Continuous Typist Verification Using Machine Learning

Total Page:16

File Type:pdf, Size:1020Kb

Continuous Typist Verification Using Machine Learning Department of Computer Science Hamilton, New Zealand Continuous Typist Verification using Machine Learning Kathryn Hempstalk This thesis is submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy at The University of Waikato. July 2009 c 2009 Kathryn Hempstalk ! Abstract A keyboard is a simple input device. Its function is to send keystroke informa- tion to the computer (or other device) to which it is attached. Normally this information is employed solely to produce text, but it can also be utilized as part of an authentication system. Typist verification exploits a typist’s pat- terns to check whether they are who they say they are, even after standard authentication schemes have confirmed their identity. This thesis investigates whether typists behave in a sufficiently unique yet consistent manner to enable an effective level of verification based on their typing patterns. Typist verification depends on more than the typist’s behaviour. The qual- ity of the patterns and the algorithms used to compare them also determine how accurately verification is performed. This thesis sheds light on all tech- nical aspects of the problem, including data collection, feature identification and extraction, and sample classification. A dataset has been collected that is comparable in size, timing accuracy and content to others in the field, with one important exception: it is derived from real emails, rather than samples collected in an artificial setting. This dataset is used to gain insight into what features distinguish typists from one another. The features and dataset are used to train learning algorithms that make judgements on the origin of previously unseen typing samples. These algorithms use “one-class classification”; they make predictions for a particular user having been trained on only that user’s patterns. This thesis examines many one-class classification algorithms, including ones designed specifically for typist verification. New algorithms and features are proposed to increase speed and accuracy. The best method proposed per- forms at the state of the art in terms of classification accuracy, while de- creasing the time taken for a prediction from minutes to seconds, and—more importantly—without requiring any negative data from other users. Also, it is general: it applies not only to typist verification, but to any other one-class classification problem. Overall, this thesis concludes that typist verification can be considered a useful biometric technique. i Acknowledgments This thesis could not have been completed without the assistance of a number of people, too many to mention them all individually. I am grateful to anyone who has helped me, supported me, and given me the strength necessary to complete such a substantial piece of work as this thesis. However, there are several groups who I would like to personally thank for their considerable input into my work. First, I would like to thank the Tertiary Education Commission and the University of Waikato for the generous scholarships they have provided me with. This thesis would not have been possible without their financial support. Second, I would like to express my gratitude to the authors of “Learning to Identify a Typist” and “Keystroke Analysis of Free Text” who kindly provided me with their datasets. Your work catalyzed my interest in typist verification, and the datasets provided me with great insights - which are reflected in this thesis. Third, I would like to thank my supervisors, Eibe and Ian, who have pro- vided me with the guidance, encouragement and academic aid necessary to complete this thesis. Ian, your confidence in my work and optimism was con- stantly reassuring - I feel truly honoured to have you as a supervisor. Equally, Eibe your advice was always welcome, and your assistance with technical as- pects of this thesis was much appreciated. Without either of you I am certain I would not have been able to complete this thesis. Last but not least, I would like to acknowledge the support provided by my family, friends, lab co-inhabitants, Team xG, pets and partner. Mum, Dad and Paul - you have always been there for me and words cannot express how grateful I am of that. To all my friends and colleagues, thank you. To those of you still working on your PhDs - hang in there! To Lily and Oscar, for always brightening my day and showing that cat-hugs really are the best kind of hugs. And to Mark - your patience, faith in me and care of me will forever be cherished. iii Contents Abstract i Acknowledgments iii 1 Introduction 1 1.1 Verification Systems . 