Patents by Inventor Christopher Michael Wade

Christopher Michael Wade has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230056614
    Abstract: Methods, systems, and apparatus, including medium-encoded computer program products, for computer aided design of physical structures using data format conversion (e.g., of output(s) from generative design processes) and user interface techniques that facilitate the production of 3D models of physical structures that are readily usable with 2.5-axis subtractive manufacturing, include: modifying smooth curves, which have been fit to contours representing discrete height layers of an object, to facilitate the 2.5-axis subtractive manufacturing; preparing an editable model of the object using a parametric feature history, which includes a sketch feature, to combine extruded versions of the smooth curves to form a 3D model of the object in a boundary representation format; reshaping a subset of the smooth curves responsive to user input with respect to the sketch feature; and replaying the parametric feature history to reconstruct the 3D model of the object, as changed by the user input.
    Type: Application
    Filed: September 14, 2022
    Publication date: February 23, 2023
    Inventors: Karl Darcy Daniel Willis, Nigel Jed Wesley Morris, Andreas Linas Bastian, Adrian Adam Thomas Butscher, Daniele Grandi, Suguru Furuta, Joseph George Lambourne, Tristan Ward Barback, Martin Cvetanov Marinov, Marco Amagliani, Jingyang John Chen, Michael Andrew Smell, Brian M. Frank, Hooman Shayani, Christopher Michael Wade, Nandakumar Santhanam
  • Patent number: 11455435
    Abstract: Methods, systems, and apparatus, including medium-encoded computer program products, for computer aided design of physical structures using data format conversion (e.g., of output(s) from generative design processes) and user interface techniques that facilitate the production of 3D models of physical structures that are readily usable with 2.5-axis subtractive manufacturing, include: modifying smooth curves, which have been fit to contours representing discrete height layers of an object, to facilitate the 2.5-axis subtractive manufacturing; preparing an editable model of the object using a parametric feature history, which includes a sketch feature, to combine extruded versions of the smooth curves to form a 3D model of the object in a boundary representation format; reshaping a subset of the smooth curves responsive to user input with respect to the sketch feature; and replaying the parametric feature history to reconstruct the 3D model of the object, as changed by the user input.
    Type: Grant
    Filed: November 8, 2019
    Date of Patent: September 27, 2022
    Assignee: Autodesk, Inc.
    Inventors: Karl Darcy Daniel Willis, Nigel Jed Wesley Morris, Andreas Linas Bastian, Adrian Adam Thomas Butscher, Daniele Grandi, Suguru Furuta, Joseph George Lambourne, Tristan Ward Barback, Martin Cvetanov Marinov, Marco Amagliani, Jingyang John Chen, Michael Andrew Smell, Brian M. Frank, Hooman Shayani, Christopher Michael Wade, Nandakumar Santhanam
  • Publication number: 20200151286
    Abstract: Methods, systems, and apparatus, including medium-encoded computer program products, for computer aided design of physical structures using data format conversion (e.g., of output(s) from generative design processes) and user interface techniques that facilitate the production of 3D models of physical structures that are readily usable with 2.5-axis subtractive manufacturing, include: modifying smooth curves, which have been fit to contours representing discrete height layers of an object, to facilitate the 2.5-axis subtractive manufacturing; preparing an editable model of the object using a parametric feature history, which includes a sketch feature, to combine extruded versions of the smooth curves to form a 3D model of the object in a boundary representation format; reshaping a subset of the smooth curves responsive to user input with respect to the sketch feature; and replaying the parametric feature history to reconstruct the 3D model of the object, as changed by the user input.
