Patents by Inventor William B. Lees
William B. Lees has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240127206Abstract: An ATM is configured to interact with a mobile device and provide user access to one or more of the banking services available at the ATM using the mobile device. Banking-related information may be viewed and/or input at the ATM using the mobile device. The ATM may have multiple vertical levels of deposit slots, withdrawal trays and/or receipt dispensers. A level at the ATM at which the user interacts with the ATM for deposits, withdrawals, or receipts may be selected. The level may be specified by the user of the mobile device, at the ATM or using the mobile device, or may be determined by the ATM.Type: ApplicationFiled: October 13, 2022Publication date: April 18, 2024Inventors: Arjun Thimmareddy, Bryan T. King, Alexander S. Lee, Vaishnavi Varma, Tony Aidoo, Paula M. Booze, Ramesh B. Chandanala, William R. Conrad, Juliet Abdul-Aziz, Gerard P. Gay
-
Patent number: 11948136Abstract: An ATM is configured to interact with a mobile device and provide user access to one or more of the banking services available at the ATM using the mobile device. Banking-related information may be viewed and/or input at the ATM using the mobile device. The ATM may have multiple vertical levels of deposit slots, withdrawal trays and/or receipt dispensers. A level at the ATM at which the user interacts with the ATM for deposits, withdrawals, or receipts may be selected. The level may be specified by the user of the mobile device, at the ATM or using the mobile device, or may be determined by the ATM.Type: GrantFiled: October 13, 2022Date of Patent: April 2, 2024Assignee: Bank of America CorporationInventors: Arjun Thimmareddy, Bryan T. King, Alexander S. Lee, Vaishnavi Varma, Tony Aidoo, Paula M. Booze, Ramesh B. Chandanala, William R. Conrad, Juliet Abdul-Aziz, Gerard P. Gay
-
Publication number: 20240104533Abstract: A screen-less automated teller machine (ATM) may be configured to interact with a mobile device. The ATM may automatically detect the presence of the mobile device in a vicinity of the ATM and initiate contact with the mobile device, or a mobile device may initiate contact with the ATM. After verifying user permission to access the ATM, the mobile device may be enabled to provide user access to one or more of the banking services available at the ATM using the mobile device. As the ATM is screen-less, banking-related information may be viewed and/or input at the ATM using the mobile device. An application on the mobile device may be used to access and interact with the ATM using the mobile device.Type: ApplicationFiled: September 22, 2022Publication date: March 28, 2024Inventors: Arjun Thimmareddy, Bryan T. King, Alexander S. Lee, Vaishnavi Varma, Tony Aidoo, Paula M. Booze, Ramesh B. Chandanala, William R. Conrad, Juliet Abdul-Aziz, Gerard P. Gay
-
Publication number: 20240095698Abstract: Methods for banking at an automated teller machine (ATM) using a mobile device. The ATM may automatically detect the presence of the mobile device in a vicinity of the ATM and initiate contact with the mobile device, or a mobile device may initiate contact with the ATM. After verifying user permission to access the ATM, the mobile device may be enabled to provide user access to one or more of the banking services available at the ATM using the mobile device and to view banking-related information on the mobile device. A mobile application on the mobile device may be used to access the ATM using the mobile device. While a mobile device is accessing the ATM, a screen on the ATM may become inactive for banking services and the option to select banking services directly at the ATM may be disabled.Type: ApplicationFiled: September 15, 2022Publication date: March 21, 2024Inventors: Arjun Thimmareddy, Bryan T. King, Alexander S. Lee, Vaishnavi Varma, Tony Aidoo, Paula M. Booze, Ramesh B. Chandanala, William R. Conrad, Juliet Abdul-Aziz, Gerard P. Gay
-
Patent number: 10171239Abstract: Aspects of the subject matter described herein relate to disclosing recovery keys. In aspects, when a recovery key is disclosed, data is updated to indicate that the recovery key has been disclosed. A machine that has locked data may determine whether a recovery key for the locked data has been disclosed and whether a new key needs to be generated for the locked data. If a new key needs to be generated for the locked data, the machine may generate the new key and send it to a recovery store for storage. In addition, old keys that protect the locked data may be deleted after the new key has been generated and stored.Type: GrantFiled: November 7, 2016Date of Patent: January 1, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Sachin Goel, Stein Erik Dolan, William B. Lees
-
Publication number: 20170196296Abstract: Reduction of body odors arising from microbial activity in moist areas of the human body, particularly the foot area, is achieved by providing a substrate that is treated with an amphoteric metal compound solution, especially those containing copper, which provides a stable material that can be placed in proximity to a part of the body that typically develops body odor, the treated material providing extended efficacy in the prevention of odor caused by microorganisms despite continuous and repeated exposure of the treated substrate to sweat or laundering.Type: ApplicationFiled: January 11, 2017Publication date: July 13, 2017Inventor: William B. Lee
-