2 1.2 Thesis Statement . 3 1.3 Motivation . 6 1.4 Contributions . 8 1.5 Thesis Structure . 9 2 Background 13 2.1 Biometrics . 15 2.1.1 Biometric System Processes . 16 2.1.2 Evaluating Biometric Measures . 17 2.2 Typing as a Biometric . 19 2.2.1 Terminology . 20 2.3 Password Hardening . 22 2.4 Static Typist Verification . 28 2.5 Continuous Typist Verification . 29 3 Replicating the State of the Art 35 3.1 Statistical Methodology . 35 3.2 Learning To Identify A Typist . 37 3.2.1 Algorithm . 38 3.2.2 Experimental Setup . 39 3.2.3 Results . 41 3.3 Keystroke Analysis of Free Text . 42 3.3.1 Algorithm . 42 3.3.2 Experimental Setup . 44 3.3.3 Results . 45 3.4 Comparison of Techniques . 45 3.4.1 Comparison Using the ROC Curve . 46 v 3.4.2 Comparison Using Datasets . 46 3.5 Summary . 49 4 Data Collection 51 4.1 Collecting Data . 52 4.1.1 Recording with SquirrelMail . 53 4.1.2 Technical Issues . 55 4.1.3 Ethical Issues . 57 4.2 Final Dataset . 58 4.3 Re-evaluation of Existing Algorithms . 60 5 Preliminary Experiments with New Techniques 63 5.1 Methodology . 64 5.2 PPM-Based Classifier . 65 5.2.1 Algorithm . 66 5.2.2 Results . 67 5.3 Spread Classifier . 68 5.3.1 Algorithm . 68 5.3.2 Results . 70 5.4 Context Classifier . 71 5.4.1 Algorithm . 71 5.4.2 Results . 72 5.5 Individual Digraph Classifier . 73 5.5.1 Algorithm . 74 5.5.2 Results . 75 5.6 Performance Comparison . 76 5.7 Summary . 77 6 Typist Behaviour 79 6.1 The Digraph . 80 6.2 From Digraphs to Finger Movements . 86 6.3 Key Usage . 88 6.4 Pausing . 89 6.5 Ordering of Events . 91 6.6 Speed and Error Rate . 93 6.7 Summary . 94 7 One-Class Classification 97 7.1 One-Class Classification versus Multi-Class Classification . 99 vi 7.1.1 Comparing Classifiers Fairly . 100 7.1.2 Evaluation Method . 102 7.1.3 Results . 103 7.1.4 Summary . 106 7.2 Methods of One-Class Classification . 107 7.3 Combining Density and Class Probability Estimation . 109 7.3.1 Combining Classifiers Using Bayes’ Rule . 110 7.3.2 Combined Classifier Performance . 112 7.3.3 Generating Different Proportions of Artificial Data . 114 7.3.4 Using Real Data . 115 7.3.5 Replacing Components . 116 7.4 Summary . 117 8 Typist Verification as One-Class Classification 119 8.1 Typing and One-Class Classification . 120 8.1.1 Methodology . 120 8.1.2 Features . 121 8.1.3 Results . 123 8.2 Adding Mouse Patterns . 125 8.2.1 Features . 126 8.2.2 Results . 128 8.3 Summary . 129 9 Conclusions 131 9.1 Collecting Data . 132 9.2 Identifying Channels of Information . 133 9.3 Requirements for System Training . 134 9.4 Revisiting the Hypothesis . 135 9.5 Future Work . 135 References 137 A Experiment Details 145 A.1 Purpose of Experiment . 145 A.1.1 Questionnaire . 145 A.1.2 Email Recording . 145 A.2 Mail Analysis . 150 A.3 Network Access . 154 vii A.4 Data Collection . 154 A.5 Data Archiving/Destruction . 155 A.6 Confidentiality . 155 A.7 Example Email Recording . 156 A.8 How to read an email recording . 157 B Instructions For Participants 159 B.1 Requirements . 159 B.2 Links . 159 B.3 CS Webmail . 159 B.4 Mail Analysis . 160 B.5 Recording Content . 166 B.6 Final Review . 166 C Questionnaire 167 D List of Top 54 Predictive Digraphs 171 viii List of Figures 2.1 Alphabetic layout (from [65]). 14 2.2 The original QWERTY keyboard layout (from [64]). 14 2.3 The enrollment process for biometrics. 17 2.4 The prediction process for biometrics. 18 3.1 The main workbench window . 36 3.2 Partial ROC curves for KAOFT and LTIAT . 47 6.1 Distribution of times for Backspace Backspace . ..
