-
公开(公告)号:PH12014501792A1
公开(公告)日:2014-11-24
申请号:PH12014501792
申请日:2014-08-07
Applicant: MICROSOFT CORP
Inventor: PEREK DAVID R , SCHWAGER MICHAEL A , SHARON DRASNIN , SEILSTAD MARK J , MANOHAR DIGHDE RAJESH , CADY ANDREW N , MAURICE SCHULTZ BERNARD , OTTO WHITT III DAVID , SCHNEIDER SUMMER L , KABIR SIDDIQUI , TOM BELESIU JIM , ALEC ISHIHARA JAMES , HUA WANG , RALF GROENE , HARRY STOUMBOS CHRISTOPHER , LAWRENCE PELLEY JOEL , SCOTT KASSELS JAY , PETER SPOONER RICHARD , SHAW TIMOTHY C , DAVID MICKELSON MATTHEW , KARSTEN AAGAARD , ROB HUALA , HENRY DIETZ PAUL , MATHIAS DENNIS J , VANDERVOORT DAVID C , DAVID PLEAKE TODD , LUTZ MOSHE R , MITCHEL MAIL SCOTT , WHITMAN CHRISTOPHER A , JOSEPH WAHL ERIC , REED MCLAUGHLIN ROBYN REBECCA , WISE JAMES H , CAMILO LEON , CHARLES OLIVER THOMAS , WINSTON OLER VAN , HIROO UMENO , CHRISTIAN REED ANTHONY , ALEXANDER CUMMINGS STEPHAN , JENSEN DARRYL I , PANAY PANOS C , HAKON STRANDE , BENG GOH CHUN , MANTOOTH HAROLD F , CHARLES MARSHALL JAMES , PEDERSEN MATTHEW G , YOUNG ROBERT D , SHERMAN NATHAN C , GIBSON SCOTT K , AARON SYKES SHANE , LANE DAVID M , ROBERT OBIE GENE , GIAIMO III EDWARD C , DAVID NEFF , SOUSA JOSE R
IPC: G06F3/00
Abstract: Sensor fusion algorithm techniques are described. In one or more embodiments, behaviors of a host device and accessory devices are controlled based upon an orientation of the host device and accessory devices, relative to one another. A combined spatial position and/or orientation for the host device may be obtained based on raw measurements that are obtained from at least two different types of sensors. In addition, a spatial position and/or orientation for an accessory device is ascertained using one or more sensors of the accessory device. An orientation (or position) of the accessory device relative to the host computing device may then be computed based on the combined spatial position/orientation for the host computing device and the ascertained spatial position/orientation for the accessory device. The relative orientation that is computed may then be used in various ways to control behaviors of the host computing device and/or accessory device.