This invention relates generally to docking stations for computing devices, and more specifically to methods and apparatus for altering the configuration and functionality of a computing device based on a location of a docking station in which the computing device is docked.
Many portable computing devices, such as notebook or laptop computers, personal digital assistants (PDAs), cell phones, etc. are designed to be lightweight and compact for ease in transportability. However, the compact and lightweight design of such devices often limits the number and types of peripheral devices that are available to the computing device.
One way to increase the versatility of a portable computing device is couple the computing device to a docking station that provides connections between one or more peripheral devices. A docking station, when connected to a portable computing device, often provides for a number of different types of ports that may not be feasible on a small and lightweight portable device. For example, the docking station may provide one or more ports to drive a large monitor, communicate with various peripherals, provide connection to a network, provide power to the portable device, and so forth.
Docking stations are typically passive devices, providing straight-through connections to a network and other peripheral devices through a matching interface located on the computing device. Thus, a computing device docked at a docking station located at a user's home may provide the same functionality when the same device docked at a docking station located at the user's work office, the only difference being the type and number of peripherals coupled to the docking station at each location.
Thus, it is often left to the user to configure the computing device for use at different locations by accessing or selecting the proper software applications and security measures for the computing device based on the location of the docking station coupled to the device. However, such configuration of the device may be both time-consuming and confusing to a non-sophisticated user. Thus, what is needed is docking station that determines the location of the docking station, and subsequently the computing device coupled to the docking station, and alters the functionality and configuration of the computing device based on the device's location.
One embodiment may take the form of a method for configuring a computing device. The method may include the operations of receiving a location indicator of a docking station coupled to a computing device, selecting a system configuration of the computing device based on the location indicator and altering the functionality of the computing device based on the determined system configuration.
Another embodiment may take the form of a docking station for a computing device. The docking station may include a processor and a machine-readable medium configured to maintain a location indicator that indicates a location of the docking station. In addition, the docking station may include an interface configured to couple to a computing device to provide the location indicator to the computing device such that the computing device alters the functionality of the computing device in response to the location indicator.
Yet still another embodiment may take the form of a system for configuring the functionality of a computing device based on a location. The system may include a computing device and docking station configured to communicate with the computing device such that a functionality of the computing device is selected based on a location indicator provided by the docking station to the computing device.
One particular implementation conforming to aspects of the present invention takes the form of docking station for a computing device, such as a laptop computer or personal digital assistant. In one embodiment, the docking station may be provided with and maintain an indication of a location in which the docking station is located. In another embodiment, the docking station may receive an indication of a location from a computing device or network periodically or when the device or network is coupled to the docking station. The determined location of the docking station may be utilized by the docking station and/or the computing device coupled to the docking station to configure the functionality and other aspects of the computing device when the device is docked.
In one embodiment, the docking station sends a signal to the computing device with an indication of the docking station's location, which typically corresponds to the location of the computing device. In response to the location sent from the docking station, the computing device may be configured in a variety of ways. For example, the functionality of the computing device may be altered in response to the location of the docking station. Additionally, security features, display configurations and the availability of software applications may also be configured in response to the location of the docking station. In this manner, a single computing device may perform the functions of several computing devices based on the location of the docking station in which the computing device is docked, without the need for the user of the device to configure the device manually.
Likewise, the docking station 110 depicted in
Docking stations are often modular by design such that a portable electronic device may dock with a plurality of similar docking stations at different locations. For example, a user may utilize one laptop docking station at the user's work location and another laptop docking station at the user's home, such that the same laptop computer may be accessed by the user when located at either work or home. Thus, the docking stations allow a user access to a computing device at several locations simply by removing the device from a first docking station and docking with another docking station.
In addition, the location of each docking station 202-212 may be such that a separate functionality of the computing device 200 is desired at each location. For example, when docked in a docking station 202 located at a user's work, the user may desire to utilize the computing device 200 as a work-related computer, capable of accessing the user's work emails and work calendar, along with several work-related software programs. When docked in a docking station 204 at home, however, the computing device 200 is most likely utilized as a home computer, possibly accessing the user's personal email accounts, personal calendar, music management software, gaming programs, etc. Thus, in one embodiment of the present disclosure, the functionality of the computing device 200 can be altered based on the location indicator received from the docking station in which the device is docked. In this manner, the operation of manually configuring the computing device 200 as desired by the user may be performed automatically by the computing device or the docking station based on a location indicator provided by the docking station.
