
    Publication date: July 13, 2017
    Inventor: William B. Lee
  • Publication number: 20170054558
    Abstract: Aspects of the subject matter described herein relate to disclosing recovery keys. In aspects, when a recovery key is disclosed, data is updated to indicate that the recovery key has been disclosed. A machine that has locked data may determine whether a recovery key for the locked data has been disclosed and whether a new key needs to be generated for the locked data. If a new key needs to be generated for the locked data, the machine may generate the new key and send it to a recovery store for storage. In addition, old keys that protect the locked data may be deleted after the new key has been generated and stored.
    Type: Application
    Filed: November 7, 2016
    Publication date: February 23, 2017
    Inventors: Sachin Goel, Stein Erik Dolan, William B. Lees
  • Patent number: 9489528
    Abstract: Aspects of the subject matter described herein relate to disclosing recovery keys. In aspects, when a recovery key is disclosed, data is updated to indicate that the recovery key has been disclosed. A machine that has locked data may determine whether a recovery key for the locked data has been disclosed and whether a new key needs to be generated for the locked data. If a new key needs to be generated for the locked data, the machine may generate the new key and send it to a recovery store for storage. In addition, old keys that protect the locked data may be deleted after the new key has been generated and stored.
    Type: Grant
    Filed: December 12, 2011
    Date of Patent: November 8, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Sachin Goel, Stein Erik Dolan, William B. Lees
  • Patent number: 8769303
    Abstract: Aspects of the subject matter described herein relate to recovering locked data. In aspects, stakeholders of locked volume(s) are identified. Security data of the volume(s) that can be used to unlock the volume(s) is collected from one or more computing devices hosting the volume(s). The security data and stakeholder data is stored on a recovery store. If a stakeholder needs to unlock a volume, the stakeholder may communicate with a recovery manager, provide certain data, and receive data that may be used to unlock the volume. Auditing may be performed for attempts to obtain the unlocking data from the recovery store.
    Type: Grant
    Filed: December 5, 2011
    Date of Patent: July 1, 2014
    Assignee: Microsoft Corporation
    Inventors: Chris W. Hallum, William B. Lees, Sachin Goel
  • Patent number: 8561209
    Abstract: Aspects of the subject matter described herein relate to encryption lifecycle management. In aspects, an orchestrating agent is installed on a device upon which encryption management is desired. During the lifecycle of the device, the orchestrating agent facilitates performing actions to protect the data of the device. For example, at certain points during the actions, the orchestrating agent may deduce the presence of external entities needed to perform the actions and interact with those entities to protect the data. During its facilitating activities, the orchestrating agent may also escrow protector data to use to unlock the data for legitimate stakeholders of the data.
    Type: Grant
    Filed: December 19, 2011
    Date of Patent: October 15, 2013
    Assignee: Microsoft Corporation
    Inventors: Sachin Goel, Stein Erik Dolan, William B. Lees
  • Publication number: 20130160139
    Abstract: Aspects of the subject matter described herein relate to encryption lifecycle management. In aspects, an orchestrating agent is installed on a device upon which encryption management is desired. During the lifecycle of the device, the orchestrating agent facilitates performing actions to protect the data of the device. For example, at certain points during the actions, the orchestrating agent may deduce the presence of external entities needed to perform the actions and interact with those entities to protect the data. During its facilitating activities, the orchestrating agent may also escrow protector data to use to unlock the data for legitimate stakeholders of the data.
    Type: Application
    Filed: December 19, 2011
    Publication date: June 20, 2013
    Applicant: MICROSOFT CORPORATION
    Inventors: Sachin Goel, Stein Erik Dolan, William B. Lees
  • Publication number: 20130148810
    Abstract: Aspects of the subject matter described herein relate to disclosing recovery keys. In aspects, when a recovery key is disclosed, data is updated to indicate that the recovery key has been disclosed. A machine that has locked data may determine whether a recovery key for the locked data has been disclosed and whether a new key needs to be generated for the locked data. If a new key needs to be generated for the locked data, the machine may generate the new key and send it to a recovery store for storage. In addition, old keys that protect the locked data may be deleted after the new key has been generated and stored.
    Type: Application
    Filed: December 12, 2011
    Publication date: June 13, 2013
    Applicant: Microsoft Corporation
    Inventors: Sachin Goel, Stein Erik Dolan, William B. Lees
  • Publication number: 20130145174
    Abstract: Aspects of the subject matter described herein relate to recovering locked data. In aspects, stakeholders of locked volume(s) are identified. Security data of the volume(s) that can be used to unlock the volume(s) is collected from one or more computing devices hosting the volume(s). The security data and stakeholder data is stored on a recovery store. If a stakeholder needs to unlock a volume, the stakeholder may communicate with a recovery manager, provide certain data, and receive data that may be used to unlock the volume. Auditing may be performed for attempts to obtain the unlocking data from the recovery store.