Recommended publications
  • 80DF Herbicide EPA Reg
    Supplemental Labeling Dow AgroSciences LLC 9330 Zionsville Road Indianapolis, IN 46268-1054 USA Spike® 80DF herbicide EPA Reg. No. 62719-107 Banded Application for Woody Plant Control in Rangeland, Permanent Pastures, Fencerows, and Clearings for Wildlife Habitat For Distribution and Use Only in Alabama, Kansas, Louisiana, Missouri, Mississippi, New Mexico, Oklahoma and Texas ATTENTION ● It is a violation of Federal law to use this product in a manner inconsistent with its labeling. ● This labeling must be in the possession of the user at the time of application. ● Read the label affixed to the container for Spike 80DF before applying. Carefully follow all precautionary statements and applicable use directions. ● Except as described below, use of Spike 80DF according to this supplemental labeling is subject to all use precautions and limitations imposed by the label affixed to the product container. Directions for Use Spike® 80DF herbicide is recommended as a ground-applied band application for control of woody plants in rangeland and permanent pastures, for establishment of clearings for enhancement of wildlife habitat, and for control of trees and brush in fencerows. Note: Before applying, read and understand Mixing Directions, Application Methods and Factors in Herbicidal Response of Woody Plants sections of this supplemental labeling. Grazing Management In rangelands and permanent grass pastures, measures to minimize injury to, and maximize growth response of, desirable grasses and other forage species are recommended. These include:
    [Show full text]
  • Evaluation of Computer Input Devices for Use in Standard Office Applications While Moving in an Off-Road Vehicle
    Evaluation of computer input devices for use in standard office applications while moving in an off-road vehicle by Thorsten Baldus A dissertation submitted to the graduate faculty in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY Major: Industrial Engineering Program of Study Committee: Patrick E. Patterson, Major Professor Samuel K. Adams Roger E. Baer John K. Jackman Mack C. Shelley Iowa State University Ames, Iowa 2006 UMI Number: 3229052 INFORMATION TO USERS The quality of this reproduction is dependent upon the quality of the copy submitted. Broken or indistinct print, colored or poor quality illustrations and photographs, print bleed-through, substandard margins, and improper alignment can adversely affect reproduction. In the unlikely event that the author did not send a complete manuscript and there are missing pages, these will be noted. Also, if unauthorized copyright material had to be removed, a note will indicate the deletion. UMI UMI Microform 3229052 Copyright 2006 by ProQuest Information and Learning Company. All rights reserved. This microform edition is protected against unauthorized copying under Title 17, United States Code. ProQuest Information and Learning Company 300 North Zeeb Road P.O. Box 1346 Ann Arbor, Ml 48106-1346 ii Graduate College Iowa State University This is to certify that the doctoral dissertation of Thorsten Baldus has met the dissertation requirements of Iowa State University Signature was redacted for privacy. Major Professor Signature was redacted for privacy. 'o/
    [Show full text]
  • Eye on the Message: Reducing Attention Demand for Touch-Based Text Entry
    Avestia Publishing International Journal of Virtual Worlds and Human-Computer Interaction Volume 1, Year 2013 Journal ISSN: 2368-6103 DOI: 10.11159/vwhci.2013.001 Eye on the Message: Reducing Attention Demand for Touch-based Text Entry I. Scott MacKenzie, Steven J. Castellucci Dept. of Electrical Engineering and Computer Science York University Toronto, Ontario, Canada, M3J 1P3 [email protected]; [email protected] Abstract- A touch-based text entry method was developed with the device’s text entry method to enhance the user the goal of reducing the attention demand on the user. The experience. method, called H4touch, supports the entry of about 75 symbols In our observations of users interacting with touch- and commands using only four soft keys. Each key is about 20 based devices, it is evident that text is most commonly larger than the keys on a Qwerty soft keyboard on the same entered using a Qwerty soft keyboard, perhaps device. Symbols are entered as Huffman codes with most enhanced with swipe detection [26], word completion, letters requiring just two or three taps. The codes for the letters and common commands are learned after a few hours of next key prediction [9], or auto correction [23]. practice. At such time, the user can enter text while visually Because the keys are numerous and small, the user attending to the message, rather than the keyboard. Similar must attend to the keyboard to aim at and touch the eye-on-the-message interaction is not possible with a Qwerty desired key. Even highly practiced users must attend to soft keyboard, since there are many keys and they are small.
