WO2026037922A1 - Protection mode for dynamically adjusting key actuation depth - Google Patents
Protection mode for dynamically adjusting key actuation depthInfo
- Publication number
- WO2026037922A1 WO2026037922A1 PCT/EP2025/073398 EP2025073398W WO2026037922A1 WO 2026037922 A1 WO2026037922 A1 WO 2026037922A1 EP 2025073398 W EP2025073398 W EP 2025073398W WO 2026037922 A1 WO2026037922 A1 WO 2026037922A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- key
- actuation
- depth
- actuation depth
- sensors
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
Aspects of the subject disclosure may include, for example, an apparatus that includes detecting an actuation of a first key of a keyboard, and adjusting an actuation depth of at least one neighboring key of the first key of the keyboard based on the detecting. Other embodiments are disclosed.
Description
Attorney Docket No.: 2024P01254US_8381-0099A-PRV
PROTECTION MODE FOR DYNAMICALLY ADJUSTING KEY ACTUATION DEPTH
Inventor
Kellen D. Carey
FIELD OF THE DISCLOSURE
[0001] The present disclosure generally relates to methods and systems for dynamically adjusting the actuation depth of one or more keys in response to change(s) to nearby key state(s).
BACKGROUND
[0002] Precise input device control can be crucial in many computer-based applications, and especially when it comes to gaming. Unintended key presses, for instance, which often results from human error or quick reflexes, can negatively impact gameplay. The close proximity of keys in many modern, compact keyboard designs can also exacerbate this issue.
BRIEF DESCRIPTION OF THE DRAWINGS
[0003] Reference will now be made to the accompanying drawings, which are not necessarily drawn to scale, and wherein:
[0004] FIG. 1 depicts an illustrative embodiment of a Graphical User Interface (GUI) generated by an Accessory Management Software (AMS) application according to the present disclosure;
[0005] FIGs. 2 and 3 depict illustrative embodiments for communicatively coupling a controller to a computing device;
[0006] FIG. 3A depicts an illustrative embodiment of utilizing a variable actuation force device in a keyboard communicatively coupled to a computing device; [0007] FIGs. 3B-3D depict an illustrative embodiment of a variable actuation force device utilizing a variable magnet;
[0008] FIG. 3E depicts an illustrative embodiment of a key or button device of a keyboard that utilizes a magnet and a magnet proximity sensor;
Page 1 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV
[0009] FIG. 3F illustrates an example dynamic actuation depth adjustment scheme in accordance with various aspects described herein;
[00010] FIG. 3G illustrates a portion of an example keyboard that includes keys that are considered neighbors of a particular key;
[00011] FIG. 4 depicts an illustrative embodiment of a communication device;
[00012] FIG. 5 depicts an illustrative embodiment of a first method utilized in the subject disclosure;
[00013] FIG. 6 depicts an illustrative embodiment of a second method utilized in the subject disclosure;
[00014] FIG. 7A depicts an illustrative embodiment of a third method utilized in the subject disclosure;
[00015] FIG. 7B depicts an illustrative embodiment of a system operating at least in part according to one or more of the methods of FIGs. 5, 6, and 7A;
[00016] FIG. 7C depicts an illustrative embodiment of a communication flow diagram;
[00017] FIG. 8 depicts an illustrative embodiment of a fourth method utilized in the subject disclosure;
[00018] FIG. 9 depicts an illustrative diagrammatic representation of a machine in the form of a computer system within which a set of instructions, when executed, may cause the machine to perform any one or more of the methodologies disclosed herein.
DETAILED DESCRIPTION
[00019] The subject disclosure describes, among other things, illustrative embodiments of a protection mode scheme in which the actuation depth of one or more keys of the keyboard (i.e., how far a key needs to be depressed before it is considered “pressed” or actuated) can be dynamically adjusted in response to change(s) to nearby key state(s). In exemplary embodiments, a control system that is communicatively coupled with the keys may, responsive to a given key being pressed, adjust (e.g., increase) the actuation depth of one or more of its neighboring keys. This advantageously makes it harder to accidentally actuate the neighboring key(s), which reduces or eliminates the possibility of there being any negative or unintended effects
Page 2 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV from accidental keystrokes. In one or more embodiments, the protection mode and various related settings may be set or enabled on a per-key basis. As described in more detail below, the settings may include selection(s) of key(s) whose actuation depth(s) are to be adjusted in response to a neighboring key’s changing state, the amount of adjustment to make to the actuation depth, and/or the duration for which the adjustment to the actuation distance is effective after a neighboring key has changed its state.
[00020] One or more aspects of the subject disclosure include a device, comprising a processing system including a processor, and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations. The operations can include detecting an actuation of a first key of a keyboard. The operations can further include adjusting an actuation depth of at least one neighboring key of the first key of the keyboard based on the detecting.
[00021] One or more aspects of the subject disclosure include a non-transitory machine-readable medium, comprising executable instructions that, when executed by a processing system including a processor, facilitate performance of operations. The operations can include based upon a detection of an actuation of a first key of a device, initiating a timer, and adjusting an actuation depth of at least one neighboring key of the first key of the device. The operations can further include re-adjusting the actuation depth of the at least one neighboring key after the timer elapses.
[00022] One or more aspects of the subject disclosure include a method. The method can include detecting, by a processing system including a processor, an actuation of a first key of a keyboard. The method can further include adjusting, by the processing system, an actuation depth of at least one neighboring key of the first key of the keyboard based on the detecting.
[00023] Other embodiments are described in the subject disclosure.
[00024] FIG. 1 depicts an illustrative embodiment of a Graphical User Interface (GUI) 100 generated by an Accessory Management Software (AMS) application according to the present disclosure. The AMS application can be executed by a computing device such as a desktop computer, a laptop computer, a tablet, a server, a mainframe computer, a gaming console, a gaming accessory, or any combination or portions thereof. The AMS application can also be executed by portable computing
Page 3 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV devices such as a cellular phone, a personal digital assistant, or a media player. The AMS application can be executed by any device with suitable computing and communication resources.
[00025] FIG. 2 illustrates a number of embodiments for utilizing a controller in the form of a gaming controller 115 with a computing device in the form of a gaming console 206. In the illustration of FIG. 2, the gaming controller 115 can be communicatively coupled to the gaming console 206 with a tethered cable interface 202 such as a USB or proprietary cable, or a wireless interface 204 such as WiFi, Bluetooth, ZigBee, or a proprietary wireless communications protocol. The cable interface 202 provides a means for communication that may be less susceptible to electromagnetic interference. It will be appreciated that the controller may further include a headset 114 (with or without a microphone not shown) utilized by a gamer to communicate with teammates and/or to listen to game sounds in high fidelity. In the illustration of FIG. 2, the AMS application can in whole or in part be executed by the gaming controller 115, the gaming console 206, or a combination thereof.
[00026] FIG. 3 illustrates a number of other embodiments for utilizing a controller with a computing device. In this embodiment, the controller comprises a mouse 110 and/or a keyboard 108 and the computing device comprises a computer 208. The mouse 110 and/or the keyboard 108 can be tethered to the computer 208 by a cable interface 202 (e.g., USB cable or proprietary cable) or a wireless interface 204. The cable interface 202 provides a means for communication that may be less susceptible to electromagnetic interference. It will be appreciated that the controller may further include a headset 114 (with or without a microphone not shown) utilized by a gamer to communicate with teammates and/or to listen to game sounds in high fidelity. In the illustration of FIG. 3, the AMS application can in whole or in part be executed by the mouse 110, the keyboard 108, the computer 208, or a combination thereof.
[00027] For illustration purposes, the terms gaming console and computer will be used hence forth interchangeably with the term computing device with an understanding that a computing device may represent a number of other devices such as a server, a tablet, a smart phone, and so on. Accordingly, the gaming console 206
Page 4 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV and/or the computer 208 can represent any device with suitable computing resources to perform the methods described in the subject disclosure.
[00028] Typically, accessories with input buttons of variable shapes and sizes (e.g., button on a keyboard) work by attaching electronic switches connected in a matrix to a microprocessor or control system that in turn reads the matrix and determines which switches are open and which are closed. The switches can come in a few different versions, the most common being a simple printed circuit board (PCB) that is configured to detect a button depression when a piece of conductive material of a switch mechanism makes contact with a contact pad of the PCB (e.g., rubber dome, membrane switches). Other implementations can include traditional mechanical electronic switches with copper blades that make contact when the switch is depressed.
[00029] Common with these switching technologies is that they are configured to have a fixed resistance to pressing of the button or keypad. The pressing resistance can be created using a spring. In order to depress the button, the resistive force of the spring must be overcome. Depending upon the mechanical configuration, the spring may have to be compressed or stretched in order to complete a button press. When the button is no longer being pressed, the force of the spring can then return the button to the non-pressed position.
[00030] FIG. 3A depicts an illustrative embodiment of a system 300 for utilizing a variable actuation force device in a keyboard communicatively coupled to a computing device. A computing device 310 (which can, e.g., correspond to or be a part of the computer 208 of FIG. 3) can be coupled to a keyboard 312 (e.g., which can, e.g., correspond to the keyboard 108 of FIGs. 1 and 3) with all or some of its buttons 316 configured with variable pressing force. Configuration signals can be generated at and/or conveyed by the keyboard to the buttons 316 for configuring and/or adjusting the pressing resistance of the buttons 316. Keystroke signals from the buttons 316 can be processed by circuitry (e.g., analog to digital converter, etc.) of the keyboard 312 to convey to the computing device 310 which buttons have been depressed. The information transmitted to the computing device 310 can be analog or digital signals representing whether buttons 316 are pressed or not pressed.
Page 5 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV
[00031] FIGs. 3B-3D depict an illustrative embodiment of a variable actuation force device utilizing a variable magnet. In one or more embodiments, the variable actuation force device 350 can be a button or keypad that is part of a keyboard or another computer accessory. For example, the variable actuation force device 350 can be a button of a computer mouse joystick, and/or video game controller. The variable actuation force device 350 can be split into sections that are held together in an assembly. The sections of the variable actuation force device 350 can move with respect to one another such that a user of a computer accessory can input a force and/or motion to the variable actuation force device 350 that causes the sections of the variable actuation force device 350 to move with respect to one another.
[00032] In one or more embodiments, the variable actuation force device 350 can include an upper section 352 and a lower section 362. The upper section 352 can be a button interface for a user of the variable actuation force device 350 to engage the device. For example, the upper section 352 can be an ergonomic surface designed for engaging a finger, thumb, of other part of a hand. The upper section 352 may include text or symbols or characters printed or embossed on its surface. The upper section 352 may include tactile queues, such as concave or convex shapes, raised surfaces, and the like, for identifying the variable actuation force device 350. The upper section 352 can move with respect to the lower section 362.
