Language selection

Search

Patent 2309868 Summary

Third-party information liability

Some of the information on this Web page has been provided by external sources. The Government of Canada is not responsible for the accuracy, reliability or currency of the information supplied by external sources. Users wishing to rely upon this information should consult directly with the source of the information. Content provided by external sources is not subject to official languages, privacy and accessibility requirements.

Claims and Abstract availability

Any discrepancies in the text and image of the Claims and Abstract are due to differing posting times. Text of the Claims and Abstract are posted:

  • At the time the application is open to public inspection;
  • At the time of issue of the patent (grant).
(12) Patent Application: (11) CA 2309868
(54) English Title: CYBERNETIC KEYER FOR TRANSMITTING OR ENTERING SYMBOLS OF A DISCRETE ALPHABET INTO A DEVICE SUCH AS A WEARABLE COMPUTER OR PORTABLE INFORMATION PROCESSOR
(54) French Title: MANIPULATEUR CYBERNETIQUE POUR L'EMISSION DE SYMBOLES D'UN ALPHABET DISCRET OU L'ENTREE DE CES SYMBOLES DANS UN DISPOSITIF TEL QU'UN ORDINATEUR VETEMENT OU UN PROCESSEUR D'INFORMATION PORTATIF
Status: Deemed Abandoned and Beyond the Period of Reinstatement - Pending Response to Notice of Disregarded Communication
Bibliographic Data
(51) International Patent Classification (IPC):
  • G06F 3/02 (2006.01)
(72) Inventors :
  • MANN, STEVE (Canada)
(73) Owners :
  • STEVE MANN
(71) Applicants :
  • STEVE MANN (Canada)
(74) Agent:
(74) Associate agent:
(45) Issued:
(22) Filed Date: 2000-05-30
(41) Open to Public Inspection: 2000-12-29
Examination requested: 2000-05-30
Availability of licence: N/A
Dedicated to the Public: N/A
(25) Language of filing: English

Patent Cooperation Treaty (PCT): No

(30) Application Priority Data:
Application No. Country/Territory Date
09/421937 (United States of America) 1999-10-21
09/422559 (United States of America) 1999-10-21
2,275,784 (Canada) 1999-06-29
2,275,798 (Canada) 1999-06-29
2,280,022 (Canada) 1999-07-28
2,280,420 (Canada) 1999-08-12
2,280,425 (Canada) 1999-08-16
CA2275784 (United States of America) 1999-06-29
CA2275798 (United States of America) 1999-06-29
CA2280022 (United States of America) 1999-07-28
CA2280420 (United States of America) 1999-08-12
CA2280425 (United States of America) 1999-08-16

Abstracts

English Abstract


A handheld keyer, suitable for sending code, transmitting messages, or
entering
data into a body-worn computer, or the like, is described. The keyer comprises
a plurality of switches actuable in various combinations, such that, with a
small
number of switches, a large number of chords are possible, a chord being
defined
as a combination of closings and openings of one or more switches. Because of
the
numerous chords that can be generated, multiple chords can be assigned to the
same
symbol. Therefore, the choice of chord can be made based on a chord
progression
that makes data entry easier, more efficient, and less repetitious. The keyer,
in the
preferred embodiment, is operable while doing other things such as jogging,
running
up and down stairs, or the like. It can also be used to secretly type messages
into a
wearable computer, or to a remote entity, while standing and conversing with
other
people in a natural manner.
34


Claims

Note: Claims are shown in the official language in which they were submitted.


WHAT I CLAIM AS MY INVENTION IS:
1. A cybernetic keyer for communication, data entry, or the like, comprising:
~ a plurality of sensors;
~ a processor responsive to an output from each of said plurality of sensors,
said processor for ranking at least one measurable aspect of each of said
sensors,
when at least some of said sensors are activated, said processor producing an
output responsive to:
~ which of said sensors are activated;
~ the relative ranking of said some of said sensors.
2. A cybernetic keyer for communication, data entry, or the like, comprising:
~ a plurality of sensors;
~ a processor responsive to an output from each of said plurality of sensors,
said processor ranking at least one measurable aspect of each of said sensors,
when at least some of said sensors are activated, said cybernetic keyer
producing
an output character from a discrete alphabet of possible output characters,
said
output character responsive to:
~ which of said sensors are activated;
~ the relative ranking of said some of said sensors.
3. The cybernetic keyer of one of claims 1 or 2, said at least one measurable
aspect
of each of said sensors being the order in which said sensors are pressed.
4. The cybernetic keyer of one of claims 1 or 2, said at least one measurable
aspect
of each of said sensors being the order in which said sensors are released.
25

5. The cybernetic keyer of one of claims 1 or 2, said at least one measurable
aspect
of each of said sensors being the velocity with which said sensors are
pressed.
6. The cybernetic keyer of claim 5, said sensor being a double throw switch,
said
velocity measured as a time interval from when a common contact leaves a
contact point at one throw of said switch, and meets another contact point at
another throw of said switch.
7. The cybernetic keyer of one of claims 1 or 2, said at least one measurable
aspect
of each of said sensors being the force applied to each of said sensors.
8. The cybernetic keyer of one of claims 1 or 2, said at least one measurable
aspect
of each of said sensors being the earliness in which said sensors are
activated.
9. The cybernetic keyer of claim 1, said processor ranking at least two
measurable
aspects of each of said sensors.
10. The cybernetic keyer of claim 9, one of said at least two measurable
aspects
of each of said sensors being the order in which said sensors are pressed, and
another of said at least two measurable aspects of each of said sensors being
the
order in which said sensors are released.
11. A cybernetic keyer for communication; data entry, or the like, comprising:
~ at least three sensors;
~ a processor responsive to an output from each of said at least three
sensors,
said processor for ranking at least one measurable aspect of at least two of
said
sensors when said at least two of said sensors are activated, said cybernetic
keyer producing an output character responsive to:
~ which two or more said sensors are activated;
~ the relative ranking of said two or more sensors.
26

12. A cybernetic keyer for communication, data entry, or the like, comprising:
~ at least two sensors;
~ a processor responsive to an output from each of said sensors,
said processor for ranking at least one measurable aspect of said sensors when
said sensors are both activated during the same time interval, said cybernetic
keyer producing an output character responsive to relative ranking of said
measurable aspect.
13. A cybernetic keyer for communication, data entry, or the like, comprising:
~ at least two sensors, numbered S0 and S1;
~ a processor responsive to an output from each of said sensors,
said processor for ranking at least one measurable aspect of said sensors when
said sensors are activated during an overlapping time interval, said
cybernetic
keyer producing an output character responsive to relative ranking of said
measurable aspect, said keyer providing a unique output symbol for each of the
following manners in which the same two sensors are activated:
~ said measurable aspect of S0 is greater than that of S1 by at least W1;
~ said measurable aspect of S1 is greater than that of S0 by at least W0;
~ said measurable aspect of S0 and S1 are within a tolerance of W0 or W1
of one another.
14. A cybernetic keyer for communication, data entry, or the like,comprising:
~ at least two switches, numbered S0 and S1;
~ a processor responsive to an output from each of said switches,
27

said keyer providing at least three different output symbols when S0 and S1
are
both pressed only once during an overlapping time interval, said at least
three
different output symbols each corresponding to the following situations:
~ switch S0 is pressed before switch S1 by at least a positive constant W;
~ switch S1 is pressed before switch S0 by at least said positive constant W;
~ switch S0 and S1 are pressed within a time tolerance of W of one another.
15. A cybernetic keyer for communication, data entry, or the like, comprising:
at least two switches;
~ a processor responsive to an output from each of said switches,
said keyer providing at least two different output symbols when the switches
are
pressed only once during an overlapping time interval, said at least two
different
output symbols each corresponding at least two of the following situations:
~ switch S0is released before switch S1 by at least a positive constant W;
~ switch S1 is released before switch S0 by at least said positive constant W;
~ switch S0 and S1 are released within a time tolerance of W of one another.
16. A cybernetic keyer for communication, data entry, or the like, comprising:
~ at least two switches;
~ a processor responsive to an output from each of said switches,
said keyer providing at least two different output symbols when the switches
are
pressed only once during an overlapping time interval, said at least two
different
output symbols each corresponding to the following situations:
~ switch S0 is released before switch S1;
~ switch S1 is released before switch S0.
28

