-
11.
公开(公告)号:US20200042096A1
公开(公告)日:2020-02-06
申请号:US16600830
申请日:2019-10-14
Applicant: Apple Inc.
Inventor: Feng Tang , Chong Chen , Haitao Guo , Xiaojin Shi , Thorsten Gernoth
Abstract: Intelligent systems are disclosed that respond to user intent and desires based upon activity that may or may not be expressly directed at the intelligent system. In some embodiments, the intelligent system acquires a depth image of a scene surrounding the system. A scene geometry may be extracted from the depth image and elements of the scene may be monitored. In certain embodiments, user activity in the scene is monitored and analyzed to infer user desires or intent with respect to the system. The interpretation of the user's intent as well as the system's response may be affected by the scene geometry surrounding the user and/or the system. In some embodiments, techniques and systems are disclosed for interpreting express user communication, e.g., expressed through hand gesture movements. In some embodiments, such gesture movements may be interpreted based on real-time depth information obtained from, e.g., optical or non-optical type depth sensors.
-
公开(公告)号:US10303866B1
公开(公告)日:2019-05-28
申请号:US16141084
申请日:2018-09-25
Applicant: Apple Inc.
Inventor: Marcel Van Os , Thorsten Gernoth , Kelsey Y. Ho
Abstract: An operation of a facial recognition authentication process may fail to authenticate a user even if the user is an authorized user of the device. In such cases, the facial recognition authentication process may automatically re-initiate to provide another attempt to authenticate the user using additional captured images. For the new attempt (e.g., the retry) to authenticate the user, one or more criteria for the images used in the facial recognition authentication process may be adjusted. For example, criteria for distance between the camera and the user's face and/or occlusion of the user's face in the images may be adjusted before the new attempt to authenticate the user. Adjustment of these criteria may increase the likelihood that the authorized user will be successfully authenticated in the new attempt.
-
13.
公开(公告)号:US20170090584A1
公开(公告)日:2017-03-30
申请号:US14865850
申请日:2015-09-25
Applicant: Apple Inc.
Inventor: Feng Tang , Chong Chen , Haitao Guo , Xiaojin Shi , Thorsten Gernoth
CPC classification number: G06F3/017 , G06F3/012 , G06F3/0304 , G06F3/16 , G06K9/00375 , G06K9/00389 , G06K9/6269 , G06K9/6282 , G06K2209/40
Abstract: Varying embodiments of intelligent systems are disclosed that respond to user intent and desires based upon activity that may or may not be expressly directed at the intelligent system. In some embodiments, the intelligent system acquires a depth image of a scene surrounding the system. A scene geometry may be extracted from the depth image and elements of the scene, such as walls, furniture, and humans may be evaluated and monitored. In certain embodiments, user activity in the scene is monitored and analyzed to infer user desires or intent with respect to the system. The interpretation of the user's intent or desire as well as the system's response may be affected by the scene geometry surrounding the user and/or the system. In some embodiments, techniques and systems are disclosed for interpreting express user communication, for example, expressed through fine hand gesture movements. In some embodiments, such gesture movements may be interpreted based on real-time depth information obtained from, for example, optical or non-optical type depth sensors. The depth information may be interpreted in “slices” (three-dimensional regions of space having a relatively small depth) until one or more candidate hand structures are detected. Once detected, each candidate hand structure may be confirmed or rejected based on its own unique physical properties (e.g., shape, size and continuity to an arm structure). Each confirmed hand structure may be submitted to a depth-aware filtering process before its own unique three-dimensional features are quantified into a high-dimensional feature vector. A two-step classification scheme may be applied to the feature vectors to identify a candidate gesture (step 1), and to reject candidate gestures that do not meet a gesture-specific identification operation (step-2). The identified gesture may be used to initiate some action controlled by a computer system.
-
14.
公开(公告)号:US12283020B2
公开(公告)日:2025-04-22
申请号:US18317893
申请日:2023-05-15
Applicant: Apple Inc.
