Feeds

Apple patents touch-sensitive controls for MacBook

Boffins break out bezel button blueprints

Internet Security Threat Report 2014

Apple has filed for a patent on a system which places the controls for a notebook computer within the outer bezel of the screen.

Patent number 8,654,524, published Tuesday, describes a set of systems in which sensors are placed in both the casing and outer screen bezel (the black box around the outside of the display) allowing for the implementation of controls and buttons.

Under such a system, Apple could create a notebook that uses sensors on the casing and acreen itself to operate as input devices for the system, adding additional controls without creating the need for additional real estate on the device.

"In one embodiment, an electronic device includes a housing configured to function as an integrated housing and I/O device and one or more sensors obscured by a wall of the housing," Apple writes in the patent document.

"The one or more sensors may be configured to sense inputs, such as through a touch or via the wall of the housing."

The application goes on to further describe integration with proximity sensors and peripheral devices, outlining a system to identify ports and suggest which cables should be used. In addition to touch, the system could recognize gestures such as multiple taps or squeezes to control different activities.

The patent appears to suggest new ways for Apple to place controls and buttons within its devices without needing to add actual hardware buttons. Such a minimalist approach has been a hallmark of Apple devices since the introduction of the iPhone in 2007.

It always bears noting that patent filings are just that: filings describing a theoretical product. The technology may or may not ever be implemented by Apple in a prototype device, let alone integrated into a final product from the company. As such, the patent should hardly be seen as a preview of coming technologies.

Still, bezel-mounted controls could provide an extremely practical and useful way to implement shortcuts and specific controls for applications in future versions of OS X which implement iOS style features.

Recent Apple patent applications and granted patents have ranged from the practical (an application for facial recognition for device log-in) to the more esoteric (a patent granted for mood-sensing technology), and have described a full range of hardware and software platforms. ®

Internet Security Threat Report 2014

More from The Register

next story
Hi-torque tank engines: EXTREME car hacking with The Register
Bentley found in a hedge gets WW2 lump insertion
What's MISSING on Amazon Fire Phone... and why it WON'T set the world alight
You fought hard and you saved and earned. But all of it's going to burn...
Trousers down for six of the best affordable Androids
Stylish Googlephones for not-so-deep pockets
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
prev story

Whitepapers

Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.