As mentioned above, docking stations 202-212 corresponding to a particular computing device 200 may be located in several places. For example, in addition to a work-related docking station 202 and home-related docking station 204, the user may also have a docking station 206 in the user's car, a docking station 210 in a location used for viewing television and—a docking station 208 location intended for an electronic picture frame. Further, a docking station for the computing device 200 may be portable such that the user may carry the docking station to a remote location to interface with one or more computing peripherals at the remote location. Thus, the user may also have a remotely located docking station 212, possibly used during travel. It should be noted that the docking station locations 202-212 discussed above and included in
As mentioned above, each of the docking stations 202-212 in the various locations may maintain or receive an indication of the station's location for the purpose of configuring a computing device 200 coupled to the docking station. Thus, when a computing device 200 is docked with a particular docking station, the location of that docking station may first be transmitted to the computing device. In response to receiving the docking station location, several aspects of the computing device may be configured.
As shown in
Initially, the docking station 300 may receive and/or maintain its location in several ways. This is shown in
Upon receipt, the docking station 300 may store the location in the machine-readable medium 316 of the station such that the location is accessible by the docking station during communication with a computing device 302. In this embodiment, the location provided to the docking station 300 may be maintained by the station until a new location is provided to the station through the configuration mode. Thus, regardless of the physical location of the docking station 300, the location identifier of the station will not change until a new configuration is provided to the station through the operations outlined above. This particular method of configuring the docking station may be useful if a user has two docking stations at a single location that he wishes to use for different computing configurations. Thus, the user may program one docking station to provide a first functionality and a second docking station to provide a second functionality, regardless of the detected position of the docking stations.
In another embodiment, the location of the docking station 300 may be dynamic such that it can change based on the physical location of the docking station. For example, the docking station 300 may receive a new location from a computing device 302 whenever a computing device docks with the station. In this example, the computing device 302 may acquire a location from one or more sources, such as global positioning system (GPS), a network or wi-fi identification or manually from the user. This location is then provided to the docking station 300 whenever the computing device 302 is docked with the station. This particular embodiment may be useful for a portable docking station as the location of the docking station may vary over time.
In yet another embodiment, the docking station 300 may obtain its location from a source other than the computing device 302. For example, the docking station 300 may include a GPS device to determine its location. Alternatively, in those configurations where the docking station 300 is connected to a network, the station may utilize a network interne protocol (IP) address or other identifying measures to determine the location of the docking station. For example, the docking station 300 may connect, either directly through a network connection or wirelessly, to a public network. This network may have an indication of the network's location such that the docking station 300 may determine its location based on the identification of the network. Generally, the docking station 300 may use any method available to a computing device to determine its location. In still another embodiment of the present disclosure, the docking station 300 may use several such methods to determine its location.
Regardless of the methods employed by the docking station 300 to obtain its location, such information may be used by the docking station and the computing device 302 to tailor the functionality and settings of the computing device in response. As shown in
In one embodiment, the computing device 302 sets and controls the various aspects of the device in response to the received location of the docking station 300. In this embodiment, the location of the docking station 304 is passed to the computing device 302 when the device is docked into the station. Once received, the computing device 302 may access a file or look-up table that maintains one or more different configurations of the device based on the location information 304 received from the docking station 300. For example, the docking station 300 may provide a location 304 to the computing device 302 that indicates that the docking station is located in a television viewing area, such as a living room of a user or on an entertainment center. Once the location of the docking station 300 is received, the computing device 302 may determine which configuration matches the received location 304. In this example, the computing device 302 may load a television viewing configuration that facilitates watching television programs through the computing device. Thus, the computing device 302 may automatically load one or more hardware drivers and software applications for viewing television online, as well as activating speakers connected to the docking station 300, among several other features of the computing device that may be loaded or activated upon determination of the location of the device. Generally, several software and hardware aspects of the computing device 302 may be altered or set in response to the received location information 304 of the docking station 300. In addition, any unrecognized location may cause the computing device 302 to load a default configuration, perhaps with expanded security to prevent unauthorized access to the computing device. The various aspects of the computing device that may be altered in response to the determined docking station location are discussed in more detail below with reference to
In another embodiment, the docking station 300 determines the configuration of the docked computing device 302 in response to the determined location. In this example, the processor 314 and machine-readable medium 316 components of the docking station 300 may act in accord to determine the proper configuration for the computing device 302, perhaps by accessing a file or look-up table maintained by the docking station 300. Once the proper configuration and settings are obtained by the docking station 300, such information may be passed to the computing device 302 to alter the settings of the device. Such information may include those communications shown in
In yet another embodiment, the computing device 302 and the docking station 300 may share duties in configuring the computing device in response to the location information 304 of the docking station. For example, the computing device 302 may alter the functionality of the computing device and various other configuration settings while the docking station 300 may control the security settings 308 of the computing device in response to the determined location.
