Patents by Inventor Kristofer N. Iverson

Kristofer N. Iverson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170176979
    Abstract: The claimed subject matter includes techniques for printing three-dimensional (3D) objects. An example method includes obtaining a 3D model and processing the 3D model to generate layers of tool path information. The processing includes automatically optimizing the orientation of the 3D model to reduce an amount of support material used in the printing. The method also includes printing the 3D object using layers.
    Type: Application
    Filed: August 29, 2014
    Publication date: June 22, 2017
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Emmett Lalish, Yulin Jin, Kristofer N. Iverson, Gheorghe Marius Gheorghescu, Xin Tong, Yang Liu
  • Publication number: 20170132836
    Abstract: Techniques are described for transforming image data, such as two dimensional (2D) or partial 3D image data (image data), into a 3D model. Upon receiving image data including color information, the image data may be segmented into a plurality of segments using the color information. At least one height value may be assigned to each of the plurality of segments based on the color information, to define 3D image data. From the 3D image data, a 3D model may be generated, for example, for visualization, modification, and/or 3D printing. In some aspects, segmenting the image data may include comparing intensity values associated with pixels and forming edges in the image data if the intensity values differ by a threshold amount. Multiple edges may be determined and connected to form one or more contour loops, whereby the contour loop(s) may be extruded to produce complete 3D image data.
    Type: Application
    Filed: February 24, 2016
    Publication date: May 11, 2017
    Inventors: Kristofer N. Iverson, Emmett Lalish, Seth William Orr, Milos Bazelides, Jan Jakubovic, Anton Mateasik, Vladimir Sisolak, Tibor Szaszi
  • Publication number: 20170132837
    Abstract: Techniques are described for transforming image data, such as two dimensional (2D) or partial three dimensional (3D) image data, into a 3D model. Upon receiving image data including color information, the image data may be converted into a height map based on the color information. The height map may be used to construct an image data mesh, which forms a 3D model. In some aspects, constructing the image data mesh may include associating vertices with pixels of the image data, connecting neighboring vertices to define at least one surface, applying texture to at least one of the surfaces, generating bottom and side surfaces, and connecting the bottom and side surface(s) to the textured surface to enclose a volume within the 3D model. In some aspects, the height map may include an edge based height map, such that color distances between pixels may be used form edges from the image data.
    Type: Application
    Filed: May 17, 2016
    Publication date: May 11, 2017
    Inventors: Kristofer N. Iverson, Emmett Lalish, Seth Orr, Milos Bazelides, Jan Jakubovic, Anton Mateasik, Vladimir Sisolak, Tibor Szaszi
  • Publication number: 20170132846
    Abstract: Techniques are described for generating a three dimensional (3D) object from complete or partial 3D data. Image data defining or partially defining a 3D object may be obtained. Using that data, a common plane facing surface of the 3D object may be defined that is substantially parallel to a common plane (e.g., ground plane). One or more edges of the common plane facing surface may be determined, and extended to the common plane. A bottom surface, which is bound by the one or more extended edges and is parallel with the common plane, may be generated based on the common-plane facing surface. In some aspects, defining the common plane facing surface may include segmenting the image data into a plurality of polygons, orienting at least one of the polygons to face the common plane, and discarding occluding polygons.
    Type: Application
    Filed: February 24, 2016
    Publication date: May 11, 2017
    Inventors: Kristofer N. Iverson, Emmett Lalish, Gheorghe Marius Gheorghescu, Jan Jakubovic, Martin Kusnier, Vladimir Sisolak, Tibor Szaszi
  • Patent number: 9643362
    Abstract: The subject disclosure is directed towards technology managing three-dimensional object fabrication in full color. In order to transform the object's model into an instruction set for a fabrication device, a fabrication manager computes color values corresponding to geometry within a later of the object's model. After determining an amount of each colored material to deposit, the fabrication manager generates coordinated instructions configured to deposit a combination of colored materials according to the geometry and efficiently transitioning between colored materials during object fabrication.
    Type: Grant
    Filed: June 5, 2013
    Date of Patent: May 9, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Louis Amadio, Kristofer N. Iverson, Jesse D. McGatha, Yulin Jin, Shanen Jon Boettcher
  • Publication number: 20170091993
    Abstract: Methods and systems are described for selecting, via a graphical user interface, map data to generate a three-dimensional (3D) model based on the selected map data. In one aspect, a method may include displaying, via the graphical use interface, a visual representation of map data. A selection of the map data may be received by the graphical user interface via a selector. The received selection of the map data may be modified to correspond to at least one of a boundary or an object in the map data. A 3D model of the modified selection of the map data may be generated and displayed by the graphical user interface. In some aspects, modifying the received selection of map data may be performed concurrently with receiving the selection of the map data, such as including moving the selector to at least one of the boundary or the object.
