Patent application number | Description | Published |
20090109984 | WIRELESS DEVICE WITH FLASH CACHE AND BOOT FROM DOCK - A device is docked to a docking station. The docking station is coupled to a wired network. Code is obtained through the wired network. The code is executed on the device to enable the device to couple to a wireless network. | 04-30-2009 |
20100100854 | GESTURE OPERATION INPUT SYSTEM - A gesture operation input system includes one or more subsystems to receive an input indicating a modifier input, receive a gesture input, wherein the gesture input indicates an action to be performed, and receive an indication that the modifier input is no longer being received. After receiving the gesture input, the gesture operation input system then determines the action to be performed using the gesture input and performs the action. | 04-22-2010 |
20100259486 | System And Method For Secure Gesture Information Handling System Communication - A secured communication channel is established between two or more information handling systems by defining attributes for encrypting information with physical inputs made at touch devices of the information handling systems. Inputting the physical gesture at a touch device of each information handling system allows evaluation of one or more attributes at each information handling system so that the shared secret of the physical gesture form the basis for encrypted communications. The touch device includes touch screens or touch pads and the attributes include gesture speed, plural distinct gesture touch points, movement of touch points relative to each other, or other attributes that are determinable from physical gesture inputs at each information handling system. | 10-14-2010 |
20120098921 | AUDIO CUES FOR MULTI-PARTY VIDEOCONFERENCING ON AN INFORMATION HANDLING SYSTEM - Stereo audio cues are provided at an information handling system to associate audio with its source based upon the characteristics of the image of the source as presented at a display of the information handling system. For example, in one embodiment, a location on a display of a window having a videoconferencing participant is used to create a stereo audio location that correlates audio associated with the participant to the window location. In another embodiment, the size on a display of a window having a videoconferencing participant is used to determine the volume of audio that is associated with the participant. | 04-26-2012 |
20130174247 | Photo Combination Lock - A simple, customizable and intuitive virtual combination unlock method and system. More specifically, an unlock system and method is disclosed which includes a virtual combination lock, where the virtual combination lock includes several rows of user-selectable images such as pictures or icons as the virtual combination wheels. In certain embodiments, the images are accessed via the user's database. To unlock the device, the user touches and drags pre-selected images into alignment with each other. Security can be adjusted by changing the number of images that need to be aligned to unlock the device. | 07-04-2013 |
20130182061 | Video Conference Touch Blur - A system for providing video conference touch blur. More specifically, in certain embodiments, a video conference touch blur operation is performed by actuating (e.g., via touch or via a mouse operation) a video conference screen image to blur areas that are not to be transmitted in high definition. | 07-18-2013 |
20130286224 | PROTECTED MEDIA STREAM SOURCE - A media stream source protection system in which a media stream is passed through a gatekeeper before being used by any other software or hardware within the information handling system. In certain embodiments, the video camera encrypts and the gatekeeper decrypts content received from the video camera before the content is provided to the gatekeeper. In certain embodiments, the encryption is performed on the camera device as part of the video encode incorporated the video camera thus providing a bandwidth-saving measure. | 10-31-2013 |
20130286225 | Advanced Video Camera Privacy Lock - A video camera privacy lock is set forth. The video camera privacy lock includes a low level filter driver that install and maintains a first position in a filter graph. The filter driver provides a locked media signal to the next sequential item rather than to a media stream until and unless the filter is unlocked. The locked media signal may be a blank screen, a text message, an icon, a static image (such as an avatar, a photograph, etc., pixilated video, or some other predetermined output). Also, in various embodiments, the driver is locked by default, thereby increasing user trust that the video camera only transmits a media signal when desired. | 10-31-2013 |
20130311464 | Aggregated Preference-Driven Social Content Player - A system and method are disclosed for managing playlists of digital content. Digital content preference data is received from a plurality of users. The preference data is then processed to generate a group preference playlist, which contains references to digital content that is mutually preferred by each of the users. The group preference playlist is then initiated to play the mutually-preferred digital content. | 11-21-2013 |
20140040509 | Near Field Communication Mimic Device And Method Of Use - A NFC mimic device retrieves peripheral information from a peripheral, stores the peripheral information and then mimics the peripheral information to an information handling system so that a NFC device of the information handling system receives the peripheral information as if provided directly from the peripheral. The NFC mimic device supports automated setup a wireless interface between an information handling system and a peripheral, such as a projector. | 02-06-2014 |
20140101748 | Adaptive System Behavior Change on Malware Trigger - A hardware secured flag mechanism which is activated by trusted Anti-Malware (AM) software. Upon being activated, the information handling system takes action to reduce user exposure even if the AM software is subsequently subverted. In certain embodiments, the flag mechanism is only reset by user intervention at a BIOS or other off-line mechanism. In certain embodiments, the flag mechanism may only be reset via a signed unlock key stored on an external memory device such as a universal serial bus (USB) key. | 04-10-2014 |