    Type: Application
    Filed: November 8, 2019
    Publication date: May 14, 2020
    Inventors: Karl Darcy Daniel Willis, Nigel Jed Wesley Morris, Andreas Linas Bastian, Adrian Adam Thomas Butscher, Daniele Grandi, Suguru Furuta, Joseph George Lambourne, Tristan Ward Barback, Martin Cvetanov Marinov, Marco Amagliani, Jingyang John Chen, Michael Andrew Smell, Brian M. Frank, Hooman Shayani, Christopher Michael Wade, Nandakumar Santhanam
  • Patent number: 9165139
    Abstract: A method for generating a secure application is described herein. The method can include the steps of obtaining a target application and decomposing the target application into original files that contain predictable instructions. One or more predictable instructions in the original files may be identified. In addition, the target application may be modified to create the secure application by binding one or more intercepts to the target application. These intercepts can enable the modification of the predictable instructions in accordance with one or more policies such that the behavior of the secure application is different from the original behavior of the target application. Modification of the target application may be conducted without access to the source code of the target application.
    Type: Grant
    Filed: May 12, 2015
    Date of Patent: October 20, 2015
    Assignee: OPENPEAK INC.
    Inventors: Christopher Michael Wade, Danilo Tan, John R. Brown, Paul Krzyzanowski, Daniel Gittleman, Robert M. Dare
  • Patent number: 9135418
    Abstract: A method for generating a secure application is described herein. The method can include the steps of obtaining a target application and decomposing the target application into original files that contain predictable instructions. One or more predictable instructions in the original files may be identified. In addition, the target application may be modified to create the secure application by binding one or more intercepts to the target application. These intercepts can enable the modification of the predictable instructions in accordance with one or more policies such that the behavior of the secure application is different from the original behavior of the target application. Modification of the target application may be conducted without access to the source code of the target application.
    Type: Grant
    Filed: February 25, 2014
    Date of Patent: September 15, 2015
    Assignee: OPENPEAK INC.
    Inventors: Christopher Michael Wade, Danilo Tan, John R. Brown, Paul Krzyzanowski, Daniel Gittleman, Robert M Dare
  • Publication number: 20150254457
    Abstract: A method for generating a secure application is described herein. The method can include the steps of obtaining a target application and decomposing the target application into original files that contain predictable instructions. One or more predictable instructions in the original files may be identified. In addition, the target application may be modified to create the secure application by binding one or more intercepts to the target application. These intercepts can enable the modification of the predictable instructions in accordance with one or more policies such that the behavior of the secure application is different from the original behavior of the target application. Modification of the target application may be conducted without access to the source code of the target application.
    Type: Application
    Filed: May 12, 2015
    Publication date: September 10, 2015
    Inventors: Christopher Michael Wade, Danilo Tan, John R. Brown, Paul Krzyzanowski, Daniel Gittleman, Robert M. Dare
  • Publication number: 20150113506
    Abstract: A system and method of adaptively loading a target application is described herein. The method can include the steps of loading an encapsulation application into memory in which the encapsulation application encapsulates the target application and allocating memory for the encapsulated target application. The method can also include the steps of remapping the encapsulated target application into the allocated memory such that the target application is loaded in the memory and configuring the target application to enable calls of the target application to be intercepted by the encapsulation application.
    Type: Application
    Filed: March 12, 2014
    Publication date: April 23, 2015
    Inventor: Christopher Michael Wade
  • Publication number: 20150113502
    Abstract: A system and method for encapsulating a target application are described herein. In particular, an analysis of the target application can be performed to determine one or more characteristics of the target application. Based on the analysis of the target application, a blueprint of the target application can be generated. Based on the blueprint, an encapsulation application can be constructed for the target application. In addition, the target application can be encapsulated with the encapsulation application to create an encapsulated target application to enable adaptive loading of the target application.
    Type: Application
    Filed: March 12, 2014
    Publication date: April 23, 2015
    Inventor: Christopher Michael Wade
  • Publication number: 20140317704
    Abstract: A method of enabling the federation of unrelated applications is described herein. The method can include the step of installing a candidate application for inclusion in a secure workspace. A first previously-installed application may have a certificate signed by a first entity, and a second previously-installed application may have a certificate signed by a second entity such that the first and second previously-installed applications have different certificates. The method can also include the steps of generating a federation value for the candidate application for inclusion in the secure workspace and determining the result of a federation check of the candidate application based on the generated federation value. If the federation check for the candidate application is satisfied, the candidate application may be permitted to be part of the secure workspace.
