INSYDE SOFTWARE CORP.
|INSYDE SOFTWARE CORP. Patent applications|
|Patent application number||Title||Published|
|20140176309||REMOTE CONTROL SYSTEM USING A HANDHELD ELECTRONIC DEVICE FOR REMOTELY CONTROLLING ELECTRICAL APPLIANCES - A remote control system using a handheld electronic device to remotely control electrical appliances includes a handheld electronic device and a command conversion device. The handheld electronic device uses a command input device to generate operation information. A command recognizing module receives the operation information, and identifies the corresponding home appliance remote control code. A wireless emission module emits a home appliance remote control code, which is received by the command conversion device. The command conversion device determines the infrared execution command corresponding to the home appliance remote control code. The infrared execution command is emitted by the infrared emission module to remotely control home appliances with the infrared remote control function. The handheld electronic device is enabled to provide a variety of different operating modes without significantly increasing the cost of the entire system.||06-26-2014|
|20140136856||SYSTEM AND METHOD FOR UPDATING FIRMWARE - A mechanism that allows firmware for a computing device to be updated in a secure manner by utilizing an update validation procedure included in a ROM image is discussed.||05-15-2014|
|20140136828||BIOS USER INTERFACE CONTROL USING MOBILE DEVICE - A technique for managing a Unified Extensible Firmware Interface (UEFI) Basic Input/Output System (BIOS)-controlled computing device from a separate mobile computing device is discussed.||05-15-2014|
|20140115364||METHOD AND DEVICE FOR ADVANCED CONFIGURATION AND POWER INTERFACE (ACPI) SLEEP-STATE SUPPORT USING CPU-ONLY RESET - A mechanism for firmware to gain control from the operating system of an Advanced Configuration and Power Interface (ACPI)-compliant computing device during sleep-state transitions even if the computing device lacks a dedicated means for such a change to occur is discussed. Embodiments of the present invention report a CPU-only reset register in place of a sleep control register for an ACPI-compliant computing device in which an operating system is attempting a sleep-state transition. A CPU reset value is substituted for a sleep type value in a sleep-state object and written to the CPU-only reset register that was reported instead of the sleep control register thereby triggering a CPU-only reset. Firmware code operating at a known CPU reset vector may perform specified processing and then authorize a transition to the originally requested sleep-state.||04-24-2014|
|20140075549||SYSTEM AND METHOD FOR PROVIDING GESTURE-BASED USER IDENTIFICATION - A mechanism for allowing a user to prove their identity on touch-based devices employing the use of a touch surface in firmware-controlled environments is discussed. The user may prove his or her identity by entering a series of strokes on the touch-based device to form a word or image. Characteristics of the entered strokes such as stroke order and stroke direction are compared to stored stroke characteristics that were gathered from a drawing of the same word or image during a user enrollment process. If the stroke characteristics comparison is acceptable, the user identity is verified.||03-13-2014|
|20130283260||IMAGE GUIDED METHOD FOR INSTALLING APPLICATION SOFTWARE - An image guided method for installing application software has the steps of using an electronic device to capture an image associated with an application software (App), comparing the captured image with data in an image database, generating installing information of the App based on the comparison result, and displaying the installing information on the electronic device to guide a user to install the App in the electronic device. Therefore, when the user takes the electronic device to capture an image or an icon associated with the App, the user receives the installing information of the App through the image comparison process and installs the App in the electronic device conveniently.||10-24-2013|
|20130283229||METHOD FOR AUTOMATICALLY GENERATING AND LAUNCHING APPLICATION SOFTWARE THROUGH A SINGLE ENTRY POINT OF A STORE PLATFORM - A method for automatically generating and launching application software through a single entry point of a store platform provides a continuous service for automatically generating and launching APP through an APP store platform providing application software (APP). After users briefly describe and/or input information, the APP store platform can automatically generate an APP product and directly launch the APP product thereon. The store platform can further launch APP products to other external APP store platforms. Accordingly, a convenient service with continuity and coherence for automatically generating and launching APP products can be provided.||10-24-2013|
|20130124843||SECURE BOOT ADMINISTRATION IN A UNIFIED EXTENSIBLE FIRMWARE INTERFACE (UEFI)-COMPLIANT COMPUTING DEVICE - Firmware in a UEFI-compliant computing device is used to administer and alter a Secure Boot process for the computing device while continuing to provide protection from unauthorized third-party code.||05-16-2013|
|20130104188||SECURE OPTION ROM CONTROL - A mechanism for controlling the execution of Option ROM code on a Unified Extensible Firmware Interface (UEFI)-compliant computing device is discussed. A security policy enforced by the firmware may be configured by the computing platform designer/IT administrator to take different actions for different types of detected expansion cards or other devices due to the security characteristics of Option ROM drivers associated with the expansion card or device. The security policy may specify whether authorized signed UEFI Option ROM drivers, unauthorized but signed UEFI Option ROM drivers, unsigned UEFI Option ROM drivers and legacy Option ROM drivers are allowed to execute on the UEFI-compliant computing device.||04-25-2013|
|20120260082||SYSTEM AND METHOD FOR PROCESSING REQUESTS TO ALTER SYSTEM SECURITY DATABASES AND FIRMWARE STORES IN A UNIFIED EXTENSIBLE FIRMWARE INTERFACE-COMPLIANT COMPUTING DEVICE - A mechanism for allowing firmware in a UEFI-compliant device to implement the UEFI specification driver signing and Authenticated Variable elements while at the same time protecting the system security database holding the library of approved keys and lists of allowed and forbidden programs from unauthorized modifications is discussed.||10-11-2012|
|20120221866||SYSTEM AND METHOD FOR SECURELY STORING FIRMWARE - A mechanism for creating secure storage for firmware for a computing device. A designated secure storage area holding firmware that is executable prior to a loading of an operating system for the computing device is created during a build of a ROM image. The creating marks one or more files as requiring encrypted storage and the one or marked files are combined during the build into the designated secure storage area. The designated secure storage area is located outside the ROM image and includes, during the build of the ROM image, a reference to the designated secure storage area in a build of firmware placed in the ROM image. The reference includes a flag indicating a current encrypted status of the designated secure storage area.||08-30-2012|
|20110161646||Method for performing quick boot and general boot at bios stage - A method for performing a quick boot and a general boot at a basic input output system (BIOS) stage is described. A computer is powered on. An embedded controller firmware or a BIOS determines whether a quick boot key is pressed. If the quick boot key is not pressed, a boot flag is changed from Quick Boot to General Boot. If the quick boot key is pressed, the BIOS determines whether the boot flag is set to Quick Boot. If it is determined that the boot flag is set to Quick Boot, an initialization of drivers preset by the quick boot is performed, and uninitialized drivers are initialized at a stage when an operating system is started. If it is determined that the boot flag is set to General Boot, an initialization of all drivers is performed.||06-30-2011|
Patent applications by INSYDE SOFTWARE CORP.