20140292659 | ZERO-VOLUME TRACKPAD - A method of determining user input into an information handling system includes determining a region of a zero-volume trackpad overlaying a keyboard area, detecting an access of the zero-volume trackpad, and determining whether to interpret the access as input into the zero-volume trackpad based upon timing of the input. | 10-02-2014 |
Patent application number | Description | Published |
20080222076 | Enabling Instant Productivity Functionality on Information Handling Systems - A method for enabling instant on access of productivity content on an information handling system. The method includes providing the information handling system with a first operating system partition and a second operating system partition wherein the first operating system partition is a main operating system partition and the second operating system partition is an instant on operating system partition, storing a synchronization management module within the first operating system partition, storing a productivity module within the second operating system partition, synchronizing productivity content stored on the first operating system partition with the productivity module via the synchronization management module, and accessing the synchronized productivity content via the productivity module of the second operating system partition. | 09-11-2008 |
20090327975 | Multi-Touch Sorting Gesture - A method and apparatus are provided for recognizing multi-touch gestures on a touch sensitive display. A plurality of graphical objects is displayed within a user interface (UI) of a display screen operable to receive touch input. A first touch input exceeding a first time duration is detected over a first graphical object. A touch-and-hold gesture action is generated, which is then applied to the first graphical object. A second touch input is then detected over a second graphical object and a touch-select gesture action is generated, which is then applied to the second graphical object. The first and second gestures are processed to determine an associated operation, which is then performed on the second graphical object. | 12-31-2009 |
20100020022 | Visual Feedback System For Touch Input Devices - A visual feedback system includes a touch input screen. A proximity sensing device is coupled to the touch input screen and operable to determine a position of an input member relative to the touch input screen when the input member is proximate to the touch input screen but prior to the contact of the input member and the touch input screen. A visual feedback engine is coupled to the touch input screen and the proximity sensing device and is operable to receive the position of the input member from the proximity sensing device and provide a visual feedback for data displayed on the touch input screen that corresponds to the position of the input member relative to the touch input screen. | 01-28-2010 |
20100036980 | MULTI-MODE PROCESSING MODULE AND METHOD OF USE - A multi-mode processing module and method of use are disclosed. In a particular form, a multi-mode processing module can include a peripheral interface configured to be enabled in response to a peripheral application access request. The multi-mode processing module can further include a plurality of independent peripheral resources individually accessible to a host processor via the peripheral interface. The multi-mode processing module can also include a local processor configurable to enable the plurality of independent peripheral resources in response to a request by the host processor. | 02-11-2010 |
20100107238 | SECURITY MODULE AND METHOD WITHIN AN INFORMATION HANDLING SYSTEM - A security module and method within an information handling system are disclosed. In a particular form, a processing module can include a local processor configurable to initiate access to resources of a host processing system. The processing module can also include a security module configured to enable use of the resources of the host processing system using a security metric. According to an aspect, the security module can be further configured to detect the security metric, and enable access to a resource of the host processing system in response to the security metric. The security module can further be configured to disable access to another resource of the host processing system in response to the security metric. | 04-29-2010 |
20100115303 | SYSTEM AND METHOD OF UTILIZING RESOURCES WITHIN AN INFORMATION HANDLING SYSTEM - A system and method of utilizing resources within an information handling system are disclosed. In a particular form, a method of utilizing an information handling system can include detecting an operating state controllable by a state controller configured to enable a plurality of operating environments including a host environment and a reduced power environment. The method can also include detecting an event operable to alter the operating state to enable an operating environment of the plurality of operating environments. According to an aspect, the operating environment can be used separate from a host system operable to enable the host environment. | 05-06-2010 |
20110225326 | Multi-Mode Processing Module and Method of Use - A method of enabling access to resources includes detecting an input to access a resource of a multi-mode processing module coupled to a host processor and a control module. The method can further include detecting an operating mode of the host processor and the control module and an availability of independent peripheral resources of the multi-mode processing module. Additionally, the method can enable the multi-mode processing module in response to the detecting the operating mode and the availability of the independent peripheral resources. | 09-15-2011 |
20120188170 | Motion Sensor-Enhanced Touch Screen - An information handling system includes a touch screen, a motion sensor, and a processor. The processor is configured to receive inputs from the touch screen, receive signals from the motion sensor, determine a correlation between the inputs from the touch screen and signals from the motion sensor, and perform an action in response to the correlation. The inputs from the touch screen correspond to a touch contact with the touch screen, and the signals from the motion sensor corresponding to a touch impact to the touch screen. | 07-26-2012 |
