摘要:
Use of a biometric identification device in a client computer system to subsequently access an authentication system includes receiving biometric sample data which is digitally signed and combining the data with a user ID and PIN. This package of data is then securely transmitted to a biometric matching server to validate the user and the biometric sample. Once validated, the biometric matching server return the data package plus a temporary certificate and a public/private key pair to the client computer. The client computer may then use this information to access an authentication system to subsequently gain access to a secure resource.
摘要:
Accessory device authentication techniques are described. In one or more embodiments, connection of an accessory device to a host computing device is detected. Responsive to the detection, an authentication sequence may occur to verify an identity and/or capabilities of the accessory device. Upon successful authentication of the accessory device, the host device may authorize the accessory device for power exchange interactions with the host device. The host device may then draw supplemental power from a power source associated with the authorized accessory device, such as a battery or power adapter. The host device may also enable the accessory device to obtain and use power supplied by the host device in some scenarios. Power exchange between a host device and an authorized accessory may be managed in accordance with capabilities of the accessory device that are identified during authentication.
摘要:
Accessory device authentication techniques are described. In one or more embodiments, connection of an accessory device to a host computing device is detected. Responsive to the detection, an authentication sequence may occur to verify an identity and/or capabilities of the accessory device. Upon successful authentication of the accessory device, the host device may authorize the accessory device for power exchange interactions with the host device. The host device may then draw supplemental power from a power source associated with the authorized accessory device, such as a battery or power adapter. The host device may also enable the accessory device to obtain and use power supplied by the host device in some scenarios. Power exchange between a host device and an authorized accessory may be managed in accordance with capabilities of the accessory device that are identified during authentication.
摘要:
A device for detecting the position of a human finger or other object on a touch-sensitive scrolling pad. Dual independent oscillators may be used to generate two pulse trains at frequencies dependent upon the capacitance of two conductors resulting from the position of the finger on the conductors. The pulses from each oscillator may be counted over a time interval. A ratio-metric measurement may be taken by calculating the ratio of the two counts, and a sum may also be calculated. The ratio of the two counts relates to finger position on the device, and their sum relates to finger pressure upon the device.
摘要:
A device for detecting the position of a human finger or other object on a touch-sensitive scrolling pad. Dual independent oscillators may be used to generate two pulse trains at frequencies dependent upon the capacitance of two conductors resulting from the position of the finger on the conductors. The pulses from each oscillator may be counted over a time interval. A ratio-metric measurement may be taken by calculating the ratio of the two counts, and a sum may also be calculated. The ratio of the two counts relates to finger position on the device, and their sum relates to finger pressure upon the device.
摘要:
A keyboard selectively operable to convey data to and from a host or personal computer (PC) through a universal serial bus (USB) port and/or a personal system/2 (PS/2) port. The keyboard is preferably connected to both the USB port and PS/2 port on the host or PC, if available. Preference is given to communicating data from the keyboard to the host or PC through the PS/2 port. However, if the PS/2 port is unavailable, not connected, or inoperative, the keyboard data are communicated to the host or PC through the USB port (assuming that it is available, operative, and connected). As soon as the PS/2 port on the host or PC is again connected to the keyboard, such data will again be communicated through the PS/2 port. In addition, the keyboard includes auxiliary USB ports to which USB-capable peripheral devices can be connected. USB data can then be communicated between the PC and the USB-capable peripheral devices via the keyboard and its connection to the USB port on the host or PC. Power supplied from the PS/2 port on the host or PC is monitored to determine whether that port is connected to the keyboard, and in response, to cause data arising from the user actuating keys on the keyboard to be supplied to the host or PC through the PS/2 port.
摘要:
A peripheral device is connectable to a computer having one of a first interface and a second interface. The first interface communicates with the peripheral device over a differential data connection having a first data conductor and a second data conductor. The second interface communicates with the peripheral device over a clock conductor and a single ended data connection which includes a data conductor. The peripheral device has first and second communication conductors configured for connection to the first and second data conductors in the differential data connection when the computer includes the first interface and is configured for connection to the first data conductor in the single ended data connection and the clock conductor when the computer is provided with the second interface. The peripheral device includes an interface detection component coupled to the first and second communication conductors and configured to detect which of the first and second interfaces the peripheral device is connected to. The peripheral device also includes a controller component configured to communicate between the peripheral device according to a protocol corresponding to the detected interface.
摘要:
Architecture for enabling continuous operation of a control command issued by a control input (e.g., a control key on a computer keyboard or game controller). For example, for a user of a software application (e.g., a gaming application), an activation modifier is used for enabling continuous operation of the control command. The activation modifier can be a lock key or other type of input used in combination with the control key. During continuous operation of the control command, one or more alternate control inputs (e.g., from alternate control keys) are enabled to concurrently issue alternate control commands to the software application.
摘要:
Architecture for enabling continuous operation of a control command issued by a control input (e.g., a control key on a computer keyboard or game controller). For example, for a user of a software application (e.g., a gaming application), an activation modifier is used for enabling continuous operation of the control command. The activation modifier can be a lock key or other type of input used in combination with the control key. During continuous operation of the control command, one or more alternate control inputs (e.g., from alternate control keys) are enabled to concurrently issue alternate control commands to the software application.
摘要:
A peripheral device is connectable to a computer having one of a first interface and a second interface. The first interface communicates with the peripheral device over a differential data connection having a first data conductor and a second data conductor. The second interface communicates with the peripheral device over a clock conductor and a single ended data connection which includes a data conductor. The peripheral device has first and second communication conductors. The peripheral device includes an interface detection component coupled to the first and second communication conductors and configured to detect which of the first and second interfaces the peripheral device is connected to.