As described herein, the computing device 302 physically docks with the docking station 300 through an interface. However, it is also contemplated that the computing device 302 may dock with the docking station 300 wirelessly. In this embodiment, the computing device 302 and the wireless docking station 300 broadcast communications between the device and the station to wirelessly dock the computing device with the docking station. Thus, as used herein, the term “docking” could be a physical docking of the computing device with the docking station or a wireless docking with a wireless docking station.
Further, the embodiments described herein discuss providing a location to the computing device 302 to alter the configuration of the device. However, any type of information may be provided to the computing device 302 from the docking station 300 to alter the functionality of the device. For example, rather than providing a location, the docking station 300 may provide a configuration suggestion, such as “computer”, “television”, “navigation device”, or the like that directs the computing location to configure certain hardware components and adopt a particular group of settings associated with the configuration suggestions. Alternatively, the docking station 300 may provide a code or other identifier that represents or indicates the suggested configuration to the computing device 302. Still further, the docking station 300 may provide information in addition to the location or configuration code, such as date and time, that may further be used by the computing device 302 to customize and configure the device.
Beginning in operation 400, the docking station detects the docking of a computing device. In the embodiments where the computing device is physically docked with the docking station, this detection may occur when the device is clicked in or otherwise engaged in the docking station. In the embodiments utilizing a wireless docking station, the detection may occur when the computing device is within range of the wireless docking station.
Once detected, the docking station may perform a security check on the computing device in operation 402 to determine if the computing device is authorized to access the docking station. The determination may take the form of a password or identification number of the computing device that is recognized by the docking station. In those situations where the computing device is not authorized or recognized by the docking station, the docking station may refuse to communicate with the computing device. This prevents a foreign computing device from accessing a docking station in an attempt to access the connected peripherals. In another embodiment, the docking station may trigger a lock on the computing device that prevents a user from accessing the device in operation 404 to provide further security. Even stronger security measures may be taken by the computing device and docking station, such as security based on public key cryptography and/or digital signatures. Generally, any computerized security scheme may be employed and utilized with the computing device and docking station.
If the computing device is authorized to access the docking station, then the docking station may determine its location in operation 406. The location of the docking station, and consequently the computing device that is docked with the docking station, may be determined by the computing device and transmitted to the docking station or determined by the docking stations itself in any manner described herein.
Upon determination of the docking station location, the computing device may be configured in response to the determined location in operation 408. As described, several aspects of the computing device may be configured in response to the determined location, including the functionality of the device by activating one or more hardware components and accessing one or more available software programs, the display settings, security measures and many other configuration settings.
Several additional security operations may also be taken once the configuration and location of the computing device is determined. In operation 410, the computing device and/or docking station may determine if the docking station is connected to a network, either through a network connection or wirelessly, and whether the network can be trusted. For example, the computing device may be configured to recognize certain networks, such as a network in use at a user's work location. The work network may be identified by the computing device as a friendly or trusted network in which the computing device is free to communicate over the network. Thus, in operation 412, if it is determined that the network connected to the docking station is trusted, then the computing device settings related to network communicating may be set at a low security level, possibly requiring a simple password to access. However, if the network is not recognized as a secure network, than a separate set of network security measures may be applied to the computing device in operation 414. For example, if the docking station is portable and is connected to a foreign network, such as one in a hotel room, than the docking station may provide such information to the computing device in operation 414 such that the network settings of the computing device is set a higher level. For example, the computing device may provide more warnings to the user during use of the network or prevent the user from accessing certain web sites or network addresses entirely. The additional network security features applied to the computing device in response to the type of network connected to the docking station is just one of several security aspects that can be configured based on the determined location of the docking station.