20120192116 | Pinch Zoom Velocity Detent - An information handling system includes a gesture sensitive interface and a processor. The processor is configured to receive inputs from the gesture sensitive interface corresponding to first and second interaction points, determine a relative motion between the first and second interaction points, and obtain a velocity of the relative motion. The processor is further configured to determine if the velocity exceeds a threshold, and scale an image on a display from an initial magnification to a predetermined magnification when the velocity exceeds a threshold. | 07-26-2012 |
20120290744 | Enabling Access to Peripheral Resources at a Processor - A method of enabling access to resources includes detecting an input to access a resource of a multi-mode processing module coupled to a host processor and a control module. The method can further include detecting an operating mode of the host processor and the control module and an availability of independent peripheral resources of the multi-mode processing module. Additionally, the method can enable the multi-mode processing module in response to the detecting the operating mode and the availability of the independent peripheral resources. | 11-15-2012 |
20120303984 | System and Method of Utilizing Resources within an Information Handling System - A method of utilizing an information handling system includes detecting an event by a state controller configured to enable a plurality of operating states for a host system including a host system power on state and a host system power off state, and a plurality of processing module operating states including a processing module power on state and a processing module reduced operating state, and enabling an operating state associated with the event, including enabling the processing module power on state where the processing module controls a shared resource and a processing module non-shared resource in response to detecting a processing module power on event, and enabling the processing module reduced operating state where the processing module controls the shared resource in response to detecting a processing module reduced operating event. | 11-29-2012 |
20130067524 | VIDEO TRANSMISSION WITH ENHANCED AREA - A video transmission method includes receiving a selected area from an input device. The selected area includes a first portion of a video image received from a video device. The video image includes a second portion, at least some of which is not included in the selected area. The first portion of the video image is transmitted at a first resolution over a network for display. The second portion of the video image is transmitted at a second resolution over the network for display. The second resolution is lower than the first resolution, which allows the system and method to utilize available transmission bandwidth to transmit the video image with the first portion, which may be a portion of interest in the video image, at a higher quality than the second portion, which may be a portion in the video image of less interest than the first portion. | 03-14-2013 |
20140222840 | INSERTION OF NON-REALTIME CONTENT TO COMPLETE INTERACTION RECORD - A system and method for assembling a full interaction record for a meeting with non-realtime interaction is disclosed. The system and method may include recording a first plurality of data associated with the meeting to produce a meeting record at a first time, and determining whether to insert a placeholder in the meeting record at a point in the meeting record. | 08-07-2014 |
20140232693 | ADVANCED IN-CELL TOUCH OPTICAL PEN - A user input device communicatively coupled to a memory is disclosed. The user input device may include a user-manipulated portion; a surface contact portion of the user-manipulated portion, the surface contact portion disposed at an end of the user-manipulated portion; a first light source contained substantially within the user-manipulated portion, the first light source emitting light through the surface contact portion; a user input detector at an external surface of the user-manipulated portion; and an optical receiver at an external surface of the user-manipulated portion, the optical receiver configured to communicate a plurality of data associated with an object external to the user input device to the memory. | 08-21-2014 |
20140270343 | EFFICIENT 360 DEGREE VIDEO PROCESSING - In accordance with the present disclosure, systems and method for efficient 360 degree video processing are described herein. A first image within a first frame of a video stream may be detected. The first frame may be partitioned into a first portion containing the first image and a second portion. An attempt may be made to detect the first image within a third portion of a subsequent frame that corresponds to the first portion of the first frame, and an attempt may not be made to detect a second image within a fourth portion of the subsequent frame that corresponds to the second portion of the first frame. Additionally, an attempt may be made to detect the second image within a fifth portion of at least one other subsequent frame that corresponds to the second portion of the first frame. | 09-18-2014 |
20150033313 | Security Module and Method within an Information Handling System - A security module and method within an information handling system are disclosed. In a particular form, a processing module can include a local processor configurable to initiate access to resources of a host processing system. The processing module can also include a security module configured to enable use of the resources of the host processing system using a security metric. According to an aspect, the security module can be further configured to detect the security metric, and enable access to a resource of the host processing system in response to the security metric. The security module can further be configured to disable access to another resource of the host processing system in response to the security metric. | 01-29-2015 |