Inventor: Zachary Z. Becker , Michelle Chua , Thorsten Gernoth , Michael P. Johnson , Allison W. Dryer
IPC: G06T17/00 , G06F3/0346 , G06T3/40 , G06T3/60 , G06T13/20 , G06T15/20 , G06T19/20 , H04N5/265 , H04N23/60 , H04N23/63
Abstract: Generating a three-dimensional virtual representation of a three-dimensional physical object can be based on capturing or receiving a capture bundle or a set of images. In some examples, generating the virtual representation of the physical object can be facilitated by user interfaces for identifying a physical object and capturing a set of images of the physical object. Generating the virtual representation can include previewing or modifying a set of images. In some examples, generating the virtual representation of the physical object can include generating a first representation of the physical object (e.g., a point cloud) and/or generating a second three-dimensional virtual representation of the physical object (e.g., a mesh reconstruction). In some examples, a visual indication of the progress of the image capture process and/or the generation of the virtual representation of the three-dimensional object can be displayed, such as in a capture user interface.
-
公开(公告)号:US11151235B2
公开(公告)日:2021-10-19
申请号:US16050021
申请日:2018-07-31
Applicant: Apple Inc.
Inventor: Deepti S. Prakash , Lucia E. Ballard , Jerrold V. Hauck , Feng Tang , Etai Littwin , Pavan Kumar Anasosalu Vasu , Gideon Littwin , Thorsten Gernoth , Lucie Kucerova , Petr Kostka , Steven P. Hotelling , Eitan Hirsh , Tal Kaitz , Jonathan Pokrass , Andrei Kolin , Moshe Laifenfeld , Matthew C. Waldon , Thomas P. Mensch , Lynn R. Youngs , Christopher G. Zeleznik , Michael R. Malone , Ziv Hendel , Ivan Krstic , Anup K. Sharma , Kelsey Y. Ho
Abstract: Techniques are disclosed relating to biometric authentication, e.g., facial recognition. In some embodiments, a device is configured to verify that image data from a camera unit exhibits a pseudo-random sequence of image capture modes and/or a probing pattern of illumination points (e.g., from lasers in a depth capture mode) before authenticating a user based on recognizing a face in the image data. In some embodiments, a secure circuit may control verification of the sequence and/or the probing pattern. In some embodiments, the secure circuit may verify frame numbers, signatures, and/or nonce values for captured image information. In some embodiments, a device may implement one or more lockout procedures in response to biometric authentication failures. The disclosed techniques may reduce or eliminate the effectiveness of spoofing and/or replay attacks, in some embodiments.
-
公开(公告)号:US20210286865A1
公开(公告)日:2021-09-16
申请号:US17182076
申请日:2021-02-22
Applicant: Apple Inc.
Inventor: Deepti S. Prakash , Lucia E. Ballard , Jerrold V. Hauck , Feng Tang , Etai Littwin , Pavan Kumar Ansosalu Vasu , Gideon Littwin , Thorsten Gernoth , Lucie Kucerova , Petr Kostka , Steven P. Hotelling , Eitan Hirsh , Tal Kaitz , Jonathan Pokrass , Andrei Kolin , Moshe Laifenfeld , Matthew C. Waldon , Thomas P. Mensch , Lynn R. Youngs , Christopher G. Zeleznik , Michael R. Malone , Ziv Hendel , Ivan Krstic , Anup K. Sharma
Abstract: Techniques are disclosed relating to biometric authentication, e.g., facial recognition. In some embodiments, a device is configured to verify that image data from a camera unit exhibits a pseudo-random sequence of image capture modes and/or a probing pattern of illumination points (e.g., from lasers in a depth capture mode) before authenticating a user based on recognizing a face in the image data. In some embodiments, a secure circuit may control verification of the sequence and/or the probing pattern. In some embodiments, the secure circuit may verify frame numbers, signatures, and/or nonce values for captured image information. In some embodiments, a device may implement one or more lockout procedures in response to biometric authentication failures. The disclosed techniques may reduce or eliminate the effectiveness of spoofing and/or replay attacks, in some embodiments.
-
17.
公开(公告)号:US10444854B2
公开(公告)日:2019-10-15
申请号:US16055994
申请日:2018-08-06
Applicant: Apple Inc.