    [Show full text]
  • Touch Typing at Home
    Touch Typing at Home Physical & Medical Team There are lots of different touch typing tutors on the market. I have selected the following ones as they have been UK designed with children in mind, however this is by no means an exhaustive list! Free online software BBC dancemat is a free typing tutor for kids. http://www.bbc.co.uk/guides/z3c6tfr http://www.sense-lang.org/typing/tutor/keyboarding.php Doorway online http://www.doorwayonline.org.uk/ Software to purchase Nessy Fingers https://www.nessy.com/uk/product/nessy-fingers/ £30 single user license for a year. Current pricing due to Covid 19 is £24 plus VAT for a 2 month subscription to the typing tutor, reading and spelling and writing materials. Colourful typing tutor uses games and real words to practice touch typing. UK English. Not compatible with IPad/tablets English type https://englishtype.com/ Junior £29.95 for home license for everyone in your house. (Primary age) English Type Senior £29.95 for home license for everyone in your house (secondary age) Both are one-off purchases with no subscription needed. Not compatible with tablet/ IPads. Demo can be downloaded This software was developed by and Educational Psychologist in the UK and uses whole words rather than nonsense letter strings Touch type 2 http://www.inclusive.co.uk/touch-type-2-p2205 £39 single user license. A straightforward typing tutor with U.K. voice and clear layout. Not as visually appealing as some but suitable for all ages. Touch Type Read and Spell https://www.readandspell.com/home-course UK version.
    [Show full text]
  • Typing Slowly but Screen-Free
    Typing Slowly but Screen-Free: Exploring Navigation over Entirely Auditory Keyboards Reeti Mathur, Aishwarya Sheth, Parimal Vyas, and Davide Bolchini* Indiana University School of Informatics and Computing at IUPUI Indianapolis, USA *[email protected] Looping Flow Time Time Time Alphabetical Probabilistic Chunked [based on letter position] Figure 1. We investigate novel forms of entirely auditory keyboards that support text interaction without a reference screen. Time, rather than a fixed location in space, becomes the dimension in which to navigate symbols (right); a blind user experiments with an off-the-shelf armband to type in screenless mode (left). ABSTRACT CSS Concepts Accessible onscreen keyboards require people who are • Human-centered computing~Auditory feedback • blind to keep out their phone at all times to search for visual Human-centered computing~Accessibility affordances they cannot see. Is it possible to re-imagine text INTRODUCTION entry without a reference screen? To explore this question, On-screen keyboards support text entry on mobile devices we introduce screenless keyboards as aural flows by displaying a visual layout of letters but continue to pose (keyflows): rapid auditory streams of Text-To-Speech significant challenges for people who are Blind or Visually- (TTS) characters controllable by hand gestures. In a study, Impaired (BVI). Whereas a person who is blind may walk 20 screen-reader users experienced keyflows to perform with some form of travel aid in one hand (cane, a human initial text entry. Typing took inordinately longer than companion or guide dog), mobile displays force users to current screen-based keyboards, but most participants coordinate two hands to swipe or touch type on the screen.
