摘要:
A hardware security password mechanism that allows administrators to manage the passwords more easily by managing them centrally on a network rather than on an individual system. Further, each individual machine interacts with the network to allow the system administrator to lock down the hardware features without having any local, hardware-based password mechanisms.
摘要:
A method for touchpad edge gesture detection comprising detecting touch input on a touchpad, determining if the touch input originates externally to the touchpad, determining if the touch input ends internally to the touchpad and performing a command on a computer corresponding to the touch input.
摘要:
A content management user interface (UI) provides a consistent appearance and operation across multiple devices of a user. Thumbnails representing content that is located on the user's devices are presented along with layered filtering operators which enable a user to filter the thumbnails by both content source and content type.
摘要:
Images are offloaded from a portable camera automatically to a network server at the time the images are taken, transparently to a user of the camera. The server executes processing functions on the images and returns the output of the processing over the network to the camera and/or other user-defined destination device to thereby relieve the camera processor of potentially complex processing chores.
摘要:
A method for data synchronization across multiple target destinations in a computer network includes acquiring information about the target destinations, wherein: the target destinations comprises at least one of a network account in the computer network, or a target device coupled to the computer network or associated with the network account; and the acquired information includes identification information associated with the target destinations. The method may also include receiving, at a user device, data from a data source; filtering the received data based on information included in the received data and in the identification information; identifying, based on the filtering, a selected target destination for receiving the filtered data; and transmitting the filtered data to the identified selected target destination.
摘要:
A remote flash ROM and security package is formed and delivered to a system ROM of a target computer system for remote flashing of the ROM and remote configuration of security settings for the computer system. The remote flash ROM and security package includes flash ROM and security control code for calling a remote flash and security driver to execute a remote flash or to remotely configure a security setting, a file containing a “signed” ROM image to be flashed to the ROM, a security settings file which preferably is encrypted, and a remote flash and security control container for containing the flash ROM and security code, the ROM image, and the security settings file. The remote flash and security driver may be included in the remote flash ROM and security package or may be resident to the target computer system. In the preferred embodiment, the computer system includes a secure memory device containing an administrator password for locking and unlocking the ROM. The remote flash ROM and security package preferably includes an administrator password matching the administrator password stored in the secure memory device to place the computer system in an administrator mode. A system ROM thereby may be flashed or a security setting changed remotely without the need for a user to enter an administrator password. Further, flashing the ROM or changing a security setting occurs as an “inband” process. Flashing a ROM or changing a security setting by remotely providing an administrator password to a secure memory device eliminates the need to reboot a computer system after downloading the ROM and security package.
摘要:
A keyboard power generator provides a plurality of keys with one or more magnets mounted thereon. Additionally, a plurality of coils are mounted on both ends of the magnet such that, when the user is typing, the magnet traverses the coils. The movement of the magnet over the coils causes a current to be generated. In one embodiment, one magnet is mounted per key on the keyboard. In a second embodiment, a plurality of magnets are mounted per key to enhance the power generation capability of the keyboard. The currents generated collectively by the keys are provided to a charge pump which multiplies the voltage to achieve a level greater than the voltage level of the battery to be charged. The multiplied voltage is provided to a charging circuitry such as a trickle charger to recharge the battery. In this manner, the more information entered by the user, the more electricity is generated by the keyboard power generator. The energy provided by the keyboard of the present invention can be used to lengthen the operating period of the portable computer, or alternative, can be used to reduce the size of the primary battery so as to result in a lighter portable computer.
摘要:
Internet connection may come through a single host computer and sent to appliance computers, as in a laptop or camera. This application intends to automatically connect the appliances to the Internet established by the host computer by means of either electronic communication or preprogramming both computers with the same network access information.
摘要:
User-specific information such as the social networking cloud of relevant metadata is used to find real-time information and provide visual feedback to users regarding the presence of other users at particular locations. In one example, the information is displayed on localized map images, with visual indicators such as dots indicating the presence of other users having desired characteristics.
摘要:
A user of a user computer whose hard disk drive (HDD) is “fried” can press a special key to cause BIOS to automatically gather location information about the computer from its GPS receiver and gather information about the HDD, activate a WWAN transceiver, and automatically send the location and HDD information over the WWAN to a service computer, which may return a location of a nearest service center to the user computer and any other advice including recovery advice for the HDD that the service center might be able to divine from the information sent to it by the user computer.