[00033] In one or more embodiments, the lower section 362 of the variable actuation force device 350 can provide a base for the intra-device movements of the assembly. For example, the upper section 352 can be attached to the lower section 362 such that the upper section 352 is kept in close proximity to the lower section 362 during wait, or non-button push times, and the upper section 352 moves toward and engages with the lower section 362 when it is pressed. In one or more embodiments, the upper section 352 can be attached to the lower section 362 to maintain the nonpressed close proximity. For example, the upper section 352 can be attached using a hinge or a spring or stopping mechanism that prevents the upper section 352 and the lower section 362 from coming apart. In one or more embodiments, the variable actuation force device 350 can be part of an array of buttons or keypads, such as in a keyboard. The lower section 362 can be a substrate or chassis that holds multiple
Page 6 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV buttons or keypad devices, any or all of which can be variable actuation force devices 350.
[00034] In one or more embodiments, the variable actuation force device 350 can include a mechanism for detecting the pressed and non-pressed state of the device. For example, the lower section 362 can include a PCB that is configured to detect a pressing of the upper section 352 when a first piece of conductive material 364 that is attached to the upper section 352 makes contact with a second piece of conductive material 366 of the lower section 362 (e.g., rubber dome, membrane switches). Other implementations can include traditional mechanical electronic switches with copper blades that make contact when the switch is depressed.
[00035] In one or more embodiments, the variable actuation force device 350 can include a variable force magnet 356 that is attached to either the upper section 352 or the lower section 362 of the device 350. The variable force magnet 356 can be an electromagnet device that generates a variable magnetic field under the influence of an electric current or voltage. For example, an electromagnet can be formed by wrapping a conductor 360 around a ferromagnetic material. The ferromagnetic material of the variable force magnet 356 can bear a permanent magnetism, such that it generates a magnetic field without being energized by the conductor 360, or can be not magnetized (i.e., not produce a magnetic field when not energized).
[00036] In one or more embodiments, the variable force magnet 356 can be energized by current flowing in the conductor 360. For example, a current 370 can be coupled into the conductor 360 to cause the ferromagnetic material of the variable force magnet 356 to generate a magnetic field 372. The magnetic field 372 can exhibit properties of magnitude and polarity (direction) based on the magnitude and direction of the electrical current flowing in the conductor 360.
[00037] In one or more embodiments, a response block 354 can be mounted either in the upper section 352 or the lower section 362 of the variable actuation force device 350. The response block 354 can be a ferromagnetic material that is responsive to the magnetic field 372 that is generated by the variable force magnet 356. In one embodiment, the response block 354 can be ferromagnetic but not magnetized. In this configuration, the response block 354 can be attracted by the
Page 7 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV magnetic field 372 that is generated by the variable force magnet 356 regardless of the polarity of the magnetic field 372. If a non-magnetized response block is mounted in the upper section 352 and the variable force magnet 356 is mounted in the lower section 362, then the magnetic field 372 will cause the response block 354 and the upper section 352 to be attracted to the variable force magnet 356 and the lower section 362.
[00038] In one or more embodiments, a mechanical force source, such as a spring 368 can be included in the variable actuation force device 350 to provide a fixed mechanical force for pushing the upper section 352 and the lower section 362 apart. The spring 368 can thereby create a fixed force that separates the upper section 352 and the lower section 362, while the variable force magnet 356 can create a variable force that pulls the upper section 352 and the lower section 362 together. The combination of the fixed force of the spring 368 and the variable magnetic force of the variable force magnet 356 can combine to create an overall, variable resistance between the upper section 352 and the lower section 362 that must be overcome when pressing the variable actuation force device 350. In another embodiment, the spring 368, the variable force magnet 356, and the response block 354 can be placed in a different configuration, whereby the spring 368 provides a force to pull the upper section 352 toward the lower section 362, while the interaction of the variable force magnet 356 and the response block 354 provide a variable force to push the upper section 352 and the lower section 362 apart. For example, the spring 368, the variable force magnet 356, and the response block 354 can be coupled to the upper section 352 and the lower section 362 via a pivot or hinge mechanism.
[00039] In one or more embodiments, the response block 354 can be magnetized. As a result of magnetization, the response block 354 can generate its own magnetic field. The magnetic field of the response block 354 can have a fixed magnitude and polarity. When the fixed magnetic field of the magnetized response block 354 interacts with the variable magnetic field 372 that is generated by the variable force magnet 356, the polarity of the two fields is critical to determining performance of the variable actuation force device 350. For example, if the fixed magnetic field of the magnetized response block 354 and the variable magnetic field 372 that is generated
Page 8 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV by the variable force magnet 356 have the same polarity, that is, the “North” poles of the magnetic fields are pointing in the same direction, then the interaction between the magnetic fields can cause the response block 354 to be attracted to the variable force magnet 356. Consequently, the upper section 352 can be attracted to the lower section 362. Alternatively, if the fixed magnetic field of the magnetized response block 354 and the variable magnetic field 372 that is generated by the variable force magnet 356 have opposite polarity, where the “North” poles of the magnetic fields are pointing in opposite directions, then the interaction between the fields can cause the response block 354 to be repulsed by the variable force magnet 356. As a result, the upper section 352 can be repulsed from the lower section 362. In another embodiment, the fixed magnetic field of the magnetized response block 354 and the variable magnetic field 372 that is generated by the variable force magnet 356 can be oriented at something between same and opposite polarity. In this case, the force relationship between the response block 354 and the variable force magnet 356 can be more complex and, in fact, could change between attraction and repulsion as the upper section 352 and the lower section 362 are pushed together.
[00040] In one or more embodiments, the variable actuation force device 350 can include or exclude a spring 368. The combination of the polarities of the fixed magnetic field of the response block 354 and the variable magnetic field 372 of the variable force magnet 356 and the orientations of these magnetic fields with respect to one another and to the upper section 352 and the lower section 362, can create a combined force that pushes the upper section 352 and the lower section 362 apart or that pulls the upper section 352 toward the lower section 362. For example, the variable magnetic field 372 and the fixed magnetic field can be of net opposite polarity such that a resulting, variable actuation force is generated that resists the pressing of the upper section 352 to the lower section 362. This variable actuation force can be controlled using only the interaction of the magnetic elements 354 and 356, and, in particular, the magnitude and direction of the electric current 370. In another example, the variable magnetic field 372 and the fixed magnetic field can be of net same polarity such that a resulting, variable actuation force of attraction is generated that causes the upper section 352 to be pulled toward the lower section 362.
Page 9 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV
In this case, a spring 368 can be added to provide a force that resists pressing. In this case, a net resistive (to pushing) force can be created by including a spring 368 that provides a fixed repulsion force that is greater than the variable attraction force that is created by the interaction of the response block 354 and the variable force magnet 356. In another embodiment, the spring 368, the variable force magnet 356, and the response block 354 can be placed in a different configuration, whereby the spring 368 provides a force to pull the upper section 352 toward the lower section 362, while the interaction of the variable force magnet 356 and the magnetized response block 354 provide a variable force to push the upper section 352 and the lower section 362 apart. [00041] In one or more embodiments, the resistance to pressing of the variable actuation force device 350 can be adjusted by changing the magnetic field that is generated by the variable force magnet 356. In one embodiment, the magnitude of the magnetic field can be changed by increasing or decreasing the current 370 at the variable force magnet 356. In one embodiment, the polarity of the magnetic field can be changed by reversing the direction of the current 370 that is used for energizing the variable force magnet 356. If an additional means of generating pressing resistance is incorporated into the design of the variable actuation force device 350, such as a spring 368 or an additional permanent magnet, then the variable force magnet 356 can generate a default resistive force for the depressing the upper section 352 even if the variable force magnet 356 is not energized. Further, by selecting the additional resistance, or default resistance, properly, the variable actuation force device 350 can provide a large range of resistance values. For example, the actuation force device 350 can be designed to have a default keypad pressing weight of 50 grams with the variable force magnet 356 deactivated (no current). If the variable force magnet 356 is then energized at full current in a first direction, then the variable force magnet 356 can generate a first magnetic field 372 to add an additional activation force equivalent to 50 grams for a combined pressing weight of 100 grams. If, however, the variable force magnet 356 is then energized at full current in the opposite direction, then the variable force magnet 356 can generate a second magnetic field 372 to subtract an activation force equivalent to 50 grams from the pressing weight and create a combined pressing weight of 0 grams. By modifying both the current magnitude and
Page 10 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV direction, the variable force magnet 356 can thereby generate a large range of pressing weights.
[00042] In one or more embodiments, the keyboard 312 and/or the computing device 310 can detect the pressing of the variable actuation force device 350 and, responsive to detecting the pressing, can adjust the pressing force of the variable actuation force device 350 by altering the magnitude and/or direction of the current that is energizing the variable force magnet 356. By changing the pressing force in response to detecting the pressing, the keyboard 312 and/or the computing device 310 can provide a keypad or button with a first pressing force in the key UP position and a second rebounding force in the key DOWN position. This technique can, for example, allow the user of the keyboard 312 to experience a combination of soft or light pressing force coupled with hard or heavy rebounding force. Alternatively, a hard or heavy pressing force can be combined with a soft or light rebounding force. [00043] In one or more embodiments, the keyboard 312 and/or the computing device 310 can be configured to enable a user to define programmable keypad pressing and/or rebounding forces. For example, the computing device 310 can be configured by a user to set in one instance the pressing weight of 40 grams and the rebounding weight of 60 grams. The computing device 310 can also be configured by a user to set multiple pressing and/or rebounding weights for a single button or for multiple buttons. The multiple pressing weights and/or rebounding weights can correspond to different actuation and reset states. For example, the first button press can be interpreted by the keyboard 312 and/or computing device 310 as a first actuation state, while a second button press (within a configurable time period) can be interpreted as a second actuation state. The computing device 310 can be further configured by a user to utilize the AMS application as will be explained below to replace stimuli generated by the variable actuation force device 350 with substitute stimuli supplied to software applications (e.g., a video game), to invoke a software application when an actuation state is detected, and/or perform other functions as will be described below.