    [Show full text]
  • Issues and Techniques in Touch-Sensitive Tablet Input
    SAN FRANCISCO JULY 22-26 Volume 19, Number 3, 1985 Issues and Techniques in Touch-Sensitive Tablet Input William Buxton Ralph Hill Peter Rowley Computer Systems Research Institute University of Toronto Toronto, Ontario Canada M5S 1A4 (416) 978-6320 1. Introduction Increasingly, research in human-computer interac- Abstract tion is focusing on problems of input [Foley, Wallace Touch-sensitive tablets and their use in human- &Chan 1984; Buxton 1983; Buxton £985]. Much of computer interaction are discussed, It is shown this attention is directed towards input technolo- that such devices have some important properties gies. The ubiquitous Sholes keyboard is being that differentiate them from other input devices replaced and/or complemented by alternative tech- (such as mice and joysticks). The analysis serves nologies. For example, a major focus of the market- two purposes: (1) it sheds light on touch tablets, ing strategy for two recent personal computers, the and (2) it demonstrates how other devices might be Apple Macintosh and Hewlett-Packard 150, has been approached. Three specific distinctions between on the input devices that they employ (the mouse touch tablets and one button mice are drawn. These and touch-screen, respectively). concern the signaling of events, multiple point sensing and the use of templates. These distinc- Now that the range of available devices is expand- tions are reinforced, and possible uses of touch ing, how does one select the best technology for a tablets are illustrated, in an example application. particular application? And once a technology is chosen, hove can it be used most effectively? These Potential enhancements to touch tablets and other questions are important, for as Buxton [ 1983] has input devices are discussed, as are some inherent argued, the ways in which the user physiccdty problems.
    [Show full text]
  • Movement Strategies and Performance in Everyday Typing Anna Maria Feit Daryl Weir Antti Oulasvirta Aalto University, Helsinki, Finland
    How We Type: Movement Strategies and Performance in Everyday Typing Anna Maria Feit Daryl Weir Antti Oulasvirta Aalto University, Helsinki, Finland Figure 1. Four users showing different typing behaviours involving different numbers of fingers and movement strategies. This paper reports typing rates, gaze and movement strategies for everyday typists, including both professionally trained and self-taught typists. We explain how untrained typists are able to type at very high rates, which were previously attributed only to the touch typing system that enforces the use of all 10 fingers. ABSTRACT Studies were carried out with trained typists (e.g., [2,4,6, This paper revisits the present understanding of typing, which 8, 23, 27, 29]) mostly operating typewriters. The participants originates mostly from studies of trained typists using the ten- were often professionally employed typists, skilled in typing finger touch typing system. Our goal is to characterise the with 10 fingers and able to consistently perform at rates of majority of present-day users who are untrained and employ over 80 words per minute (wpm) [8, 22, 24]. diverse, self-taught techniques. In a transcription task, we We are seeking to shed new light on the everyday typing tech- compare self-taught typists and those that took a touch typing niques, employed by a majority of users, that do not fall within course. We report several differences in performance, gaze the touch typing system. Touch typing originates from the deployment and movement strategies. The most surprising 1890s and is the technique taught in typing classes. Column- finding is that self-taught typists can achieve performance wise, each key is assigned to one finger.
    [Show full text]
  • Best Email Notification Program
    Best Email Notification Program Replicate Vince bicycling some stirrup after saltless Herb feudalize out-of-doors. Leonard confederating tearfully while actuated Kane exteriorises darn or dichotomizes untenderly. Ware remains susurrant after Lancelot manumits astuciously or thirst any trackman. Spam can still prefer to. Their best android mail control over notifications in your notification emails in user that gives receiving. To be checked out a fairly robust reputation even the receiving, they can help you should be required to send you are something in fewer words. If you're looking for guy best email client for Windows 10 you should. Fortunately you however need a pay this an email checker program there are. Email notifications for Squarespace Scheduling clients. Verify that you always following series best practices for email deliverability and scoop your. Web push notifications in-app notifications as hit as email notifications. Write better organized before they will be just what kind of notification. Email Subscribers & Newsletters Simple and Effective Email. The best engagement and shows the email programs like the app in the interface. Free and unlimited email tracking for Gmail Real-time notifications and link tracking Works in. Affiliate marketing programs offer rewards to companies or individuals that send. Alternatives to Outlook Declutter your inbox get replies. It best android, notifications stand and has expanded set of the program with two is in those add or other programs like your. Gmail for android version, the best email notification program can translate all of? We rounded up its best email tracking tools that finally do moreand. Up your emails we highly recommend these best backup software before use.
