Patent application number | Description | Published |
20130297058 | DECOMPOSITION OF 3D GEOMETRY INTO DEVELOPABLE SURFACE PATCHES AND 2D CUT PATTERNS - Embodiments disclosed herein provide techniques for decomposing 3D geometry into developable surface patches and cut patterns. In one embodiment, a decomposition application receives a triangulated 3D surface as input and determines approximately developable surface patches from the 3D surface using a variant of k-means clustering. Such approximately developable surface patches may have undesirable jagged boundaries, which the decomposition application may eliminate by generating a data structure separate from the mesh that contains patch boundaries and optimizing the patch boundaries or, alternatively, remeshing the mesh such that patch boundaries fall on mesh edges. The decomposition application may then flatten the patches into truly developable surfaces by re-triangulating the patches as ruled surfaces. The decomposition application may further flatten the ruled surfaces into 2D shapes and lay those shapes out on virtual sheets of material. A person, or machinery, may cut out those shapes from physical sheets of material based on the layout. | 11-07-2013 |
20130297059 | THREE-DIMENSIONAL PRINTING PREPARATION - Embodiments disclosed herein provide systems and methods for preparing geometry for 3D printing. In one embodiment, a 3D printing preparation application receives 3D geometry and repairs non-manifold edges and non-manifold vertices, producing a topological manifold geometry. The 3D printing preparation application then welds coincident edges without coincident faces and fills holes in the geometry. The 3D printing preparation application may further perform resolution-aware thickening of the geometry by estimating distances to a medial axis based on distances to distance field shocks, and advecting the distance field using a velocity field. A similar approach may be used to perform resolution-aware separation enforcement. Alternatively, one component may be globally thickened and subtracted from another for separation enforcement. The 3D printing preparation application may also split large models and add connectors for connecting the split pieces after printing. In addition, the 3D printing preparation application may generate a 3D print preview. | 11-07-2013 |
20140081603 | NESTING USING RIGID BODY SIMULATION - Embodiments of the invention provide systems and methods for nesting objects in 2D sheets and 3D volumes. In one embodiment, a nesting application simplifies the shapes of parts and performs a rigid body simulation of the parts dropping into a 2D sheet or 3D volume. In the rigid body simulation, parts begin from random initial positions on one or more sides and drop under the force of gravity into the 2D sheet or 3D volume until coming into contact with another part, a boundary, or the origin of the gravity. The parts may be dropped according to a particular order, such as alternating large and small parts. Further, the simulation may be translation- and/or position-only, meaning the parts do not rotate and/or do not have momentum, respectively. Tighter packing may be achieved by incorporating user inputs and simulating jittering of the parts using random forces. | 03-20-2014 |
Patent application number | Description | Published |
20130254519 | NETWORK SECURITY CONFIGURATION USING SHORT-RANGE WIRELESS COMMUNICATION - A configuration device is disclosed for configuring a network device in a communication network. The configuration device initiates pairing operations with the network device via a short-range communication connection. The configuration device determines whether the network device is in a registered state or an unregistered state. If the configuration device determines that the network device is in the unregistered state, the configuration device establishes a secure short-range communication channel between the configuration device and the network device. The configuration device transmits a network key to the network device via the secure short-range communication channel for configuring the network device to communicatively connect to the communication network. If the configuration device determines that the network device is in the registered state, the configuration device determines whether to unregister the network device. | 09-26-2013 |
20130275760 | Method for configuring an internal entity of a remote station with a certificate - Disclosed is a method for configuring an internal entity of a WiFi-enabled remote station with a certificate. In the method, the remote station receives the certificate in at least one message from a registrar acting as a certificate authority. The remote station provides the certificate to the internal entity. The internal entity securely communicates with an external entity based on the certificate. | 10-17-2013 |
20140053281 | CONFIGURATION OF A NEW ENROLLEE DEVICE FOR USE IN A COMMUNICATION NETWORK - An electronic device obtains a device password associated with the new enrollee device to be configured for a communication network. The device password is provided to a network registrar to cause the network registrar to configure the new enrollee device for the communication network. The network registrar performs an enrollment process based upon the device password and provides feedback to the electronic device to indicate whether or not the new enrollee device was successfully added to the communication network. Alternatively, when an electronic device detects the presence of a new enrollee device to be configured for the communication network, the electronic device generates a device password for the new enrollee device and provides the device password to the new enrollee device and to the network registrar, thereby causing the network registrar to initiate an enrollment process for the new enrollee device based upon the device password. | 02-20-2014 |
