Patent application number | Description | Published |
20110087776 | CLOUD BASED COMPUTER POWER MANAGEMENT - According to one general aspect, a method of providing data to a client device may include receiving a request from a client device for a multi-element document. The method may also include receiving, from the client device, an indicator related to the level of system resources of the client device. The method may include dynamically adjusting one or more of the elements included by the requested multi-element document based, at least in part, upon the received indicator. The method may further include transmitting the adjusted multi-element document to the client device. | 04-14-2011 |
20110087870 | COMPUTING DEVICE WITH DEVELOPER MODE - Methods and apparatus for implementing modes of operation of computing device are disclosed. An example apparatus includes a mode-selection input device having a first state and a second state. The example apparatus also includes firmware operably coupled with the mode-selection input device. In the example apparatus, when the mode-selection input device is in the first state, the firmware is configured to cause the computing device to operate in a first mode of operation, a user mode. In the example apparatus, when the mode-selection input device is in the second state, the firmware is configured to cause the computing device to operate in second mode of operation, a developer mode. | 04-14-2011 |
20110087872 | Firmware Verified Boot - Methods and apparatus for verifying a boot process of a computing system are disclosed. An example computer-implemented method includes reading, by a computing system during a boot process, a header section of a read-write portion of firmware of the computing system. The example method further includes generating, using a first cryptographic hash algorithm, a message digest corresponding with the header. The example method also includes decrypting, using a first public-key, an encrypted signature corresponding with the header. The example method still further includes comparing the message digest corresponding with the header and the decrypted signature corresponding with the header. In the event the message digest corresponding with the header and the decrypted signature corresponding with the header match, the example method includes continuing the boot process. In the event the message digest corresponding with the header and the decrypted signature corresponding with the header do not match, the example method includes halting the boot process. | 04-14-2011 |
20110087920 | COMPUTING DEVICE WITH RECOVERY MODE - Methods and apparatus for implementing a recovery mode procedure for a computing device are disclosed. An example method includes determining, by a computing device, that a recovery mode procedure is to be executed on the computing device. The example method further includes, determining whether a trusted recovery image is accessible to the computing device and, in the event the trusted recovery image is accessible to the computing device, executing the recovery mode procedure to repair or replace a current image of the computing device using the trusted recovery image. In the event the trusted recovery image is not accessible to the computing device, the example method includes, providing instructions for obtaining the trusted recovery image, determining the obtained trusted recovery image is accessible to the computing device and executing the recovery mode procedure to repair or replace the current image of the computing device using the obtained trusted recovery image. | 04-14-2011 |
20110087960 | Power Metering and Control in Cloud Based Computer - According to one general aspect, a method of regulating the system resource consumption of an apparatus may include monitoring one or more system resources of the apparatus. The method may also include receiving a request to display, via the apparatus, a requested multi-element document. The method may include retrieving by the apparatus, at least in part, the requested multi-element document. The method may include dynamically editing the requested multi-element document based, at least in part, upon the monitored system resources. The method may also include displaying the dynamically edited multi-element document. | 04-14-2011 |
20110088039 | Power Monitoring and Control in Cloud Based Computer - According to another general aspect, a method for displaying the system resource usage of a computer may include identifying the number of open tabs in one or more tabbed based browsers running on the computer. The method may include determining the system resource usage of each tab. The method may further include displaying the system resource usage of each tab in a system resource meter. | 04-14-2011 |
20120262400 | CLICK DISAMBIGUATION ON A TOUCH-SENSITIVE INPUT DEVICE - The surface of an touch-sensitive input device may act as a physical button that the user may push down to perform a click or other operation. For example, the user may push down the surface of the input device with one finger for a left click and push down the surface of the input device with two fingers for a right click. In one aspect, a system for detecting a left click or a right click when the user pushes down the surface of the input device is provided. When the system first detects that the surface of the input device is pushed down, the system may wait for a short period of time before making a determination of whether the user is pushing down the surface with one finger or two fingers. During this time, the system may collect additional information to make a more reliable determination. | 10-18-2012 |
20120303990 | POSTPONING SUSPEND - According to one general aspect, a method may include operating a computing device in a first power mode. The method may also include executing, by a processor of the computing device, at least one non-interactive task. The method may also include detecting, by a processor of the computing device, a request to place the computing device in a second power mode, wherein the second power mode consumes less system resources than the first power mode. The method may further include delaying the transition of the computing device to the second power mode until either the completion of the non-interactive task or an overriding triggering event. | 11-29-2012 |
