摘要:
A device providing pointing device functions in a keyboard without requiring the keyboard operator to remove any fingertip from the keys. A computer keyboard keyswitch mounting plate is supported for horizontal displacement against a resistive force. A transducer for measuring the force exerted in the plane of the keyboard key tops is attached between the keyboard case and the keyswitch mounting plate. The direction and magnitude of the force can be measured and encoded so they may be used to emulate the signals generated by a pointing device. The operator may elect a pointing device mode by merely applying sufficient force along the plane of the surface of the key tops, thus switching from a keyboard mode to a pointing device mode, without moving the fingers from a typing position.
摘要:
The novel notepad of the invention provides a convenient interface into the capabilities of computer technology from paper based information. The notepad has a form factor similar to a clipboard wherein the board portion includes a digitizing tablet and the clip portion includes an optical scanner. A battery-powered embedded processor and associated peripherals provide for capturing and storing information in a variety of forms including at least scanning information, digitized stylus information and audio annotation. An important feature of the invention is the linking of these different forms of information via software so that while the information is readily available for efficient processing, it is also combinable so as to recreate the annotated document through conventional means.
摘要:
A protective reflex system for a portab1e computer hard disk initiates protective action before the hard disk suffers the shock of an impact in the event they fall from, for example, a user's lap. A three axis accelerometer is mounted in the portable computer. The output of the accelerometer is continuously monitored by a dedicated processor. In the event of an acceleration event within a preset range of values, the dedicated processor passes a high priority interrupt to the central processing unit of the portable computer and then proceeds to park the disk heads. Alternately, the interrupt routine of the central processing unit may also cause the park operation. In addition to park operation, a brake operation may be performed by either the dedicated processor or the central processing unit.
摘要:
The invention provides a method of securing remote terminal access to a central computer. The method uses the services of a physically secure coprocessor which is, or will be, coupled to the remote terminal for the purposes of effecting remote access to the central computer. The method comprises transferring an encrypted decryption key from the central computer to the physically secure coprocessor. The coupling between the coprocessor and remote terminal allows a file to be encrypted which can confirm that the remote terminal (which is the source of the encrypted file) has or had access to the specific coprocessor to which the encrypted decryption key had previously been transferred. Thereafter the encrypted file is transferred to the central computer and is examined there to confirm that the source of the file has access to the specific coprocessor which received the encrypted decryption key. Access is allowed, by the remote terminal, to the central computer after confirmation is produced by the examination at the central computer.
摘要:
The invention provides a software asset protection mechanism which is based on the separation of the software to be protected from the right to execute that software. Protected software can only be executed on composite computing systems in which a physically and logically secure coprocessor is associated with a host computer. The software to be protected is broken down into a protected (encrypted) portion and an (optional) unprotected or plain text portion. The software is distributed by any conventional software distribution mechanism (for example a floppy disk) including the files already identified along with an encrypted software decryption key. The coprocessor is capable of decrypting the software decryption key so it can thereafter decrypt the software, for execution purposes. However, the coprocessor will not perform these functions unless and until the user's right to execute is evidenced by presentation of a physically secure token. The physically secure token provides to the coprocessor token data in plain text form (the physical security of the plain text token data is provided by the cartridge within which token data is stored). The physical properties of that cartridge taken together with the correspondence between the token data provided by the cartridge and the encrypted token data evidence the user's right to execute. While the coprocessor can, thereafter, decrypt and execute the protected portion of the software, access to that software is denied the user by the physical and logical features of the coprocessor. Other properties of the cartridge (specifically a destructive read property) ensure that the act of transferring token data to the coprocessor obliterates that data from the cartridge so it cannot be revised. Further, the protocol for the coprocessor/cartridge exchange is arranged so that observation of even the entire exchange provides inadequate information with which to simulate or spoof the effect of an authentic, unused cartridge.
摘要:
Drive current for a light emitting semiconductor device, such as an injection laser, is supplied by a digitally programmable current source capable of supplying any one of a plurality of different discrete current amplitudes. Light emitted by the device is sensed and an amplitude parameter (e.g. instantaneous current or power amplitude, average current or power amplitude, modulation amplitude, etc.) is digitally encoded. A logic circuit responsive to the digitally encoded amplitude parameter and optionally responsive to other digital signals as well, controls the discrete current amplitude supplied by the programmable current source.