    Type: Application
    Filed: February 24, 2016
    Publication date: March 30, 2017
    Inventors: Felix G.T.I. Andrew, Duncan Murray Lawler, Kristofer N. Iverson, Apurva Ashvinkumar Thanky
  • Publication number: 20170090460
    Abstract: Methods and systems are described for generating a three dimensional (3D) model from map data, for example, for 3D printing, 3D virtualization, etc. In one aspect, a method for generating a 3D model may include obtaining map data corresponding to an area or volume, for example, based on a selection of an area of a map. The map data may be translated into a local space. A surface mesh may be formed from the translated map data, and, in some cases, holes in the map data may be connected. At least one side surface may be generated at an angle relative to the surface mesh. In some cases, the side surface may include a side skirt that extends from the surface mesh to a local medium point. The at least one side surface may be combined with the surface mesh to generate the 3D model of the map data.
    Type: Application
    Filed: February 24, 2016
    Publication date: March 30, 2017
    Inventors: Felix G.T.I. Andrew, Duncan Murray Lawler, Kristofer N. Iverson, Apurva Ashvinkumar Thanky
  • Patent number: 9251350
    Abstract: Described herein are techniques and apparatuses for scanning a computing device for malware and/or viruses. In various embodiments, a trusted operating environment, which may include a trusted operating system and/or a trusted antivirus tool, may be utilized with respect to a computing device. More particularly, the trusted operating system may be used to boot the computing device. Moreover, the trusted antivirus tool may search the computing device for malware definition updates (e.g., virus signature updates) and use the trusted operating system to scan the computing device for malware. In other embodiments, the trusted antivirus tool may scan the computing device and remove any viruses detected by the trusted antivirus tool. The trusted operating system may then reboot the computing device into a clean environment once any detected viruses are removed.
    Type: Grant
    Filed: May 6, 2011
    Date of Patent: February 2, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Reshma P Khilnani, Kristofer N. Iverson
  • Publication number: 20150317412
    Abstract: The claimed subject matter includes techniques for designing three-dimensional (3D) objects for fabrication. An example method includes obtaining a three-dimensional (3D) mesh comprising polygons and obtaining a two-dimensional (2D) image. The method also includes receiving position information describing a location of the 2D image relative to the 3D mesh and modifying the 3D mesh based on the 2D image and the position information to generate an embossed 3D mesh that is embossed with the 2D image.
    Type: Application
    Filed: August 20, 2014
    Publication date: November 5, 2015
    Inventors: Kristofer N. Iverson, Vladimír Sisolák, Ján Jakubovic, Martin Kusnier, Anton Mateasik, Milos Bazelides, Jesse McGatha, Yulin Jin
  • Publication number: 20150128261
    Abstract: A method of safe file transmission and reputation lookup is provided. As a part of the safe file transmission and reputation lookup methodology, a data file that is to be made available to a data file receiver is accessed and it is determined whether the data file needs to be provided a protective file. The data file is wrapped in a protective file to create a non-executing package file. Access is provided to the non-executing package file where the associated data file is prevented from being executed until data file reputation information is received.
    Type: Application
    Filed: January 5, 2015
    Publication date: May 7, 2015
    Inventors: Geoff Hulten, John Scarrow, Ivan Osipkov, Kristofer N. Iverson
  • Patent number: 8931090
    Abstract: A method of safe file transmission and reputation lookup is provided. As a part of the safe file transmission and reputation lookup methodology, a data file that is to be made available to a data file receiver is accessed and it is determined whether the data file needs to be provided a protective file. The data file is wrapped in a protective file to create a non-executing package file. Access is provided to the non-executing package file where the associated data file is prevented from being executed until data file reputation information is received.
    Type: Grant
    Filed: March 5, 2012
    Date of Patent: January 6, 2015
    Assignee: Microsoft Corporation
    Inventors: Geoff Hulten, John Scarrow, Ivan Osipkov, Kristofer N. Iverson
  • Patent number: 8862699
    Abstract: A reputation based redirection service is usable to build URL wrappers for un-trusted and unknown URLs. Such URL wrappers can be used to protect Web users by, for example, redirecting traffic to interstitial Web pages. Additionally, reputation decisions can be made by the service to further protect users from malicious URLs.
    Type: Grant
    Filed: December 14, 2009
    Date of Patent: October 14, 2014
    Assignee: Microsoft Corporation
    Inventors: Ameya S. Bhatawdekar, Kristofer N. Iverson, Elliott J. Haber, John L. Scarrow, Chad W. Mills
  • Publication number: 20140297014
    Abstract: The subject disclosure is directed towards three-dimensional object fabrication using an implicit surface representation as a model for surface geometries. A voxelized space for the implicit surface representation, of which each machine addressable unit includes indirect surface data, may be used to control components of an apparatus when that apparatus fabricates a three-dimensional object. Instructions generated using this representation may cause these components to move to surface positions and deposit source material.
    Type: Application
    Filed: June 24, 2013
    Publication date: October 2, 2014
    Inventors: Kristofer N. Iverson, Christopher C. White, Yulin Jin, Jesse D. McGatha, Shahram Izadi
  • Publication number: 20140277661
    Abstract: The subject disclosure is directed towards technology managing three-dimensional object fabrication in full color. In order to transform the object's model into an instruction set for a fabrication device, a fabrication manager computes color values corresponding to geometry within a later of the object's model. After determining an amount of each colored material to deposit, the fabrication manager generates coordinated instructions configured to deposit a combination of colored materials according to the geometry and efficiently transitioning between colored materials during object fabrication.
