Feeds

Apple seeks patent for keyboard that sucks

Or blows. Or both

High performance access to file storage

Apple has applied for a patent that describes a novel method for improving the tactile feedback of ultra-thin keyboards: each key emits a puff of air when either approached or touched, and can be pneumatically sucked downward in response to touch.

When we discovered patent application number 20110107958, "Input devices and methods of operation", we checked to see if it had been filed on April 1. Nope: it was filed on November 12, 2009, and published this Thursday.

We also checked out the bona fides of the lead inventor, Aleksandar Pance. He appears legit, having filed 18 patents for Apple since late 2008, mostly focused on input devices.

Apple patent illustration: a keyboard that blows and sucks

As your finger approaches, a puff of air is released to add to tactile feedback and a vacuum pulls the key downward

But the filing itself? Well, that's another matter. It does address a legitimate concern – the fact that thin keyboards with limited key travel can provide less-than-satisfactory user experience – but a keyboard that blows and sucks? Color us unconvinced.

Still, the embodiments – "examples", in patentese – described in patent application 20110107958 are ingenious. In one, proximity sensors detect an approaching fingertip, and emit a puff of air "through openings in a key surface, or through openings adjacent the key assembly."

Another embodiment senses an approaching finger and applies air pressure to the space below the key, causing it to more strongly resist the finger's advance.

Still another embodiment sucks the key downward when it is depressed, causing it to be "thus pneumatically pulled away from the user," with the desired effect being to "provide the user with the impression of a longer keystroke than is actually present."

Apple patent illustration: a keyboard that blows and sucks

In this embodiment, the keyboard merely sucks – the key down into its housing, that is

The application also describes a number of different embodiments that combine blowing and sucking in various combinations, ways to regulate the amount of air pressure used to enhance key resistance, and proximity and contact sensors using capacitance or optical sensing.

Nowhere in the filing, however, is a discussion of how all this keystroke-enhancing technology can be fit into a keyboard without making it bulkier than it would be otherwise, even though the solutions it proposes are specifically targeted at enhancing tactile feedback in low-profile devices. ®

SANS - Survey on application security programs

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Number crunching suggests Yahoo! US is worth less than nothing
China and Japan holdings worth more than entire company
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.