-
公开(公告)号:US11710357B2
公开(公告)日:2023-07-25
申请号:US17423967
申请日:2019-04-19
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Mary Gray Baker , Alexander Thayer
CPC classification number: G07C9/00182 , E05B67/22
Abstract: Examples of devices are described herein. In some examples, a device may include a plurality of electronic elements. In some examples, each of the electronic elements is mechanically interlockable to another of the electronic elements. In some examples, each of the electronic elements is to control a lock state based on a broadcast signal to modify a shape of the device to a predetermined target shape.
-
公开(公告)号:US11321034B2
公开(公告)日:2022-05-03
申请号:US17054830
申请日:2018-09-26
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Mithra Vankipuram , Rafael Ballagas , Alexander Thayer
IPC: G06F3/12 , G06F16/901 , G06F16/908
Abstract: An example communication device includes a camera to detect media. A processor is to link the detected media with a stored version of the detected media in a database. The processor is to instruct a printing device associated with a remote device to output a hardcopy of the stored version of the detected media.
-
公开(公告)号:US20220092895A1
公开(公告)日:2022-03-24
申请号:US17423967
申请日:2019-04-19
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Mary Gray Baker , Alexander Thayer
Abstract: Examples of devices are described herein. In some examples, a device may include a plurality of electronic elements. In some examples, each of the electronic elements is mechanically interlockable to another of the electronic elements. In some examples, each of the electronic elements is to control a lock state based on a broadcast signal to modify a shape of the device to a predetermined target shape.
-
公开(公告)号:US20200184047A1
公开(公告)日:2020-06-11
申请号:US16605198
申请日:2017-08-28
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: Alexander Thayer , Mithra Vankipuram
Abstract: Examples disclosed herein relate to authenticating a first and second user. For example, a processor may authenticate a first user to access at least one of a device and a location and identify a second user located within an authentication zone. The processor may trigger an authentication process for the second user based on the identification and output information indicating whether the second user is authenticated.
-
-
-