17. A cybernetic keyer for communication, data entry, or the like, comprising:
~ a plurality of sensors;
~ a processor responsive to an output from each of said sensors,
said processor for ranking at least one measurable aspect of some of said
sensors
activated with overlapping time intervals, said cybernetic keyer producing an
output character responsive to relative ranking of said measurable aspect.
18. A cybernetic keyer for communication, data entry, or the like, comprising:
~ a plurality of sensors;
~ a processor responsive to an output from each of said sensors,
said keyer producing an output symbol in response to activated sensors, said
processor responsive to an Attack of a first activated sensor, a. Close of a
last
activated sensor, a Release of a first unactivated sensor, and an Open of a
last
unactivated sensor, said symbol depending on at least three of the following:
~ which of said sensors is said first activated sensor;
~ which of said sensors is said last activated sensor;
~ which of said sensors is said first unactivated sensor;
~ which of said sensors is said last activated sensor.
19. A cybernetic keyer for communication, data entry, or the like, comprising:
~ a plurality of sensors;
~ a processor responsive to an output from each of said sensors,
said keyer producing an output symbol in response to activated sensors, said
processor, for at least four of the possible output symbols that can be
generated
by said keyer, responding to an Attack of a first activated sensor, a Close of
a
29

last activated sensor, a Release of a first unactivated sensor, and an Open of
a
last unactivated sensor, said output symbol depending on at least three of the
following:
~ which of said sensors is said first activated sensor;
~ which of said sensors is said last activated sensor:
~ which of said sensors is said first unactivated sensor;
~ which of said sensors is said last activated sensor.
20. A cybernetic keyer for communication, data entry, or the like, comprising:
~ a plurality of sensors;
~ a processor responsive to an output from each of said sensors,
said keyer producing an output symbol in response to activated sensors, said
processor, for at least four of the possible output symbols that can be
generated
by said keyer, responding to at least one of:
~ an ARPA stage when at least two of said sensors are activated;
~ an APRA stage when at least two of said sensors are unactivated.
21. The cybernetic keyer of one of claims 19, or 20, where said keyer produces
the symbols PLAY, STOP, Fast Forward (FF), REWIND (REW), RECORD
(REC), and PAUSE.
22. The cybernetic keyer of claim 21 where said four symbols are Fast Forward
(FF); REWIND (REW), RECORD (REC), and PAUSE.
23. A cybernetic keyer for communication, data entry, or the like, comprising:
~ a plurality of sensors, numbering N;
~ a processor responsive to an output from each of said sensors,
30

said keyer producing <IMG> distinct chords, said <IMG> distinct.
chords being redundantly mapped to a lesser number of symbols output by
said keyer, at least some of said symbols being responsive to an arpeggio or
an
oiggepra.
24. A cybernetic keyer for communication, data entry, or the like, comprising:
~ a plurality of sensors;
~ a processor responsive to an output from each of said sensors,
said keyer producing a symbol in response to a first chord entered on said
keyer,
said first chord not having Delay loopback, said first chord not having Yaled
loopback, said keyer eventually producing a second symbol in response to a
second chord, when entry of said second chord begins before sensors forming
said first chord are all fully released.
25. A cybernetic keyer for communication, data entry, or the like, comprising
at
least three sensors, said keyer providing output symbols in response to the
activation of various combinations of said at least three sensors, said output
symbols comprising at least the numbers 0 through 9, where at least the number
0 is output in more than one way, said more than one way comprising at least
two different combinations of pressing said at least three sensors to produce
the
number 0.
26. A cybernetic keyer for communication, data entry, or the like, comprising
at
least three sensors, said keyer providing output symbols in response to the
activation of various combinations of said at least three sensors, said output
symbols comprising at least the numbers 0 through 9, where at least some of
the numbers are output in more than one way, where said keyer outputs each
of said at least some of the numbers in response to at least two different
chords.
27. A cybernetic keyer for communication, data entry, or the like, comprising:
31

~ a plurality of sensors;
~ a processor responsive to an output from each of said sensors,
said plurality of sensors including at least one ordinally conditional
modifier.
28. The cybernetic keyer of claim 27 where a function of said ordinally
conditional
modifier includes being a shift key or being a control key, said function as
to
whether it operates as a shift key or as a control key being responsive to an
order in which it is pressed within a chord.
29. The cybernetic keyer of any of claims 1 to 28, where said sensors are
switches.
30. The cybernetic keyer of any of claims 1 to 28, where at least some of said
sensors
are dual axis switches.
31. The cybernetic keyer of any of claims 1 to 28, where said sensors are
transducers.
32. The cybernetic keyer of any of claims 1 to 28, where at least some of said
sensors comprise dual sensors, said dual sensors responsive to independent
axes
and having a common rocker Block.
33. The cybernetic keyer of any of claims 1 to 28, where said sensors are
pressure
transducers.
34. The cybernetic keyer of any of claims 1 to 28, where said sensors are
force
transducers.
35. The cybernetic keyer of any of claims 1 to 34, where said sensors are
mounted
into a detachable handle.
36. The cybernetic keyer of any of claims 1 to 34, where said sensors are
mounted
into the detachable handle of an electronic flashlamp.
37. The cybernetic keyer of any of claims 1 to 34, where said sensors are
mounted
into a transferable grip.
32

38. A method of manufacturing a cybernetic keyer, said method comprising the
steps of:
~ heating a material to a temperature at which said material becomes soft;
~ forming said material to the hand of the intended user;
~ allowing said material to cool to a temperature at which said material
becomes hard.
39. A method of manufacturing a cybernetic keyer, said method comprising the
steps of:
~ heating a material to a temperature at which said material becomes soft;
~ forming said material to the hand of the intended user;
~ allowing said material to cool to a temperature at which said material
becomes hard;
~ installing a plurality of sensors in said material.
40. A cybernetic keyer for communication, data entry, or the like, comprising:
~ a plurality of sensors;
~ a processor responsive to an output from each of said sensors,
said plurality of sensors borne by a transferable hand grip, said transferable
hand grip providing an operationally hands-free keyer.
33

Description

Note: Descriptions are shown in the official language in which they were submitted.