Inventor: Feng Tang , Chong Chen , Haitao Guo , Xiaojin Shi , Thorsten Gernoth
Abstract: Intelligent systems are disclosed that respond to user intent and desires based upon activity that may or may not be expressly directed at the intelligent system. In some embodiments, the intelligent system acquires a depth image of a scene surrounding the system. A scene geometry may be extracted from the depth image and elements of the scene may be monitored. In certain embodiments, user activity in the scene is monitored and analyzed to infer user desires or intent with respect to the system. The interpretation of the user's intent as well as the system's response may be affected by the scene geometry surrounding the user and/or the system. In some embodiments, techniques and systems are disclosed for interpreting express user communication, e.g., expressed through hand gesture movements. In some embodiments, such gesture movements may be interpreted based on real-time depth information obtained from, e.g., optical or non-optical type depth sensors.
-
公开(公告)号:US20190042835A1
公开(公告)日:2019-02-07
申请号:US16051030
申请日:2018-07-31
Applicant: Apple Inc.
Inventor: Eslam A. Mostafa , Thorsten Gernoth , Kelsey Y. Ho
Abstract: A facial recognition authentication on a device having a camera may operate with multiple enrollment profiles on the device. Multiple enrollment profiles may include separate profiles for different appearances of a user and/or separate profiles for different users authorized to use the device. The enrollment profiles may be generated using an enrollment process where the enrollment process is operated separately to generate each of the different enrollment profiles. During the facial recognition authentication process, a user may unlock the device by having a matching score for image(s) captured of the user that that exceeds an unlock threshold for at least one of the enrollment profiles. The user may have a matching score that exceeds the unlock threshold for multiple enrollment profiles. Each enrollment profile unlocks the device for the user may be updated using a template update process that operates independently for each enrollment profile.
-
公开(公告)号:US20190041197A1
公开(公告)日:2019-02-07
申请号:US15912917
申请日:2018-03-06
Applicant: Apple Inc.
Inventor: Thorsten Gernoth , Ian R. Fasel , Haitao Guo , Atulit Kumar
CPC classification number: G06T7/514 , G01B11/14 , G06K9/00221 , G06K9/2027 , G06K9/2036 , G06T7/74 , G06T2207/10048 , G06T2207/30244 , H04N5/2251 , H04N5/2256 , H04N5/33
Abstract: An estimate of distance between a user and a camera on a device is used to determine an illumination pattern density used for speckle pattern illumination of the user in subsequent images. The distance may be estimated using an image captured when the user is illuminated with flood infrared illumination. Either a sparse speckle (dot) pattern illumination pattern or a dense speckle pattern illumination pattern is used depending on the distance between the user's face and the camera.
-
20.
公开(公告)号:US10048765B2
公开(公告)日:2018-08-14
申请号:US14865850
申请日:2015-09-25
Applicant: Apple Inc.
Inventor: Feng Tang , Chong Chen , Haitao Guo , Xiaojin Shi , Thorsten Gernoth
Abstract: Varying embodiments of intelligent systems are disclosed that respond to user intent and desires based upon activity that may or may not be expressly directed at the intelligent system. In some embodiments, the intelligent system acquires a depth image of a scene surrounding the system. A scene geometry may be extracted from the depth image and elements of the scene, such as walls, furniture, and humans may be evaluated and monitored. In certain embodiments, user activity in the scene is monitored and analyzed to infer user desires or intent with respect to the system. The interpretation of the user's intent or desire as well as the system's response may be affected by the scene geometry surrounding the user and/or the system. In some embodiments, techniques and systems are disclosed for interpreting express user communication, for example, expressed through fine hand gesture movements. In some embodiments, such gesture movements may be interpreted based on real-time depth information obtained from, for example, optical or non-optical type depth sensors. The depth information may be interpreted in “slices” (three-dimensional regions of space having a relatively small depth) until one or more candidate hand structures are detected. Once detected, each candidate hand structure may be confirmed or rejected based on its own unique physical properties (e.g., shape, size and continuity to an arm structure). Each confirmed hand structure may be submitted to a depth-aware filtering process before its own unique three-dimensional features are quantified into a high-dimensional feature vector. A two-step classification scheme may be applied to the feature vectors to identify a candidate gesture (step 1), and to reject candidate gestures that do not meet a gesture-specific identification operation (step-2). The identified gesture may be used to initiate some action controlled by a computer system.
-
-
-
-
-
-
-
-
-