[00044] In one or more embodiments, the keyboard 312 may additionally, or alternatively, include one or more keys or button devices that use a magnet proximity
Page 11 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV sensor, such as a Hall Effect sensor, rather than a traditional switch, such as a rubber membrane with conductive material or a mechanical switch that makes or breaks contact. FIG. 3E depicts an illustrative embodiment of a key or button device 380 of a keyboard that utilizes a magnet 386 and a magnet proximity sensor 382. Keys or buttons 380 may be used in addition to or as substitutes for variable actuation force devices 350. Various features described above with respect to the variable actuation force device 350 may apply to the key or button device 380. In any case, the magnet proximity sensor 382 may be a Hall Effect sensor that can measure a strength of a magnetic field or a change in the strength of a magnetic field generated by the magnet 386, which is in proximity to the magnetic proximity sensor 382. The magnetic proximity sensor 382 may output a voltage level that corresponds to the strength/change in strength of the magnetic field that it senses from the magnet as (e.g., a spring-loaded) portion 388 holding the magnet 386 is depressed. A control system 390 (which may be implemented in hardware, firmware, or a combination of hardware and software) can detect the voltage level of the Hall Effect sensor-based key or button. In a keyboard, the control system 390 can detect the voltage levels of the individual Hall Effect sensors corresponding to the various keys. In one or more embodiments, the actuation depth for a given key (i.e., the depth of a depression of the key at which the key is determined to be pressed) can be adjusted by configuring the control system 390. Keys may be associated with a default actuation depth, such as, for instance, 0.1 millimeter (mm), which may correspond to a particular change in detected magnetic strength provided by the magnet 386 and thus a particular voltage provided by a corresponding Hall Effect sensor. In essence, the change in the strength of the Hall Effect sensor sets how much voltage is present across the sensor’s leads before the control system 390 decides that the key has been pressed. In one or more embodiments, the actuation depth for one or more keys may be user customized (e.g., changed to 0.15 mm, 0.22 mm, etc.) such that the control system 390 detects actuations of those keys according to specific voltage levels that correspond to the user-defined depths. In various embodiments, a key or button device, such as the key or button device 380, can additionally, or alternatively, utilize one or more other actuation/depth sensing switch technologies, such as optical sensor-based switch
Page 12 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV technology (i.e., L switch technology that operates in binary with a first “off’ state when the key is not pressed and no light reaches a photodetector, and a second “on” state when the key is pressed and light reaches the photodetector), capacitive sensor-based switch technology, inductive sensor-based switch technology, or any other type of sensor-based switch technology. In these embodiments, the control system 390 may be communicatively to such sensors for detecting actuations of associated keys.
[00045] FIG. 3F illustrates an example dynamic actuation depth adjustment scheme in accordance with various aspects described herein. In various embodiments, the scheme may be used for a keyboard with Hall Effect sensor-based keys, such as the key 380 described above or keys configured with other types of switch sensor technologies, such as optical sensors, capacitive sensors, inductive sensors, etc.
[00046] As illustrated in FIG. 3F, the control system 390 may be communicatively coupled to multiple keys (e.g., leads of sensors associated with the keys). While the control system 390 is shown to be communicatively coupled to only two keys, ‘W’ and ‘E’, it will be understood and appreciated that the control system 390 may be communicatively coupled to additional keys, such as one or more other keys that may be included in a standard or customized keyboard. In exemplary embodiments, the control system 390 may be configured to dynamically adjust the actuation depth of one or more keys in response to change(s) to nearby key state(s). As illustrated in FIG. 3F, the ‘W’ and ‘E’ keys may be associated with a default or predefined actuation depth — e.g., 0.1mm. Of course, other default or predefined actuation depths are also possible. In exemplary embodiments, the actuation depth may be adjustable in accordance with a (e.g., user-selectable) protection mode for a given key. For instance, the control system 390 may, either by default or according to a user selection, enable the protection mode for a given key such that, when that key is pressed to its actuation depth, the actuation depth of one or more neighboring keys is adjusted to a different actuation depth (e.g., 1.5mm or any other depth value). In some embodiments, the adjustment s) may be made in real-time (or near real-time), such as within a maximum delay of about 1ms from detection of the actuation of the
Page 13 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV key. In the example illustrated in FIG. 3F, at 395a, the ‘W’ key may receive a depression force (e.g., a user key press) that causes it to be displaced (395b) to the default or predefined actuation depth of 0.1mm or beyond. At 395c, the control system 390 may detect this as an actuation of the ‘W’ key. Based on this detection, the control system 390 may, at 395d, dynamically adjust the actuation depth of the ‘E’ key to the protection mode actuation depth — here, e.g., 1.5mm. Responsive to depression force(s) applied to the ‘E’ key, the ‘E’ key may be displaced by corresponding amounts, such as, for instance, amount 395e (i.e., to some actuation depth that is between 0.1mm and 1.5mm) and amount 395f (i.e., to 1.5mm or beyond). The control system 390 may detect (395g) actuation of the ‘E’ key only if its displacement is greater than or equal to 1.5mm (i.e., displacement 395f or beyond). [00047] Various settings or configurations may be set for the protection mode on a per-key basis. The configurations may be defined by default and/or via user customization — e.g., using a user interface, such as the GUI of FIG. 1 or the like. The configurations may be utilized by the control system 390 when implementing the protection mode for one or more keys. As an example, prior to or while playing a game, the user may select, using the user interface, one or more keys to enable the protection mode for, which can trigger the control system 390 to apply the protection mode for those selected keys.
[00048] In exemplary embodiments, all neighboring keys of a particular key may (e.g., by default) be subject to the protection mode when that particular key is pressed. As used herein, a neighboring key refers to one that is physically adjacent to another key — i.e., one that borders the key or that shares a common edge or boundary with the key. In various embodiments, the control system 390 may store and/or have access to a neighboring key mapping for one or more keys that the control system 390 can use to facilitate the identification of potential keys to adjust actuation depths for when those keys are pressed. FIG. 3G illustrates a portion of an example keyboard that includes keys that are considered neighbors of a particular key. Particularly, the ‘T’ key is shown in FIG. 3G with its neighboring keys ‘R’, ‘5’, ‘6,’, ‘Y’, ‘F’, and ‘G’. As an example, the control system 390 may store and/or have access to a neighboring key mapping that identifies the ‘R’, ‘5’, ‘6,’, ‘ Y’, ‘F’, and ‘G’ keys as being neighbors
Page 14 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV of the ‘T’ key. Some or all of these keys may (e.g., by default) be subject to the protection mode and thus have their actuation depths adjusted when the ‘T’ key is pressed. Continuing the example, the neighboring key mapping may similarly identify the neighboring key(s) for some or all of the keys of the keyboard. In one or more embodiments, some or all of these neighboring keys may be user selectable for inclusion in or exclusion from the protection mode. For example, a user may select (e.g., via the user interface) only the ‘R’ and ‘ Y’ keys for inclusion in the protection mode when the ‘T’ key is pressed. In such a case, the control system 390 may not dynamically adjust the actuation depth of the ‘5’, ‘6,’, ‘F’, and ‘G’ keys when the ‘T’ key is pressed.
[00049] In various embodiments, the specific adjustments to the actuation depths of some or all of the neighboring keys may be user-defined. For instance, the user may select only the ‘R’ and ‘ Y’ keys for inclusion in the protection mode, where the adjusted actuation depth of the ‘R’ key is one value (e.g., 1.8mm) and the adjusted actuation depth of the ‘Y’ key is the same or a different value (e.g., 1.4mm, 1.8mm, 2.5mm, etc.). While the intent of the protection mode is to make it more difficult to accidentally actuate neighboring keys when a particular key is pressed — i.e., by increasing the actuation depth of those neighboring key(s), in certain embodiments, the control system 390 may enable a user to select shorter actuation depths for one or more of the neighboring keys — i.e., shorter than the default or predefined actuation depth. For example, if a default or predefined actuation depth is 1.3mm, the user may be permitted to select an adjusted actuation depth that is shorter than 1.3mm (e.g., 1.1mm).
[00050] In one or more embodiments, the adjustment to the actuation depth may last for a default duration (e.g., 250 milliseconds (ms), 400ms, 1 second (s), etc.) or a duration that is user-defined. For example, in certain embodiments, the control system 390 may initiate a timer (e.g., for 250ms) based upon detection of an actuation of a pressed key and/or in conjunction with adjusting the actuation depth of a given neighboring key, and may allow the timer to count down or elapse before resetting the actuation depth back to a default or predefined value. In this way, for instance, when the ‘W’ key is pressed, the actuation depth of one or more neighboring keys, such as
Page 15 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV the ‘E’ key, may be increased for that default or chosen duration beginning from detection of actuation of the ‘W’ key, after which the actuation depth(s) of those neighboring key(s) may revert to their default or predefined value(s). In various embodiments, the control system 390 may initiate timers that have the same countdown value or different countdown values for different ones of the neighboring keys. As an example, if the ‘E’ key is pressed, the control system 390 may (e.g., based on a default setting or user customization) initiate a 250ms timer for the neighboring ‘W’ key and a 500ms timer for the neighboring ‘R’ key.
[00051] In certain embodiments, the control system 390 may maintain the adjusted actuation depth(s) of neighboring key(s) (e.g., only) while the particular key is being pressed even if the default or user-defined duration has not yet elapsed (e.g., 250ms has not yet passed since the actuation of the particular key or since the adjustment of the actuation depth). That is, the control system 390 may revert the actuation depth(s) of the neighboring key(s) to their default or predefined values once the particular key is no longer detected as being actuated. In alternate embodiments, the control system 390 may maintain the adjusted actuation depth(s) of the neighboring key(s) for the full default or user-defined duration regardless of whether the particular key has been released from actuation.
[00052] It is noted that other accessories (e.g., mouse, gaming controllerjoystick, smartphone with tactile keypad, navigation disk of a mobile device, etc.) can utilize any of the variations of the variable actuation force device 350 and/or the key 380 described above with respect to FIGs. 3B-3F. For example, the buttons of a mouse can be configured with a key 380 as described by the subject disclosure. Any of the buttons on a gaming controller (such as reference 115) of FIG. 2 can be configured with variable actuation force devices and/or keys as described by the subject disclosure. For instance, any device which can make use of a variable pressing and/or rebounding force or Hall Effect (or other types of) sensors and can utilize the variable actuation force devices and/or keys described by the subject disclosure. Any of the accessory devices described in the subject disclosure can also be adapted to utilize any of the variations of the variable actuation force devices and/or keys described
Page 16 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV above with respect to FIGs. 3B-3F or a suitable substitute that performs a similar function.