    [Show full text]
  • 220 Layout with IBM* Compatibility FTSC Full Tr
    5150 KEYBOARDS & KEYPADS 5150 CHERRY ELECTRICAL PRODUCTS 3600 Sunset Ave., Waukegan, IL 60087 708/360-3500 • FAX 708/360-3566 GSO-1600 & GSO-lS00 GSO-1600 GSO-lS00 mM Compatible Keyboard with Built-In Bar Code Compact, 101 Key, mM Compatible Keyboard with Reader. For PC, XT, AT,andPS/2-Systems. Separate Numeric Keypad. For PC, XT, AT and PS/2 Systems. • Input port for bar code stylus, laser scanning gun, or slot reader. • Fits into 19 inch rack (less than 16 inches wide). • Barcodes are automatically identified and differentiated • 101 keysforPC*. XT*, AT*, and PSI2* systems as well (all resolutions). as ffiM* terminals. • 103 keys (2 keys forprograrnroing mode) conforming to • Switch selection ofPC*, XT*, AT*, and PS/2 * modes. ASCU international key layout per DIN 66003/66303 . LED's indicate the mode selected . • Superior Cherry MX keyswitches with' ' Gold • Superior Cherry MX keyswitches with "Gold Crosspoint" contacts help eliminate input errors. Crosspoint" contacts help eliminate input errors. GSO-1307 DEC VT-220 Layout with • Includes housing and cable. IBM* Compatibility • Rugged construction. • " Deep Dish " for home keys FandJ with dimple on key • 105 keys using superior Cherry MX keyswitches with 5 for touch typing. "Gold Crosspoint" contacts to eliminate input errors. • Mane finished, 2-shot molded keycaps are wear resistant • High reliability: and easy to clean. Keycaps colors are: beige/grey (code MCBF = I x 10' operations. U9), white/grey (code L9) . MTBF = 80,000 hours. • Materials conform to UL 94. MCBF (each keymodule) 50 x 10" operations. > • Separate cu rsor pad. • Ergonomic, low profile design with "cylindrical style" • Full N -key rollover.
    [Show full text]
  • Posture & Positioning
    Keyboarding 101 Posture & Positioning Keyboarding 101 Learning Target: To learn proper keyboarding techniques to utilize when typing. Essential Questions: 1. Why is it important to use proper keyboarding techniques? 2. What proper keyboarding techniques should be utilized when typing on a computer keyboard? What is Keyboarding? • Keyboarding is the capability of entering text by using the correct fingers without looking at the keys (touch typing). • Touch typing involves using all ten of your fingers to type, using the correct finger for each key, and not looking at the keyboard. What is Keyboarding? • Having excellent keyboarding skills will help you to use the computer more efficiently and be more productive. • Keyboarding skills are skills for life. You will use these skills now and in the future for things like school work and in your career. There is no hiding from a computer today! Why Do We Care? As the day drags on, people tend to slouch. While slouching may feel like a comfortable way to relax and save energy, it can lead to back and neck pain. If you maintain good posture, you're likely to feel more alert throughout the day, because the muscles will have less strain placed on them, resulting in lower energy usage. Learning to have better posture is a practice that may take some time, but you'll look and feel better---and your body will be more relaxed. And MORE Why Do We Care… • The proper keyboarding posture minimizes static and dynamic muscle loads that may cause damage to your nerves, ligaments, muscles and tendons.
