Patents by Inventor Christopher C. White
Christopher C. White has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240135388Abstract: A computer executed process for mimicking human dialog, referred to herein as a “humanoid” or “humanoid system,” can be configured to provide automated customer support. The humanoid can identify a support issue for a customer, as well as a customer support campaign corresponding to the support issue. The humanoid can identify at least one machine learning model associated with the customer support campaign and can communicate with the customer using the at least one machine learning model. The humanoid can execute a support action to resolve the support issue.Type: ApplicationFiled: October 29, 2023Publication date: April 25, 2024Inventors: David C. White, JR., Jay K. Johnston, Magnus Mortensen, Christopher Shaun Roberts, Kevin D. McCabe
-
Publication number: 20240095461Abstract: A computer executed process for mimicking human dialog, referred to herein as a “humanoid” or “humanoid process software,” can be configured to participate in multi-parry conversations. The humanoid can monitor electronic communications in a conversation involving the humanoid and at least one other party. The humanoid can model the electronic communications by uniquely identifying each of the electronic communications as a stream of data. For example, the data can be labeled and sorted in a database and/or arranged in a nodal graph representation. The humanoid can participate in the conversation based on the modeling.Type: ApplicationFiled: November 29, 2023Publication date: March 21, 2024Inventors: David C. White, JR., Christopher Shaun Roberts, Magnus Mortensen, Jay Kemper Johnston
-
Publication number: 20240076467Abstract: Catalytic compositions for depolymerizing polyolefin-based waste material into useful petrochemical products and methods of use are described. The catalytic compositions are mixed metal oxides demonstrating equal or higher conversion than noncatalytic pyrolysis. These mixed metal oxide catalysts and a polyolefin-based material are heated in the presence of oxygen to form a product comprising one or more olefin monomers.Type: ApplicationFiled: August 24, 2023Publication date: March 7, 2024Applicant: Basell Poliolefine Italia S.r.l.Inventors: Daniel F. White, Sandor Nagy, Christopher D. Smith, David L. Ramage, Noel C. Hallinan
-
Publication number: 20140297014Abstract: The subject disclosure is directed towards three-dimensional object fabrication using an implicit surface representation as a model for surface geometries. A voxelized space for the implicit surface representation, of which each machine addressable unit includes indirect surface data, may be used to control components of an apparatus when that apparatus fabricates a three-dimensional object. Instructions generated using this representation may cause these components to move to surface positions and deposit source material.Type: ApplicationFiled: June 24, 2013Publication date: October 2, 2014Inventors: Kristofer N. Iverson, Christopher C. White, Yulin Jin, Jesse D. McGatha, Shahram Izadi
-
Patent number: 8661249Abstract: Systems and methodologies that facilitate delegation of keyset management to a platform presenting a centralized health-related data repository are provided. Effectively, a central keyset manager is provided that generates, manages and distributes key material to client applications and servers deploying the platform. Thus, communications with the platform storing sensitive health-related data can be secured without incurring the costs associated with implementing and enforcing policies associated with key generation and expiration among a plurality of servers and client applications. Additionally, the innovation can scale keyset management to meet short term demand needs.Type: GrantFiled: September 24, 2007Date of Patent: February 25, 2014Assignee: Microsoft CorporationInventors: Brian J. Guarraci, Christopher C. White, Johnson T. Apacible
-
Patent number: 8474012Abstract: A consent management system is described which manages an entity's consent to consume application functionality on a per-feature level of granularity. To perform this task, the consent management system maintains consent information which describes a plurality of use conditions associated with the features of the application functionality. In one case, the consent information has a hierarchical data structure that identifies a hierarchy of application features. In operation, the consent management system accesses the content information whenever an entity seeks to access a particular application feature; it grants or denies access to the feature based on the consent information. The consent management system also includes a consent maintenance module that allows an administrator (or other entity) to cancel or modify any use condition in the consent information.Type: GrantFiled: December 10, 2010Date of Patent: June 25, 2013Assignee: Microsoft CorporationInventors: Muzammil Ahmed, Prashant Agrawal, Christopher C. White
-