CA 02309868 2000-OS-30
iNT~.. , . . . . _;" f
;t'ilY4
~r~ ~ a 200
Patent .Application
of .. ~,,
~ ~~-~;~F~ i~vitLLtGTUFILE '
W. Steve G. Mann
for
CYBERNETIC KEYER FOR TRANSMITTING OR ENTERING
SYMBOLS OF A DISCRETE ALPHABET INTO A DEVICE SUCH AS
A WEARABLE COMPUTER OR PORTABLE INFORMATION
PROCESSOR
of which the following is a specification:
FIELD OF THE INVENTION
The present invention pertains generally to an apparatus for data entry, or
for trans-
mission of code, or the like. The field of the invention may be related to the
fields of
keyboards, keyers, input devices, human factors, mobile communication,
cybernetic
sciences, humanistic intelligence, and consumer electronics.
BACKGROUND OF THE INVENTION
Humanistic Intelligence is intelligence that arises in a natural cybernetic
way,
through having a constancy of user-interface, by way of an "always-ready"
computer
system. A handheld keyer that can be easily custom built for each user, and
can be
used while doing other things such as jogging', running up and down stairs, or
the
like, is of great use in this context. Such a keyer c:an also be used to
secretly type
messages while standing and conversing with other people in a natural manner.
What is described; is a simple conformable keyboard, for use with computer sys-
tems that vlork in extremely close synergy with the human user. This close
synergy is
achieved through a user-interface to signal processing hardware that is both
in close
physical proximity to the user, and is constant.
1

CA 02309868 2000-OS- .30 f ~~r~ ; - .~,.~~
MAY 3 G 2000
PNO'r"~4_ ~ ~ ;,, ~ cLi~~ ('UELLE
The constancy of user-interface (interactional constancy) is what separates
this
signal processing architecture from other related devices such as pocket
calculators
and Personal Digital Assistants (PDAs).
Not only is the apparatus operationally constant, in the sense that although
it.
nay have power saving (sleep) modes, it need not be completely shut down (dead
as is typically a calculator worn in a shirt pocket but turned off roost of
the time).
More important is the fact that it is also interactionally constant. By
interaction-
ally constant, what is meant is that the inputs and outputs of the device are
always
potentially active. Interactionally constant implies operationally constant,
but op-
erationally constant does not necessarily imply interactionally constant.
Thus, for
example, a pocket calculator, worn in a shirt pocket, and left on all the time
is still
not interactionally constant, because it cannot be used in this state (e.g.
one still has
to pull it out of the pocket to see the display or enter numbers). A wrist
watch is a
borderline case; although it operates constantly in order to continue to keep
proper
time, and it is conveniently worn on the body, one must make a conscious
effort to
orient it within one's field of vision in order to interact with it.
The invention can be applied to both traditional devices like calculators and
v~rist
watches, or to a new class of devices such as those that are interactionally
constant.
The WearComp apparatus of the 1970s and early 1980s was an example of an
interactionally constant wearable multimedia computer system for collaboration
in
computer mediated reality spaces.
Physical proximity and constancy were simultaneously realized by the
'WearComp'
project. (For a detailed historical account of the WearCornp project, and
other related
projects, see http:~wvearcam.org and http:~~wearcomp.org~historical.)
The W'earComp project of the 1970s and early 1980s comrpised Early embod-
iments of the applicant's original "photographer's assistant" system and
Personal
Imaging systems. WearComp2, an early 1980s backpack-based signal processing
and
personal imaging system with right eye display comprised two antennas
operating
2

CA 02309868 2000-OS-30 ~ I[vj!'~~.; ~.v;w~~~: ~ c~~°,~~~~y
N~A'~ 0 2000
z :s
~'HUt'r":. . ~ ., , ; ~s.a.i.~:l'UELLE
at different frequencies to facilitate wireless communications over a full-
duplex radio
link. WearComp4, a late 1980s clothing-based sigwal processing and personal
imag-
ing system had a left eye display and beam sputter. Separate antennas
facilitated
simultaneous voice, video, and data communication. W'earComp was an attempt at
building an intelligent "photographer's assistant" around the body, and
comprised a
computer system attached to the body, a display means constantly visible to
one or
both eyes, and means of signal input including a series of pushbutton switches
and a
pointing device
SUMMARY OF THE INVENTION
A preferred embodiment of the invention typically comprises an input device
with
pushbutton switches mounted to a wooden pushbroom hand-grip, or an input
device
comprising five microswitches mounted to the handle of an electronic flash. A
joystick
(c:ontrolling two potentiometers), designed as a pointing device for use in
conjunction
with the ~~'earComp project, is also often present. The invention may also be
used
with various hand held devices, or may be mounted covertly to a belt, or in
shoes, so
that the user can key in data with the toes.
In the flashlamp embodiment, the user can hold the device in one hand to
function
as a keyboard and mouse do, but still be able to operate the device while
walking
around. In this way, the apparatus re-situated the functionality of a desktop
multi-
media computer with mouse, keyboard, and video screen, as a physical extension
of
the user's body.
An important aspect of the W'earComp is the keyer, which serves to enter com-
wands into the apparatus. The keyer, in the preferred embodiment, is attached
to
some other apparatus, such as a flashlamp, or lightcornb, so that the effect
is a hands
free data entry device (hands free in the sense that one would need to hold
onto the
flashlamp, or the like, anyway, so no additional hand is needed to hold the
keyer).
However, the keyer invention is useful by itself, or incorporated into various
appliances
3

CA 02309868 2000-OS-30
m i t~t_tL ~ nAi.. wv~! ?rtn I r
a
MAY ~ ~ 2000
S
PROFrsa~ ~ :_ ._ ~~~al.E
such as toasters, kettles, pocket pagers, and the like, to allow a used to
control the
functionality of these devices quickly with a small number of switches, and
without
having to pay a lot of attention to a display system.
BRIEF DESCRIPTION OF THE DRAWINGS
The invention will now be described in more detail, by way of examples which
in no way are meant to limit the scope of the invention, but, rather, these
examples
will serve to illustrate the invention with reference to the accompanying
drawings, in
which:
FIG. 1 illustrates hands free aspects of the keyer.
FIG. 2 Illustrates seven stages of a cybernetic keyer.
FIG. 3 Illustrates cybernetic keyer timing.
FIG. 4 Illustrates a two switch cybernetic keyer
FIG. 5 Illustrates examples of some symbols output from a two switch
cybernetic
kever.
FIG. 6 Illustrates a timing graph for examples of some symbols and
corresponding
s«~itch timings.
FIG. 7 Illustrates keyer redundancy.
FIG. 8 Illustrates an ordinally conditional modifier example.
FIG. 9 Illustrates a. dual sensor.
FIG. 10 Illustrates a timing tolerance example.
FIG. 11 Illustrates traces of timing information for symbols of a two switch
keyer
incorporating timing tolerances.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
While the invention shall now be described with reference to the preferred em-
bodiments shown in the drawings, it should be understood that the description
is not
4

CA 02309868 2000-OS-30 ...~.~,r
!t~.I~FLI_.EC:T~3!~ ~=(~aFRTY
MAY ~ 0 2000
r,~
PROPHic i ~. ~, ~ ; ~:.~.tv i llF~ ~ F
to limit the invention only to the particular embodiments shown
but"~"'~~'3~'f''
all alterations, modifications and equivalent arrangements possible within the
scope
of the appended claims.
In all aspects of the present invention, references to "sensor" mean any
device
comprising a device that can sense force, pressure, displacement, or the like,
in either
continuous or discrete steps.
References to "processor" , or "computer" shall include sequential
instruction, par-
allel instruction. and special purpose architectures such as digital signal
processing
hardware, Field Programmable Gate Arrays (FPGAs), programmable logic devices,
Programmable Interface Controllers (PICs), as well as analog signal processing
de-
vices.
When it is said that object "A" is "borne" by object "B", this shall include
the
possibilities that A is attached to B, that A is bonded onto the surface of B,
that A
is embedded inside B, that A is part of B, that A is built into B, or that A
is B.
V~ith reference to Fig 1; the keyer is preferably hands free. The hands free
at-
tribute comes from having the keyer borne by the handle of an object that
'would need
to be carried by the user anyway. In this example, the instrument is a hand-
held
fiashlamp that is being used by the user for the painting with lightvectors (
"dusting" )
genre of photographic or experiential imaging. Since the flashlamp handle 120
must
be held to direct the reflector 100 of lamp housing 110 at subject matter of
interest,
no additional hand is needed for the keyer. Alternatively the keyer may be
built into
the grip of a camera, if traditional photography were the goal. It could also
be built
into the grip of a ski pole, if, for example, a ski instructor was using the
keyer to
enter data, or to recall instructions into cybernetic Laser EyeTap (TM)
eyeglasses as
described in http://eyetap.org.
The original keyer had five keys, one for each of the four fingers, and a
fifth
one for the thumb; so that characters were formed by pressing the keys in
different
combinations. A computer or processor can read when each key is pressed, and
when

