摘要:
A host process for use in a user-mode device driver architecture is provided by the subject invention. The architecture includes a reflector, a driver manager and the host process which hosts and isolates one or more user-mode device driver(s). The user-mode device driver runs in the user-mode (UM) environment and has access to various UM services. The reflector resides in “kernel memory” (e.g., memory/resource(s) available to operating system) while the driver manager, host process and user mode device driver(s) are located in user space (e.g., memory/resource(s) available to user application(s)). The host process can include a host runtime component and a framework component. The host runtime component is responsible for building a driver stack object, and, locating/loading object(s) of a framework component. The host runtime component further includes a message handler that facilitates communication with the reflector and routes information to components of the host process.
摘要:
Techniques for detecting presence of a remote device at Layer 2 in response to an indication of an attempt to use the device and without maintaining a Layer 3 connection to the device. The techniques allow reducing power consumption without compromising the device's availability. A device that pairs with a remote wireless device may establish a Layer 3 connection to the remote device to provide services to a user. The Layer 3 connection and underlying Layer 2 connection (e.g., WI-FI, WI-FI DIRECT™ or BLUETOOTH®) may be terminated when the Layer 3 connection is not actively used. Once use of the remote device is desired, its presence may be detected using a Layer 2 device discovery mechanism and the Layer 2 and Layer 3 connections to the device may be reestablished. Services provided at Layer 3, such as steaming data, may then be performed over the reestablished Layer 3 connection.
摘要翻译:响应于尝试使用设备的指示并且不维持到设备的第3层连接的用于在第2层检测远程设备的存在的技术。 这些技术可以降低功耗,而不会影响设备的可用性。 与远程无线设备配对的设备可以建立到远程设备的第3层连接以向用户提供服务。 当层3连接未被主动使用时,可以终止第3层连接和底层的第2层连接(例如,WI-FI,WI-FI DIRECT TM或BLUETOOTH)。 一旦需要远程设备的使用,可以使用第2层设备发现机制检测其存在,并且可以重新建立到设备的第2层和第3层连接。 然后可以通过重新建立的第3层连接来执行第3层提供的服务,例如蒸汽数据。
摘要:
In embodiments of extensions for USB driver interface functions, a set of USB driver interfaces are exposed by a USB core driver stack, and the USB driver interfaces include USB driver interface functions to interface with USB client function drivers that correspond to client USB devices. A composite device driver registers itself and requests a function handle for each function of a client USB device. The USB client function drivers are enumerated and the function handles generated for each function of the client USB device. A check first protocol is enforced that directs a USB client function driver to check for availability of a USB driver interface function before interfacing with the USB core driver stack via the USB driver interfaces. A contract version identifier is received that indicates a set of operation rules by which a USB client function driver interfaces with the USB core driver stack.
摘要:
Techniques for monitoring presence of a remote device at Layer 2 that allow reducing power consumption without compromising the device's availability. A device that pairs with a remote wireless device may establish a Layer 3 connection, such as an IP connection, to the remote device to provide services to a user. The Layer 3 connection may be formed over a Layer 2 connection via an access point or as a peer-to-peer wireless connection between the devices. When the Layer 3 connection is not actively used to access the remote device, the Layer 3 connection and the supporting Layer 2 connection (e.g., WI-FI, WI-FI DIRECT™ or BLUETOOTH®) may be terminated and presence of the remote device may be monitored using a Layer 2 device discovery mechanism. The Layer 2 and Layer 3 connections to the device may be reestablished when use of the remote device is desired.
摘要:
A wireless peer-to-peer protocol that supports fast and low power joining to an existing group. The protocol may be an extension of a peer-to-peer protocol that supports a sleep state for a device controlling the group. When a device is seeking to join a group at a time when the controlling device is in a sleep state, another device that has information about the controlling device may provide information to the joining device that may then be used by the joining device to more quickly, and using less power, synchronize with the controlling device. The information may include information about a channel used by the controlling device or about timing of availability of the controlling device. The information may also reveal whether the group provides a service being sought by the joining device or may otherwise influence whether the joining device will attempt to join a group.
摘要:
A user-mode device driver architecture is provided by the subject invention. The architecture includes a reflector, a driver manager and a host process which hosts and isolates one or more user-mode device driver(s). The user-mode device driver runs in the user-mode (UM) environment and has access to various UM services. The reflector resides in “kernel memory” (e.g., memory/resource(s) available to operating system) while the driver manager, host process and user mode device driver(s) are located in user space (e.g., memory/resource(s) available to user application(s)). The reflector provides a secure, stable communication path for application(s), the host process and/or user-mode device driver(s) to communicate with the operating system.
摘要:
Theft of decompressed digital content as the content is being rendered is prevented. A requested slow-down of the rendering of the content is detected. Transfers of relatively large amounts of data are detected. A re-compressor-based requested slow-down of the rendering of the content is detected. A re-compressor re-compressing the content is detected. In each situation, the detected activity is presumably initiated by a content thief attempting to steal the content. In each situation, the detected activity is responded to in a manner designed to frustrate the presumed attempt of the content thief to steal the content.
摘要:
Theft of decompressed digital content as the content is being rendered is prevented. A requested slow-down of the rendering of the content is detected. Transfers of relatively large amounts of data are detected. A re-compressor-based requested slow-down of the rendering of the content is detected. A re-compressor re-compressing the content is detected. In each situation, the detected activity is presumably initiated by a content thief attempting to steal the content. In each situation, the detected activity is responded to in a manner designed to frustrate the presumed attempt of the content thief to steal the content.
摘要:
A computing device that forms a group in accordance with a peer-to-peer protocol in which a device may be identified based on a credential of a user. The credential may be used to determine a unique identifier for the user such that the same identifier is used on any device operated by the same user. Such an identifier may be used in connection with a peer-to-peer protocol that supports persistent peer-to-peer groups. As a result, the unique identifier for the user may be retained by remote devices that have paired with any device operated by a particular user such that those remote devices may automatically establish a connection with any other device operated by the same user that similarly uses the same unique identifier for the user.
摘要:
A system in which wireless devices form a group in accordance with a peer-to-peer protocol and, at a later time, a device may send an invitation request to trigger the devices tore-form the peer-to-peer group. The invitation request may contain an identifier that is associated with a set of a plurality of devices. Those devices may be related such that they perform a function for which a user would want to use those devices together. The group of devices, for example, may be multimedia devices that receive and present streaming multimedia content or may be human interface devices that collectively act as an interface for a work station incorporating a wireless computing device operated by a user. Requesting that remote devices concurrently re-form a group reduces the time and spectral congestion associated with re-forming the group, particularly when the remote devices may periodically enter a low power state.