摘要:
Light guide display and field of view techniques are described. In one or more implementations, an apparatus includes one or more modules implemented at least partially in hardware to configure a user interface and a display device communicatively coupled to the one or more modules to output the user interface to be viewable by a user within a range of distances from the display device such that closer distances within the range permit the user to have an increased field of view in comparison with distances within the range that are further away from the user.
摘要:
Augmented reality light guide display techniques are described. In one or more implementations, an apparatus includes a housing configured in a hand-held form factor, one or more sensors configured to detect a position and orientation of the housing in three dimensions in a physical environment of the housing, a light guide that is at least partially transparent and supported by the housing, a light engine that is optically coupled to the light guide, and one or more modules disposed within the housing and implemented at least partially in hardware. The one or more modules are configured to calculate a position and orientation of an augmentation and cause the light engine to output the augmentation for display using the light guide such that the augmentation is viewable concurrently with at least a portion of the physical environment through the light guide.
摘要:
Embodiments provide storage, security, and other services to smart personal devices (SPDs) in a personal area network (PAN) via a smart personal gateway device (SPGD). The SPGD caches and shares data among SPDs having support for heterogeneous communication modalities. The SPGD acts as an offline cache or other common storage location for the SPDs in the PAN.
摘要:
Light guide display and field of view techniques are described. In one or more implementations, an apparatus includes one or more modules implemented at least partially in hardware to configure a user interface and a display device communicatively coupled to the one or more modules to output the user interface to be viewable by a user within a range of distances from the display device such that closer distances within the range permit the user to have an increased field of view in comparison with distances within the range that are further away from the user.
摘要:
A pay-per-use computer, or other electronic device that uses local security, may use a security module or other circuit for monitoring and enforcement of a usage policy. To help prevent physical attacks on the security module, or the circuit board near the security module, a second circuit may be mounted over the security module to help prevent access to the security module. Both circuits may be mounted on a interposer and the interposer mounted to the circuit board, creating a stack including the first circuit, the interposer, the security module, and a main PC board. When the PC board includes dense signal traces under the security module a three dimensional envelope is created around the security module. When the first circuit is a high value circuit, such as a Northbridge, the risk/reward of attacking the security module is increased substantially and may deter all but the most determined hackers.
摘要:
The claimed subject matter provides a system and/or a method that facilitates authentication of a user in a surface computing environment. A device or authentication object can be carried by a user and employed to retain authentication information. An authentication component can obtain the authentication information from the device and analyze the information to verify an identity of the user. A touch input component can ascertain if a touch input is authentication by associating touch input with the user. In addition, authentication information can be employed to establish a secure communications channel for transfer of user data.
摘要:
A computer that operates in a metered mode for normal use and a restricted mode uses an input/output memory management unit (I/O MMU) in conjunction with a security policy to determine which peripheral devices are allowed direct memory access during the restricted mode of operation. During restricted mode operation, non-authorized peripheral devices are removed from virtual address page tables or given vectors to non-functioning memory areas.
摘要翻译:以正常使用的计量模式操作的计算机和受限模式使用输入/输出存储器管理单元(I / O MMU)结合安全策略来确定在受限模式期间允许哪些外围设备被允许直接存储器访问 操作。 在限制模式操作期间,未授权的外围设备从虚拟地址页表或给定向量移除到非功能存储区。
摘要:
Providing for analysis of artifacts of electronic devices to generate data that is substantially unique to a particular device or to a class of devices is described herein. In some aspects, analyzed artifacts are chosen based on reliable reproducibility of such data over many analyses. The substantially unique data can be associated with a particular electronic device(s) to distinguish such devices from other devices. In some aspects, the generated data is first transformed into an identifier, such as a number, word, string of data, etc., to distinguish the electronic device in remote communication, to provide a key in an encryption/decryption algorithm, and so on. The data can be reproduced by reanalyzing the artifacts, and thus need not be stored for future consumption, mitigating risks involved in storing sensitive data.
摘要:
Oftentimes users can be exposed to media content such as advertisements while in a non-connective state. Advertisement providers can desire to obtain information related to the exposure and users can be rewarded for the exposure. Therefore, a record can be retained related to advertisement exposure and the record can be transmitted when it is determined that the user is in a connective state. Since personal information can be held upon the record and there can be motivation to alter the record, the record can be stored in hardware, such as a microcontroller of a flash memory device, prior to transmission.
摘要:
Oftentimes, computer files, information packets, and the like share identical data portions that cause duplicate storing. The files and/or packets can be logically divided and checks can be performed to determine if there are shared portions. If shared portions exist, then as opposed to making a duplicate copy of information, a pointer can be produced that identifies where the portion is saved. In addition, pointers can be used in compression of information such that a compressed file can identify an original copy—the original copy can be used to decompress the information.