20130047031 | SECURE RECOVERY APPARATUS AND METHOD - A system and method is disclosed for recovering a boot image from a secure location. Hardware instructions initiate a sequence of boot cycles to launch a computer operating system on a computer-enabled device. During the boot cycles, multiple levels of boot code are verified and a determination is made whether each level is usable by the device. If a level of boot code is determined to be unusable, a secure copy of the boot code is loaded from a secure read-only location to repair the unusable code to launch the computer operating system. | 02-21-2013 |
20130176259 | CLICK DISAMBIGUATION ON A TOUCH-SENSITIVE INPUT DEVICE - The surface of an touch-sensitive input device may act as a physical button that the user may push down to perform a click or other operation. For example, the user may push down the surface of the input device with one finger for a left click and push down the surface of the input device with two fingers for a right click. In one aspect, a system for detecting a left click or a right click when the user pushes down the surface of the input device is provided. When the system first detects that the surface of the input device is pushed down, the system may wait for a short period of time before making a determination of whether the user is pushing down the surface with one finger or two fingers. During this time, the system may collect additional information to make a more reliable determination. | 07-11-2013 |
20130181936 | COMPUTING DEVICE USER PRESENCE DETECTION - A computing device may detect the presence of a user after the user has not interacted with the computing device for a predetermined time period. The user may leave the device powered up, but after the predetermined time period has expired, the device enters a user detection mode from a normal operation mode such that nonessential components are powered down. A trackpad may be used to detect the presence of the user in the user detection mode. An electric field is generated by conductive plates of the trackpad. When the user extends his hand over the trackpad, sense lines in the track pad detect the interference with the electric field caused by the hand. A processor is signaled to return the device normal operation mode and restore full power to the device. A camera may be also used to detect the user's presence during the user detection mode. | 07-18-2013 |
20140028554 | RECOGNIZING GESTURE ON TACTILE INPUT DEVICE - A non-transitory computer-readable storage medium may comprise instructions stored thereon for recognizing gestures on a tactile input device. The instructions may be configured to cause a computing system to at least receive, from a sensor of the tactile input device, a signal representing a first contact on the tactile input device and subsequent release of the first contact from the tactile input device, receive, from the sensor of the tactile input device, a signal representing a second contact on the tactile input device after the first contact is released, the second contact being maintained and changing location on the tactile input device, and recognize the first contact and the second contact as a single gesture if the second contact occurs within a re-tap threshold period of time after the first contact, and the second contact begins within a maximal threshold distance on the tactile input device from the first contact. | 01-30-2014 |
20140222941 | AD-HOC DEVICE SHARING OVER A NETWORK - The subject technology discloses implementations for an ad-hoc sharing service that provides a solution for end-to-end connectivity of one or more master computing devices to access different resources of one or more host computing devices that are available to be utilized (e.g., depending on the desired usage of the master computing device(s) and the respective capabilities of each device). Example resources on a given device include, but are not limited to, display, audio, network, storage, processing, input and output peripherals, etc. The ad-hoc sharing service can initially determine available resources of each device for sharing. | 08-07-2014 |
20140223163 | SECURE RECOVERY APPARATUS AND METHOD - A system and method is disclosed for recovering a boot image from a secure location. Hardware instructions initiate a sequence of boot cycles to launch a computer operating system on a computer-enabled device. During the boot cycles, multiple levels of boot code are verified and a determination is made whether each level is usable by the device. If a level of boot code is determined to be unusable, a secure copy of the boot code is loaded from a secure read-only location to repair the unusable code to launch the computer operating system. | 08-07-2014 |
20140320455 | CLICK DISAMBIGUATION ON A TOUCH-SENSITIVE INPUT DEVICE - The surface of an touch-sensitive input device may act as a physical button that the user may push down to perform a click or other operation. For example, the user may push down the surface of the input device with one finger for a left click and push down the surface of the input device with two fingers for a right click. In one aspect, a system for detecting a left click or a right click when the user pushes down the surface of the input device is provided. When the system first detects that the surface of the input device is pushed down, the system may wait for a short period of time before making a determination of whether the user is pushing down the surface with one finger or two fingers. During this time, the system may collect additional information to make a more reliable determination. | 10-30-2014 |
20150089262 | HEURISTICS BASED ON BACKOFF FOR POWER MODES - According to one general aspect, a method may include monitoring, by a computing device, a user's current behavior in regards to the computing device. The method may also include determining whether to place the computing device in a reduced power mode based upon the user's monitored current behavior and based on a history of user habits in regards to one or more computing devices. In various implementations, the method may further include, if it is determined to place the computing device in the reduced power mode, placing the computing device in the reduced power mode. | 03-26-2015 |