CA 02309868 2000-OS-30
INTr~~ ..~ ,..,
MAY .° (~ fQ00
PHU1'ri: e=~ 1..~ g
each key is released, as well as how fast the key is depressed. A
satisfactor'~"~5'Pa~~'~8t' ' "'"' "
is the 6502 processor of Rockwell corporation. There are four large switches:
~ a thumb switch, SWt;
~ an index finger switch, SWi;
~ a middle finger switch, SWm;
~ a ring finger switch, S~~'r.
.-~ conditional modifier switch 190 has a long lever 199 that makes it. easy
for the
smallest finger to press it. In this embodiment, it is used less often than
the other
four switches.
A five switch keyer such as disclosed here, is called a pentakeyer. All five
switches
of this keyer are affixed to the handle 120 of the flashlarnp, which may be
detached
from the lamp housing 110 by way of a long screw through the entire handle
from
the bottom to the top, into a 1/4 20 screw thread in the housing 110. Housing
110 is
made of metal to separate the 900 volts main supply in housing 110 from the
handle
and its associated low voltage switches.
The handle unscrews and is attached to any of a large number of different
instru-
menu, such as may be tapped with a 1/4 20 thread to accept the pentakeyer. The
pentakeyer will screw onto the bottom of almost any camera, whether it be a
35mm
still camera, a video camera, or the like. In this way the camera can be used
while
keying. Therefore, the result is an effective hands-free keyer. The fact that
the keyer
doubles as a handle for something makes it operationally hands free.
Lamp housing 110 has a cursor pointing device comrpised of housing 130 with
four
potentiometers 131, two of which are connected to a resistor capacitor
tirrring circuit
into a wearable computer for cursor control of the wearable computer. The
control
arm 140 is operable by the thumb of the user, so that the user can type,
control the
cursor, and aim the flashlamp with one hand.
6

CA 02309868 2000-OS-30
Velocity sensing capability arises from using both the naturally closed (NC)
and
naturally open (NO) contacts, and measuring the time between when the common
contact (C) leaves the NC contact and meets the NO contact. The velocity
sensing
timing circuit is similar to the potentiometer timing circuit, so that seven
timing
circuits in total are needed (five for the five switches, and two for the
cursor, one for
each of its x and y axes).
The operation of a keyer takes place over seven stages, as shown in Fig 2.
There are seven stages associated with pressing a combination of keys: A
Attack is
the exact instant when the first switch is measurably pressed. (e.g. when its
common
moves away from its first throw if it is a double throw switch, or when the
first switch
is closed if it is a single throw switch). D Delay is the time betwTeen
.Attack and when
the last switch of a given chord has finished being pressed. Thus Delay
corresponds
to an arpeggiation interval (ARPA, from Old High German harpha, meaning harp,
upon which strings were plucked in sequence but continued to sound together).
This
Delay may be deliberate and expressive, or accidental. C Close is the exact
instant
at which the last. key of a desired chord is fully pressed. This Closure of
the chord
exists only in the mind (in the first brain) of the user, because the second
brain
(e.g. the computational apparatus, worn by; attached to, or implanted in the
user)
has no way of knowing whether there is a plan to, or plans to, continue the
chord
with more switch closures, unless all of the switches have been pressed. S
Sustain is
the continued holding of the chord. Much as a piano has a sustain pedal, a
chord
on the keyboard can be sustained. Y Yaled is the opposite of delay (yaled is
delay
spelled backwards). Yaled is the time over which the user releases the
components of
a chord. Just as a piano is responsive to w hen keys are released, as well as
when they
are pressed, the keyboard can also be so responsive. The Yaled process is
referred to
as an APRA (OIGGEPRA), e.g. ARPA (or arpeggio) spelled backwards. O Open is
the time at which the last key is fully (measurably) released. At this point
the chord
is completely open and no switches are measurably pressed.
7

CA 02309868 2000-OS-30
It should be noted that the Close, Sustain, Release progression exists only in
the
firstbrain of the user, so any knowledge of the progression from within these
three
stages must be inferred, for example, by the time delays.
Arbitrary time constants can be used to make the keyboard very expressive,
e.g.
characters can be formed by pressing keys for different lengths of time.
Indeed, a single
key alone could be used to tap out l~Morse code, so that only one key would
really be
needed, if we were willing to use arbitrary timing information. Two keys would
give
the iambic paddle effect, similar to that described in a Jan. 12, '1972
publication,
lay William F. Brown, U.S. Pat. No. 3757045, which was further developed in
U.S.
Pat. No. 5773769, so that there would be no need for a heavy base (it could
thus be
further adapted to be used while worn).
Another example of time dependent keyboards include those with a Sustain fea
tune, such as those with the well-known "Typematic'' (auto repeat) function of
most
modern keyboards. A key held down for a long time behaves differently than one
pressed for a short time. The key held down for a short time produces a single
char-
acter, whereas the key held down for a. long time produces a plurality of the
same
character.
Some problems arise with time dependent keying, however. For example, a novice
user typing very slowly may accidentally activates a timing feature. Although
many
input devices (e.g. ordinary keyboards and mice, as well as ordinary iambic
paddles)
have user adjustable timing constants, the need to adjust or adapt to these
constants
is an undesirable feature of these keyboards.
Moreover, there are problems and issues of velocity sensing, which is itself a
timing
matter. Sorne problems associated with velocity sensing include the necessity
of
selecting a switch with less deadband zone ( "snap" ) than desired, for the
desirable
amount of tactile feedback. There were some other undesirable attributes of
the
velocity sensing systems, so in this paper, the non-velocity sensing version
will be
described for simplicity.
8

CA 02309868 2000-OS-30
Without using any timing constants whatsoever and without using any velocity
sensing, nor Sustain, nor measurement of the timing in the Delay and Yaled
stages),
( Fig 2) a very large number of possible keypresses can still be attained.
Consider first, for simplicity, a two key keyboard. There are four possible
states:
00 when no keys are pressed, Ol when the least significant key (LSK) is
pressed, 10
«-hen the most significant key (~MSK) is pressed, and 11, when both are
pressed. It
is desired to be able to have a rest position when no characters are sent, so
00 is
preferably reserved for this rest state, otherwise the keyboard would be
streaming
out characters at all times, even when not in use.
In a dynamic situation, keys will be pressed and released. Both keys will be
pressed at exactly the same time, only on a set of measure zero. In Fig 3, the
time
the LSK is pressed is plotted on the abscissa, and the time that the MSK is
pressed
on the ordinate, of a graph. Each keypress will be a point, and we will obtain
a
sc;atterplot of keypresses in the plane. Simultaneity exists along the line to
= tl,
a.nd the line has zero measure within the plane. Therefore, any symbol that
requires
simultaneous pressing of both keys (or simultaneous release of both) will be
inherently
unreliable, unless we build in some timing tolerance. Timing tolerances
require tinning
information, such as a timing constant or adaptation, so for no«-, for
simplicity. let
us assume that such timing tolerances are absent. Therefore, let us only
concern
ourselves with whether or not the key presses overlap, and if they do, let us
only
concern ourselves with 'which key was pressed first. and which was released
first.
Two keys would be pressed or released at exactly the same time, only on a set,
denoted by the line to = tl, which has measure zero in the (to, tl) plane,
where to
is the time of pressing or releasing of SWITCH 0, and tl is the tune of
pressing or
releasing of SWITCH 1. To overcome this uncertainty, the particular meaning of
the
chord is assigned based ordinally, rather than on using a timing threshold.
Here,
for example, SWITCH 0 is pressed first and released after pressing SWITCH 1
but
before releasing SWITCH 1. This situation is for one of the possible symbols
that
9

