Abstract:
A technique for identifying a user of a device includes receiving a tracking mechanism trigger and capturing (e.g., periodically) identifying information on the user of the device in response to the trigger.
Abstract:
A technique for preventing damage to a portable device includes detecting movement of a portable device and determining whether a port of the portable device is attached to an external device. When the external device is attached to the port, a notification is provided to a user of the portable device that the external device requires detachment from the portable device (e.g., assuming that the notification is not masked).
Abstract:
An apparatus, system, and method are disclosed for remotely accessing a shared password. A storage module stores identifiers, passwords, and keys within a secure key structure of a client. The passwords and keys include a shared password encrypted with a shared password key that is encrypted with a service structure key. The storage module also stores the service structure key encrypted with a key derived from a service password on a trusted server. An input/output module accesses the trusted server from the client with a prospective service password and receives the encrypted service structure key from the trusted server if a hash of the prospective service password is equivalent to the service password. An encryption module may decrypt the service structure key with the prospective service password, the shared password key with the service structure key, and the shared password with the shared password key.
Abstract:
Method and apparatus for enabling applications on security processors of computer systems. In one aspect, a security processor apparatus includes a processor and a memory coupled to the processor and operative to store a secure table. The secure table stores different certified endorsement keys and different values, each value associated with one of the endorsement keys. Each stored value is derived from a different application that is certified by the associated endorsement key to be executed on the processor.
Abstract:
A system and method for loading programs during a system boot using stored configuration data in a predetermined file system from a prior session and providing the stored configuration data to a guest operating system capable of communication with a host operating system, during start-up, within a computing environment having a hypervisor, in a predetermined manner.
Abstract:
The collaborative sharing of resources on demand based on proximity, within a group or network of computers. Broadly contemplated herein the “tiling” of a collection of logically adjacent individual graphical desktops in a virtual desktop. In such a setting, the action of dragging a window or icon off of one desktop and onto another would effectively transfer user interactability, and/or perceived ownership of the object, to the desktop where the window or icon graphically “lands”.
Abstract:
An arrangement for supporting a flat panel display wherein an actuating arrangement responsively alters a physical disposition of the supporting arrangement in a manner to avert physical damage to said flat panel display. Preferably, a flat panel display cover on a laptop will “bow” or arch in a direction away from the flat panel display and the actuating arrangement can be embodied, e.g., by a lattice or grid of wiring, or by a bimetallic sheet. Electronic or mechanical actuation is conceivable and the actuating arrangement can be triggered by, e.g., the imposition of a potentially damaging object and/or by closure of the laptop. While a laptop embodiment is broadly contemplated, other applications are possible.
Abstract:
Hypervisors are a new technology in the industry that enable multiple Operating Systems to co-exist on a single client. The use of a hypervisor provides a novel approach to thermal fan control. The hypervisor is able to fire up a maintenance Operating System on demand or have it running from the powering of the computer. The maintenance Operating System continuously monitors the status of the user Operating System and determines if the system is within the desired fan noise profile by measuring noise levels using means well known in the art. If the system seems to be drifting out of the desired profile, the maintenance Operating System will determine what type of action is required and choose the most appropriate course of action. These actions can be performed by either the maintenance Operating System or the hypervisor, as appropriate.
Abstract:
Peripheral devices are connected to the receptacle of a central processing unit (CPU) or to a hub using an “A” type universal serial bus (USB) connector plug and receptacle that ensures a positive connection regardless of the relative orientation of the two components. This is achieved mechanically, electronically, or through a combination of both. In one embodiment, the receptacle includes a bidirectional backplane that permits electrical contacts within the receptacle to slide or move in a direction that is perpendicular to the linear direction of the connector and its connecting cables. Another option is to use an orientation sensor such as a pressure transducer which serves to detect the orientation of the plug with respect to the receptacle. Another feature is the use of a multi-layer printed circuit board to cross or reverse the pins in the plug, such as D+ to D− and Power to Ground.
Abstract translation:外围设备使用“A”型通用串行总线(USB)连接器插头和插座连接到中央处理单元(CPU)的插座或集线器,确保无论两个组件的相对方向如何,都能确保正向连接。 这是通过机械,电子或通过两者的组合实现的。 在一个实施例中,插座包括双向背板,其允许插座内的电触点沿垂直于连接器及其连接电缆的线性方向的方向滑动或移动。 另一种选择是使用诸如压力传感器的取向传感器,其用于检测插头相对于插座的取向。 另一个特征是使用多层印刷电路板来交叉或倒转插头中的引脚,例如D +至D-和Power to Ground。
Abstract:
An approach is provided that, upon receiving a keyboard event, reduces a volume of an audio input channel from a first volume level to a lower volume level. After the volume of the audio input channel is reduced, the approach waits until a system event occurs, with the system event based at least in part on the occurrence of a nondeterministic event. The volume of the audio input channel is then increased from the lower volume level to a higher volume level when the system event occurs