[00053] FIG. 4 depicts an illustrative embodiment of a communication device 400. Communication device 400 can serve in whole or in part as an illustrative embodiment of devices described in the subject disclosure. For example, the communication device 400 may facilitate adjusting of scroll wheel tactile sensations. The communication device 400 can comprise a wireline and/or wireless transceiver 402 (herein transceiver 402), a user interface (UI) 404, a power supply 414, a proximity sensor 416, a motion sensor 418, an orientation sensor 420, and a controller 406 for managing operations thereof. The transceiver 402 can support short-range or long-range wireless access technologies such as Bluetooth, WiFi, Digital Enhanced Cordless Telecommunications (DECT), or cellular communication technologies, just to mention a few. Cellular technologies can include, for example, CDMA- IX, UMTS/HSDPA, GSM/GPRS, TDMAZEDGE, EV/DO, WiMAX, software defined radio (SDR), Long Term Evolution (LTE), as well as other next generation wireless communication technologies as they arise. The transceiver 402 can also be adapted to support circuit-switched wireline access technologies (such as PSTN), packet-switched wireline access technologies (such as TCP/IP, VoIP, etc.), and combinations thereof.
[00054] The UI 404 can include a depressible or touch-sensitive keypad 408 coupled to a navigation mechanism such as a roller ball, a joystick, a mouse, a keyboard, or a navigation disk for manipulating operations of the communication device 400. In a case where the UI 404 includes a keyboard, the keypad 408 may provide keys and/or one or more scroll wheel assemblies (as may be described elsewhere herein) of the keyboard. In a case where the UI 404 includes a mouse, the keypad 408 may alternatively represent button(s) (e.g., left/right/middle button(s)) and/or one or more scroll wheel assemblies (as may be described elsewhere herein) of the mouse. The keypad 408 can be an integral part of a housing assembly of the communication device 400 or an independent device operably coupled thereto by a tethered wireline interface (such as a USB cable) or a wireless interface supporting for example Bluetooth. The keypad 408 can represent a numeric keypad, and/or a QWERTY keypad with alphanumeric keys. The UI 404 can further include a display 410 such as monochrome
Page 17 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV or color LCD (Liquid Crystal Display), OLED (Organic Light Emitting Diode) or other suitable display technology for conveying images to an end user of the communication device 400.
[00055] In an embodiment where the display 410 utilizes touch-sensitive technology, a portion or all of the keypad 408 can be presented by way of the display 410 with navigation features. As a touch screen display, the communication device 400 can be adapted to present a user interface with graphical user interface (GUI) elements that can be selected by a user with a touch of a finger. The touch screen display 410 can be equipped with capacitive, resistive or other forms of sensing technology to detect how much surface area of a user’s finger has been placed on a portion of the touch screen display. This sensing information can be used to control the manipulation of the GUI elements.
[00056] The UI 404 can also include an audio system 412 that utilizes common audio technology for conveying low volume audio (such as audio heard only in the proximity of a human ear) and high-volume audio (such as speakerphone for hands free operation, stereo or surround sound system). The audio system 412 can further include a microphone for receiving audible signals of an end user. The audio system 412 can also be used for voice recognition applications. The UI 404 can further include an image sensor 413 such as a charged coupled device (CCD) camera for capturing still or moving images and performing image recognition therefrom.
[00057] The power supply 414 can utilize common power management technologies such as replaceable or rechargeable batteries, supply regulation technologies, and charging system technologies for supplying energy to the components of the communication device 400 to facilitate long-range or short-range portable applications. Alternatively, the charging system can utilize external power sources such as DC power supplied over a physical interface such as a USB port or by way of a power cord attached to a transformer that converts AC to DC power.
[00058] The proximity sensor 416 can utilize proximity sensing technology such as an electromagnetic sensor, a capacitive sensor, an inductive sensor, an image sensor or combinations thereof. The motion sensor 418 can utilize motion sensing technology such as an accelerometer, a gyroscope, or other suitable motion sensing technology to
Page 18 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV detect movement of the communication device 400 in three-dimensional space. The orientation sensor 420 can utilize orientation sensing technology such as a magnetometer to detect the orientation of the communication device 400 (North, South, West, East, combined orientations thereof in degrees, minutes, or other suitable orientation metrics).
[00059] The communication device 400 can use the transceiver 402 to also determine a proximity to a cellular, WiFi, Bluetooth, or other wireless access points by common sensing techniques such as utilizing a received signal strength indicator (RSSI) and/or a signal time of arrival (TO A) or time of flight (TOF). The controller 406 can utilize computing technologies such as a microprocessor, a digital signal processor (DSP), and/or a video processor with associated storage memory such as Flash, ROM, RAM, SRAM, DRAM or other storage technologies.
[00060] The communication device 400 as described herein can operate with more or less components described in FIG. 4 to accommodate the implementation of devices described by the subject disclosure. These variant embodiments are contemplated by the subject disclosure.
[00061] FIGs. 5, 6, and 7 A respectively depict methods 500, 600, and 700 describing illustrative embodiments of the AMS application. Method 500 can begin with step 502 in which the AMS application is invoked in a computing device. The computing device can be a remote server (not shown), the gaming console 206 or computer 208 of FIGs. 2 and 3, or any other computing device with suitable computing resources. The invocation step can result from a user selection of the AMS application from a menu or iconic symbol presented by the computing device, or when a user communicatively couples a gaming controller 115 or other form of accessory device with the computing device. In step 504, the AMS application can detect by way of software drivers in an operating system (OS) of the computing device a plurality of operationally distinct accessories communicatively coupled to the computing device. The accessories can be coupled to the computing device by a tethered interface (e.g., USB cable), a wireless interface (e.g., Bluetooth or Wireless Fidelity — WiFi), or combinations thereof.
Page 19 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV
[00062] In the present context, an accessory can represent any type of device which can be communicatively coupled to the computing device (or which can be an integral part of the computing device) and which can control aspects of the OS and/or a software application operating from the computing device. An accessory can represent for example a keyboard, a touch screen display, a gaming pad, a gaming controller, a mouse, a joystick, a microphone, or a headset with a microphone — just to mention a few.
[00063] In step 506, the AMS application presents a GUI (e.g., the GUI 101 depicted in FIG. 1) that shows operationally distinct accessories, such as a keyboard 108, a gaming controller 115, etc. The GUI 101 presents the accessories 108-116 in a scrollable section 117. One or more accessories can be selected by a user with a mouse pointer. In this illustration, the keyboard 108 and the gaming controller 115 were selected for customization. Upon selecting the keyboard 108 and the gaming controller 115 from the scrollable window of section 117, the AMS application presents the keyboard 108 and the gaming controller 115 in split windows 118, 120, respectively, to assist the user during the customization process.
[00064] In step 508, the AMS application can be programmed to detect a userselection of a particular software application such as a video game. This step can be the result of the user entering in a Quick Search field 160 the name of a gaming application (e.g., World of Warcraft™ or WoW) or any other application (e.g., a word processing application, a web browsing application, etc.). Assume that the user selects a gaming application. In this case, upon identifying the gaming application, the AMS application can retrieve in step 510 from a remote or local database gaming application actions which can be presented in a scrollable section 139 of the GUI represented as “Actions” 130. The actions can be tactical actions 132, communication actions 134, menu actions 136, and movement actions 138 which can be used to invoke and manage features of the gaming application.
[00065] The actions presented descriptively in section 130 of the GUI can represent a sequence of accessory input functions which a user can stimulate by button depressions, navigation or speech. For example, depressing the left button on the mouse 110 can represent the tactical action “Reload”, while the simultaneous keyboard
Page 20 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV depressions “Ctrl A” can represent the tactical action “Melee Attack”. For ease of use, the “Actions” 130 section of the GUI is presented descriptively rather than by a description of the input function(s) of a particular accessory.
[00066] Any one of the Actions 130 can be associated with one or more input functions of the accessories being customized in windows 118 and 120 by way of a drag and drop action or other customization options. For instance, a user can select a “Melee Attack” by placing a mouse pointer 133 over an iconic symbol associated with this action. Upon doing so, the symbol can be highlighted to indicate to the user that the icon is selectable. At this point, the user can select the icon by holding the left mouse button and drag the symbol to any of the input functions (e.g., buttons) of the keyboard 108 or selectable options of the gaming controller 115 to make an association with an input function of one of these accessories. Actions of one accessory can also be associated with another accessory that is of a different category. For example, key depressions “Ctrl A” of the keyboard 108 can be associated with one of the buttons of the gaming controller 115 (e.g., the left button 119).
[00067] In one embodiment, a Melee Attack action can be associated by dragging this action to either the left button 119 or right button 121 of the gaming controller 115. Thus, when the selected button is depressed, the stimulus signal that is generated by the selected button of the gaming controller 115 can be substituted by the AMS application with the Melee Attack action. In another embodiment, the AMS application can be configured so that the Melee Action can be associated with a combination of key button presses (e.g., simultaneous depression of the left and right buttons 119, 121, or a sequence of button depressions: two rapid left button depressions followed by a right button depression).
[00068] In yet another embodiment, the AMS application can be configured so that the Melee Action can be associated with movement of the gaming controller 115 such as, for example, rapid movement or shaking of the gaming controller 115. In a further embodiment, the AMS application can be adapted to make associations with two dimensional or three-dimensional movements of the gaming controller 115 according to a gaming venue state. For example, suppose the player’s avatar enters a fighter jet. In this gaming venue state, moving the left navigation knob forward can be associated
Page 21 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV by the AMS application with controlling the throttle of the jet engines. Rapidly moving the gaming controller 115 downward can represent release of munitions such as a bomb. [00069] In a gaming venue state where the gamer’ s avatar has entered a building, lifting of the gaming controller 115 above a first displacement threshold can be associated with a rapid movement of the avatar up one floor. A second displacement threshold can be associated with a rapid movement of the avatar down one floor — the opposite of the first displacement threshold. Alternatively, the second displacement threshold could be associated with a different action such as jumping between buildings when the avatar is on the roof of a building.
[00070] The AMS application can monitor gaming venue states by analyzing captured images produced by the gaming application (e.g., one or more still images of a tank, or a video of an avatar entering a tank), and/or by receiving messages from the gaming application by way of an application programming interface (API) thereby enabling the AMS application to identify the occurrence of a particular gaming venue state.