As mentioned above, the determined location of the docking station may alter many aspects of the docked computing device. For example,
Several operations of this method are discussed above with reference to
In response to the identification of the docking station, several aspects of the computing device are set in response to the docking station providing a work location to the device in operation 510. Generally, the functionality of the computing device is configured into a work-related computer such that the user can utilize the device for work-related activities. In addition, several other aspects of the computing device may also be configured in relation to a work configuration maintained by the device.
For example, certain work-related software applications may be initialized in preparation for use in work-related activities. In addition, an icon for one or more of these applications may be placed on the desktop of the computing device for ease in access by the user. Other applications that are not used during work-related activities may be hidden or deactivated by the computing device. In one particular example, a work-centric email program may be loaded and provided to the user automatically upon the determination of the computing device being docked at a docking station located at work. A work-centric background and other display settings may also be configured at the computing device. In addition, drivers for one or more work-related printers may be loaded and assigned as preferred printers in the work-centric configuration. Several hardware components of the computing device may also be activated in response to the location of the docking station.
Several security measures may also be employed in the work-centric configuration. For example, the computing device may maintain a database of the user's identifications and passwords for various networks within the work environment. These passwords may be accessible by the user in the work-centric configuration, but locked out during other configurations of the computing device. Similarly, the computing device may provide the user with a favorites list of work-related web pages and documents for ease in access during this configuration. Generally, any configurable aspect of a computing device may be configured in response to the docking station location received by the docking station.
An extension of the security measures applied in operation 510 is illustrated in operations 512-516. Similar to
In contrast, the same computing device may be docked in a computer docking station at the user's home, in which the computing device may operate under a home configuration that provides different functionality to the user when the device is docked at work. For example, the display settings, such as background and theme of the computing device may be altered in response to the home setting. In addition, the work-related software applications may be removed from the user's desktop and/or rendered inactive while other more home-centric applications are activated, such as on-line music management applications or gaming applications. Several personal user profiles may also be loaded, such as a preferred private email provider and a list of personal favorite websites of the users. In general, the aspects of the computing device may be altered in response to the user docking the computing device in a docking station at the user's home that are geared towards the user's private computing needs.
In another example, the computing device may be docked in a docking station located in the user's car.
Similar to the above examples, the docking station may first detect the device in operation 602 and determine the computing device is authorized to access the station in operation 604. Several security measures may be activated if the device is not authorized in operation 606. Otherwise, the location of the docking station as being in the user's car is determined in operation 608.
Once the vehicle location is determined, several software applications may be started in response. For example, the computing device may automatically be converted into a navigation device, including GPS functionality with maps and directions. In addition, the computing device may disable the inputs to the computing device and convert into a voice-command only mode so that the user can control the device without removing his hands from the wheel of the vehicle, as shown in operation 612. Other software applications may also be loaded, such as a digital music player or cell phone capabilities of the computing device that the user may use while driving.
Once the television-viewing location is determined, the computing device may automatically be converted into a television viewing system by activating one or more software programs and hardware devices in operation 710. For example, drivers for a television display, sound-systems and other peripheral devices related to television viewing may be activated. In addition, several on-line television websites may be accessed by the computing device to retrieve content for viewing by the user. Multimedia content that may be stored on the computing device may also be accessed and presented to the user or provided on the desktop of the computing device. Generally, any configurable aspect of a computing device that provides a television-viewing experience to a user may be configured in response to the docking station location being a television-viewing location.
Several security measures may also be employed in the television-centric configuration. For example, the computing device may lock one or more inputs to the device to prevent interruption of the multimedia program being viewed. Further, the computing device may require a password to access the device to prevent someone other than the user from accessing the device while it is docked in the docking station. Such security measures may be configured in any number of ways by the computing device.