Publication number: 20170054558Abstract: Aspects of the subject matter described herein relate to disclosing recovery keys. In aspects, when a recovery key is disclosed, data is updated to indicate that the recovery key has been disclosed. A machine that has locked data may determine whether a recovery key for the locked data has been disclosed and whether a new key needs to be generated for the locked data. If a new key needs to be generated for the locked data, the machine may generate the new key and send it to a recovery store for storage. In addition, old keys that protect the locked data may be deleted after the new key has been generated and stored.Type: ApplicationFiled: November 7, 2016Publication date: February 23, 2017Inventors: Sachin Goel, Stein Erik Dolan, William B. Lees
-
Patent number: 9489528Abstract: Aspects of the subject matter described herein relate to disclosing recovery keys. In aspects, when a recovery key is disclosed, data is updated to indicate that the recovery key has been disclosed. A machine that has locked data may determine whether a recovery key for the locked data has been disclosed and whether a new key needs to be generated for the locked data. If a new key needs to be generated for the locked data, the machine may generate the new key and send it to a recovery store for storage. In addition, old keys that protect the locked data may be deleted after the new key has been generated and stored.Type: GrantFiled: December 12, 2011Date of Patent: November 8, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Sachin Goel, Stein Erik Dolan, William B. Lees
-
Patent number: 8769303Abstract: Aspects of the subject matter described herein relate to recovering locked data. In aspects, stakeholders of locked volume(s) are identified. Security data of the volume(s) that can be used to unlock the volume(s) is collected from one or more computing devices hosting the volume(s). The security data and stakeholder data is stored on a recovery store. If a stakeholder needs to unlock a volume, the stakeholder may communicate with a recovery manager, provide certain data, and receive data that may be used to unlock the volume. Auditing may be performed for attempts to obtain the unlocking data from the recovery store.Type: GrantFiled: December 5, 2011Date of Patent: July 1, 2014Assignee: Microsoft CorporationInventors: Chris W. Hallum, William B. Lees, Sachin Goel
-
Patent number: 8561209Abstract: Aspects of the subject matter described herein relate to encryption lifecycle management. In aspects, an orchestrating agent is installed on a device upon which encryption management is desired. During the lifecycle of the device, the orchestrating agent facilitates performing actions to protect the data of the device. For example, at certain points during the actions, the orchestrating agent may deduce the presence of external entities needed to perform the actions and interact with those entities to protect the data. During its facilitating activities, the orchestrating agent may also escrow protector data to use to unlock the data for legitimate stakeholders of the data.Type: GrantFiled: December 19, 2011Date of Patent: October 15, 2013Assignee: Microsoft CorporationInventors: Sachin Goel, Stein Erik Dolan, William B. Lees
-
Publication number: 20130160139Abstract: Aspects of the subject matter described herein relate to encryption lifecycle management. In aspects, an orchestrating agent is installed on a device upon which encryption management is desired. During the lifecycle of the device, the orchestrating agent facilitates performing actions to protect the data of the device. For example, at certain points during the actions, the orchestrating agent may deduce the presence of external entities needed to perform the actions and interact with those entities to protect the data. During its facilitating activities, the orchestrating agent may also escrow protector data to use to unlock the data for legitimate stakeholders of the data.Type: ApplicationFiled: December 19, 2011Publication date: June 20, 2013Applicant: MICROSOFT CORPORATIONInventors: Sachin Goel, Stein Erik Dolan, William B. Lees
-
Publication number: 20130148810Abstract: Aspects of the subject matter described herein relate to disclosing recovery keys. In aspects, when a recovery key is disclosed, data is updated to indicate that the recovery key has been disclosed. A machine that has locked data may determine whether a recovery key for the locked data has been disclosed and whether a new key needs to be generated for the locked data. If a new key needs to be generated for the locked data, the machine may generate the new key and send it to a recovery store for storage. In addition, old keys that protect the locked data may be deleted after the new key has been generated and stored.Type: ApplicationFiled: December 12, 2011Publication date: June 13, 2013Applicant: Microsoft CorporationInventors: Sachin Goel, Stein Erik Dolan, William B. Lees
-
Publication number: 20130145174Abstract: Aspects of the subject matter described herein relate to recovering locked data. In aspects, stakeholders of locked volume(s) are identified. Security data of the volume(s) that can be used to unlock the volume(s) is collected from one or more computing devices hosting the volume(s). The security data and stakeholder data is stored on a recovery store. If a stakeholder needs to unlock a volume, the stakeholder may communicate with a recovery manager, provide certain data, and receive data that may be used to unlock the volume. Auditing may be performed for attempts to obtain the unlocking data from the recovery store.Type: ApplicationFiled: December 5, 2011Publication date: June 6, 2013Applicant: Microsoft CorporationInventors: Chris W. Hallum, William B. Lees, Sachin Goel
