Feeds

Microsoft's muscle-interface patent gets under your skin

Computers get really personal

Secure remote control for conventional and virtual desktops

Microsoft boffins have applied for patents that could let you control computer-based devices using electronic impulses from your muscles rather than fiddling with your fingers.

The company's research division has devised what it called a "Wearable Electromyography-Based Controller" that reads and understands electrical signals generated by movement in your muscles, to do things like change tracks on your music player or open your computerized car's locked door remotely.

Microsoft has applied for two patents, published by the US Patent and Trademark Office on December 31: one for the controller, and another for a system that recognizes gestures from EMG signals.

Microsoft Research demonstrated the controller in a video here, where users are unable to use their fingers properly to control or even use a device because they are either on the move or have their hands full.

Also, demonstrated is a wicked riff on Guitar Hero played air-guitar style with the player wearing just the controller and dispensing with the standard WiFi handset.

The EMG controller demonstrated uses a series of wires that are stuck Borg-like to the surface of the skin on the forearm. A wireless interface has also been built.

According to Microsoft's patent, the wearable controller decodes electrical signals produced by human muscular activity using surface Electromyography (sEMG) sensors.

"The resulting electrical signals provide a muscle-computer interface for use in controlling or interacting with one or more computing devices or other devices coupled to a computing device," the patent read.

The technology and patent applications, reveled by TechFlash, come from the branch of Microsoft that gave us Surface, the Windows-based table that responds to touch and gesture input from different people simultaneously. The EMG work comes as Microsoft has been building Natal, the company's answer to Nintendo's Wii that dispenses with a handset controller for wireless and motion-based interaction with Xbox games.

You seen see both patents here and here. ®

Beginner's guide to SSL certificates

More from The Register

next story
Xperia Z3: Crikey, Sony – ANOTHER flagship phondleslab?
The Fourth Amendment... and it IS better
Don't wait for that big iPad, order a NEXUS 9 instead, industry little bird says
Google said to debut next big slab, Android L ahead of Apple event
Microsoft to enter the STRUGGLE of the HUMAN WRIST
It's not just a thumb war, it's total digit war
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Netscape Navigator - the browser that started it all - turns 20
It was 20 years ago today, Marc Andreeesen taught the band to play
A drone of one's own: Reg buyers' guide for UAV fanciers
Hardware: Check. Software: Huh? Licence: Licence...?
The Apple launch AS IT HAPPENED: Totally SERIOUS coverage, not for haters
Fandroids, Windows Phone fringe-oids – you wouldn't understand
Apple SILENCES Bose, YANKS headphones from stores
The, er, Beats go on after noise-cancelling spat
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.