Patent application number | Description | Published |
20140085610 | Virtual Segmentation of Interactive Scanning Laser Projector Display - Regions are defined in projected content to create a virtually segmented display. When reflections are received from objects within a defined region, the reflections are recognized and passed to a user interface circuit. When reflections are received from objects outside a defined region, the reflections are gated and not recognized. | 03-27-2014 |
20140118704 | Mobile Device, Case and Attachment with Retractable Optic - A retractable optic conditionally redirects an image from a scanning laser projector. The retractable optic may be coupled to a mobile device, a mobile device case, or may be part of an attachment. The retractable optic includes a reflective surface that has a free-form shape defined by a polynomial that is a function of two independent, transverse coordinate variables. | 05-01-2014 |
20140232699 | Interactive Projection System with Actuated Stylus - An actuated stylus conditionally occludes or exposes a reflector. The actuation mechanism may be mechanical, electrical, or a combination. When the reflector is occluded and the stylus is in the field of view of an interactive projection, no light is reflected back to the projection system. When the reflector is exposed, light is reflected back to the projection system. The reflector may be exposed in a time coded sequence to encode information such as a stylus ID and user action. | 08-21-2014 |
20150237316 | Multi-Segment Brightness Compensation - A scanning projector includes a brightness compensation component. The brightness compensation component modifies pixel brightness as a function of instantaneous scan phase of a sinusoidally scanning mirror. The brightness compensation component uses different brightness compensation functions based on whether the instantaneous scan phase is above or below a threshold. The threshold may correspond to a knee of a maximum laser power limit curve. | 08-20-2015 |
Patent application number | Description | Published |
20100281252 | ALTERNATE AUTHENTICATION - A user may utilize an existing digital identity to authorize the user's access to security-enabled device operations, where the security-enabled device comprises a cryptographic chip. The device can receive a user authentication token from the digital user identification service, which authenticates a user's identity. Further, the security-enabled device can validate the user authentication token, and provide the user access to device security operations on the security-enabled device if the user authentication token is successfully validated, allowing the user to reset their security access information for the device. | 11-04-2010 |
20100299518 | PORTABLE SECURE COMPUTING NETWORK - As provided herein, when using an untrusted network connection, a secure online environment can be created for a remote machine by connecting to a trusted computer with a trusted network connection. A proxy server is installed on a first computing device and shared encryption keys are generated for the first device and a portable storage device. A connection is initiated between a second computing device (e.g., remote device), connected to an untrusted network, and the first computing device, comprising initiating a proxy server protocol from the portable storage device (e.g., attached to the second device), using the second computing device. A secure connection between the first and second devices is created using the encryption keys. | 11-25-2010 |
20110179028 | AGGREGATING DATA FROM A WORK QUEUE - One or more techniques and/or systems are disclosed herein for aggregating web-based data stored in a distributed data store so that it can be retrieved in a first-in, first-out (FIFO) manner. A unique aggregation key is generated for respective one or more data generated from a web-based event, where the one or more data are added to the distributed data store, and the aggregation key corresponds merely to the data generated from the web-based event. The one or more data from the web based event is aggregated in a FIFO queue and stored in a same partition of the distributed data store, based on the aggregation key. | 07-21-2011 |
20140088979 | PROVIDING SYSTEM RESOURCES WITH SECURE CONTAINMENT UNITS - A system for providing resources to customers includes racks, sub-rack level secure containment units in the racks, and a provisioning control system. The sub-rack level secure containment units each enclose system resources. The racks hold two or more of the sub-rack level secure containment units. For each customer, the provisioning control system may provision a set of sub-rack level secure containment units to the customer. The provisioning control system may monitor, and create a record of, events of physical access to the system resources in each customer's set of sub-rack level secure containment units. | 03-27-2014 |
20150356290 | ALTERNATE AUTHENTICATION - A user may utilize an existing digital identity to authorize the user's access to security-enabled device operations, where the security-enabled device comprises a cryptographic chip. The device can receive a user authentication token from the digital user identification service, which authenticates a user's identity. Further, the security-enabled device can validate the user authentication token, and provide the user access to device security operations on the security-enabled device if the user authentication token is successfully validated, allowing the user to reset their security access information for the device. | 12-10-2015 |
Patent application number | Description | Published |
20090327482 | RELIABLE AND ACCURATE USAGE DETECTION OF A SOFTWARE APPLICATION - Use of software applications is detected by categorizing components of applications into a usage manifest and implementing a usage detection background service on a client PC that monitors the components according to the usage manifest. The application components are categorized based on the mode of user interaction as well as the component's correlation to active use of an application. The background service tracks events and activities associated with the application components to generate usage metrics that include the frequency of unique launches of an application and the duration of each unique use. A usage manager for the background service may utilize the usage metrics for a component independently, or combine metrics for multiple components in cases where applications work in an interactive manner (such as a plug-in to a web browser) in order to compute application usage by comparing the metrics against predefined thresholds. | 12-31-2009 |
20110110268 | MODEL-BASED VIRTUAL NETWORKING - Architecture that facilitates the virtual specification of a connection between physical endpoints. A network can be defined as an abstract connectivity model expressed in terms of the connectivity intent, rather than any specific technology. The connectivity model is translated into configuration settings, policies, firewall rules, etc., to implement the connectivity intent based on available physical networks and devices capabilities. The connectivity model defines the connectivity semantics of the network and controls the communication between the physical nodes in the physical network. The resultant virtual network may be a virtual overlay that is independent of the physical layer. Alternatively, the virtual overlay can also include elements and abstracts of the physical network(s). Moreover, automatic network security rules (e.g., Internet Protocol security-IPSec) can be derived from the connectivity model of the network. | 05-12-2011 |
