摘要:
Disclosed are a unique system and method that facilitate establishing and maintaining a secure connection between at least one wireless input component and a host (e.g., PC). The system and method involve the wireless input component broadcasting a message that can be “heard” by any potential host located within a given distance from the wireless input component. The message can indicate that the input component is available for use or pairing with a PC. PCs in the area can respond to the message by notifying the user that a wireless input component is available and by generating a random PIN. The PIN can be displayed to the user on the respective PC. The user can be prompted to enter the PIN using the wireless device. When a match between the user's response and the corresponding PC is determined, the two can be securely linked. In addition the invention provides support of wireless input devices at boot or start up.
摘要:
A manager component for managing input from legacy and non-legacy devices in a similar manner is disclosed. An inventive manager component receives input from both non-legacy input drivers for non-legacy input devices, and legacy input drivers for legacy input devices. The manager component provides the input to application programs that desirably have previously registered to receive input from one or more types of input devices. The application programs receive this input without directly communicating with the drivers.
摘要:
In a wireless USB data transfers over UWB, softwareconfigures hardware thresholds to control data transfer in a manner that uses bandwidth for good connections over bad connections, given the high error rate experienced with wireless USB. Periodic transfers are first attempted before asynchronous transfers, as long as the periodic transfers are successful. When failures are occurring, the hardware includes a mechanism having a software-configurable threshold specifying the number of errors a given endpoint can tolerate before it is paused in the schedule. By pausing transfer attempts that are likely to again fail, endpoints with successful transfers are favored over those experiencing errors. When the number of active transfers pending exceeds a software-configurable notification threshold for isochronous endpoints, the hardware notifies the software of this state, corresponding to a low-buffer condition at the receiver. The software may then reconfigure thresholds and deactivate other transfers to force data transfers into the buffer.
摘要:
A computer receives data from a keyboard having one or more keys which cause generation of keyboard data that quantitatively describe the relative force applied to those keys. The keyboard data are transmitted in an HID report containing identifiers for one or more keys that have been pressed and force data for each key. The force data may be a multi-bit value quantifying the key force, or a null indicator signaling that the key is not force-sensing. Keyboard data messages are then prepared which identify keys pressed, contain force data, and may indicate whether the force data updates previous force data. Force updates are only provided to application programs registering for key force data. In other aspects of the invention, key repeat messages are automatically generated for a key held pressed by a user. The key repeat messages are generated at a rate controlled by the amount of force applied to the key.
摘要:
A secure association may be established between a first device and a second device for providing secure communication. When the secure association is to be terminated, a first device may save an indication that termination of the secure association is pending, if it is unable to communicate with the second device at that time. At a later time, the first device may communicate with the second device to notify it that the secure association is to be terminated. After the second device has been notified, the secure association may be terminated by the first device.
摘要:
Device connection routing for controllers is provided. A computing device is configured with multiple controllers that provide connections for peripheral devices. The controllers enable the peripheral devices to interact with the computing device through a bus. Each device connection is routed to one of the multiple controllers based on one or more pre-determined factors. These factors may include load-balancing, power saving, quality of service, data flow requirements, and the like. Device connection routing may be dynamically managed to respond to changing states of the peripheral devices and the controllers. The device connection routing may be performed for controllers associated with any type of wired or wireless buses, such as Universal Serial Bus (USB), IEEE 1394, Secure Digital Input/Output (SDIO), and the like.
摘要:
A centralized wireless resource manager is leveraged to facilitate in reconciling communication conflicts between wireless devices that interact with a computing device and/or reconciling communication conflicts between a wireless device and a locale of a computing device interacting with the wireless devices. One instance allows dynamic reconciliation of a wireless device based, at least in part, on the wireless device's hardware supported communication parameters and/or its currently utilized communication parameters and the like. Another instance provides dynamic communication adjustments based, at least in part, on a locale of a computing device. This facilitates in adjusting communication frequencies based on, at least in part, local laws and regulations and the like.
摘要:
Port number emulation for wireless Universal Serial Bus (USB) connections is provided. Virtual USB port numbers are emulated and associated with external devices that are wirelessly connected to a host device. The associations are maintained in a data structure. When a wireless external device connects with the host device after a period of disconnection, the emulated port number associated with the wireless external device is identified. The virtual port number is provided to a software component in the host device so that the external device can resume interaction with software components in the host device across enumerations. In one example implementation, the virtual USB port numbers are provided to a plug and play manager, which handles the wireless USB devices in a manner similar to wired USB devices.
摘要:
An extensible architecture for untrusted medium (e.g., wireless) device configuration via trusted medium. The architecture can be employed to associate a device that utilizes an untrusted medium (e.g., wireless connection). Association is effected using a trusted medium, for example, a wired connection. The architecture can facilitate configuration of the device to communicate (e.g., securely) via an untrusted medium (e.g., wireless connection). Configuration of the device can be based, at least in part, upon information exchanged via a trusted medium (e.g., wired connection). The device can send an association request to a driver and receives an association response from the driver. If the association is successful, the association response can include, for example, configuration information (e.g., encryption key) to enable the device to communicate (e.g., securely) via the untrusted medium. If the association is unsuccessful, the association response can include, for example, error information.
摘要:
Techniques are disclosed to provide generic USB drivers. More particularly, a generic USB device driver architecture is described which enables development through a user-mode USB library that accesses a generic kernel-mode driver. In a described implementation, a method includes loading a kernel-mode generic device driver in response to a plug-in event of a device. A user software component accesses the device by utilizing routines provided by the generic user-mode library (e.g., a dynamic link library (DLL)) that communicates with the generic device driver.