摘要:
A manager component for managing input from legacy and non-legacy devices in a similar manner is disclosed. An inventive manager component receives input from both non-legacy input drivers for non-legacy input devices, and legacy input drivers for legacy input devices. The manager component provides the input to application programs that desirably have previously registered to receive input from one or more types of input devices. The application programs receive this input without directly communicating with the drivers.
摘要:
Disclosed are a unique system and method that facilitate establishing and maintaining a secure connection between at least one wireless input component and a host (e.g., PC). The system and method involve the wireless input component broadcasting a message that can be “heard” by any potential host located within a given distance from the wireless input component. The message can indicate that the input component is available for use or pairing with a PC. PCs in the area can respond to the message by notifying the user that a wireless input component is available and by generating a random PIN. The PIN can be displayed to the user on the respective PC. The user can be prompted to enter the PIN using the wireless device. When a match between the user's response and the corresponding PC is determined, the two can be securely linked. In addition the invention provides support of wireless input devices at boot or start up.
摘要:
A computer receives data from a keyboard having one or more keys which cause generation of keyboard data that quantitatively describe the relative force applied to those keys. The keyboard data are transmitted in an HID report containing identifiers for one or more keys that have been pressed and force data for each key. The force data may be a multi-bit value quantifying the key force, or a null indicator signaling that the key is not force-sensing. Keyboard data messages are then prepared which identify keys pressed, contain force data, and may indicate whether the force data updates previous force data. Force updates are only provided to application programs registering for key force data. In other aspects of the invention, key repeat messages are automatically generated for a key held pressed by a user. The key repeat messages are generated at a rate controlled by the amount of force applied to the key.
摘要:
In a wireless USB data transfers over UWB, softwareconfigures hardware thresholds to control data transfer in a manner that uses bandwidth for good connections over bad connections, given the high error rate experienced with wireless USB. Periodic transfers are first attempted before asynchronous transfers, as long as the periodic transfers are successful. When failures are occurring, the hardware includes a mechanism having a software-configurable threshold specifying the number of errors a given endpoint can tolerate before it is paused in the schedule. By pausing transfer attempts that are likely to again fail, endpoints with successful transfers are favored over those experiencing errors. When the number of active transfers pending exceeds a software-configurable notification threshold for isochronous endpoints, the hardware notifies the software of this state, corresponding to a low-buffer condition at the receiver. The software may then reconfigure thresholds and deactivate other transfers to force data transfers into the buffer.
摘要:
Testing of computing devices and/or peripherals coupled via a wired bus may be facilitated through automatically re-configuring connections between computing devices and peripherals. A switching device may selectively couple and de-couple computing devices and peripherals for testing purposes. A control device may send control commands to the switching device to couple and decouple computing devices and peripherals in accordance with a testing schedule or program. The ability of a peripheral device and a computing device to function together while coupled via the wired bus may be evaluated.
摘要:
A secure association may be established between a first device and a second device for providing secure communication. When the secure association is to be terminated, a first device may save an indication that termination of the secure association is pending, if it is unable to communicate with the second device at that time. At a later time, the first device may communicate with the second device to notify it that the secure association is to be terminated. After the second device has been notified, the secure association may be terminated by the first device.
摘要:
Device connection routing for controllers is provided. A computing device is configured with multiple controllers that provide connections for peripheral devices. The controllers enable the peripheral devices to interact with the computing device through a bus. Each device connection is routed to one of the multiple controllers based on one or more pre-determined factors. These factors may include load-balancing, power saving, quality of service, data flow requirements, and the like. Device connection routing may be dynamically managed to respond to changing states of the peripheral devices and the controllers. The device connection routing may be performed for controllers associated with any type of wired or wireless buses, such as Universal Serial Bus (USB), IEEE 1394, Secure Digital Input/Output (SDIO), and the like.
摘要:
A system for identifying data connection attributes is disclosed. The system comprises a connection monitor that identifies an operational attribute of a data connection. The system also includes a signal module that activates operation of a status indicator of the data connection such that a manner of operation of the status indicator is associated with the operational attribute. Methods for operating the system are also disclosed.
摘要:
In wireless USB data transfers over UWB, software configures hardware thresholds to control data transfer in a manner that uses bandwidth for good connections over bad connections, given the high error rate experienced with wireless USB. Periodic transfers are first attempted before asynchronous transfers, as long as the periodic transfers are successful. When failures are occurring, the hardware includes a mechanism having a software-configurable threshold specifying the number of errors a given endpoint can tolerate before it is paused in the schedule. By pausing transfer attempts that are likely to again fail, endpoints with successful transfers are favored over those experiencing errors. When the number of active transfers pending exceeds a software-configurable notification threshold for isochronous endpoints, the hardware notifies the software of this state, corresponding to a low-buffer condition at the receiver. The software may then reconfigure thresholds and deactivate other transfers to force data transfers into the buffer.
摘要:
A centralized wireless resource manager is leveraged to facilitate in reconciling communication conflicts between wireless devices that interact with a computing device and/or reconciling communication conflicts between a wireless device and a locale of a computing device interacting with the wireless devices. One instance allows dynamic reconciliation of a wireless device based, at least in part, on the wireless device's hardware supported communication parameters and/or its currently utilized communication parameters and the like. Another instance provides dynamic communication adjustments based, at least in part, on a locale of a computing device. This facilitates in adjusting communication frequencies based on, at least in part, local laws and regulations and the like.