20110113142 | SMART CLIENT ROUTING - Architecture that facilitates communications between two network nodes of the different networks by providing a routing mechanism that uses alternative modalities driven entirely by policies that are authored and stored in a computing cloud and enforced on the client. This allows the selection of one network path over another path based on criteria such as, physical location of the hosts and service level agreements (SLAs) to be provided, for example. With respect for path selection, a packet can be routed through a datacenter closest to the hosts. With respect to SLAs, there may be different SLAs available to different clients. For clients with the highest bandwidth/uptime or other guarantees, a network path different from other types of clients can be selected. Additionally, connectivity can be allowed or disallowed based on other kinds of policy rules such as a virtual circle to which the hosts may belong. | 05-12-2011 |
20110185436 | URL FILTERING BASED ON USER BROWSER HISTORY - A URL monitoring system may use a user's browsing history to generate a score for the user. The score may be used to permit or deny access to a URL. The score may be used to represent the user's intent when browsing, and based on that intent, the user may be allowed access to a URL with conflicting classifications. The score may be also be used as a trustworthiness score so that a user who browses responsibly may have their score increased over time, and a user who browses irresponsibly or inappropriately may have their score decreased. The scores may be calculated and maintained on a user's client device, edge device, or other device within a network. | 07-28-2011 |
Patent application number | Description | Published |
20140250143 | DIGITAL INK BASED CONTEXTUAL SEARCH - Disclosed herein are representative embodiments of tools and techniques for performing contextual searches using text determined based on digital-ink data. According to one exemplary technique, digital-ink data is received at a computing device and text is determined based on the digital-ink data. Additionally, by an application of the computing device, a contextual search is performed using the text. | 09-04-2014 |
20140267094 | PERFORMING AN ACTION ON A TOUCH-ENABLED DEVICE BASED ON A GESTURE - Techniques are described herein that are capable of performing an action on a touch-enabled device based on a gesture. A gesture (e.g., a hover gesture, a gaze gesture, a look-and-blink gesture, a voice gesture, a touch gesture, etc.) can be detected and an action performed in response to the detection. A hover gesture can occur without a user physically touching a touch screen of a touch-enabled device. Instead, the user's finger or fingers can be positioned at a spaced distance above the touch screen. The touch screen can detect that the user's fingers, palm, etc. are proximate to the touch screen, such as through capacitive sensing. Additionally, finger movement can be detected while the fingers are hovering to expand the existing options for gesture input. | 09-18-2014 |
20140267130 | HOVER GESTURES FOR TOUCH-ENABLED DEVICES - Various embodiments herein provide for a method of receiving user input on a touch screen. A hover gesture can be detected and an action performed in response to the detection. The hover gesture can occur without a user physically touching a touch screen. Instead, the user's finger or fingers can be positioned at a spaced distance above the touch screen. The touch screen can detect that the user's fingers are proximate to the touch screen, such as through capacitive sensing. Additionally, finger movement can be detected while the fingers are hovering. | 09-18-2014 |
20140337804 | SYMBOL-BASED DIGITAL INK ANALYSIS - Techniques are described for automatically performing application-specific actions based on global pre-defined symbols entered using digital ink. For example, a computing device supporting digital ink input can receive digital ink content from a user (e.g., via a digitizer and/or touchscreen), process the digital ink input to recognize text and/or graphical content, determine whether global pre-defined symbols are present in the recognized text and/or graphical content, and perform application-specific actions associated with the global pre-defined symbols that are present. The application-specific actions can be associated with built-in and/or third-party applications. | 11-13-2014 |
20140354553 | AUTOMATICALLY SWITCHING TOUCH INPUT MODES - Techniques are described for automatically determining a touch input mode for a computing device. The computing device can detect whether touch is being performed by a user's finger or by an object. The computing device can then enable a different interaction model depending on whether a finger or an object is detected. For example, the computing device can automatically switch to a finger touch input mode when touch input is detected using the user's finger, and automatically switch to an object touch input mode when touch input is detected using an object. The finger touch input mode can perform user interface manipulation. The object touch input mode can perform input using digital ink. Different feedback models can be provided depending on which touch input mode is currently being used. | 12-04-2014 |
20150089419 | PRESENTATION OF A CONTROL INTERFACE ON A TOUCH-ENABLED DEVICE BASED ON A MOTION OR ABSENCE THEREOF - Techniques are described herein that are capable of causing a control interface to be presented on a touch-enabled device based on a motion or absence thereof. A motion, such as a hover gesture, can be detected and the control interface presented in response to the detection. Alternatively, absence of a motion can be detected and the control interface presented in response to the detection. A hover gesture can occur without a user physically touching a touch screen of a touch-enabled device. Instead, the user's finger or fingers can be positioned at a spaced distance above the touch screen. The touch screen can detect that the user's fingers are proximate to the touch screen, such as through capacitive sensing. Additionally, finger movement can be detected while the fingers are hovering to expand the existing options for gesture input. | 03-26-2015 |
20150199101 | INCREASING TOUCH AND/OR HOVER ACCURACY ON A TOUCH-ENABLED DEVICE - Techniques are described herein that are capable of increasing touch and/or hover accuracy on a touch-enabled device. For example, attribute(s) of a hand or a portion thereof (e.g., one or more fingers) may be used to determine a location on a touch screen to which a user intends to point. Such attribute(s) may be derived, measured, etc. For instance, a value corresponding to a distance between the hand/portion and the touch screen may be derived from a magnitude of a measurement of an interaction between the hand/portion and the touch screen. In another example, virtual elements displayed on the touch screen may be mapped to respective areas in a plane that is parallel (e.g., coincident) with the touch screen. In accordance with this example, receiving a touch and/or hover command with regard to an area in the plane may indicate selection of the corresponding virtual element. | 07-16-2015 |