CA 02309868 2000-OS-30
can be produced from this combination of two switches. This particular symbol
will
be numbered (4) and will be assigned the meaning of REW (Rewind).
This limitation greatly simplifies programming (e.g. for programming on a
simple
602 microprocessor or the like), and greatly simplifies learning, as the pace
from
novice to expert does not involve continually changing timing parameters and
various
other subjectively determined timing constants.
Accordingly; without any timing constants or timing adaptation, v~e can, with
only two switches, obtain six possible unique symbols, not including the Open
chord
(nothing pressed), as illustrated in Fig. 4.
In Fig. 4, timing information is depicted as dual traces: SWITCH 0 is depicted
by
the bottom trace and SWITCH 1 by the top trace. The zeroith symbol 00 depicts
the
open chord (no switches pressed). The first symbol O1 depicts the situation in
which
only SVG'ITCH 0 is pressed. The second symbol 10 depicts the situation in
which only
S~~- ITCH 1 is pressed. The third through sixth symbols 11 arise from
situations in
which both switches are pressed and then released, with overlap. The third
symbol
FLFL depicts the situation in which SWITCH 1 is pressed First, switch 0 is
pressed
Last, SWITCH 1 is released First, and switch 0 is released Last. Similarly
LFLF
denotes Last First Last First (fourth symbol). FLLF denotes the situation in
which
SWITCH 1 is held down while SWITCH 0 is pressed and released (fifth symbol).
I:FFL denotes the situation in which SWITCH 0 is held down while SWITCH 1 is
pressed and released (sixth symbol). The zeroith through sixth symbols are
denoted
by reference numerals 0 through 6, respectively. Each of the active ones (e.g.
other
than the Open chord, 0) are given a meaning in operating a recording machine,
with
the functions PLAY, STOP, FastForward (FF), REWind, RECord, and PAUSE.
The operation of the cybernetic keyer is better understood by way of a simple
example, illustrated in Fig 5. In this example, the top trace denotes SWITCH
1, and
the bottom trace SWITCH 0. Initially, SWITCH 0 is pressed and then SWITCH 1 is
pressed. However, because there is no overlap between these switch pressings,
they are

CA 02309868 2000-OS-30
interpreted as separate symbols (e.g. this is not a chord). The separate
symbols are
1 (PLAY) and 2 (STOP) respectively. This results in the playing of a short
segment
of video which is then stopped. Then, a little while later, SWITCH 0 is
pressed and
then SWITCH 1 is pressed. However; because there is now overlap, this action
is
considered to be a chord. Specifically it is an LFLF (Last First Last First)
chord,
which is interpreted as symbol number 4 (REW'IND). A REWIND operation on a
stopped system is interpreted as high speed rewind. A short time later, SWITCH
0
is held down while SWITCH 1 is pressed briefly. This action is interpreted as
symbol
number 6 (PAUSE). Since PAUSE would normally be used only during PLAY or
ILECORD, the meaning during RE~YIND is overloaded with a new meaning, namely
slow down from high speed rewind to normal speed rewind. Thus we have full
control
of a recording system with only two switches, and without using any time
constants
a.s might arise from other interfaces such as the iambic ~~Iorse code keyers
used by
ham radio operators.
The timespace graph of Fig 3 is really just a four dimensional time space
collapsed
onto two dimensions of the page. Accordingly, we can view any combination of
key
presses that involves pressing both switches within a finite time, as a pair
of ordered
points on the graph. There are six possibilities. Examples of each are
depicted in
Fig 6. The symbol "X" denotes pressing of the two keys, and exists in the
first pair of
time dimensions, to and t1. The releasing of the two keys exists in the first
second pair
of dimensions, which, for simplicity (since it is difficult to draw the four
dimensional
space on the printed page), are also denoted to and tl, but with the symbol
"O"
for Open. Examples of symbols 3 through 6 are realized. Two other examples,
for
when the switch closures do not overlap, are also depicted. These are depicted
as 1.2
(symbol 1 followed by symbol 2) and 2,1 (symbol 2 followed by symbol 1).
With three switches instead of two, there are many more combinations possible.
Even if the three switches are not velocity sensing (e.g. if they are only
single throw
switches), there are still 51 combinations, which can be enumerated as
follows:
11

CA 02309868 2000-OS-30
~ Choose any one of the three switches (one symbol each)
~ Choose any pair of switches (e.g. omit any one of the three switches from
the chord). For each of these three choices, there are four possible symbols
(corresponding to the symbols 3 through 6 of Fig 4).
~ Using all three switches, at the ARPA (arpeggio, Fig 2) stage:
- there are three choices for First switch;
- once the first switch is chosen, there remains the question as to which of
the remaining two will be pressed Next;
- then there is only one switch left, to press Last.
Thus at the ARPA stage, there are 3 * 2 * 1 = 6 different ways of pressing all
three switches. At the APRA (oiggepra, Fig 2) stage, there are an equal number
of ways of releasing these three switches that have all been pressed. Thus
there
are six ways of pressing, and six ways of releasing, which gives 6 * 6 = 36
symbols
that involve all three switches.
Therefore, the total number of symbols on the three switch keyer is 3 + 12 +
36 = 51.
That's a sufficient number to generate the 26 letters of the alphabet, the
numbers 0
through 9, the space character, and four additional symbols.
Uppercase and control characters are generated by using the four additional
sym-
bols for SHIFT, CONTROL. etc., of the letter or symbol that follows. Thus the
multiplication sign is SHIFT followed by the number 8, and the at sign is
SHIFT
followed by the number 2, and so on.
It is preferable to have all the characters be single chords, so that the user
gets
one character for every chord. Having a separate SHIFT chord would require the
user
to remember state (e.g. remember whether the SHIFT key was active), and would
also slow down data entry.
Accordingly, if a fourth switch is added, we can:
12

CA 02309868 2000-OS-30
~ Choose any one of the four switches (one symbol each);
~ Choose any pair of switches. For each of these z~44~z~, = 6 choices, there
are four
possible symbols (corresponding to the symbols 3 through 6 of Fig 4);
~ Choose any three switches (e.g. omit any one of the four switches from the
chord). For each of these 4 choices, form the chord in any of the 3 * 2 * 1 =
6
possible ways, and unform the chord in any of six possible ways, giving 62 =
36
ways to create and uncreate the chord of the three chosen switches, as
described
in the three switch example above;
~ Using all four switches, at the ARPA (arpeggio) stage:
- there are four choices for First switch;
- once the first switch is chosen, there remains the question as to which of
the remaining three switches will be pressed Second;
- once the second switch is chosen, there remains the question as to which
of the remaining two switches will be pressed Third;
- then there is only one switch left, to press Last.
Thus at the ,~RPA stage, there are 4 * 3 * 2 * 1 = 4! = 24 different ways of
pressing all four switches. At the APR.A (oiggepra) stage, there are an equal
number of ways of releasing these four switches that: have all been pressed.
Thus
there are twenty four ways of pressing, and twenty four ways of releasing,
which
gives 24 * 24 = 576 symbols that involve all four switches.
Therefore, the total number of symbols on the four switch keyer is
4~ (li)z + 4~ (2i)z + 4! (3~)z + 4~ ~4~)z
1!(4 _ 1)! 2!(4 _ 2)! 3!(4 _ 3)! 4!(4 _ 4)!
=4*lz+6*2z+4*6z+1*24z=748. (1)
13