    Type: Application
    Filed: December 5, 2011
    Publication date: June 6, 2013
    Applicant: Microsoft Corporation
    Inventors: Chris W. Hallum, William B. Lees, Sachin Goel
  • Patent number: 8316455
    Abstract: Accessing a data set with secret and non-secret data. A method includes accessing a data set image. The data set image comprises secret data. The data set image is derived from an authorized data set associated with a master key that authorizes access to the secret data. The master key is not provided with the data set image. The method further comprises restoring the data set image to a computing system to create a degraded data set. Data in the degraded data set other than the secret data is accessed without restoring the master key.
    Type: Grant
    Filed: January 27, 2011
    Date of Patent: November 20, 2012
    Assignee: Microsoft Corporation
    Inventors: Collin H. Brace, Nathan D. Muggli, William B. Lees, William J. Whalen
  • Patent number: 8250220
    Abstract: A system and method for identifying network endpoints that provide a service of interest orders endpoints according to their network proximity to a requesting client. The requesting client may then contact the closest available providing endpoint, thus increasing the efficiency of usage of network resources while decreasing latency and enhancing reliability. In an embodiment of the invention, when a connection to the nearest providing endpoint cannot be established, a mechanism for locating a next-closest alternative endpoint is provided.
    Type: Grant
    Filed: January 25, 2012
    Date of Patent: August 21, 2012
    Assignee: Microsoft Corporation
    Inventors: Jeffrey B. Parham, Levon A. Esibov, Nicholas J. Harvey, William B. Lees
  • Publication number: 20120124223
    Abstract: A system and method for identifying network endpoints that provide a service of interest orders endpoints according to their network proximity to a requesting client. The requesting client may then contact the closest available providing endpoint, thus increasing the efficiency of usage of network resources while decreasing latency and enhancing reliability. In an embodiment of the invention, when a connection to the nearest providing endpoint cannot be established, a mechanism for locating a next-closest alternative endpoint is provided.
    Type: Application
    Filed: January 25, 2012
    Publication date: May 17, 2012
    Applicant: Microsoft Corporation
    Inventors: Jeffrey B. Parham, Levon A. Esibov, Nicholas J. Harvey, William B. Lees
  • Patent number: 8145699
    Abstract: A system and method for identifying network endpoints that provide a service of interest orders endpoints according to their network proximity to a requesting client. The requesting client may then contact the closest available providing endpoint, thus increasing the efficiency of usage of network resources while decreasing latency and enhancing reliability. In an embodiment of the invention, when a connection to the nearest providing endpoint cannot be established, a mechanism for locating a next-closest alternative endpoint is provided.
    Type: Grant
    Filed: May 30, 2003
    Date of Patent: March 27, 2012
    Assignee: Microsoft Corporation
    Inventors: Jeffrey B. Parham, Levon A. Esibov, Nicholas J. Harvey, William B. Lees
  • Publication number: 20110126027
    Abstract: Accessing a data set with secret and non-secret data. A method includes accessing a data set image. The data set image comprises secret data. The data set image is derived from an authorized data set associated with a master key that authorizes access to the secret data. The master key is not provided with the data set image. The method further comprises restoring the data set image to a computing system to create a degraded data set. Data in the degraded data set other than the secret data is accessed without restoring the master key.
    Type: Application
    Filed: January 27, 2011
    Publication date: May 26, 2011
    Applicant: MICROSOFT CORPORATION
    Inventors: Colin H. Brace, Nathan D. Muggli, William B. Lees, William J. Whalen
  • Patent number: 7921304
    Abstract: Accessing a data set with secret and non-secret data. A method includes accessing a data set image. The data set image comprises secret data. The data set image is derived from an authorized data set associated with a master key that authorizes access to the secret data. The master key is not provided with the data set image. The method further comprises restoring the data set image to a computing system to create a degraded data set. Data in the degraded data set other than the secret data is accessed without restoring the master key.
    Type: Grant
    Filed: December 6, 2005
    Date of Patent: April 5, 2011
    Assignee: Microsoft Corporation
    Inventors: Colin H. Brace, Nathan D. Muggli, William B. Lees, William J. Whalen
  • Patent number: 7774442
    Abstract: Described is a technology in a distributed configuration network management environment, in which action-style documents are used as guides in processing structured documents to perform management tasks. For example, the action-style documents may be used by a standard stylesheet processor to validate a constitutional document, and process input lines of that constitutional document into output lines of a document. When executed, the output lines perform a management task. In this manner, for example, policy statements of an administrator are transformed into a single type of self-contained document that is consistently interpreted, and thus consistently executed, regardless of its source or when it was authored.
    Type: Grant
    Filed: June 26, 2008
    Date of Patent: August 10, 2010
    Assignee: Microsoft Corporation
    Inventors: William B. Lees, Rajagopalan B. Narayanan, Jeffrey B. Parham