Once the picture-viewing location is determined, the computing device may automatically be converted into an electronic picture frame by accessing one or more photo catalogs and periodically displaying the photos on the display screen of the computing device, similar to an electronic picture frame. Further, the types of photos selected may be based on information provided to the computing device. For example, a date and time may be passed to the computing device by the docking station. In response, the computing device may select or be directed to select a particular set of photos that corresponds to the date and time. Generally, any information may be used by the computing device to customize the number and types of photos displayed when the computing device accesses an electronic photo docking station.
In addition, the computing device may employ one or more power saving routines if a particular configuration does not require high-volume processing, such as an electronic picture frame configuration. In this configuration, the computing device may run slower to reduce the amount of power used by the device. Other routines may also be employed, such as reducing the amount of storage space utilized by the device and locking out the rest of the hard drive for other storage and uses. When the device is coupled to a different docking station at a separate location, then these routines may be removed such that the computing device may operate at full capacity, depending on the docking station location.
In a similar manner as described above, the computing device may be configured to provide any functionality supported by the device in response to the location of the docking station. For example, the computer could be configured as a desktop computer, handheld computing device, personal digital assistant, mobile telephone, music or audio player (such as an MP3 player), health or medical device, auto/vehicle-mounted device, gaming console, display device, wireless internet access device, backup storage device and so on. Further, each selected configuration may have a particular set of hardware components and software programs that support the underlying functionality of the device that are initialized and/or loaded in response to the setting of the configuration of the computing device. Generally, the computing device may provide any functionality that is supported by the device.
I/O device 930 may also include an input device (not shown), such as an alphanumeric input device, including alphanumeric and other keys for communicating information and/or command selections to the processors 902-906. Another type of user input device includes cursor control, such as a mouse, a trackball, or cursor direction keys for communicating direction information and command selections to the processors 902-906 and for controlling cursor movement on the display device.
System 900 may include a dynamic storage device, referred to as main memory 916, or a random access memory (RAM) or other devices coupled to the processor bus 912 for storing information and instructions to be executed by the processors 902-906. Main memory 916 also may be used for storing temporary variables or other intermediate information during execution of instructions by the processors 902-906. System 900 may include a read only memory (ROM) and/or other static storage device coupled to the processor bus 912 for storing static information and instructions for the processors 902-906. The system set forth in
According to one embodiment, the above techniques may be performed by computer system 900 in response to processor 904 executing one or more sequences of one or more instructions contained in main memory 916. These instructions may be read into main memory 916 from another machine-readable medium, such as a storage device. Execution of the sequences of instructions contained in main memory 916 may cause processors 902-906 to perform the process steps described herein. In alternative embodiments, circuitry may be used in place of or in combination with the software instructions. Thus, embodiments of the present disclosure may include both hardware and software components.
A machine readable medium includes any mechanism for storing information in a form (e.g., software, processing application) readable by a machine (e.g., a computer). Such media may take the form of, but is not limited to, non-volatile media and volatile media. Non-volatile media includes optical or magnetic disks. Volatile media includes dynamic memory, such as main memory 916. Common forms of machine-readable medium may include, but is not limited to, magnetic storage medium (e.g., floppy diskette); optical storage medium (e.g., CD-ROM); magneto-optical storage medium; read only memory (ROM); random access memory (RAM); erasable programmable memory (e.g., EPROM and EEPROM); flash memory; or other types of medium suitable for storing electronic instructions.
It should be noted that the flowcharts of
The foregoing merely illustrates certain principles and embodiments of the invention. Various modifications and alterations to the described embodiments will be apparent to those skilled in the art in view of the teachings herein. It will thus be appreciated that those skilled in the art will be able to devise numerous systems, arrangements and methods which, although not explicitly shown or described herein, embody the principles of the invention and are thus within the spirit and scope of the present invention. From the above description and drawings, it will be understood by those of ordinary skill in the art that the particular embodiments shown and described are for purposes of illustrations only and are not intended to limit the scope of the present invention. References to details of particular embodiments are not intended to limit the scope of the invention.
This application is a Continuation application which claims priority to Non-Provisional application Ser. No. 12/650,870, filed Dec. 31, 2009, titled “LOCATION-BASED DOCK FOR A COMPUTING DEVICE”, which is hereby incorporated by reference in its entirety for all purposes.
Number | Date | Country | |
---|---|---|---|
Parent | 12650870 | Dec 2009 | US |
Child | 15150173 | US |