20140196112 | DEPLOYING WIRELESS DOCKING AS A SERVICE - A method includes establishing, by a wireless docking center, a secure wireless communication connection with a wireless dockee, receiving, by the wireless docking center, from the wireless dockee, an ASP session request for a wireless docking service of the wireless docking center, receiving, by the wireless docking center, from the wireless dockee, a passphrase for authenticating with the wireless docking service, determining, by the wireless docking center, whether the wireless dockee is authorized to access the wireless docking service based on the received passphrase, responsive to determining that the wireless dockee is not authorized to access the wireless docking service, denying, by the wireless docking center, the wireless dockee access to the wireless docking service, and responsive to determining that the wireless dockee is authorized to access the wireless docking service, granting, by the wireless docking center, the wireless dockee access to the wireless docking service. | 07-10-2014 |
20140282960 | SEAMLESS DEVICE CONFIGURATION IN A COMMUNICATION NETWORK - One embodiment of seamless device configuration between a network device and an access point sends a device credential associated with the network device to the access point before the network device communicates with the access point. The device credential can be used to verify the identity of the network device and can authenticate the network device with the access point without requiring user interaction. Another embodiment can incorporate a central authority maintaining a database of network devices, access points and associated users. The central authority can determine when one or more network devices can seamlessly be configured for use with a particular access point. The central authority can send the device credential associated with the one or more network devices to the access point before the network device communicates with the access point. | 09-18-2014 |
20140376721 | WIRELESS CONFIGURATION USING PASSIVE NEAR FIELD COMMUNICATION - A system comprises an access point and a client device. The access point receives, using near field communication (NFC) technology, a public key associated with the client device and sends, using NFC technology, a public key associated with the access point. The access point further encrypts configuration data associated with a network and sends the encrypted configuration data to the client device. The client device receives, using NFC technology, a command indicating that a public key associated with the client device is to be sent to the access point and sends, using NFC technology, the public key to the access point. The client device further receives, using NFC technology, a public key associated with the access point and configures the client device to wirelessly connect to a network associated with the access point. | 12-25-2014 |
20150052231 | PROVIDING CUSTOM NAMES FOR HEADLESS DEVICES - A headless device does not have a user interface that conveniently allows the user to enter a custom name for the headless device. In this disclosure, a custom name may be determined (either automatically or via user input) at a user device, such as a user device that has a user interface. The custom name may be based on the type of device, location, services, and/or other information about the headless device. The custom name is introduced to the communications network in association with a network address of the headless device. In some embodiments, forged messages based on conventional network protocols may be used to associate the custom name with the network address of the headless device. | 02-19-2015 |
20150067792 | OWNER ACCESS POINT TO CONTROL THE UNLOCKING OF AN ENTRY - Disclosed is a method, apparatus, and system to control the unlocking of an entry for a guest having a wireless device by an owner access point. A virtual key for a wireless device and an access control rule associated with the virtual key may be stored at the owner access point. The owner access point may determine whether a virtual key received from a wireless device matches the stored virtual key and whether the access control rule for the stored virtual key is satisfied. If the virtual key matches, and the access control rule for the stored virtual key is satisfied, the owner access point may transmit an open command to the entry. | 03-05-2015 |
20150089216 | METHOD FOR CONFIGURING A REMOTE STATION WITH A CERTIFICATE FROM A LOCAL ROOT CERTIFICATE AUTHORITY FOR SECURING A WIRELESS NETWORK - A remote station is configured with a certificate from a local root certificate authority for securing a wireless network. To configure the certificate, the remote station forwards a station public key to the local root certificate authority. The station public key is forwarded out-of-band of the wireless network. The remote station receives a certificate and a root public key from the local root certificate authority. The certificate is generated by the local root certificate authority based on the forwarded station public key, and the certificate and the root public key are received out-of-band of the wireless network. The remote station securely communicates, using the wireless network, with another station based on the certificate and the root public key. | 03-26-2015 |
20150092701 | NETWORK BASED PROVISIONING OF UE CREDENTIALS FOR NON-OPERATOR WIRELESS DEPLOYMENTS - Methods, systems, and devices are described for provisioning of devices, such as UEs, for service at a wireless network. One or more device parameters may be identified for use in provisioning the device on the wireless network, which may be provided to a network element. The network element may use the provided parameters to access a subscription server. The subscription server may provide verification and/or subscription parameters of the device that may then be used by the device to verify that the device is authorized to access the wireless network. | 04-02-2015 |
20150229475 | ASSISTED DEVICE PROVISIONING IN A NETWORK - Device provisioning (e.g., enrollment, configuration, and/or authentication) of a client device with a network device may be assisted using a configurator device. The configurator device may obtain a client public key associated with the client device and send the client public device to the network device. The network device may use the client public key in an authentication process between the network device and the client device. Following the authentication process, the client device may be configured for use with the network device to gain access to other network resources. In this manner, permission to gain access to the network device can be transparent to the user, often without the user having to enter codes or passwords. | 08-13-2015 |