CA 02309868 2000-OS-30
That's a sufficient number to generate the 256 ASCII symbols, along with 492
ad-
ditional symbols which may be each assigned to entire words, or to commonly
used
phrases, such as a sig (signing off) message, a callsign, or commonly needed
sequences
of symbols. Thus a callsign like "N1NLF" is a. single chord. A commonly used
se-
<tuence of cozTZmands like ALT 192, ALT 255, ALT 192, is also a single chord.
Common
words like ''the" , ''and" , etc., are also single chords.
The four switches can be, one each associated with the thumb, and three
largest
fingers, leaving out the srrzallest finger. Claude Shannon's information
theory, how-
ever, suggests that if we have a good strong clear channel, and a weaker
channel, that
we can get, additional error free communication by using both the strong and
weak
channels than we can by using only the strong channel. Therefore, we can and
should
use the weak (smallest) finger, for at least a small portion of the bandwidth,
even
though the other four will carry the majority of the load. Thus, referring to
Fig l,
we can see that. there are four strong double throw switches for the thumb and
three
largest fingers, and a fifth smaller switch having a. very long lever for the
smallest
finger. The long lever makes it easy to press this switch with the weak finger
but at
the expense of speed and response time. In fact, each of the five switches has
been
selected specifically knowing the strength and other attributes of what will
press it.
This design gives rise to the pentakeyer.
The result in (1) can be generalized. The number of possible chords for a
keyer
with N switches, having only Single Throw (ST) switches, and not using any
looping
back at either the Delay or Yaled (Fig 2) stages of chord development, is:
_,
A.
n! 2 2
n~(lV n)i ( ) ( )
TE= 1
Equation 2 simplifies to:
N!n!
), (3)
(N-n .
Thus the pentakeyer gives us 5 + 40 + 360 + 2880 + 14400 = 17685 possible
chords,
without the use of any loopback, velocity sensing, or timing constants.
14

CA 02309868 2000-OS-30
0.1 Redundancy
The pentakeyer provides enough chords to use one to represent each of the most
commonly used words in the English language. There are, for example, enough
chords
to represent more than half the words recognized by the UNIX ''spell" command
with
a typical /usr/share/lib/dict/words having 25143 words.
However, if all we want to represent is ASCII characters, the pentakeyer gives
us 17685/256 > 69, e.g. more than 69 different ways to represent each letter.
This
suggests that, for example. we can have 69 different ways of typing the letter
''a" ,
anc:l more than 69 different ways of typing the letter "b", and so on. In this
way,
we can choose whichever of these ways follows most conveniently in a given
chord
progression.
In using most musical instruments, there are multiple ways of generating each
chord. For example, in playing the guitar, there are at least two commonly
used "G"
chords, both of which sound quite similar. The choice of which ''G" to use
depends on
which one is easiest. to reach, based on what chord came before it, and what
chord will
come after it, etc.. Thus the freedom in having two different realizations of
essentially
the same chord makes playing the instrument easier.
Similarly, because there are so many different ways of typing the letter ''a"
, the
user is free to select the particular realization of the letter "a" that's
easiest to type
when considering whatever came before it and whatever will come after it.
Having
multiple realizations of the same chord is called chordic redundancy. Rather
than
distributing the chordic redundancy evenly across all letters, more redundancy
is
applied where it is needed more, so that there are more different ways of
typing the
letter ''a" than there are of typing the letter "q" or "u" . Part of this
reasoning is based
on the fact that there are a wide range of letters that can come before or
after the
letter ''a", whereas, for example, there is a smaller range of, and tighter
distribution
on, the letters that can follow "q", with the letter "u" being in the center
of that
rc>latively narrow distribution.

CA 02309868 2000-OS-30
Redundancy need not be imposed on the novice, e.g. the first-time user can
learn
one way of forming each symbol, and then gradually learn a second way of
forming
some of the more commonly used symbols. Eventually; an experienced user will
learn
several ways of forming some of the more commonly used symbols.
Additionally, some chords are applied (in some cases even redundantly) to
certain
entire words, phrases, expressions, and the like. An example with timing
diagrams
fc~r a chordic redundancy based keyer is illustrated in Fig 7. Example of
Keyer
with a functional chordic redundancy generator or keyer having functional
chordic
redundancy. This keyer is used to type in or enter the numbers from 0 to 9
using
three single throw switches. Each symbol (each number from 0 to 9) may be
typed
in various ways. Thus if we wish to type "001" , we can do this as follows:
~ first press and release switch SW'0, to obtain symbol Oo (the zeroith
embodiment
of symbol 0);
~ then to speed up the process (rather than press the same switch again) we
press
switch SWl while holding SW2, to obtain symbol O1 which is another realization
of the symbol 0;
~ we then choose a realization of the symbol 1, namely 12, that does not.
begin
with switch SV'2. Thus before the chord for symbol O1 is completely released
(e.g. at the Yaled stage), we begin entering the chord for symbol 12, starting
with the available switch S~VO.
This approach, of having multiple chords to choose from, in order to produce a
given symbol, is the opposite of an approach taken with telephone touchpad
style
keyboards in which each number could mean different letters. In U.S. Pat. No.
6,011.554, issued January 4, 2000, assigned to Tegic Communications, Inc.
(Seattle.
W'A), King; Martin T. (Vashon, WA); Grower; Dale L. (Lansing, MI); Kushler;
Clifford
A. (Vashon, WA); Grunbock; Cheryl A. (Vashon, WA) describe a disambiguating
system in which an inference is made as to what the person might likely be
trying to
16

CA 02309868 2000-OS-30
type. .4 drawback of this Tegic system is that the user must remain aware of
what
the machine thinks he or she is typing. There is an extra cognitive load
imposed
on the user, including the need to be constantly vigilant that errors are not
being
made. Using the Tegic system is a bit like using command line completion in
Emacs.
~~'hile it allegedly purports to speed up the process, it can, in practice,
slow down
the process by imposing an additional burden on the user. In some sense, the
Tegic
system is a form of anti-redundancy, giving the user less flexibility. For
example,
forming new words (not in the dictionary) is quite difficult with the Tegic
system,
and when it does make mistakes, they are harder to detect because the mistakes
get
mapped onto the space of valid words.
Indeed, chordic redundancy (choice) is much more powerful than anti-redundancy
(anti-choice) in how characters can be formed.
Ordinally conditional modifiers are a useful feature of some embodi-
ments.
A modifier key is a key that alters the function of another key. On a standard
key board, the SHIFT key modifies other letters by causing them to appear
capitalized.
The SHIFT key modifies other keys between two states, namely a lowercase state
and
an uppercase state.
Another modifier key of the standard keyboard is the control key. A letter key
pressed while the control key is held down is modified so that it becomes a
control
character. Thus the letter "a" gets changed to ''A" if it is pressed v~hile
the control
key is held down.
Fig. 8 illustrates an approach of having a modifier that is ordinally
conditional,
so that. its effect is responsive to where it is pressed in the chord. Fig 8
shows
an example of how a four key ordinally conditional modifier is reduced to
practice.
Letters are arranged in order of letter frequency starting with the letter "e"
which
is the most commonly used letter of the alphabet.. Each of the 26 letters, the
ten
munbers, and some symbols are encoded with the 51 possible chords that can be
17