[00071] At step 512, the AMS application can also respond to a user selection of a profile. A profile can be a device profile or master profile invoked by selecting GUI button 156 or 158, each of which can identify the association of gaming actions with input functions of one or more accessories. If a profile selection is detected in step 512, the AMS application can retrieve in step 514 macro(s) and/or prior associations defined by the profile. The actions and/or macros defined in the profile can also be presented in step 516 by the AMS application in the actions column 130 of the GUI 101 to modify existing profile associations or create new associations.
[00072] In step 518, the AMS application can also respond to a user selection to create a macro. A macro in the present context can mean any actionable command which can be recorded by the AMS application. An actionable command can represent a sequence of stimuli generated by manipulating input functions of an accessory, a combination of actions in the Action section 130, an identification of a software application to be initiated by the OS of the computing device, or any other recordable stimulus to initiate, control or manipulate software applications. For instance, a macro can represent a user entering the identity of a software application (e.g., instant
Page 22 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV messaging tool) to be initiated by the OS upon the AMS application detecting a speech command using speech recognition technology.
[00073] A macro can also represent recordable speech delivered by a microphone singly or in combination with a headset for detection by another software application through speech recognition or for delivery of the recorded speech to other parties. In yet another embodiment a macro can represent recordable navigation of an accessory such as a joystick of the gaming controller 115, recordable selections of buttons of the gaming controller 115, and so on. Macros can also be combinations of the above illustrations with selected actions from the Actions 130 menu. Macros can be created from the GUI 101 by selecting a “Record Macro” button 148. The macro can be given a name and category in user-defined fields 140 and 142.
[00074] Upon selecting the Record Macro button 148, a macro can be generated by selection of input functions on an accessory (e.g., Ctrl A, speech, navigation knob movements of the gaming controller 115, etc.) and/or by manual entry in field 144 (e.g., typing the name and location of a software application to be initiated by an OS, such as an instant messaging application, keyboard entries such as Ctrl A, etc.). Once the macro is created, it can be tested by selecting button 150 which can repeat the sequence specified in field 144. The clone button 152 can be selected to replicate the macro sequence if desired. Fields 153 can also present timing characteristics of the stimulation sequence in the macro with the ability to modify and thereby customize the timing of one or more stimulations in the stimulation sequence. Once the macro has been fully defined, selection of button 154 records the macro in step 520. The recording step can be combined with a step for adding the macro to the associable items. Actions column 130, thereby providing the user the means to associate the macro with input functions of the accessories (e.g., one or more keys of the keyboard 108, buttons of the gaming controller 115, etc.).
[00075] In step 522, the AMS application can respond to drag and drop associations of actions with input functions of the keyboard 108 or the gaming controller 115. Associations can also be made based on the two or three dimensional movements of the gaming controller 115. If user input indicates that a user is performing an association, the AMS application can proceed to step 524 where it can determine if a profile has
Page 23 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV been identified in step 512 to record the association(s) detected. If a profile has been identified, the associations are recorded/stored in the profile in step 526. If a profile has not been identified in step 512, the AMS application can create a profile in step 528 for recording the detected associations. In the same step, the user can name the newly created profile as desired. The newly created profile can also be associated with one or more gaming software applications in step 530 for future reference. The AMS application can also record in a profile in step 526 associations based on gaming venue states. In this embodiment the same stimuli generated by the gaming controller 115 can result in different substitutions based on the gaming venue state detected by the AMS application.
[00076] Referring back to step 526, once the associations have been recorded in a profile, the AMS application can determine in step 532 which of the accessories shown illustratively in FIGs. 1 to 3 are programmable and available for programming. If the AMS application detects that an accessory (e.g., keyboard 108, gaming controller 115) is communicatively coupled to the computing device and determines that the accessory is capable of performing stimulus substitutions locally, the AMS application can proceed to step 534 of FIG. 5 where it submits the profile and its contents for storage in the accessory (e.g., the gaming controller 115 in FIGs. 2 and 3). Once the accessory (e.g., the gaming controller 115) is programmed with the profile, the accessory can perform stimuli substitutions according to the associations recorded by the AMS application in the profile. Alternatively, the AMS application can store the profile in the computing device(s) of FIGs. 2 and 3 and perform substitutions of stimuli supplied by the gaming controller 115 according to associations recorded in the profile by the AMS application.
[00077] The GUI 101 of FIG. 1 presented by the AMS application can have other functions. For example, the GUI 101 can present a layout of the accessory (button 122), how the accessory is illuminated when associations between input functions and actions are made (button 124), and configuration options for the accessory (button 126). The AMS application can adapt the GUI 101 to present more than one functional GUI page. For instance, by selecting button 102, the AMS application can adapt the GUI 101 to present a means to create macros and associate actions to accessory input functions as
Page 24 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV depicted in FIG. 1. Selecting button 104 can cause the AMS application to adapt the GUI 101 to present statistics from stimulation information and/or gaming action results captured by the AMS application as described in the subject disclosure. Selecting button 106 can also cause the AMS application to adapt the GUI 101 to present promotional offers and software updates.
[00078] The steps of method 500 in whole or in part can be repeated until a desirable pattern is achieved of associations between stimulus signals generated by accessories and substitute stimuli. It would be apparent to an artisan with ordinary skill in the art that there can be numerous other approaches to accomplish the embodiments described by method 500 or variants thereof. These undisclosed approaches are contemplated by the subject disclosure.
[00079] FIG. 6 depicts a method 600 for illustrating additional operations of the AMS application. In the configurations of FIGs. 2 and 3, the AMS application can be operating in whole or in part from the gaming controller 115, a gaming console 206, a computer 208, or a remote server (not shown). For illustration purposes, it is assumed the AMS application operates from the gaming console 206. Method 600 can begin with the AMS application establishing communications in steps 602 and 604 between the gaming console 206 and a gaming accessory such as the gaming controller 115, and a headset 114 such as shown in FIG. 1. These steps can represent for example a user starting the AMS application from the gaming console 206 and/or the user inserting at a USB port of the gaming console 206 a connector of a USB cable tethered to the gaming controller 115, which invokes the AMS application. In step 606, the gaming controller 115 and/or headset 114 can in turn provide the AMS application one or more accessory ID’s, or the user can provide by way of a keyboard or the gaming controller 115 user identification. With the accessory ID’s or user input, the AMS application can identify in step 608 a user account associated with the gaming controller 115 and/or headset 114. In step 610, the AMS application can retrieve one or more profiles associated with the user account.
[00080] In step 612, the user can be presented by way of a display coupled to the gaming console 206 profiles available to the user to choose from. If the user makes a selection, the AMS application proceeds to step 614 where it retrieves from the selected
Page 25 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV profiles the association(s) stored therein. If a selection is not made, the AMS application can proceed to step 616 where it can determine whether a software gaming application (e.g., video game) is operating from the gaming console 206 or whether the gaming console 206 is communicating with the software gaming application by way of a remote system communicatively coupled to the gaming console 206 (e.g., on-line gaming server(s) presenting, for example, World of Warcraft™). If a gaming software application is detected, the AMS application proceeds to step 617 where it retrieves a profile that matches the gaming application detected and the association(s) contained in the profile. As noted earlier, association(s) can represent accessory stimulations, navigation, speech, the invocation of other software applications, macros or other suitable associations that result in substitute stimulations. The accessory stimulations can be stimulations that are generated by the gaming controller 115, as well as stimulations from other accessories (e.g., headset 114), or combinations thereof.
[00081] Once a profile and its contents have been retrieved in either of steps 614 or step 617, the AMS application can proceed to step 719 of FIG. 7A where it monitors for a change in a gaming venue state based on the presentations made by the gaming application, or API messages supplied by the gaming application. At the start of a game, for example, the gaming venue state can be determined immediately depending on the gaming options chosen by the gamer. The AMS application can determine the gaming venue state by tracking the gaming options chosen by a gamer, receiving an API instruction from the gaming application, or by performing image processing on the video presentation generated by the gaming application. For example, the AMS application can detect that the gamer has directed an avatar to enter a tank. The AMS application can retrieve in step 719 associations for the gaming controller 115 for controlling the tank.
[00082] The AMS application can process movements of the gaming controller 115 forwards, backwards, or sideways in two or three dimensions to control the tanks movement. Similarly, rotating the gaming controller 115 or tilting the gaming controller 115 forward can cause an accelerometer, gyro or magnetometer of the gaming controller 115 to provide navigational data to the AMS application which can be substituted with an action to cause the tank to turn and/or move forward. The profile
Page 26 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV retrieved by the AMS application can indicate that the greater the forward tilt of the gaming controller 115, the greater the speed of the tank should be moving forward. Similarly, a rear tilt can generate navigation data that is substituted with a reverse motion and/or deceleration of the forward motion to stop or slow down the tank. A three dimensional lift of the mouse can cause the tank to steer according to the three dimensional navigation data provided by the gaming controller 115. For example, navigation data associated with a combination of a forward tilt and right bank of the gaming controller 115 can be substituted by the AMS application to cause an increase in forward speed of the tank with a turn to the right determined by the AMS application according to a degree of banking of the gaming controller 115 to the right. In the above embodiment, the three dimensional navigation data allows a gamer to control any directional vector of the tank including speed, direction, acceleration and deceleration. [00083] In another illustration, the AMS application can detect a new gaming venue state as a result of the gamer directing the avatar to leave the tank and travel on foot. Once again the AMS application retrieves in step 719 associations related to the gaming venue state. In this embodiment, selection of buttons of the gaming controller 115 can be associated by the AMS application with weaponry selection, firing, reloading and so on. The movement of the gaming controller 115 in two or three dimensions can control the direction of the avatar and/or selection or use of weaponry. Once the gaming venue state is detected in step 719, the AMS application retrieves the associations related to the venue state and can perform substitutions of stimuli generated by the gaming controller 115, and/or speech commands received by microphone of the headset 114. [00084] In one embodiment, the AMS application can be configured in step 719 to retrieve a profile that provides substitute stimuli for replacing certain stimuli generated by accessories. The associations recorded in the profile can be venue independent. In another embodiment, the AMS application can retrieve a combination of profiles, where one or more profiles provide substitute stimuli that are venue dependent and one or more other profiles provide substitute stimuli that are venue independent.
[00085] The AMS application can monitor in step 720 stimulations generated by the accessories coupled to the gaming console 206. The stimulations can be generated by the gamer manipulating the gaming controller 115, and/or by generating speech
Page 27 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV commands detected by a microphone of the headset 114. If a stimulation is detected at step 720, the AMS application can determine in step 722 whether to forward the detected stimulation(s) to an Operating System (OS) of the gaming console 206 or the gaming application directly without substitutions. This determination can be made by comparing the detected stimulation(s) to corresponding associations in one or more profiles retrieved by the AMS application. If the detected stimulation(s) match the associations, then the AMS application proceeds to step 740 where it retrieves substitute stimulation(s) in the profile(s). In step 742, the AMS application can substitute the detected stimulation(s) with the substitute stimulations in the profile(s).
