摘要:
An apparatus includes sensor circuitry configured to sense spatial phenomena; application circuitry configured to respond to sensation of a spatial phenomenon by the sensor circuitry where a pre-existing relationship exists between the spatial phenomenon and the response of the application circuitry; and regulation circuitry configured to regulate the response of the application circuitry to the spatial phenomenon based at least in part on sensation of a different spatial phenomenon by the sensor circuitry. Various other apparatuses, systems, methods, etc., are also disclosed.
摘要:
A technique for providing a software patch to an associated computer system includes receiving, at a wireless communication device, a communication. Next, it is determined, at the wireless communication device, whether the communication is associated with a software patch available for the associated computer system. When the communication is associated with the software patch, a notification is sent from the wireless communication device to the associated computer system that the software patch is available.
摘要:
An apparatus, system, and method are disclosed for gesture mode selection. An apparatus for gesture mode selection includes a detection module, a gesture mode module, and a gesture recognition module. The detection module detects a triggering event. The gesture mode module sets a gesture mode from an idle mode to an enhanced mode based on the detection of the triggering event. The gesture recognition module processes data from a non-contact input device to detect gestures according to the gesture mode set by the gesture mode module.
摘要:
A method computer usable medium and computer system circuitry are disclosed for starting or “booting up” a computer from a remote location using a remote command device such as a cellular telephone. The method and system includes a secure means for remotely storing and transmitting security passwords.
摘要:
Mechanical stress on solder joints that hold BGA modules to computer motherboards is reduced by adding to the motherboard a topmost layer, and forming V-shaped channels into the layer next to the BGA module so that stress is shielded from the BGA module and its solder joints.
摘要:
A method and system for enabling security attestation for a computing device during a return from an S4 sleep state. When the computing device enters into the S4 state following a successful boot up, the attestation log is appended to the TPM tick count and the log is signed (with a security signature). When the device is awaken from S4 state, the BIOS obtains and verifies the log created during the previous boot. The CRTM maintains a set of virtual PCRs and references these virtual PCRs against the log. If the values do not match, the return from S4 state fails and the device is rebooted.
摘要:
Systems, methods and media for providing access to a network are disclosed. More particularly, hardware and/or software for providing network access only to client computer systems with acceptable status information are disclosed. Embodiments include a method that generally includes receiving a request for a network address from a client computer system via a network and determining whether the status of the requesting client computer system is acceptable. In the event that the status of the client computer system is determined to be acceptable, the method also generally includes assigning and transmitting a network address to the client computer system. In some embodiments, the status of the client computer system may include information about the system configuration, installed software, presence of files such as virus files, etc.
摘要:
A method and system for defining every operation required of a client PC before being authorized to obtain an IP address that will enable the client PC to join a network serviced by specified DHCP servers. Each successful operation generates a value that is stored on a pre-determined location on the client PC's hard drive. A hash is created from all of the stored values, and after being encrypted, the hash is sent to the DHCP server when requesting an IP address. The DHCP server has a hash string indicative of the required status of operations that should be performed by any client PC requesting an IP address to join the network serviced by the DHCP server. If the DHCP's has string does not match with the hash sent by the client PC, then the DHCP server will not provide the requisite IP address to the client PC.
摘要:
A system and method for concurrent WLAN and WPAN wireless modes from a single device is presented. A client uses a Wi-Fi device's infrastructure mode to communicate in a WLAN environment and, during idle WLAN times, uses the Wi-Fi device's adhoc mode to communicate in a WPAN environment. The Wi-Fi device uses a watchdog timer to switch between infrastructure mode and adhoc mode. When the client's Wi-Fi device switches to infrastructure mode, the client's Wi-Fi device uses an infrastructure register and an infrastructure device driver to transfer data over the WLAN environment. Likewise, when the client's Wi-Fi device switches to adhoc mode, the client's Wi-Fi device uses an adhoc register and an adhoc device driver to transfer data over the WLAN environment. The client uses a code shim to act as a virtual device driver at times when either the infrastructure device driver or the adhoc device driver is inactive.
摘要:
A data processing network configuration includes a server and an access point wired to a network and a mobile system wirelessly connected to the access point. The access point receives and stores a request to retrieve information from the mobile system. The mobile system, when in a powered down state, powers its wireless network adapter periodically to poll the access point to discover the stored request for information. The mobile system responds to discovery of the stored request by retrieving the requested information from nonvolatile storage of the mobile system and transmitting the requested information via the wireless network adapter while otherwise remaining powered down. The information request may be a system management request and the request packet may include a Media Access Control (MAC) address repeated multiple times. The access point stores pending requests in a table having an entry for each associated mobile system.