CA 02309868 2000-OS-30
formed from 3 switches, a middle finger switch, SW'm, an index finger switch,
SWi,
and a. thumb switch, SWt. (The more common letters such as e, t, a, etc., are
also
encoded redundantly so that there is more than one way to enter, for example,
the
letter "e".) A ring finger switch, SWr, is the ordinally conditional modifier.
If SWr is
not pressed, an ordinary lowercase character is assumed. If a chord leads with
SWr,
the character is assumed to be an uppercase character. If the chord is entered
while
holding SWr the character is assumed to be a control character. If a chord
trails
with SV'r, it is assumed to represent a meta character. The ordinally
conditional
modifier is also applied to numbers to generate some of the symbols. For
example,
an exclamation mark is entered by leading with SWr, into the chord for the
number
1.
One reason chording keyboards can be slow is that they often don't provide
rollover. A regular ~W'ERTY... keyboard allows for rollover. A typical 1984
IBM
MODEL 1VI keyboard, for example, will be responsive to any key while the
letter "q"
is held down. When the letters "q" and ''w" are held down, it is responsive to
most
keys (e.g. all those except keys in the q and w columns). When the letters
"q",
''w" , and "e" are held down, it is responsive to other keys except from those
three
columns. When "q" , "w" , "e" , and "r" are held down, it is still responsive
to keys in
the right hand half of the keyboard (e.g. keys that would ordinarily be
pressed with
the right hand). Only when five keys are held down, does it stop responsing to
new
keypresses. Thus the MODEL M has quite a bit of rollover. This means that one
can
type new letters before finishing the typing of previous letters. This ability
to have
overlap between typing different letters allows a person to type faster
because a new
letter can be pressed before letting go of the previous letter.
Commercially available chording keyboards such as the Eandykey Twiddler and
the BAT don't allow for rollover. Thus typing on the Twiddler or BAT is a
slower
process.
A goal of the cybernetic keyer is to be able to type much more quickly.
Therefore,
18

CA 02309868 2000-OS-30
an important feature, is the tradeoff between loopbacks at the Delay and Yaled
stages
(Fig 2), and rollover. If we decide, by design, that there will be no loopback
at the
Delay or the Yaled stages, we can assume that a chord has been committed to at
the
Release stage. Thus once we reach the Release stage, we can begin to accept
another
chord, so long as the other chord does not require the use of any switches
that are
still depressed at the Release stage. However, because of the sixty nine-fold
chordic
redundancy, it is arranged that, for most of the commonly following letters,
there
exists at least one new chord that can be built on keys not currently held
down, at
the Release stage.
As an example of rollover on a cybernetic keyer, consider the following: With
reference to the two switch keyer, suppose we press SWITCH l, then press
SWITCH 0,
and then release SWITCH 1. W'e are now at the Release stage, and can enter a
new
command with SWITCH 1, since we know that there will be no Yaled loopback
(e.g.
since we know that the chord will not involve pressing SWITCH 1 again). Thus
pressing SWITCH 1 again can be safely used as a new symbol, prior to releasing
SWITCH 0. In this way, symbols can rollover (overlap).
The chordic redundancy factor can be further increased with a more expressive
keyer. The number of possible chords can be increased from 17685 to 7 + 84 +
1260 +
20160 + 302400 + +3628800 + 25401600 = 29354311 by simply adding three
switches
a.t the thumb position. This provides more than twenty nine million symbols,
which is
enough that each word in the English language could be represented in
approximately
a thousand different ways. This degree of chordic redundancy could provide for
some
very fast typing, if this many chords could be remembered. However, rather
than
increasing the number of switches, it is preferable to increase, instead, the
expressivity
of each one.
The pentakeyer is a crude instrument that lacks an ability to provide for
tremen-
dous "expression'' and sensitivity to the user. It fails to provide a rich
form of Human-
istic Intelligence in the sense that the feedback is cumbersome, and not
continuous.
19

CA 02309868 2000-OS-30
A guitar, violin, or real piano (e.g. an old fashioned mechanical piano, not a
comput-
erized synthetic piano data input keyboard), provides a much richer user
experience
because it provides instant feedback, and the user can experience the unique
response
of the instrument.
Even using both rails of each switch (e.g. double throw and even velocity
sensing)
still fails to provide a truly expressive input device. Accordingly, a better
keyer was
built from continuous transducers in the form of phonographic cartridges
salvaged
from old record players. These devices provide continuous flow of pressure
information
along two axes (each phono cartridge is responsive to pressure along two
independent
axes at right angles to one another, originally for playing stereo sound
recordings
from the grooves of a record). The dual sensor is depicted in Fig 9 and may
comprise
either a continuous sensor, or two on-off switches operable on separate axes.
In Fig. 9, Sensors SO and Sl may be switches or transducers or other forms of
sensory apparatus. Sensors SO and S1 are operable individually, or together,
by way
of rocker Block BO1. Pressing straight down on Block BO1 will induce a
response
from both sensors. A response can also be induced in only one of sensors SO or
S1 by
pressing along its axis.
In this embodiment, the keyer described here is similar to the ternary data
entry
keyboard described by Langley; October 4, 1988, in U.S. Pat. 1\0. 4,775,255,
in the
sense that there are also to axes of each key; so that a given key can move
towards
or away from the operator, and has a central ''off" position, and a spring
detent
to make the key return to the central position in the absence of pressure from
the
finger. An important difference, though, is the fact that the keyboard of U.S.
Pat.
No. 4,775,255 has no ability to sense how fast, how hard, or how much each
switch is
pressed, other than just the ternary value of 0, +1, or -1. Also, in the keyer
of U.S.
Pat. No. 4,775,255, the axes are not independent (e.g. one can't press +1 and -
1 at
the same time).
The sensor pair of Fig 9, on the other hand, provides two independent
continuous

CA 02309868 2000-OS-30
dimensions. Thus a keyer rrrade from five such sensor pairs provides a much
more
expressive input. Even if the transducers are quantized, to binary outputs,
there are
four possibilities: 0, -l, +1, and ~1. W'ith five continuous transducers, one
for each
finger or thumb position, the user interface involves squeezing out
characters, rather
than clicking out characters. The input space is a very richly structured ten
dimen-
sional timespace, producing ten traces of time-varying signals. This ten
dimensional
timespace is reduced to discrete symbols according to a mapping based on
compar-
ison of the waveforms with reference waveforms stored in a computer system.
Since
comparison with the reference waveforms is approximate, it is done by
clustering,
based on various kinds of similarity metrics.
Including just one time constant can greatly expand the functionality
of a cybernetic keyer.
If we relax the ordinality constraint, and permit just one time constant,
pertaining
to simultaneity, we can obtain eleven symbols from just two switches. Such a
scheme
can be used for entering numbers, including the decimal point.
00 (Open chord not used)
0 01
1 10
2 FLFL
3 FLLF
4 FLW
LFFL
6 LFLF
7 LFW
8 WFL
9 WLF
WW
L': sing this simple coding scheme, the number zero is entered by pressing the
LSK.
21

CA 02309868 2000-OS-30
The number one is entered by pressing the V1SK. The number four, for example,
is
entered by pressing the MSK first, then pressing the LSK, and then releasing
both
at the same time, Within a certain time tolerance for which time is considered
the
same. (The letter ''W" denotes Within tolerance, as illustrated in
With reference to Fig 10, Keyer Chords are shown within timing tolerances Y~ o
and Wl. Time differences within the tolerance band are considered to be zero,
so that
events falling within the tolerance band defined by Wo and T~Yi are considered
to be
effectively simultaneous.
With reference to Fig 11, The decimal point is entered by pressing both
switches
at approximately the same tune, and releasing both at approximately the same
time.
The ''approximately the same time" is defined according to a band around the
line
t« = tl of Fig 10.
Again, with reference to Fig. 11, a two switch chordic Keyer incorporating
timing
tolerances can produce eleven symbols. In addition to the unused Open chord,
there
are eleven other chords that can be used for the numbers 0 through 9, and the
decimal
point.
This number system can be implemented either by two pushbutton switches, or
by a single vector keyswitch of two components, as illustrated in Fig 9. In
the latter
case, the entire set of number symbols can be entered with just one switch,
e.g. by
just one finger. :Vote that each number involves just a single keypress,
unlike what
would be the case if one entered numbers using a small wearable Vlorse code
keyer,
or the like. Thus the cybernetic chordic keyer provides a much more efficient
entry
of symbols.
Wearable keyers are known in the art of ham radio. For example, in L.S. Pat.
Vo.
4,194,085, March 18, 1980, Scelzi describes a "Finger keyer for code
transmission''.
The telegraphic keyer fits over a finger, preferably the index finger, of an
operator;
for tapping against the operator's thumb or any convenient object. It is used
for
transmission of code with portable equipment. The keyer is wearably operable
when
22