[00086] In one embodiment, the AMS application can track in step 744 the substitute stimulations by updating the stimulations with a unique identifier such as a globally unique identifier (GUID). In this embodiment, the AMS application can also add a time stamp to each substitute stimulation to track when the substitution was performed. In another embodiment, the AMS application can track each substitute stimulation according to its order of submission to the gaming application. For instance, sequence numbers can be generated for the substitute stimulations to track the order in which they were submitted to the gaming application. In this embodiment, the substitute stimulations do not need to be updated with sequence numbers or identifiers so long as the order of gaming action results submitted by the gaming application to the AMS application remain in the same order as the substitute stimulations were originally submitted.
[00087] For example, if a first stimulation sent to the gaming application by the AMS application is a command to shoot, and a second stimulation sent to the gaming application is a command to shoot again, then so long as the gaming application provides a first a game action result for the first shot, followed by a game action result for the second shot, then the substitute stimulations will not require updating with sequence numbers since the game action results are reported in the order that the stimulations were sent. If on the other hand, the game action results can be submitted out of order, then updating the stimulations with sequence numbers or another suitable identifier would be required to enable the AMS application to properly track and correlate stimulations and corresponding gaming action results.
Page 28 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV
[00088] Referring back to step 722, if the detected stimulation(s) do not match an association in the profile(s), then the AMS application proceeds to one of steps 744 or 746 in order to track the stimulations of the accessory as described above. In another embodiment, tracking of original stimulations or substitute stimulations can be bypassed by skipping steps 744 or 746 and proceeding to step 734.
[00089] Once the stimulations received in step 720 have been substituted with other stimulations at step 742 responsive to a detected association, or maintained unchanged responsive to detecting no association with substitute stimuli, and (optionally) the AMS application has chosen a proper tracking methodology for correlating gaming action results with stimulations, the AMS application can proceed to step 748 where it supplies to the OS of the computing device 206 a gaming action (i.e., one or more stimulations). The gaming action supplied to the OS at step 748 can be an unadulterated “original” gaming action or an alternative generated gaming action. At step 734, the OS determines whether to invoke in step 736 a software application identified in the stimulation(s) (e.g., gamer says “turn on team chat”, which invokes a chat application), whether to forward the received stimulation(s) to the gaming software application in step 738, or combinations thereof. Step 734 may also represent a bypass of the OS whereby stimuli signals are directed to a software application of either steps 736 or 738. [00090] Contemporaneous to the embodiments described above, the AMS application can monitor in step 750 for game action results supplied by the gaming application via API messages previously described. For instance, suppose the stimulation sent to the gaming application in step 738 is a command to shoot a pistol. The gaming application can determine that the shot fired resulted in a miss of a target or a hit. The gaming application can respond with a message which is submitted by way of the API to the AMS application that indicates the shot fired resulted in a miss or a hit. If IDs such as GUIDs were sent with each stimulation, the gaming application can submit game action results with their corresponding GUID to enable the AMS application to correlate the gaming action results with stimulations having the same GUID.
[00091] For example, if the command to shoot included the ID “1234”, then the game action result indicating a miss will include the ID “1234”, enabling the AMS
Page 29 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV application in step 752 to correlate the game action result to the stimulation having the same ID. If on other hand, the order of game action results can be maintained consistent with the order of the stimulations, then the AMS application can correlate in step 754 stimulations with game action results by the order in which stimulation were submitted and the order in which game action results are received. In step 756, the AMS application can catalogue stimulations and game action results. In another embodiment, the AMS application can be adapted to catalogue the stimulations in step 760. In this embodiment, step 760 can be performed as an alternative to steps 750 through 756. In another embodiment, step 760 can be performed in combination with steps 750 through 756 in order to generate a catalogue of stimulations, and a catalogue for gaming action results correlated to the stimulations.
[00092] FIGs. 7B and 7C illustrate embodiments of a system with a corresponding communication flow diagram for correlating stimulations and gaming action results. In this illustration a user clicks the left button 119 of the gaming controller 115. The gaming controller 115 can include firmware (or circuitry), which creates an event as depicted by event 2 in FIG. 7B. The button depression and the event creation are depicted in FIG. 7C as steps 782 and 784. In step 784, the firmware of the gaming controller 115 can, for example, generate an event type “left button #3”, and a unique GUID with a time stamp which is submitted to the AMS application. Referring back to FIG. 7B, the AMS application catalogues event 3, and if a substitute stimulation has been predefined, remaps the event according to the substitution. The remapped event is then transmitted to the gaming application at event 4. Event 3 of FIG. 7B is depicted as step 786 in FIG. 7C. In this illustration, the AMS application substitutes the left button #3 depression stimulus with a “keyboard ‘F’” depression which can be interpreted by the gaming application as a fire command. The AMS application in this illustration continues to use the same GUID, but substitutes the time stamp for another time stamp to identify when the substitution took place.
[00093] Referring back to event 4, the gaming application processes the event and sends back at event 5 a game action result to the AMS application which is processed by the AMS application at event 6. The AMS application then submits the results to the accessory at event 7. Events 4 and 5 are depicted as step 788 in FIG. 7C. In this
Page 30 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV step, the gaming application processes “F” as an action to fire the gamer’s gun, and then determines from the action the result from logistical gaming results generated by the gaming application. In the present illustration, the action of firing resulted in a hit. The gaming application can submit to the AMS application the result type “Hit” with a new time stamp, while utilizing the same GUID for tracking purposes. At step 790, the AMS application correlates the stimulation “left button #3 (and/or the substitute stimulation keyboard “F”) to the game result “Hit” and catalogues them in memory. The AMS application then submits to the accessory (e.g., gaming controller 115) in step 790 the game action results “Hit” with the same GUID, and a new time stamp indicating when the result was received. Upon receiving the message from the AMS application, the accessory in step 792 processes the “Hit” by asserting a red LED on the accessory (e.g., left button 119 illuminates in red or other LED of the gaming controller 115 illuminates in red) to indicate a hit. Other notification notices can be used such as another color for the LED to indicate misses, a specific sound for a hit, or kill, a vibration or other suitable technique for notifying the gamer of the game action result. [00094] It is to be understood and appreciated that, although one or more of FIGs. 1 to 7C might be described above as pertaining to various processes and/or actions that are performed in a particular order, some of these processes and/or actions may occur in different orders and/or concurrently with other processes and/or actions from what is depicted and described above. Moreover, not all of these processes and/or actions may be required to implement the systems and/or methods described herein. Furthermore, while various systems, devices, components, etc. may have been illustrated in one or more of FIGs. 1 to 7C as separate systems, devices, components, etc., it will be appreciated that multiple systems, devices, components, etc. can be implemented as a single system, device, component, etc., or a single system, device, component, etc. can be implemented as multiple systems, devices, components, etc. Additionally, functions described as being performed by one system, device, component, etc. may be performed by multiple systems, devices, components, etc., or functions described as being performed by multiple systems, devices, components, etc. may be performed by a single system, device, component, etc.
Page 31 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV
[00095] FIG. 8 depicts an illustrative embodiment of a method 800 in accordance with various aspects described herein.
[00096] At 802, the method can include detecting an actuation of a first key of a keyboard. For example, similar to that described above with respect to one or more of FIGs. 3E to 3G, the control system 390 can perform one or more operations that include detecting an actuation of a first key of a keyboard.
[00097] At 804, the method can include adjusting an actuation depth of at least one neighboring key of the first key of the keyboard based on the detecting. For example, similar to that described above with respect to one or more of FIGs. 3E to 3G, the control system 390 can perform one or more operations that include adjusting an actuation depth of at least one neighboring key of the first key of the keyboard based on the detecting.
[00098] In one or more embodiments, the adjusting includes adjusting the actuation depth of the at least one neighboring key from a first actuation depth to a second actuation depth.
[00099] In one or more embodiments, the second actuation depth is greater than the first actuation depth. In other embodiments, the second actuation depth is less than the first actuation depth. In one or more embodiments, the second actuation depth is a default adjusted actuation depth. In other embodiments, the second actuation depth is user-defined.
[000100] In one or more embodiments, the first actuation depth is at least 0.1mm.
[000101] In one or more embodiments, the first actuation depth is no more than 4.0mm.
[000102] In one or more embodiments, the second actuation depth is at least 0.2mm. [000103] In one or more embodiments, the second actuation depth is no more than 0.5mm.
[000104] In one or more embodiments, the second actuation depth is no more than 1.0mm.
[000105] In one or more embodiments, the method can include initiating a timer based on the detecting, and re-adjusting the actuation depth of the at least one neighboring key from the second actuation depth to the first actuation depth after the timer elapses.
Page 32 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV
In one or more embodiments, a countdown period of the timer is a default period. In other embodiments, the countdown period of the timer is user-defined.
[000106] In one or more embodiments, the countdown period of the timer is at least 100ms.
[000107] In one or more embodiments, the countdown period of the timer is at least 500ms.
[000108] In one or more embodiments, the countdown period of the timer is no more than 1 second.
[000109] In one or more embodiments, the countdown period of the timer is indefinite.
[000110] In one or more embodiments, the at least one neighboring key includes all keys that border or share an edge or boundary with the first key. In other embodiments, the at least one neighboring key includes one or more but not all keys that border or share an edge or boundary with the first key.
[000111] In one or more embodiments, the method can include receiving a user selection to enable a protection mode for the first key, resulting in an enabled protection mode, where the adjusting is based on the enabled protection mode.
[000112] In one or more embodiments, actuations of keys of the keyboard are detected from signals provided by sensors associated with the keys, where the sensors comprise Hall Effect sensors, optical sensors, capacitive sensors, inductive sensors, other types of sensors, or a combination thereof.
[000113] While for purposes of simplicity of explanation, the respective processes are shown and described as a series of blocks in FIG. 8, it is to be understood and appreciated that the claimed subject matter is not limited by the order of the blocks, as some blocks may occur in different orders and/or concurrently with other blocks from what is depicted and described herein. Moreover, not all illustrated blocks may be required to implement the methods described herein.