    Type: Application
    Filed: March 12, 2014
    Publication date: October 23, 2014
    Inventors: Philip Schentrup, Andrew James Dobson, Robert M. Dare, Christopher Michael Wade
  • Publication number: 20140317679
    Abstract: A method for generating a secure application is described herein. The method can include the steps of obtaining a target application and decomposing the target application into original files that contain predictable instructions. One or more predictable instructions in the original files may be identified. In addition, the target application may be modified to create the secure application by binding one or more intercepts to the target application. These intercepts can enable the modification of the predictable instructions in accordance with one or more policies such that the behavior of the secure application is different from the original behavior of the target application. Modification of the target application may be conducted without access to the source code of the target application.
    Type: Application
    Filed: February 25, 2014
    Publication date: October 23, 2014
    Applicant: OpenPeak Inc.
    Inventors: Christopher Michael Wade, Danilo Tan, John R. Brown, Paul Krzyzanowski, Daniel Gittleman, Robert M. Dare
  • Publication number: 20140281499
    Abstract: A method and system of enabling communications among unrelated applications is described herein. The method includes the step of identifying a paste memory element in an environment of a computing device that restricts communications among unrelated applications. The method also includes the step of imposing a file system on the identified paste memory element. The file system is compatible with the unrelated applications such that a first unrelated application is capable of storing data in the paste memory element using the imposed file system and a second unrelated application is capable of accessing the stored data using the imposed file system. As an example, the first and second unrelated applications may be secure applications. In addition, the method can also include the steps of encrypting the data stored in the paste memory element that is associated with the first unrelated application and decrypting this data on behalf of the second unrelated application.
    Type: Application
    Filed: July 15, 2013
    Publication date: September 18, 2014
    Inventors: Philip Schentrup, Christopher Michael Wade
  • Publication number: 20140282876
    Abstract: A method and system of restricting the operation of applications to authorized domains is described herein. The method can include the steps of receiving reference domain restriction data associated with an application and receiving generated domain restriction data associated with the application. A domain restriction check can be performed by comparing the generated domain restriction data with the reference domain restriction data, In addition, a domain restriction approval signal can be generated if the domain restriction check is satisfied. The domain restriction check can ensure that the application will not operate in unauthorized domains.
    Type: Application
    Filed: March 12, 2014
    Publication date: September 18, 2014
    Inventors: Philip Schentrup, Andrew James Dobson, Robert M. Dare, Christopher Michael Wade
  • Patent number: 8695060
    Abstract: A method for generating a secure application is described herein. The method can include the steps of obtaining a target application and decomposing the target application into original files that contain predictable instructions. One or more predictable instructions in the original files may be identified. In addition, the target application may be modified to create the secure application by binding one or more intercepts to the target application. These intercepts can enable the modification of the predictable instructions in accordance with one or more policies such that the behavior of the secure application is different from the original behavior of the target application. Modification of the target application may be conducted without access to the source code of the target application.
    Type: Grant
    Filed: September 25, 2012
    Date of Patent: April 8, 2014
    Assignee: OpenPeak Inc.
    Inventors: Christopher Michael Wade, Danilo Tan, John R. Brown, Paul Krzyzanowski, Daniel Gittleman, Robert M. Dare
  • Publication number: 20140096230
    Abstract: A method for sharing a virtual private network (VPN) connection among applications is described herein. In an environment in which multiple applications exchange data through the use of the virtual file system, a VPN for a first application can be established, and it can be determined that the first application is deactivated. Upon the determination that the first application is deactivated, a state of the VPN can be saved in a shared memory through the virtual file system. It may also be determined that a second application is activated. A VPN connection can be established for the second application by resuming the saved VPN state through the virtual file system.
    Type: Application
    Filed: September 25, 2013
    Publication date: April 3, 2014
    Inventor: Christopher Michael Wade