-
Patent number: 8316455Abstract: Accessing a data set with secret and non-secret data. A method includes accessing a data set image. The data set image comprises secret data. The data set image is derived from an authorized data set associated with a master key that authorizes access to the secret data. The master key is not provided with the data set image. The method further comprises restoring the data set image to a computing system to create a degraded data set. Data in the degraded data set other than the secret data is accessed without restoring the master key.Type: GrantFiled: January 27, 2011Date of Patent: November 20, 2012Assignee: Microsoft CorporationInventors: Collin H. Brace, Nathan D. Muggli, William B. Lees, William J. Whalen
-
Patent number: 8250220Abstract: A system and method for identifying network endpoints that provide a service of interest orders endpoints according to their network proximity to a requesting client. The requesting client may then contact the closest available providing endpoint, thus increasing the efficiency of usage of network resources while decreasing latency and enhancing reliability. In an embodiment of the invention, when a connection to the nearest providing endpoint cannot be established, a mechanism for locating a next-closest alternative endpoint is provided.Type: GrantFiled: January 25, 2012Date of Patent: August 21, 2012Assignee: Microsoft CorporationInventors: Jeffrey B. Parham, Levon A. Esibov, Nicholas J. Harvey, William B. Lees
-
Publication number: 20120124223Abstract: A system and method for identifying network endpoints that provide a service of interest orders endpoints according to their network proximity to a requesting client. The requesting client may then contact the closest available providing endpoint, thus increasing the efficiency of usage of network resources while decreasing latency and enhancing reliability. In an embodiment of the invention, when a connection to the nearest providing endpoint cannot be established, a mechanism for locating a next-closest alternative endpoint is provided.Type: ApplicationFiled: January 25, 2012Publication date: May 17, 2012Applicant: Microsoft CorporationInventors: Jeffrey B. Parham, Levon A. Esibov, Nicholas J. Harvey, William B. Lees
-
Patent number: 8145699Abstract: A system and method for identifying network endpoints that provide a service of interest orders endpoints according to their network proximity to a requesting client. The requesting client may then contact the closest available providing endpoint, thus increasing the efficiency of usage of network resources while decreasing latency and enhancing reliability. In an embodiment of the invention, when a connection to the nearest providing endpoint cannot be established, a mechanism for locating a next-closest alternative endpoint is provided.Type: GrantFiled: May 30, 2003Date of Patent: March 27, 2012Assignee: Microsoft CorporationInventors: Jeffrey B. Parham, Levon A. Esibov, Nicholas J. Harvey, William B. Lees
-
Publication number: 20110126027Abstract: Accessing a data set with secret and non-secret data. A method includes accessing a data set image. The data set image comprises secret data. The data set image is derived from an authorized data set associated with a master key that authorizes access to the secret data. The master key is not provided with the data set image. The method further comprises restoring the data set image to a computing system to create a degraded data set. Data in the degraded data set other than the secret data is accessed without restoring the master key.Type: ApplicationFiled: January 27, 2011Publication date: May 26, 2011Applicant: MICROSOFT CORPORATIONInventors: Colin H. Brace, Nathan D. Muggli, William B. Lees, William J. Whalen
-
Patent number: 7921304Abstract: Accessing a data set with secret and non-secret data. A method includes accessing a data set image. The data set image comprises secret data. The data set image is derived from an authorized data set associated with a master key that authorizes access to the secret data. The master key is not provided with the data set image. The method further comprises restoring the data set image to a computing system to create a degraded data set. Data in the degraded data set other than the secret data is accessed without restoring the master key.Type: GrantFiled: December 6, 2005Date of Patent: April 5, 2011Assignee: Microsoft CorporationInventors: Colin H. Brace, Nathan D. Muggli, William B. Lees, William J. Whalen
-
Patent number: 7774442Abstract: Described is a technology in a distributed configuration network management environment, in which action-style documents are used as guides in processing structured documents to perform management tasks. For example, the action-style documents may be used by a standard stylesheet processor to validate a constitutional document, and process input lines of that constitutional document into output lines of a document. When executed, the output lines perform a management task. In this manner, for example, policy statements of an administrator are transformed into a single type of self-contained document that is consistently interpreted, and thus consistently executed, regardless of its source or when it was authored.Type: GrantFiled: June 26, 2008Date of Patent: August 10, 2010Assignee: Microsoft CorporationInventors: William B. Lees, Rajagopalan B. Narayanan, Jeffrey B. Parham