Patents by Inventor William B. Lees

William B. Lees has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190247064
    Abstract: A method of surgically preparing a proximal end of a tibia includes inserting an intramedullary orthopaedic surgical instrument into a medullary canal of the tibia, securing an attachment device to the intramedullary orthopaedic surgical instrument, attaching a cutting block to the attachment device, resecting the proximal end of the tibia using the cutting block to form a surgically-prepared surface, positioning a tibial base trial on the surgically-prepared surface, and inserting a keel punch through a slot defined in the tibial base trial and into the surgically-prepared surface of the tibia.
    Type: Application
    Filed: April 24, 2019
    Publication date: August 15, 2019
    Inventors: Kyle B. Thomas, Todd A. Kilpela, Steven P. Gowers, Ryan C. Keefer, William R. Macumber, Jonathan C. Lee, Lisa M. Robertson
  • Patent number: 10171239
    Abstract: Aspects of the subject matter described herein relate to disclosing recovery keys. In aspects, when a recovery key is disclosed, data is updated to indicate that the recovery key has been disclosed. A machine that has locked data may determine whether a recovery key for the locked data has been disclosed and whether a new key needs to be generated for the locked data. If a new key needs to be generated for the locked data, the machine may generate the new key and send it to a recovery store for storage. In addition, old keys that protect the locked data may be deleted after the new key has been generated and stored.
    Type: Grant
    Filed: November 7, 2016
    Date of Patent: January 1, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Sachin Goel, Stein Erik Dolan, William B. Lees
  • Publication number: 20170196296
    Abstract: Reduction of body odors arising from microbial activity in moist areas of the human body, particularly the foot area, is achieved by providing a substrate that is treated with an amphoteric metal compound solution, especially those containing copper, which provides a stable material that can be placed in proximity to a part of the body that typically develops body odor, the treated material providing extended efficacy in the prevention of odor caused by microorganisms despite continuous and repeated exposure of the treated substrate to sweat or laundering.
    Type: Application
    Filed: January 11, 2017
    Publication date: July 13, 2017
    Inventor: William B. Lee
  • Publication number: 20170054558
    Abstract: Aspects of the subject matter described herein relate to disclosing recovery keys. In aspects, when a recovery key is disclosed, data is updated to indicate that the recovery key has been disclosed. A machine that has locked data may determine whether a recovery key for the locked data has been disclosed and whether a new key needs to be generated for the locked data. If a new key needs to be generated for the locked data, the machine may generate the new key and send it to a recovery store for storage. In addition, old keys that protect the locked data may be deleted after the new key has been generated and stored.
    Type: Application
    Filed: November 7, 2016
    Publication date: February 23, 2017
    Inventors: Sachin Goel, Stein Erik Dolan, William B. Lees
  • Patent number: 9489528
    Abstract: Aspects of the subject matter described herein relate to disclosing recovery keys. In aspects, when a recovery key is disclosed, data is updated to indicate that the recovery key has been disclosed. A machine that has locked data may determine whether a recovery key for the locked data has been disclosed and whether a new key needs to be generated for the locked data. If a new key needs to be generated for the locked data, the machine may generate the new key and send it to a recovery store for storage. In addition, old keys that protect the locked data may be deleted after the new key has been generated and stored.
    Type: Grant
    Filed: December 12, 2011
    Date of Patent: November 8, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Sachin Goel, Stein Erik Dolan, William B. Lees
  • Patent number: 8769303
    Abstract: Aspects of the subject matter described herein relate to recovering locked data. In aspects, stakeholders of locked volume(s) are identified. Security data of the volume(s) that can be used to unlock the volume(s) is collected from one or more computing devices hosting the volume(s). The security data and stakeholder data is stored on a recovery store. If a stakeholder needs to unlock a volume, the stakeholder may communicate with a recovery manager, provide certain data, and receive data that may be used to unlock the volume. Auditing may be performed for attempts to obtain the unlocking data from the recovery store.
    Type: Grant
    Filed: December 5, 2011
    Date of Patent: July 1, 2014
    Assignee: Microsoft Corporation
    Inventors: Chris W. Hallum, William B. Lees, Sachin Goel
  • Patent number: 8561209
    Abstract: Aspects of the subject matter described herein relate to encryption lifecycle management. In aspects, an orchestrating agent is installed on a device upon which encryption management is desired. During the lifecycle of the device, the orchestrating agent facilitates performing actions to protect the data of the device. For example, at certain points during the actions, the orchestrating agent may deduce the presence of external entities needed to perform the actions and interact with those entities to protect the data. During its facilitating activities, the orchestrating agent may also escrow protector data to use to unlock the data for legitimate stakeholders of the data.