Patent number: 8327456Abstract: An authorization framework is provided that protects data records in a platform, such as a service-based platform, by requiring multiple level entities to be authorized with respect to the data records. For example, the data records can have an associated owner user that can grant access to other users with respect to the data. Additionally, however, the user can also grant access to certain applications that access the platform such that the data records can be initially closed for a user requiring the user to explicitly grant desired access to applications and/or users. In this regard, applications can be forbidden from accessing the data, even on behalf of the user, unless expressly authorized to do so by the user. Thus, the user can make informed decisions regarding who is to have access to its data.Type: GrantFiled: September 14, 2007Date of Patent: December 4, 2012Assignee: Microsoft CorporationInventors: Jeffrey Dick Jones, Sean Patrick Nolan, Johnson T. Apacible, Vijay Varadan, Brian J. Guarraci, Christopher C. White
-
Publication number: 20120151557Abstract: A consent management system is described which manages an entity's consent to consume application functionality on a per-feature level of granularity. To perform this task, the consent management system maintains consent information which describes a plurality of use conditions associated with the features of the application functionality. In one case, the consent information has a hierarchical data structure that identifies a hierarchy of application features. In operation, the consent management system accesses the content information whenever an entity seeks to access a particular application feature; it grants or denies access to the feature based on the consent information. The consent management system also includes a consent maintenance module that allows an administrator (or other entity) to cancel or modify any use condition in the consent information.Type: ApplicationFiled: December 10, 2010Publication date: June 14, 2012Applicant: MICROSOFT CORPORATIONInventors: Muzammil Ahmed, Prashant Agrawal, Christopher C. White
-
Patent number: 7992198Abstract: An authentication mechanism is provided for a web method platform that allows homogeneous access for different types of clients according to a bootstrapping procedure utilized to establish the session. Different clients can be assigned different levels of trust based in part on the bootstrapping procedure and/or information provided during the procedure. The bootstrapping procedure can produce a token that is used by the clients in subsequent requests to provide previous authentication or state information to the platform. The token can comprise a shared secret used to ensure integrity of communications in some cases, and the token can be opaque to the client. Tokens can expire and require a client to re-bootstrap to provide higher levels of authentication protection, and tokens can be shared among a plurality of application servers to facilitate effective handling of requests in a farmed environment.Type: GrantFiled: September 14, 2007Date of Patent: August 2, 2011Assignee: Microsoft CorporationInventors: Brian J. Guarraci, Christopher C. White, Niels Thomas Ferguson, Jeffrey Dick Jones, Sean Patrick Nolan, Johnson T. Apacible, Vijay Varadan
-
Patent number: 7814288Abstract: Applications are protected from being exposed to exploits and instabilities due to memory operations involving zero byte allocations. Memory operations involving a zero byte allocation are handled by a zero byte memory manager. When an application requests a zero byte allocation, a pointer to a protected part of memory is returned such that when the application attempts to read and/or write to the location the program flow is interrupted.Type: GrantFiled: March 29, 2007Date of Patent: October 12, 2010Assignee: Microsoft CorporationInventors: Thomas S. Coon, Michael R. Marcelais, Christopher C. White
-
Patent number: 7797743Abstract: Embodiments are described for removing malicious code from a file in a first file format by converting the file into a converted file of a second file format. In embodiments, converting the file eliminates malicious code embedded within the file from being stored in the converted file. The conversion is performed within a restricted computer process that has restricted privileges limiting its access to an operating system and an underlying computer system. As a result, even if malicious code embedded within the file executes while the file is being converted into the converted file, the damage to a computer system is mitigated because of the limited privileges provided to the restricted process.Type: GrantFiled: February 26, 2007Date of Patent: September 14, 2010Assignee: Microsoft CorporationInventors: Ambrose T. Treacy, Maithili V. Dandige, Eric Fox, Robert A. Little, Christopher C. White, David LeBlanc, Benjamin J. Bunker, Aaron E. Erlandson
-
Publication number: 20090307488Abstract: Systems and methodologies that facilitate delegation of keyset management to a platform presenting a centralized health-related data repository are provided. Effectively, a central keyset manager is provided that generates, manages and distributes key material to client applications and servers deploying the platform. Thus, communications with the platform storing sensitive health-related data can be secured without incurring the costs associated with implementing and enforcing policies associated with key generation and expiration among a plurality of servers and client applications. Additionally, the innovation can scale keyset management to meet short term demand needs.Type: ApplicationFiled: September 24, 2007Publication date: December 10, 2009Applicant: MICROSOFT CORPORATIONInventors: Brian J. Guarraci, Christopher C. White, Johnson T. Apacible
