Abstract:
Se describe el uso de un dispositivo de identificación biométrico en un sistema de computadora de cliente para tener acceso subsecuente a un sistema de autenticación, el cual incluye recibir datos de muestra biométricos que están digitalmente firmados y combinar los datos con una ID y PIN de usuario. Este paquete de datos después es transmitido con seguridad a un servidor de coincidencia biométrico para validar al usuario y la muestra biométrica. Una vez validado, el servidor de coincidencia biométrico regresa el paquete de datos más un certificado temporal y un par de clave pública/privada a la computadora de cliente. La computadora de cliente después puede utilizar esta información para tener acceso a un sistema de autenticación para ganar acceso subsecuente a un recurso seguro.
Abstract:
Se describen técnicas de algoritmo de fusión de sensor. En una o más modalidades, los comportamientos de un dispositivo anfitrión y dispositivos de accesorio se controlan basándose en una orientación del dispositivo anfitrión y dispositivos de accesorio, con relación entre sí. Una posición y/u orientación espacial combinadas para el dispositivo anfitrión pueden obtenerse basándose en medidas incompletas que se obtienen desde al menos dos diferentes tipos de sensores. Además, se evalúa una posición y/u orientación espacial para un dispositivo de accesorio utilizando uno o más sensores del dispositivo de accesorio. Una orientación (o posición) del dispositivo de accesorio con relación al dispositivo de cómputo anfitrión entonces puede calcularse basándose en la posición/orientación espacial combinadas para el dispositivo de cómputo anfitrión y la posición/orientación espacial evaluada para el dispositivo de accesorio. La orientación relativa que se calcula entonces puede utilizarse en varias formas para controlar comportamientos del dispositivo de cómputo anfitrión y/o dispositivo de accesorio.
Abstract:
Use of a biometric identification device in a client computer system to subsequently access an authentication system includes receiving biometric sample data which is digitally signed and combining the data with a user ID and PIN. This package of data is then securely transmitted to a biometric matching server to validate the user and the biometric sample. Once validated, the biometric matching server return the data package plus a temporary certificate and a public/private key pair to the client computer. The client computer may then use this information to access an authentication system to subsequently gain access to a secure resource.
Abstract:
A pressure sensitive keyboard includes multiple pressure sensors associated with the keys of the keyboard. In response to pressure applied to one or more keys of the keyboard, a determination is made as to whether the pressure applied is a key strike (a user selection of a key). Various different factors can be used in determining whether the pressure applied is a key strike, such as the amount of the pressure applied, a rate at which the pressure is applied, a number of keys to which pressure is applied, when the pressure is applied relative to previous key strikes, and so forth.
Abstract:
Various embodiments of systems and methods to implement a context-based state change for an adaptive input device are provided. For example, a method is disclosed that may include receiving a state input indicating a change in a system state, changing adaptive input device data in response to the state input, the adaptive input device data including one or more of image data or adaptive input device mapping data, and adjusting an adaptive input device display state using the adaptive input device data. Adjusting the adaptive input device display state may include one or more of displaying the image data on an adaptive input device display or adjusting an adaptive input device mapping state according to the adaptive input device mapping data.
Abstract:
Use of a biometric identification device in a client computer system to subsequently access an authentication system includes receiving biometric sample data which is digitally signed and combining the data with a user ID and PIN. This package of data is then securely transmitted to a biometric matching server to validate the user and the biometric sample. Once validated, the biometric matching server return the data package plus a temporary certificate and a public/private key pair to the client computer. The client computer may then use this information to access an authentication system to subsequently gain access to a secure resource.
Abstract:
Pressure sensitive key techniques are described. In one or more implementations, a device includes at least one pressure sensitive key having a flexible contact layer spaced apart from a sensor substrate by a spacer layer, the flexible contact layer configured to flex responsive to pressure to contact the sensor substrate to initiate an input, for a computing device, associated with the pressure sensitive key. At least one of the flexible contact layer or the sensor substrate are configured to at least partially normalize an output resulting from pressure applied at a first location of the flexible contact layer with an output resulting from pressure applied at a second location of the flexible contact layer that has lesser flexibility than the first location.
Abstract:
Techniques for device camera angle are described. In one or more implementations, a camera is mounted in a computing device at an angle based on an orientation of the computing device. For example, when the computing device is positioned on a surface and at an angle to the surface (such as when supported by a kickstand), the mounting angle of the camera is such that an optical axis of the camera points forward, and not towards the surface. In at least some implementations, a computing device includes a camera that is physically adjustable to support different orientations of the computing device. In at least some implementations, images that are captured via a camera on a computing device can be manipulated based on an orientation of the computing device.
Abstract:
Sensor fusion algorithm techniques are described. In one or more embodiments, behaviors of a host device and accessory devices are controlled based upon an orientation of the host device and accessory devices, relative to one another. A combined spatial position and/or orientation for the host device may be obtained based on raw measurements that are obtained from at least two different types of sensors. In addition, a spatial position and/or orientation for an accessory device is ascertained using one or more sensors of the accessory device. An orientation (or position) of the accessory device relative to the host computing device may then be computed based on the combined spatial position/orientation for the host computing device and the ascertained spatial position/orientation for the accessory device. The relative orientation that is computed may then be used in various ways to control behaviors of the host computing device and/or accessory device.
Abstract:
Input device assembly techniques are described. In one or more implementations, an input device includes a key assembly including a plurality of keys that are usable to initiate respective inputs for a computing device, a connection portion configured to be removably connected to the computing device physically and communicatively to communicate signals generated by the plurality of keys to the computing device, a flexible hinge that physically connects the connection portion to the key assembly, and an outer layer that is configured to cover the plurality of keys of the key assembly, form an outer surface of the flexible hinge, and is secured to the connection portion such that the outer layer wraps around at least two sides of the connection portion.