    Type: Grant
    Filed: December 19, 2011
    Date of Patent: October 15, 2013
    Assignee: Microsoft Corporation
    Inventors: Sachin Goel, Stein Erik Dolan, William B. Lees
  • Publication number: 20130160139
    Abstract: Aspects of the subject matter described herein relate to encryption lifecycle management. In aspects, an orchestrating agent is installed on a device upon which encryption management is desired. During the lifecycle of the device, the orchestrating agent facilitates performing actions to protect the data of the device. For example, at certain points during the actions, the orchestrating agent may deduce the presence of external entities needed to perform the actions and interact with those entities to protect the data. During its facilitating activities, the orchestrating agent may also escrow protector data to use to unlock the data for legitimate stakeholders of the data.
    Type: Application
    Filed: December 19, 2011
    Publication date: June 20, 2013
    Applicant: MICROSOFT CORPORATION
    Inventors: Sachin Goel, Stein Erik Dolan, William B. Lees
  • Publication number: 20130148810
    Abstract: Aspects of the subject matter described herein relate to disclosing recovery keys. In aspects, when a recovery key is disclosed, data is updated to indicate that the recovery key has been disclosed. A machine that has locked data may determine whether a recovery key for the locked data has been disclosed and whether a new key needs to be generated for the locked data. If a new key needs to be generated for the locked data, the machine may generate the new key and send it to a recovery store for storage. In addition, old keys that protect the locked data may be deleted after the new key has been generated and stored.
    Type: Application
    Filed: December 12, 2011
    Publication date: June 13, 2013
    Applicant: Microsoft Corporation
    Inventors: Sachin Goel, Stein Erik Dolan, William B. Lees
  • Publication number: 20130145174
    Abstract: Aspects of the subject matter described herein relate to recovering locked data. In aspects, stakeholders of locked volume(s) are identified. Security data of the volume(s) that can be used to unlock the volume(s) is collected from one or more computing devices hosting the volume(s). The security data and stakeholder data is stored on a recovery store. If a stakeholder needs to unlock a volume, the stakeholder may communicate with a recovery manager, provide certain data, and receive data that may be used to unlock the volume. Auditing may be performed for attempts to obtain the unlocking data from the recovery store.
    Type: Application
    Filed: December 5, 2011
    Publication date: June 6, 2013
    Applicant: Microsoft Corporation
    Inventors: Chris W. Hallum, William B. Lees, Sachin Goel
  • Patent number: 8316455
    Abstract: Accessing a data set with secret and non-secret data. A method includes accessing a data set image. The data set image comprises secret data. The data set image is derived from an authorized data set associated with a master key that authorizes access to the secret data. The master key is not provided with the data set image. The method further comprises restoring the data set image to a computing system to create a degraded data set. Data in the degraded data set other than the secret data is accessed without restoring the master key.
    Type: Grant
    Filed: January 27, 2011
    Date of Patent: November 20, 2012
    Assignee: Microsoft Corporation
    Inventors: Collin H. Brace, Nathan D. Muggli, William B. Lees, William J. Whalen
  • Patent number: 8250220
    Abstract: A system and method for identifying network endpoints that provide a service of interest orders endpoints according to their network proximity to a requesting client. The requesting client may then contact the closest available providing endpoint, thus increasing the efficiency of usage of network resources while decreasing latency and enhancing reliability. In an embodiment of the invention, when a connection to the nearest providing endpoint cannot be established, a mechanism for locating a next-closest alternative endpoint is provided.
    Type: Grant
    Filed: January 25, 2012
    Date of Patent: August 21, 2012
    Assignee: Microsoft Corporation
    Inventors: Jeffrey B. Parham, Levon A. Esibov, Nicholas J. Harvey, William B. Lees
  • Publication number: 20120124223
    Abstract: A system and method for identifying network endpoints that provide a service of interest orders endpoints according to their network proximity to a requesting client. The requesting client may then contact the closest available providing endpoint, thus increasing the efficiency of usage of network resources while decreasing latency and enhancing reliability. In an embodiment of the invention, when a connection to the nearest providing endpoint cannot be established, a mechanism for locating a next-closest alternative endpoint is provided.
    Type: Application
    Filed: January 25, 2012
    Publication date: May 17, 2012
    Applicant: Microsoft Corporation
    Inventors: Jeffrey B. Parham, Levon A. Esibov, Nicholas J. Harvey, William B. Lees
  • Patent number: 8145699
    Abstract: A system and method for identifying network endpoints that provide a service of interest orders endpoints according to their network proximity to a requesting client. The requesting client may then contact the closest available providing endpoint, thus increasing the efficiency of usage of network resources while decreasing latency and enhancing reliability. In an embodiment of the invention, when a connection to the nearest providing endpoint cannot be established, a mechanism for locating a next-closest alternative endpoint is provided.