-
Publication number: 20080256643Abstract: An authorization framework is provided that protects data records in a platform, such as a service-based platform, by requiring multiple level entities to be authorized with respect to the data records. For example, the data records can have an associated owner user that can grant access to other users with respect to the data. Additionally, however, the user can also grant access to certain applications that access the platform such that the data records can be initially closed for a user requiring the user to explicitly grant desired access to applications and/or users. In this regard, applications can be forbidden from accessing the data, even on behalf of the user, unless expressly authorized to do so by the user. Thus, the user can make informed decisions regarding who is to have access to its data.Type: ApplicationFiled: September 14, 2007Publication date: October 16, 2008Applicant: MICROSOFT CORPORATIONInventors: Jeffrey Dick Jones, Sean Patrick Nolan, Johnson T. Apacible, Vijay Varadan, Brian J. Guarraci, Christopher C. White
-
Publication number: 20080256616Abstract: An authentication mechanism is provided for a web method platform that allows homogeneous access for different types of clients according to a bootstrapping procedure utilized to establish the session. Different clients can be assigned different levels of trust based in part on the bootstrapping procedure and/or information provided during the procedure. The bootstrapping procedure can produce a token that is used by the clients in subsequent requests to provide previous authentication or state information to the platform. The token can comprise a shared secret used to ensure integrity of communications in some cases, and the token can be opaque to the client. Tokens can expire and require a client to re-bootstrap to provide higher levels of authentication protection, and tokens can be shared among a plurality of application servers to facilitate effective handling of requests in a farmed environment.Type: ApplicationFiled: September 14, 2007Publication date: October 16, 2008Applicant: MICROSOFT CORPORATIONInventors: Brian J. Guarraci, Christopher C. White, Niels Thomas Ferguson, Jeffrey Dick Jones, Sean Patrick Nolan, Johnson T. Apacible, Vijay Varadan
-
Publication number: 20080244335Abstract: Applications are protected from being exposed to exploits and instabilities due to memory operations involving zero byte allocations. Memory operations involving a zero byte allocation are handled by a zero byte memory manager. When an application requests a zero byte allocation, a pointer to a protected part of memory is returned such that when the application attempts to read and/or write to the location the program flow is interrupted.Type: ApplicationFiled: March 29, 2007Publication date: October 2, 2008Applicant: Microsoft CorporationInventors: Thomas S. Coon, Michael R. Marcelais, Christopher C. White
-
Publication number: 20080209551Abstract: Embodiments are described for removing malicious code from a file in a first file format by converting the file into a converted file of a second file format. In embodiments, converting the file eliminates malicious code embedded within the file from being stored in the converted file. The conversion is performed within a restricted computer process that has restricted privileges limiting its access to an operating system and an underlying computer system. As a result, even if malicious code embedded within the file executes while the file is being converted into the converted file, the damage to a computer system is mitigated because of the limited privileges provided to the restricted process.Type: ApplicationFiled: February 26, 2007Publication date: August 28, 2008Applicant: Microsoft CorporationInventors: Ambrose T. Treacy, Maithili V. Dandige, Eric Fox, Robert A. Little, Christopher C. White, David LeBlanc, Benjamin J. Bunker, Aaron E. Erlandson
-
Patent number: 6983271Abstract: An answer wizard drop-down menu for providing users quick and efficient access to help utilities, including help files and wizards provided by a software application, is provided. An answer wizard drop-down edit control and interface is located in a conspicuous, but non-obstructive location on a software application graphical interface. An edit control allows a user to enter a question regarding some desired functionality of the application. In response to the user's question, the user is presented with a list of potential answers to the question in a drop-down menu. If the user finds an acceptable answer to her question in the list of potential answers, the user selects the acceptable answer, and an appropriate help file application is launched to provide the user assistance with the functionality about which the user has questions. Each question so asked by the user is saved in a list of most recently used items.Type: GrantFiled: June 13, 2001Date of Patent: January 3, 2006Assignee: Microsoft CorporationInventors: Catherine Rose Morrow, Glenn L. Frankel, Christopher C. White, Zeke Koch, Richard M. Banks, Tjeerd Hoek, Aaron H. Weiss