Patent application number | Description | Published |
20120159363 | Z-ORDER BANDS - The subject disclosure relates to managing z-dimensional ordering of elements within a computing system display through the use of z-order bands. As described herein, z-order bands are utilized to arrange windows and other graphics corresponding to respective application types. A policy engine controls which windows and/or other graphical elements can enter and exit each band. Graphical elements within a given band can additionally be subject to per-band properties corresponding to the band and/or user preferences. As additionally described herein, z-order bands and/or other suitable mechanisms are utilized to facilitate registration watermarking for a computing environment by rendering a registration watermark display upon determining that one or more licensed elements of a computing system have not been registered. The registration watermark display is assigned a z-order band that enables its display over all other graphical elements associated with the computing system and prevents other graphical elements from interfering with its display. | 06-21-2012 |
20120182687 | ADAPTIVE THERMAL MANAGEMENT FOR DEVICES - A method for cooling an electronic device having first and second flow paths for transmitting a coolant. The method includes assessing a merit of impelling the coolant along the first flow path relative to impelling the coolant along the second flow path. When the relative merit is above a threshold, coolant is impelled along the first flow path. When the relative merit is below the threshold, coolant is impelled along the second flow path. | 07-19-2012 |
20120185929 | INCORPORATING NETWORK CONNECTION SECURITY LEVELS INTO FIREWALL RULES - Embodiments of the present invention are directed to establishing and/or implementing firewall rules that may employ parameters based on connection security levels for a connection between devices. A firewall may thus provide greater granularity of security and integrate more closely with other security methods to provide better overall security with fewer conflicts. | 07-19-2012 |
20120246377 | HID over Simple Peripheral Buses - In embodiments of HID over simple peripheral buses, a peripheral sensor receives inputs from a peripheral device, and the peripheral sensor implements an HID SPB interface to interface the peripheral device with a computing system via a simple peripheral bus (SPB) in an HID data format. The peripheral sensor can also receive extensibility data for a proprietary function of the peripheral device, and communicate the inputs from the peripheral device and the extensibility data via the simple peripheral bus in the computing system. Alternatively or in addition, a peripheral sensor can generate sensor data and the HID SPB interface interfaces the peripheral sensor with the computing system via the simple peripheral bus. The peripheral sensor can then communicate the sensor data as well as extensibility data for a proprietary function of the peripheral sensor via the simple peripheral bus in the HID data format to the computing system. | 09-27-2012 |
20130067236 | SYSTEMS FOR VALIDATING HARDWARE DEVICES - A computing environment in which devices interoperate with a plurality of hardware components. Inconsistencies in user experience when operating devices that may use different components are avoided by generating a signature for the components. The signature may be computed as a function of a first key and one or more parameter values obtainable from the component. The signature and parameter values may be stored in the component's memory, and may be obtainable while the component is in operation as part of the computing device. The device may validate the component by performing at least one function based on the signature, the one or more parameter values obtainable from the component, and a second key, which may or may not be identical to the first key. The device may change its interaction with the component, depending on whether the component was successfully validated. | 03-14-2013 |
20130152186 | FILTERING KERNEL-MODE NETWORK COMMUNICATIONS - Some embodiments of the invention are directed to techniques for determining whether a process on a computer system that is sending or receiving data, or is attempting to send or receive data, with another computer system is executing in kernel mode or user mode and providing an indicator of this determination to a security engine. In some embodiments, such an indication is provided to a security engine (e.g., a firewall) that implements a security policy based at least in part on whether the sending or receiving process is in kernel mode or user mode, and filter communications based on a process' operating mode. This enables a security engine to maintain security policies of greater specificity and thus improve security of a computer system. | 06-13-2013 |
20130332643 | HID OVER SIMPLE PERIPHERAL BUSES - In embodiments of HID over simple peripheral buses, a peripheral sensor receives inputs from a peripheral device, and the peripheral sensor implements an HID SPB interface to interface the peripheral device with a computing system via a simple peripheral bus (SPB) in an HID data format. The peripheral sensor can also receive extensibility data for a proprietary function of the peripheral device, and communicate the inputs from the peripheral device and the extensibility data via the simple peripheral bus in the computing system. Alternatively or in addition, a peripheral sensor can generate sensor data and the HID SPB interface interfaces the peripheral sensor with the computing system via the simple peripheral bus. The peripheral sensor can then communicate the sensor data as well as extensibility data for a proprietary function of the peripheral sensor via the simple peripheral bus in the HID data format to the computing system. | 12-12-2013 |
20140368435 | Modifying Input Delivery to Applications - In some examples, input received from an input device, such as a keyboard, is modified by a component associated with an operating system before the input is delivered to an application. For instance, a component associated with the operating system may become registered for modifying input. In some situations, the input is modified based at least in part on metadata associated with the input device. For example, a location of a fingertip on a touch-sensitive display may be used to modify the input before delivery to an application. | 12-18-2014 |
20140368436 | Classification of User Input - Techniques for identifying inadvertent user input, such as inadvertent touch contact or air input, are described. The techniques may include classifying a touch contact or air input as intentional or unintentional based on contextual information related to the touch contact, the air input, or a device via which the touch contact or air input was received. In some examples, the contextual information may indicate how a user is interacting with the device, such as a position of the user's hand, a location of the touch contact on a touch surface, a path of user's touch trajectory, an application with which the user may be interacting, keyboard input history of the user, and so on. When the user input is classified as unintentional, the techniques may refrain from performing an action that is generally triggered by the user input. | 12-18-2014 |
20140368444 | DISAMBIGUATION OF INDIRECT INPUT - The techniques described herein are directed to a computing device that receives data from an indirect input device. The data received may indicate or signal that one or more objects are on or within a detection area of the indirect input device. For example, the data may indicate that one or more objects are in contact with a surface of an indirect touch device. The techniques include determining parameters for the one or more objects and analyzing the parameters to determine whether the data is directed to a touch operation or to a mouse operation. To perform the touch operation or the mouse operation, the techniques further describe converting the data received from a first coordinate space of the indirect input device to a second coordinate space of a display screen. | 12-18-2014 |
20140372061 | INTERACTION DEVICE CORRECTIVE PARAMETERS - The techniques described herein are directed to receiving parameters directed to correcting spatial error and/or jitter associated with an interaction device connected to a computing device. In some instances, the parameters are encrypted parameters that may be decrypted and consumed to correct the spatial error and/or the jitter associated with the interaction device. For instance, the parameters may provide an adjustment to one or more reported positions of input received from a detection area of the interaction device, so that a display position more accurately reflects, based on the adjustment, an actual position of input on the detection area of the interaction device. | 12-18-2014 |
20150058628 | FILTERING KERNEL-MODE NETWORK COMMUNICATIONS - Some embodiments of the invention are directed to techniques for determining whether a process on a computer system that is sending or receiving data, or is attempting to send or receive data, with another computer system is executing in kernel mode or user mode and providing an indicator of this determination to a security engine. In some embodiments, such an indication is provided to a security engine (e.g., a firewall) that implements a security policy based at least in part on whether the sending or receiving process is in kernel mode or user mode, and filter communications based on a process' operating mode. This enables a security engine to maintain security policies of greater specificity and thus improve security of a computer system. | 02-26-2015 |