摘要:
In one or more embodiments, one or more systems, methods, and/or processes may provide low power state entry signals to multiple devices of an information handling system. After providing the low power state entry signals to the multiple devices, the one or more systems, methods, and/or processes may receive a first status signal from a first device of the multiple devices within an amount of time; may determine that the first status signal from the first device was received within the amount of time; may determine that a second status signal from a second device of the multiple devices was not received within the amount of time; may log that the first status signal from the first device was received within the amount of time; and may log that the second status signal from the second device was not received within the amount of time.
摘要:
A computer-implemented method provides power to a fingerprint reader while the remaining components of the information handling system are held in a low power, non-operating state. Placement of a finger across the fingerprint reader is detected with the information handling system in the non-operating state. A fingerprint is read and a corresponding fingerprint image is generated. The fingerprint image is buffered and an embedded controller is triggered to start an authentication device having a secure storage. The fingerprint image is compared to a fingerprint template contained in the secure storage. In response to the fingerprint image matching the fingerprint template, the authentication device signals the embedded controller to activate a user authenticated wake-up cycle to provide power to the other components of the information handling system such that the information handling system activates an operating system and enters a fully powered and user authenticated, operational state.
摘要:
A computer-implemented method provides power to a fingerprint reader while the remaining components of the information handling system are held in a low power, non-operating state. Placement of a finger across the fingerprint reader is detected with the information handling system in the non-operating state. A fingerprint is read and a corresponding fingerprint image is generated. The fingerprint image is buffered and an embedded controller is triggered to start an authentication device having a secure storage. The fingerprint image is compared to a fingerprint template contained in the secure storage. In response to the fingerprint image matching the fingerprint template, the authentication device signals the embedded controller to activate a user authenticated wake-up cycle to provide power to the other components of the information handling system such that the information handling system activates an operating system and enters a fully powered and user authenticated, operational state.
摘要:
A docking station connects through a docking port and docking cable with an information handling system to support communication between the information handling system and docking station peripherals. On initial interface, one data lane of the docking port establishes a temporary management interface, such as an I2C management bus, to configure the docking station. After configuration, a docking manager, virtual wireless access point and power block cooperate to assign data lanes of the docking port and wireless communication resources to information transfer and power transfer functions based upon processing and communication tasks performed at the information handling system.
摘要:
A computer-implemented method provides power to a fingerprint reader while the remaining components of the information handling system are held in a low power, non-operating state. Placement of a finger across the fingerprint reader is detected with the information handling system in the non-operating state. A fingerprint is read and a corresponding fingerprint image is generated. The fingerprint image is buffered and an embedded controller is triggered to start an authentication device having a secure storage. The fingerprint image is compared to a fingerprint template contained in the secure storage. In response to the fingerprint image matching the fingerprint template, the authentication device signals the embedded controller to activate a user authenticated wake-up cycle to provide power to the other components of the information handling system such that the information handling system activates an operating system and enters a fully powered and user authenticated, operational state.
摘要:
An intelligent imaging device determines an occlusion of a shutter mechanism. The shutter mechanism opens to expose light to an image sensor, and the shutter mechanism closes to block the light from entering the image sensor. However, as the shutter mechanism transitions between full open and full close, the shutter mechanism is partially open and exposing the light to the image sensor. The image sensor continues generating images during these transitions, thus possibly revealing personal/sensitive data. The intelligent imaging device determines the shutter mechanism is partially open by conducting a real time, frame-by-frame content analysis. The intelligent imaging device may then disable an interface to the image sensor to avoid sharing personal/sensitive data. Even if the shutter mechanism is manually operated, the intelligent imaging device implements a visual/audible warning to warn a user that the shutter mechanism is not completely open or closed.
摘要:
An intelligent imaging device determines an occlusion of a shutter mechanism. The shutter mechanism opens to expose light to an image sensor, and the shutter mechanism closes to block the light from entering the image sensor. However, as the shutter mechanism transitions between full open and full close, the shutter mechanism is partially open and exposing the light to the image sensor. The image sensor continues generating images during these transitions, thus possibly revealing personal/sensitive data. The intelligent imaging device determines the shutter mechanism is partially open by conducting a real time, frame-by-frame content analysis. The intelligent imaging device may then disable an interface to the image sensor to avoid sharing personal/sensitive data. Even if the shutter mechanism is manually operated, the intelligent imaging device implements a visual/audible warning to warn a user that the shutter mechanism is not completely open or closed.
摘要:
Power monitor information in an information handling system may be adjusted based on a battery voltage to account for a battery discharge state. The power monitor information may be scaled higher when the battery voltage is low to encourage the system to throttle and decrease power consumption. This adjustment increases the likelihood that the battery remains within safe operating limits.
摘要:
A docking station connects through a docking port and docking cable with an information handling system to support communication between the information handling system and docking station peripherals. On initial interface, one data lane of the docking port establishes a temporary management interface, such as an I2C management bus, to configure the docking station. After configuration, a docking manager, virtual wireless access point and power block cooperate to assign data lanes of the docking port and wireless communication resources to information transfer and power transfer functions based upon processing and communication tasks performed at the information handling system.
摘要:
A lock for an information handling system includes a sensor configured to detect removal of an element from a chassis prior to verification of a user credential, and a plunger that engages the chassis at a first position. A security controller verifies the user credential, and causes the muscle wire to move the plunger from the first position to a second position in response to the verified user credential.