Abstract:
An improved key matrix scanning technique conducts a first pre-scan on a first array of connections in a key matrix to identify any activated keys or buttons associated with the first array. A second sub-scan is conducted on a second array of connections in the key matrix but only for the connections in the first array that are detected as having activated keys.
Abstract:
An improved key matrix scanning technique conducts a first pre-scan on a first array of connections in a key matrix to identify any activated keys or buttons associated with the first array. A second sub-scan is conducted on a second array of connections in the key matrix but only for the connections in the first array that are detected as having activated keys.
Abstract:
A method and system is provided for supplying power to a host via a USB port. The power is transmitted to the host using the standard VBUS and GND lines that are part of standard USB cables and connectors. The peripheral device includes a special USB descriptor block. During the standard enumeration process, the host reads this USB descriptor block and recognizes that the device can provide power to the host. A set feature command is used to start the power transmission to the host.
Abstract translation:提供了一种通过USB端口向主机供电的方法和系统。 使用作为标准USB电缆和连接器一部分的标准VBUS和GND线将电源传输到主机。 外围设备包括一个特殊的USB描述符块。 在标准枚举过程中,主机读取此USB描述符块,并识别设备可以为主机提供电源。 set feature命令用于启动向主机的电力传输。
Abstract:
Disclosed is a peripheral device, comprising a sensor to trip when in proximity to a host device, and a transmitter coupled to the sensor to transmit a bind request to a host device. Further described is a method of binding the peripheral device to a host device.
Abstract:
Methods, apparatus, and other embodiments associated with automatically configuring a secure wireless connection are described. According to one embodiment, an apparatus includes a security logic in a first device. The security logic is configured to determine a security code for wirelessly connecting to a second device by sending a request to initiate communication to the second device. The security logic is further configured to receive a reply from the second device in response to the request. The apparatus also includes a communication logic configured to establish a secure wireless connection to the second device from the first device by automatically initiating a Wi-Fi Protected Setup (WPS) based, at least in part, on the security code.
Abstract:
The present disclosure describes techniques for pre-association discovery. In some aspects a frame having information useful to identify a service provided by a wireless device is received, the service provided by the wireless device is identified based on the information of the frame and known service identification information, and the identified service is associated with the wireless device effective to enable use of the identified service.
Abstract:
An improved key matrix scanning technique conducts a first pre-scan on a first array of connections in a key matrix to identify any activated keys or buttons associated with the first array. A second sub-scan is conducted on a second array of connections in the key matrix but only for the connections in the first array that are detected as having activated keys.
Abstract:
A system of networked computers and peripherals and document delivery software which provides a user with a familiar simple user interface to deliver documents to a variety of different destinations. Each document generation device participating in the system is provided with a unified print driver which translates an electronic document into a non-specific or printer independent printer language file and appends to this file a job ticket containing any other rendering characteristics which may not be supported by the printer independent language. This entire file is then transmitted to the system server which analyzes the file, including the rendering characteristics; determines the best output device(s); appends output device specific commands to the general printer language file; and transmits this file to the device(s) for final output.
Abstract:
The present disclosure describes techniques for pre-association discovery. In some aspects a frame having information useful to identify a service provided by a wireless device is received, the service provided by the wireless device is identified based on the information of the frame and known service identification information, and the identified service is associated with the wireless device effective to enable use of the identified service.
Abstract:
An improved key matrix scanning technique conducts a first pre-scan on a first array of connections in a key matrix to identify any activated keys or buttons associated with the first array. A second sub-scan is conducted on a second array of connections in the key matrix but only for the connections in the first array that are detected as having activated keys.