CA 02309868 2000-OS-30
walking, or during other activities.
Keyers, such as previously known keyers, as well as the keyers of the present.
invention, such as the pentakeyer, and the continuous ten dimensional keying
system,
are much easier to use if they are custom made for each user. The most
important
aspect is getting the hand grip to fit well.
In a preferred embodiment, therefore, the keyer is moulded to fit the
individual
hand of the wearer. Presently, this is done by dipping the hand in icewater,
and
draping it with heated plastic material that is formed to the shape of the
hand. Once
the handpiece is formed, sensors are selected and installed so the keyer will
match
the specific attributes of the user's hand geometry.
Learning to use the pentakeyer is not easy, just as learning how to play a
musical
instrument is not easy. The pentakeyer evolved out of a difFerent philosophy,
more
than twenty years ago. This alternative philosophy knew nothing of so-called
"user-
friendly" user interface design, and therefore evolved along a completely
different
path.
Just as playing the violin is much harder to master than playing the TV remote
control, it can also be much more rewarding and expressive. Thus if we were
only
to consider ease of use, vTe might be tempted to teach children how to operate
a
television because it is easier to learn than how to play a violin, or how to
read and
write. But if we did this, we would have an illiterate society in which all we
could
do were things that were easy to learn. It is the author's belief that a far
richer
experience can be attained with a lifelong computer interface that is worn on
the
body, and used constantly for ten to twenty years. On this kind of time scale,
an
apparatus that functions as a true extension of the mind and body, can result.
Just
as it takes a long time to learn how to see, or to read and write, or to
operate one's
own body (e.g. it takes a number of years for the brain to figure out how to
operate
the body so that it can walk), it is expected that the most satisfying and
powerful
user interfaces will be learned over many years.
23

CA 02309868 2000-OS-30
From the foregoing description, it will thus be evident. that the present
invention
provides a design for a personal cybernetic chordic keyer. .4s various changes
can
be made in the above embodiments and operating methods without departing from
the spirit or scope of the invention, it is intended that all matter contained
in the
above description or show n in the accompanying drawings should be interpreted
as
illustrative and not in a limiting sense.
Variations or modifications to the design and construction of this invention,
within
the scope of the invention, may occur to those skilled in the art upon
reviewing
the disclosure herein. Such variations or modifications, if within the spirit
of this
invention, are intended to be encompassed within the scope of any claims to
patent
protection issuing upon this invention.
24

Representative Drawing
A single figure which represents the drawing illustrating the invention.
Administrative Status

2024-08-01:As part of the Next Generation Patents (NGP) transition, the Canadian Patents Database (CPD) now contains a more detailed Event History, which replicates the Event Log of our new back-office solution.

Please note that "Inactive:" events refers to events no longer in use in our new back-office solution.

For a clearer understanding of the status of the application/patent presented on this page, the site Disclaimer , as well as the definitions for Patent , Event History , Maintenance Fee  and Payment History  should be consulted.

Event History

Description Date
Application Not Reinstated by Deadline 2005-05-30
Time Limit for Reversal Expired 2005-05-30
Inactive: Adhoc Request Documented 2005-03-02
Inactive: Abandoned - No reply to s.30(2) Rules requisition 2004-09-30
Inactive: Abandoned - No reply to s.29 Rules requisition 2004-09-30
Deemed Abandoned - Failure to Respond to Maintenance Fee Notice 2004-05-31
Inactive: S.30(2) Rules - Examiner requisition 2004-03-31
Inactive: S.29 Rules - Examiner requisition 2004-03-31
Letter Sent 2004-01-29
Reinstatement Requirements Deemed Compliant for All Abandonment Reasons 2004-01-07
Deemed Abandoned - Failure to Respond to Maintenance Fee Notice 2003-05-30
Application Published (Open to Public Inspection) 2000-12-29
Inactive: Cover page published 2000-12-28
Filing Requirements Determined Compliant 2000-09-01
Inactive: Filing certificate - RFE (English) 2000-09-01
Inactive: IPC assigned 2000-07-21
Inactive: First IPC assigned 2000-07-21
Request for Priority Received 2000-07-19
Letter Sent 2000-07-14
Application Received - Regular National 2000-07-06
Request for Examination Requirements Determined Compliant 2000-05-30
All Requirements for Examination Determined Compliant 2000-05-30

Abandonment History

Abandonment Date Reason Reinstatement Date
2004-05-31
2003-05-30

Maintenance Fee

The last payment was received on 2004-01-07

Note : If the full payment has not been received on or before the date indicated, a further fee may be required which may be one of the following

  • the reinstatement fee;
  • the late payment fee; or
  • additional fee to reverse deemed expiry.

Please refer to the CIPO Patent Fees web page to see all current fee amounts.

Fee History

Fee Type Anniversary Year Due Date Paid Date
Application fee - small 2000-05-30
Request for examination - small 2000-05-30
MF (application, 2nd anniv.) - small 02 2002-05-30 2002-03-27
MF (application, 3rd anniv.) - small 03 2003-05-30 2004-01-07
Reinstatement 2004-01-07
Owners on Record

Note: Records showing the ownership history in alphabetical order.

Current Owners on Record
STEVE MANN
Past Owners on Record
None
Past Owners that do not appear in the "Owners on Record" listing will appear in other documentation within the application.
Documents

To view selected files, please enter reCAPTCHA code :



To view images, click a link in the Document Description column. To download the documents, select one or more checkboxes in the first column and then click the "Download Selected in PDF format (Zip Archive)" or the "Download Selected as Single PDF" button.

List of published and non-published patent-specific documents on the CPD .

If you have any difficulty accessing content, you can call the Client Service Centre at 1-866-997-1936 or send them an e-mail at CIPO Client Service Centre.


Document
Description 
Date
(yyyy-mm-dd) 
Number of pages   Size of Image (KB) 
Representative drawing 2000-12-20 1 4
Description 2000-05-30 24 1,105
Claims 2000-05-30 9 312
Abstract 2000-05-30 1 31
Drawings 2000-05-30 11 139
Cover Page 2000-12-20 2 58
Filing Certificate (English) 2000-09-01 1 163
Notice: Maintenance Fee Reminder 2002-03-04 1 121
Notice: Maintenance Fee Reminder 2003-03-03 1 122
Courtesy - Abandonment Letter (Maintenance Fee) 2003-06-30 1 174
Second Notice: Maintenance Fee Reminder 2003-12-02 1 124
Notice: Maintenance Fee Reminder 2004-03-02 1 116
Notice of Reinstatement 2004-01-29 1 167
Courtesy - Abandonment Letter (Maintenance Fee) 2004-07-26 1 175
Second Notice: Maintenance Fee Reminder 2004-12-01 1 118
Courtesy - Abandonment Letter (R30(2)) 2004-12-09 1 167
Courtesy - Abandonment Letter (R29) 2004-12-09 1 167
Notice: Maintenance Fee Reminder 2005-03-01 1 119
Correspondence 2000-07-14 1 9
Correspondence 2000-07-19 2 56
Fees 2004-01-07 1 60
Fees 2002-03-27 1 128