    Type: Grant
    Filed: May 30, 2003
    Date of Patent: March 27, 2012
    Assignee: Microsoft Corporation
    Inventors: Jeffrey B. Parham, Levon A. Esibov, Nicholas J. Harvey, William B. Lees
  • Publication number: 20110126027
    Abstract: Accessing a data set with secret and non-secret data. A method includes accessing a data set image. The data set image comprises secret data. The data set image is derived from an authorized data set associated with a master key that authorizes access to the secret data. The master key is not provided with the data set image. The method further comprises restoring the data set image to a computing system to create a degraded data set. Data in the degraded data set other than the secret data is accessed without restoring the master key.
    Type: Application
    Filed: January 27, 2011
    Publication date: May 26, 2011
    Applicant: MICROSOFT CORPORATION
    Inventors: Colin H. Brace, Nathan D. Muggli, William B. Lees, William J. Whalen
  • Patent number: 7921304
    Abstract: Accessing a data set with secret and non-secret data. A method includes accessing a data set image. The data set image comprises secret data. The data set image is derived from an authorized data set associated with a master key that authorizes access to the secret data. The master key is not provided with the data set image. The method further comprises restoring the data set image to a computing system to create a degraded data set. Data in the degraded data set other than the secret data is accessed without restoring the master key.
    Type: Grant
    Filed: December 6, 2005
    Date of Patent: April 5, 2011
    Assignee: Microsoft Corporation
    Inventors: Colin H. Brace, Nathan D. Muggli, William B. Lees, William J. Whalen
  • Patent number: 7774442
    Abstract: Described is a technology in a distributed configuration network management environment, in which action-style documents are used as guides in processing structured documents to perform management tasks. For example, the action-style documents may be used by a standard stylesheet processor to validate a constitutional document, and process input lines of that constitutional document into output lines of a document. When executed, the output lines perform a management task. In this manner, for example, policy statements of an administrator are transformed into a single type of self-contained document that is consistently interpreted, and thus consistently executed, regardless of its source or when it was authored.
    Type: Grant
    Filed: June 26, 2008
    Date of Patent: August 10, 2010
    Assignee: Microsoft Corporation
    Inventors: William B. Lees, Rajagopalan B. Narayanan, Jeffrey B. Parham
  • Publication number: 20090327457
    Abstract: Described is a technology in a distributed configuration network management environment, in which action-style documents are used as guides in processing structured documents to perform management tasks. For example, the action-style documents may be used by a standard stylesheet processor to validate a constitutional document, and process input lines of that constitutional document into output lines of a document. When executed, the output lines perform a management task. In this manner, for example, policy statements of an administrator are transformed into a single type of self-contained document that is consistently interpreted, and thus consistently executed, regardless of its source or when it was authored.
    Type: Application
    Filed: June 26, 2008
    Publication date: December 31, 2009
    Applicant: Microsoft Corporation
    Inventors: William B. Lees, Rajagopalan B. Narayanan, Jeffrey B. Parham
  • Publication number: 20090327301
    Abstract: Described is a technology in a distributed configuration network management environment, in which constitutional (governing, authoritative) documents are used to perform management tasks. The constitutional documents are structured so as to be consistent, self-contained and independently validated, yet may be combined with other constitutional documents to perform a management task. A constitutional document includes a schematic language statement, data transformation statements, and rule statements. In usage, the structured document is distributed to an agent on a client machine, which processes the structured document by transforming data and applying rules, such as to enforce network policy on client machines.
    Type: Application
    Filed: June 26, 2008
    Publication date: December 31, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: William B. Lees, Rajagopalan B. Narayanan, Jeffrey B. Parham
  • Publication number: 20090264225
    Abstract: A golf tee made of an elastomeric material includes a base section for positioning on a ground surface, and a concave head section for supporting a golf ball thereon. The tee can be made of a polymeric foam, such as polyurethane foam orethylene vinyl acetate foam. The tee can have a generally frusto-conical shape, with the base section having a larger diameter than the head section. A notch can be formed in the tee for exposing the ball to a golf club head. The tee can include a pointing member extending outwardly from, such that the pointing member points in a direction of a golf green and provides a visual cue to a user of the tee as to the direction of the golf green while swing at the ball.
    Type: Application
    Filed: April 15, 2009
    Publication date: October 22, 2009
    Inventor: William B. Lee