Patent application number | Description | Published |
20110063455 | Monitoring Quality Of Video Signals - In a method and system for assessing video quality, an analog video signal to be assessed is input. At least part of the incoming video signal is converted to digital values. The digital values are stored. A detector determines whether any stored digital value is outside an acceptable range. | 03-17-2011 |
20110292085 | POINTING DEVICE WITH A DISPLAY SCREEN FOR OUTPUT OF A PORTION OF A CURRENTLY-DISPLAYED INTERFACE - Example embodiments relate to pointing devices, methods, and machine-readable storage media. In example embodiments disclosed herein, a pointing device may include a display screen. Example embodiments may receive an image from a computing device that includes a pointer and an area of a currently-displayed interface surrounding the pointer. Example embodiments may then output the received image on the display screen of the pointing device. | 12-01-2011 |
20140040636 | EMBEDDED CONTROLLER TO VERIFY CRTM - In one embodiment a computing system includes an embedded controller to verify the provider of the core root of trust for measurement (CRTM). | 02-06-2014 |
20150162036 | CONTROL OF STORAGE DEVICE - Sensor data and audio data are received by a controller. The controller determines if the audio data is above a threshold level. The controller also determines if the sensor data is above a threshold level. The controller can suspend operation of a hard drive based on the data being above or below the threshold level. | 06-11-2015 |
20150213255 | AUTHENTICATION SYSTEM - An authentication system is disclosed herein. An example includes a computing device and a port associated with the computing device for connection of an accessory to the computing device. The example also includes an authentication device that generates an accessory response upon receipt of a challenge and a hardware controller. The hardware controller generates both the challenge and an expected response to the challenge. It compares the expected response to the accessory response to ascertain if the accessory response is one of a valid response and an invalid response, and it signals for the port to be enabled for the valid response to allow access to functionality of the accessory by the computing device. Other features and components of the authentication system are also disclosed herein, as is a method of authenticating an accessory for use by a computing device. | 07-30-2015 |
20160034065 | CONTROLLING FORMS OF INPUT OF A COMPUTING DEVICE - Examples disclosed herein control computing device input. One example includes activating a touchscreen of a computing device and enabling a capacitive touch control of the computing device for user selection as a device input to initiate a device action. The example further includes disabling the capacitive touch control based on a pen event with the touchscreen, wherein the pen event is triggered when a digital pen is to be placed within a predefined distance from the touchscreen. | 02-04-2016 |