[000114] Upon reviewing the aforementioned embodiments, it would be evident to an artisan with ordinary skill in the art that the embodiments of the subject disclosure can be modified, reduced, or enhanced without departing from the scope of the claims described below. For example, the AMS application can be executed from an accessory
Page 33 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV
(e.g., 110, 114, 115, etc.) or a computing device (e.g., gaming console 206 and/or computer 208) to perform the embodiments described in the subject disclosure. The AMS application can also be operated from a remote server (“cloud services”). In yet another embodiment, functions of the AMS application can be distributed between devices. In yet another embodiment, the AMS application can be configured to track the performance of a gamer and adapt a threshold as the gamer improves or declines in performance.
[000115] It should be understood that devices described in the exemplary embodiments can be in communication with each other via various wireless and/or wired methodologies. The methodologies can be links that are described as coupled, connected and so forth, which can include unidirectional and/or bidirectional communication over wireless paths and/or wired paths that utilize one or more of various protocols or methodologies, where the coupling and/or connection can be direct (e.g., no intervening processing device) and/or indirect (e.g., an intermediary processing device such as a router).
[000116] FIG. 9 depicts an exemplary diagrammatic representation of a machine in the form of a computer system 900 within which a set of instructions, when executed, may cause the machine to perform any one or more of the methods described above. The computer system 900 may facilitate adjusting of scroll wheel tactile sensations. One or more instances of the machine can operate, for example, as an accessory, computing device or combinations thereof. For example, the machine can be embodied as a laptop computer. In some embodiments, the machine may be connected (e.g., using a network 926) to other machines. In a networked deployment, the machine may operate in the capacity of a server or a client user machine in a server-client user network environment, or as a peer machine in a peer-to-peer (or distributed) network environment.
[000117] The machine may comprise a server computer, a client user computer, a personal computer (PC), a tablet, a smart phone, a laptop computer, a desktop computer, a control system, a network router, switch or bridge, or any machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine. It will be understood that a communication device of the subject
Page 34 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV disclosure includes broadly any electronic device that provides voice, video, or data communication. Further, while a single machine is illustrated, the term “machine” shall also be taken to include any collection of machines that individually or jointly execute a set (or multiple sets) of instructions to perform any one or more of the methods discussed herein.
[000118] The computer system 900 may include a processor (or controller) 902 (e.g., a central processing unit (CPU)), a graphics processing unit (GPU, or both), a main memory 904 and a static memory 906, which communicate with each other via a bus 908. The computer system 900 may further include a display unit 910 (e.g., a liquid crystal display (LCD), a flat panel, or a solid-state display). The computer system 900 may include an input device 912 (e.g., a keyboard), a cursor control device 914 (e.g., a mouse), a disk drive unit 916, a signal generation device 918 (e.g., a speaker or remote control) and a network interface device 920. In distributed environments, the embodiments described in the subject disclosure can be adapted to utilize multiple display units 910 controlled by two or more computer systems 900. In this configuration, presentations described by the subject disclosure may in part be shown in a first of the display units 910, while the remaining portion is presented in a second of the display units 910.
[000119] The disk drive unit 916 may include a tangible computer-readable storage medium 922 on which is stored one or more sets of instructions (e.g., software 924) embodying any one or more of the methods or functions described herein, including those methods illustrated above. The instructions 924 may also reside, completely or at least partially, within the main memory 904, the static memory 906, and/or within the processor 902 during execution thereof by the computer system 900. The main memory 904 and the processor 902 also may constitute tangible computer-readable storage media.
[000120] Dedicated hardware implementations including, but not limited to, application specific integrated circuits, programmable logic arrays and other hardware devices can likewise be constructed to implement the methods described herein. Application specific integrated circuits and programmable logic array can use downloadable instructions for executing state machines and/or circuit configurations to
Page 35 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV implement embodiments of the subject disclosure. Applications that may include the apparatus and systems of various embodiments broadly include a variety of electronic and computer systems. Some embodiments implement functions in two or more specific interconnected hardware modules or devices with related control and data signals communicated between and through the modules, or as portions of an application-specific integrated circuit. Thus, the example system is applicable to software, firmware, and hardware implementations.
[000121] In accordance with various embodiments of the subject disclosure, the operations or methods described herein are intended for operation as software programs or instructions running on or executed by a computer processor or other computing device, and which may include other forms of instructions manifested as a state machine implemented with logic components in an application specific integrated circuit or field programmable gate array. Furthermore, software implementations (e.g., software programs, instructions, etc.) including, but not limited to, distributed processing or component/object distributed processing, parallel processing, or machine processing can also be constructed to implement the methods described herein. It is further noted that a computing device such as a processor, a controller, a state machine or other suitable device for executing instructions to perform operations or methods may perform such operations directly or indirectly by way of one or more intermediate devices directed by the computing device.
[000122] While the tangible computer-readable storage medium 922 is shown in an example embodiment to be a single medium, the term "tangible computer-readable storage medium" should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more sets of instructions. The term "tangible computer-readable storage medium" shall also be taken to include any non-transitory medium that is capable of storing or encoding a set of instructions for execution by the machine and that cause the machine to perform any one or more of the methods of the subject disclosure. The term “non-transitory” as in a non-transitory computer-readable storage includes without limitation memories, drives, devices and anything tangible but not a signal per se.
Page 36 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV
[000123] The term "tangible computer-readable storage medium" shall accordingly be taken to include, but not be limited to solid-state memories such as a memory card or other package that houses one or more read-only (non-volatile) memories, random access memories, or other re-writable (volatile) memories, a magneto-optical or optical medium such as a disk or tape, or other tangible media which can be used to store information. Accordingly, the disclosure is considered to include any one or more of a tangible computer-readable storage medium, as listed herein and including art- recognized equivalents and successor media, in which the software implementations herein are stored.
[000124] Although the present specification describes components and functions implemented in the embodiments with reference to particular standards and protocols, the disclosure is not limited to such standards and protocols. Each of the standards for Internet and other packet switched network transmission (e.g., TCP/IP, UDP/IP, HTML, HTTP) represent examples of the state of the art. Such standards are from time- to-time superseded by faster or more efficient equivalents having essentially the same functions. Wireless standards for device detection (e.g., RFID), short-range communications (e.g., Bluetooth®, WiFi, Zigbee®), and long-range communications (e.g., WiMAX, GSM, CDMA, LTE) can be used by computer system 900.
[000125] The illustrations of embodiments described herein are intended to provide a general understanding of the structure of various embodiments, and they are not intended to serve as a complete description of all the elements and features of apparatus and systems that might make use of the structures described herein. Many other embodiments will be apparent to those of skill in the art upon reviewing the above description. The exemplary embodiments can include combinations of features and/or steps from multiple embodiments. Other embodiments may be utilized and derived therefrom, such that structural and logical substitutions and changes may be made without departing from the scope of this disclosure. Figures are also merely representational and may not be drawn to scale. Certain proportions thereof may be exaggerated, while others may be minimized. Accordingly, the specification and drawings are to be regarded in an illustrative rather than a restrictive sense.
Page 37 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV
[000126] Although specific embodiments have been illustrated and described herein, it should be appreciated that any arrangement calculated to achieve the same purpose may be substituted for the specific embodiments shown. This disclosure is intended to cover any and all adaptations or variations of various embodiments. Combinations of the above embodiments, and other embodiments not specifically described herein, can be used in the subject disclosure. In one or more embodiments, features that are positively recited can also be excluded from the embodiment with or without replacement by another component or step. The steps or functions described with respect to the exemplary processes or methods can be performed in any order. The steps or functions described with respect to the exemplary processes or methods can be performed alone or in combination with other steps or functions (from other embodiments or from other steps that have not been described).
[000127] Less than all of the steps or functions described with respect to the exemplary processes or methods can also be performed in one or more of the exemplary embodiments. Further, the use of numerical terms to describe a device, component, step or function, such as first, second, third, and so forth, is not intended to describe an order or function unless expressly stated so. The use of the terms first, second, third and so forth, is generally to distinguish between devices, components, steps or functions unless expressly stated otherwise. Additionally, one or more devices or components described with respect to the exemplary embodiments can facilitate one or more functions, where the facilitating (e.g., facilitating access or facilitating establishing a connection) can include less than every step needed to perform the function or can include all of the steps needed to perform the function.
[000128] In one or more embodiments, a processor (which can include a controller or circuit) has been described that performs various functions. It should be understood that the processor can be multiple processors, which can include distributed processors or parallel processors in a single machine or multiple machines. The processor can be used in supporting a virtual processing environment. The virtual processing environment may support one or more virtual machines representing computers, servers, or other computing devices. In such virtual machines, components such as microprocessors and storage devices may be virtualized or logically represented. The
Page 38 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV processor can include a state machine, application specific integrated circuit, and/or programmable gate array including a Field PGA. In one or more embodiments, when a processor executes instructions to perform “operations”, this can include the processor performing the operations directly and/or facilitating, directing, or cooperating with another device or component to perform the operations.
[000129] The Abstract of the Disclosure is provided with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. In addition, in the foregoing Detailed Description, it can be seen that various features are grouped together in a single embodiment for the purpose of streamlining the disclosure. This method of disclosure is not to be interpreted as reflecting an intention that the claimed embodiments require more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive subject matter lies in less than all features of a single disclosed embodiment. Thus, the following claims are hereby incorporated into the Detailed Description, with each claim standing on its own as a separately claimed subject matter. It is also to be understood and appreciated that the subject matter in one or more dependent claims may be combined with that in one or more other dependent claims.
[000130] The following are descriptions of various embodiments relating to adjustment of key actuation depth, listed as items.
Item 1. A device, comprising: a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations, the operations comprising: detecting an actuation of a first key of a keyboard; and adjusting an actuation depth of at least one neighboring key of the first key of the keyboard based on the detecting.
Item 2. The device according to any one of the preceding items, wherein the adjusting comprises adjusting the actuation depth of the at least one neighboring key from a first actuation depth to a second actuation depth.
Page 39 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV
Item 3. The device according to any one of the preceding items, wherein the second actuation depth is greater than the first actuation depth.
Item 4. The device according to any one of the preceding items, wherein the second actuation depth is less than the first actuation depth.
Item 5. The device according to any one of the preceding items, wherein the second actuation depth is a default adjusted actuation depth.
Item 6. The device according to any one of the preceding items, wherein the second actuation depth is user-defined.
Item 7. The device according to any one of the preceding items, wherein the first actuation depth is at least 0.1mm.
Item 8. The device according to any one of the preceding items, wherein the first actuation depth is no more than 4.0mm.
Item 9. The device according to any one of the preceding items, wherein the second actuation depth is at least 0.2mm.