    [Show full text]
  • Don't Skype & Type! Acoustic Eavesdropping in Voice-Over-IP
    Don’t Skype & Type! Acoustic Eavesdropping in Voice-Over-IP Alberto Compagno Mauro Conti Sapienza University of Rome University of Padua [email protected] [email protected] Daniele Lain Gene Tsudik University of Padua University of California, Irvine [email protected] [email protected] ABSTRACT vate and sensitive information, such as photos, passwords, Acoustic emanations of computer keyboards represent a se- and messages. Protecting such sensitive data by encryp- rious privacy issue. As demonstrated in prior work, physical tion is a common approach to prevent unauthorized access properties of keystroke sounds might reveal what a user is and disclosure. However, there is no protection if data is typing. However, previous attacks assumed relatively strong leaked before encryption. In fact, eavesdropping on physical adversary models that are not very practical in many real- signals, such as acoustic or electromagnetic emanations, is world settings. Such strong models assume: (i) adversary's one way to recover either: (1) clear-text data before encryp- physical proximity to the victim, (ii) precise profiling of the tion, e.g., during its input or visualization, or (2) encryption victim's typing style and keyboard, and/or (iii) significant keys, e.g., during data encryption and decryption. Indeed, amount of victim's typed information (and its corresponding the history of eavesdropping on physical signals dates back sounds) available to the adversary. to 1943, when a Bell engineer discovered that an oscilloscope This paper presents and explores a new keyboard acous- can retrieve the plain-text from electromagnetic emanations tic eavesdropping attack that involves Voice-over-IP (VoIP), of a Bell Telephone model 131-B2 { a mixing device used by called Skype & Type (S&T), while avoiding prior strong ad- the US Army to encrypt communications [9].
    [Show full text]
  • 923,920,400/100,412,4913,680,682,.691, 516, 515; 248/917,921,918,922,919, Primarye.E.E." Examine-Jeffery A
    III USOO5212473A United States Patent (19) 11 Patent Number: 5,212,473 Louis (45) Date of Patent: May 18, 1993 (54) MEMBRANE KEYBOARD AND METHOD 4,933,522 6/1990 Celander ............................. 200/513 OF USNG SAME 5,119,078 6/1992 Grant .................................. 340/71 75 Inventor: William M. Louis, Encinitas, Calif. OTHER PUBLICATIONS 73 Assignee: Typeright Keyboard Corp., IBM Technical Disclosure Bulletin, "Key Matrix Using Encinitas, Calif. a Fluid Medium' by Cook et al. vol. 13, No. 3, dated Aug. 1970, p. 744. (21) Appl. No.: 658,541 IBM Technical Disclosure Bulletin, "Briefcase-Porta 22 Filed: Feb. 21, 1991 ble Text-written with 100-key Full-Size Keyboard' by 51) Int. Cl............................................... Goog 3/oz Pechanek et al. vol. 27, No. 4A, dated Sep. 1984, pp. 52 U.S. C. ...................................... 340/711; 341/22, 2002-200 ... if 58 Field341/27, of Search 200/513, ....................... 200/516, 340/711,700, 200/517,361/380 407, puter"IBM.Techniel by IBM Corp.,Pisclosure vol. 32,Bullein, No. 10B,Solding dated Mar.in 341/21, 22, 27, 24; 200/512.5 A, 513,511,517, 1990, pp. 266-267. 520,521,923,920,400/100,412,4913,680,682,.691, 516, 515; 248/917,921,918,922,919, PrimaryE.E.E." Examine-Jeffery A. Bri 693; 364/709.06, 710.01, 189, 708; 361/380; Attorney, Agent, or Firm-Bernard L. Kleinke; Jerry R. 235/1 D Potts; William Patrict Waters (56) References Cited 57 ABSTRACT U.S. PATENT DOCUMENTS A membrane keyboard producing audible and tactile 2,527,016 10/1950 Loung ................................
    [Show full text]