    Type: Application
    Filed: June 5, 2013
    Publication date: September 18, 2014
    Inventors: Louis Amadio, Kristofer N. Iverson, Jesse D. McGatha, Yulin Jin, Shanen Jon Boettcher
  • Patent number: 8230511
    Abstract: Described herein are techniques and apparatuses for scanning a computing device for malware and/or viruses. In various embodiments, a trusted operating environment, which may include a trusted operating system and/or a trusted antivirus tool, may be utilized with respect to a computing device. More particularly, the trusted operating system may be used to boot the computing device. Moreover, the trusted antivirus tool may search the computing device for malware definition updates (e.g., virus signature updates) and use the trusted operating system to scan the computing device for malware. In other embodiments, the trusted antivirus tool may scan the computing device and remove any viruses detected by the trusted antivirus tool. The trusted operating system may then reboot the computing device into a clean environment once any detected viruses are removed.
    Type: Grant
    Filed: December 10, 2010
    Date of Patent: July 24, 2012
    Assignee: Microsoft Corporation
    Inventors: Reshma Khilnani, Kristofer N. Iverson
  • Publication number: 20120167213
    Abstract: A method of safe file transmission and reputation lookup is provided. As a part of the safe file transmission and reputation lookup methodology, a data file that is to be made available to a data file receiver is accessed and it is determined whether the data file needs to be provided a protective file. The data file is wrapped in a protective file to create a non-executing package file. Access is provided to the non-executing package file where the associated data file is prevented from being executed until data file reputation information is received.
    Type: Application
    Filed: March 5, 2012
    Publication date: June 28, 2012
    Applicant: Microsoft Corporation
    Inventors: Geoff Hulten, John Scarrow, Ivan Osipkov, Kristofer N. Iverson
  • Patent number: 8146151
    Abstract: Safe file transmission and reputation lookup. As a part of the safe file transmission and reputation lookup methodology, a data file that is to be made available to a data file receiver is accessed and it is determined whether the data file needs to be provided a protective file. The data file is wrapped in a protective file to create a non-executing package file. Access is provided to the non-executing package file where the associated data file is prevented from being executed until data file reputation information is received.
    Type: Grant
    Filed: February 27, 2008
    Date of Patent: March 27, 2012
    Assignee: Microsoft Corporation
    Inventors: Geoff Hulten, John Scarrow, Ivan Osipkov, Kristofer N. Iverson
  • Patent number: 8104088
    Abstract: Techniques and apparatuses for scanning a computing device for malware are described. In one implementation, a trusted operating environment, which includes a trusted operating system and a trusted antivirus tool, is embodied on a removable data storage medium. A computing device is then booted from the removable data storage medium using the trusted operating system. The trusted antivirus tool searches the computing device for malware definition updates (e.g., virus signature updates) and uses the trusted operating system to scan the computing device for malware. In another implementation, a computing device is booting from a trusted operating system on a removable device and a trusted antivirus tool on the removable device scans the computing device for malware. The removable device can update its own internal components (e.g., virus signatures and antivirus tool) by searching the computing device or a remote resource for updates and authenticating any updates that are located.
    Type: Grant
    Filed: May 11, 2007
    Date of Patent: January 24, 2012
    Assignee: Microsoft Corporation
    Inventors: Reshma Khilnani, Kristofer N. Iverson
  • Publication number: 20110214186
    Abstract: Described herein are techniques and apparatuses for scanning a computing device for malware and/or viruses. In various embodiments, a trusted operating environment, which may include a trusted operating system and/or a trusted antivirus tool, may be utilized with respect to a computing device. More particularly, the trusted operating system may be used to boot the computing device. Moreover, the trusted antivirus tool may search the computing device for malware definition updates (e.g., virus signature updates) and use the trusted operating system to scan the computing device for malware. In other embodiments, the trusted antivirus tool may scan the computing device and remove any viruses detected by the trusted antivirus tool. The trusted operating system may then reboot the computing device into a clean environment once any detected viruses are removed.
    Type: Application
    Filed: May 6, 2011
    Publication date: September 1, 2011
    Applicant: MICROSOFT CORPORATION
    Inventors: Reshma P. Khilnani, Kristofer N. Iverson
  • Publication number: 20110167328
    Abstract: Implementations of accessible content reputation lookup are described. In one implementation, before a user activates a link in a document, such as a hyperlink on a webpage, the user can designate the link. For example, the user can float a cursor over the link or interact with an icon placed proximate to the link. By designating the link, the user can request reputation information associated with the link, including information as to whether or not content associated with the link, an application used to access the content, and/or source(s) on which the content resides, are known to be dangerous or risky. If the reputation information indicates that the link is safe to activate, the user can activate the link and access the content. Alternately, if the reputation information indicates that the link is unsafe to access, the user can choose to forego activation of the link.
    Type: Application
    Filed: March 17, 2011
    Publication date: July 7, 2011
    Applicant: Microsoft Corporation
    Inventor: Kristofer N. Iverson