Item 10. The device according to any one of the preceding items, wherein the second actuation depth is no more than 0.5mm.
Item 11. The device according to any one of the preceding items, wherein the second actuation depth is no more than 1.0mm.
Item 12. The device according to any one of the preceding items, wherein the operations further comprise: initiating a timer based on the detecting; and
Page 40 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV re-adjusting the actuation depth of the at least one neighboring key from the second actuation depth to the first actuation depth after the timer elapses.
Item 13. The device according to any one of the preceding items, wherein a countdown period of the timer is a default period.
Item 14. The device according to any one of the preceding items, wherein a countdown period of the timer is user-defined.
Item 15. The device according to any one of the preceding items, wherein a countdown period of the timer is at least 100ms.
Item 16. The device according to any one of the preceding items, wherein a countdown period of the timer is at least 500ms.
Item 17. The device according to any one of the preceding items, wherein a countdown period of the timer is no more than 1 second.
Item 18. The device according to any one of the preceding items, wherein a countdown period of the timer is indefinite.
Item 19. The device according to any one of the preceding items, wherein the operations further comprise: detecting a release of the first key; and further adjusting the actuation depth of the at least one neighboring key of the first key based on the detecting the release of the first key.
Item 20. The device according to any one of the preceding items, wherein the further adjusting comprises re-adjusting the actuation depth of the at least one neighboring key from the second actuation depth to the first actuation depth.
Page 41 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV
Item 21. The device according to any one of the preceding items, wherein the at least one neighboring key comprises all keys that border or share an edge or boundary with the first key.
Item 22. The device according to any one of the preceding items, wherein the at least one neighboring key comprises one or more but not all keys that border or share an edge or boundary with the first key.
Item 23. The device according to any one of the preceding items, wherein the operations further comprise: receiving a user selection to enable a protection mode for the first key, resulting in an enabled protection mode, wherein the adjusting is based on the enabled protection mode.
Item 24. The device according to any one of the preceding items, wherein actuations of keys of the keyboard are detected from signals provided by sensors associated with the keys, and wherein the sensors comprise Hall Effect sensors, optical sensors, capacitive sensors, inductive sensors, other types of sensors, or a combination thereof.
Item 25. A method, comprising: detecting, by a processing system including a processor, an actuation of a first key of a keyboard; and adjusting, by the processing system, an actuation depth of at least one neighboring key of the first key of the keyboard based on the detecting.
Item 26. The method according to any one of the preceding items, wherein the processing system is implemented in firmware.
Item 27. The method according to any one of the preceding items, wherein the at least one neighboring key is user-selected.
Page 42 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV
Item 28. The method according to any one of the preceding items, wherein the adjusting comprises adjusting the actuation depth of the at least one neighboring key from a first actuation depth to a second actuation depth.
Item 29. The method according to any one of the preceding items, wherein the second actuation depth is greater than the first actuation depth.
Item 30. The method according to any one of the preceding items, wherein the second actuation depth is less than the first actuation depth.
Item 31. The method according to any one of the preceding items, wherein the second actuation depth is a default adjusted actuation depth.
Item 32. The method according to any one of the preceding items, wherein the second actuation depth is user-defined.
Item 33. The method according to any one of the preceding items, wherein the first actuation depth is at least 0.1mm.
Item 34. The method according to any one of the preceding items, wherein the first actuation depth is no more than 4.0mm.
Item 35. The method according to any one of the preceding items, wherein the second actuation depth is at least 0.2mm.
Item 36. The method according to any one of the preceding items, wherein the second actuation depth is no more than 0.5mm.
Item 37. The method according to any one of the preceding items, wherein the second actuation depth is no more than 1.0mm.
Page 43 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV
Item 38. The method according to any one of the preceding items, further comprising: initiating, by the processing system, a timer based on the detecting; and re-adjusting, by the processing system, the actuation depth of the at least one neighboring key from the second actuation depth to the first actuation depth after the timer elapses.
Item 39. The method according to any one of the preceding items, wherein a countdown period of the timer is a default period.
Item 40. The method according to any one of the preceding items, wherein a countdown period of the timer is user-defined.
Item 41. The method according to any one of the preceding items, wherein a countdown period of the timer is at least 100ms.
Item 42. The method according to any one of the preceding items, wherein a countdown period of the timer is at least 500ms.
Item 43. The method according to any one of the preceding items, wherein a countdown period of the timer is no more than 1 second.
Item 44. The method according to any one of the preceding items, wherein a countdown period of the timer is indefinite.
Item 45. The method according to any one of the preceding items, further comprising: detecting, by the processing system, a release of the first key; and
Page 44 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV further adjusting, by the processing system, the actuation depth of the at least one neighboring key of the first key based on the detecting the release of the first key.
Item 46. The method according to any one of the preceding items, wherein the further adjusting comprises re-adjusting the actuation depth of the at least one neighboring key from the second actuation depth to the first actuation depth.
Item 47. The method according to any one of the preceding items, wherein the at least one neighboring key comprises all keys that border or share an edge or boundary with the first key.
Item 48. The method according to any one of the preceding items, wherein the at least one neighboring key comprises one or more but not all keys that border or share an edge or boundary with the first key.
Item 49. The method according to any one of the preceding items, further comprising: receiving, by the processing system, a user selection to enable a protection mode for the first key, resulting in an enabled protection mode, wherein the adjusting is based on the enabled protection mode.
Item 50. The method according to any one of the preceding items, wherein actuations of keys of the keyboard are detected from signals provided by sensors associated with the keys, and wherein the sensors comprise Hall Effect sensors, optical sensors, capacitive sensors, inductive sensors, other types of sensors, or a combination thereof.
Item 51. A non-transitory machine-readable medium, comprising executable instructions that, when executed by a processing system including a processor, facilitate
Page 45 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV performance of operations, the operations comprising the method according to any one of items 25 to 50.
Item 52. A non-transitory machine-readable medium according to any one of items 25 to 51, comprising executable instructions that, when executed by a processing system including a processor, facilitate performance of operations, the operations comprising: based upon a detection of an actuation of a first key of a device: adjusting an actuation depth of at least one neighboring key of the first key of the device.
Item 53. The non-transitory machine-readable medium according to any one of items 25 to 52, wherein the adjusting comprises adjusting the actuation depth of the at least one neighboring key from a first actuation depth to a second actuation depth.
Item 54. The non-transitory machine-readable medium according to any one of items 25 to 53, wherein the operations further comprise: initiating a timer based on the detection; and re-adjusting the actuation depth of the at least one neighboring key from the second actuation depth to the first actuation depth after the timer elapses.
Item 55. The non-transitory machine-readable medium according to any one of items 25 to 54, wherein the device comprises a keyboard, a computer mouse, a gaming accessory, a controller device, or a combination thereof.
Item 56. The non-transitory machine-readable medium according to any one of items 25 to 55, wherein actuations of keys of the device are detected from signals provided by sensors associated with the keys, and wherein the sensors comprise Hall Effect sensors, optical sensors, capacitive sensors, inductive sensors, other types of sensors, or a combination thereof.
Page 46 of 50
38133933-1
Claims
1. A device, comprising: a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations, the operations comprising: detecting an actuation of a first key of a keyboard; and adjusting an actuation depth of at least one neighboring key of the first key of the keyboard based on the detecting.
2. The device of claim 1, wherein the adjusting comprises adjusting the actuation depth of the at least one neighboring key from a first actuation depth to a second actuation depth.
3. The device of claim 2, wherein the second actuation depth is greater than the first actuation depth.
4. The device of claim 2, wherein the second actuation depth is less than the first actuation depth.
5. The device of claim 2, wherein the second actuation depth is a default adjusted actuation depth.
6. The device of claim 2, wherein the second actuation depth is user-defined.
7. The device of claim 2, wherein the operations further comprise: initiating a timer based on the detecting; and re-adjusting the actuation depth of the at least one neighboring key from the second actuation depth to the first actuation depth after the timer elapses.
Page 47 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV
8. The device of claim 7, wherein a countdown period of the timer is a default period.
9. The device of claim 7, wherein a countdown period of the timer is user-defined.
10. The device of claim 1, wherein the at least one neighboring key comprises all keys that border or share an edge or boundary with the first key.
11. The device of claim 1, wherein the at least one neighboring key comprises one or more but not all keys that border or share an edge or boundary with the first key.
12. The device of claim 1, wherein the operations further comprise: receiving a user selection to enable a protection mode for the first key, resulting in an enabled protection mode, wherein the adjusting is based on the enabled protection mode.
13. The device of claim 1, wherein actuations of keys of the keyboard are detected from signals provided by sensors associated with the keys, and wherein the sensors comprise Hall Effect sensors, optical sensors, capacitive sensors, inductive sensors, other types of sensors, or a combination thereof.
14. A non-transitory machine-readable medium, comprising executable instructions that, when executed by a processing system including a processor, facilitate performance of operations, the operations comprising: based upon a detection of an actuation of a first key of a device: initiating a timer, and adjusting an actuation depth of at least one neighboring key of the first key of the device; and re-adjusting the actuation depth of the at least one neighboring key after the timer elapses.
Page 48 of 50
38133933-1
Attorney Docket No.: 2024P01254US_8381-0099A-PRV
15. The non-transitory machine-readable medium of claim 14, wherein the adjusting comprises adjusting the actuation depth of the at least one neighboring key from a first actuation depth to a second actuation depth.
16. The non-transitory machine-readable medium of claim 14, wherein the device comprises a keyboard, a computer mouse, a gaming accessory, a controller device, or a combination thereof.
17. The non-transitory machine-readable medium of claim 14, wherein actuations of keys of the device are detected from signals provided by sensors associated with the keys, and wherein the sensors comprise Hall Effect sensors, optical sensors, capacitive sensors, inductive sensors, other types of sensors, or a combination thereof.
18. A method, comprising: detecting, by a processing system including a processor, an actuation of a first key of a keyboard; and adjusting, by the processing system, an actuation depth of at least one neighboring key of the first key of the keyboard based on the detecting.
19. The method of claim 18, wherein the processing system is implemented in firmware.
20. The method of claim 18, wherein the at least one neighboring key is user- selected.
Page 49 of 50
38133933-1
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US63/683,730 | 2024-08-16 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2026037922A1 true WO2026037922A1 (en) | 2026-02-19 |
Family
ID=
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12102906B2 (en) | Programmable actuation force input for an accessory and methods thereof | |
| WO2026037922A1 (en) | Protection mode for dynamically adjusting key actuation depth |