Feeds

Apple rethinks battery bondage

Patents ponder portable power packs

High performance access to file storage

Three Apple patent applications have surfaced indicating the company may be rethinking its policy of using non-user-serviceable batteries in its mobile devices.

One of the applications describes a "host machine" - looking much like an iMac in the accompanying drawings - that has battery-charging slots built into its body.

A second describes how the host machine could communicate wirelessly with mobile devices to monitor their battery power, notify users when it was time for a charge, and talk with other host machines about the state of the batteries it's servicing.

A third describes a "intelligent universal rechargeable batteries" with pop-off end-caps that allow "battery chemicals" to be swapped out when they've reached the end of their productive lives.

Apple battery-patent schematic

Your Mac may someday double as a pricey battery charger

These filings, if implemented in future products, would be a 180-degree about-face for Apple's burgeoning battery bondage.

Beginning with the iPod, Apple has increasingly sealed its batteries inside its mobile devices. Today, only the MacBook and 15-inch MacBook Pro have user-serviceable batteries. The entire iPod line, iPhone, 17-inch MacBook Pro, and MacBook Air all have their batteries locked inside. They require either a warranty-busting case-cracking or the ministrations of an authorized service technician for replacement.

But these filings point to a day when an assortment of different-sized batteries could be popped into the aforementioned host machine to be charged, then swapped into and out of a broad range of mobile devices, including mice, keyboards, speakers, mp3 players, personal digital assistants, cell phones, laptop computers, microphones, headphones, and headsets.

The filings also describe how a magnetic field produced by either the host machine or the mobile device could flip an internal switch within a battery, so that the battery would only provide power to a matching device.

Apple go on to mention inductive charging, which eliminates the need for metal-to-metal charging contacts. This is familiar to anyone who has used an electric toothbrush. And the company touches on secondary power sources that could take over when a battery has either run down or been removed.

All of the components in this battery system - a network of host machines, mobile devices, and batteries - could communicate with one another about their power needs, charge levels, and available fresh batteries, letting other devices know when they've got power to spare, sharing information about which host machine has what batteries available, and warning devices when their batteries are either running down or in need of new "battery chemicals."

Apple battery patent schematic

Even batteries themselves could become user-upgradeable

Host machines on the cooperative network could maintain "a record of charging histories" of each of the rechargeable batteries used by the devices communicating with the network and automatically reset those histories when a battery is upgraded with new innards.

Of course, patent filing aren't reliable indications of future products. At minimum, though, these three filings indicate that there may be some debate among the Apple corps about which tack its battery technology should take: multiple intelligent, swappable, refillable, communicative, and user-serviceable power packs or batteries imprisoned in the devices they power.

We support battery freedom. ®

High performance access to file storage

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.