-
公开(公告)号:US20220342972A1
公开(公告)日:2022-10-27
申请号:US17862179
申请日:2022-07-11
Applicant: Apple Inc.
Inventor: Marcel VAN OS , Peter D. ANTON , Arian BEHZADI , Jeffrey T. BERNSTEIN , Lynne DEVINE , Allison W. DRYER , Cas G. LEMMENS , Joseph A. MALIA
IPC: G06F21/32 , G06F3/04883 , G06F3/01 , H04L9/32
Abstract: The present disclosure relates generally to implementing biometric authentication, including providing user interfaces for: while the electronic device is in a first state in which a respective function of the electronic device is disabled, detecting one or more activations of the button; and in response to detecting the one or more activations of the button: capturing, with the one or more biometric sensors that are separate from the button, biometric data; if the biometric data satisfies biometric authentication criteria, transitioning the electronic device to a second state in which the respective function of the electronic device is enabled; and if the biometric data does not satisfy the biometric authentication criteria, maintaining the electronic device in the first state and displaying, on the display, an indication that biometric authentication has failed.
-
公开(公告)号:US20240361898A1
公开(公告)日:2024-10-31
申请号:US18632138
申请日:2024-04-10
Applicant: Apple Inc.
Inventor: Guillaume R. ARDAUD , Jeffrey T. BERNSTEIN , Joseph A. MALIA , Julian K. MISSIG
IPC: G06F3/04847
CPC classification number: G06F3/04847
Abstract: The present disclosure generally relates to capturing and/or editing media items that can correspond to multiple media types and/or multiple cameras. In some embodiments, a method for capturing and/or editing media that can be presented as multiple different media types is described. In some embodiments, a method for capturing and/or editing media that was captured using multiple different cameras is described. In some embodiments, a method for selecting a subset of cameras with which to capture media is described.
-
公开(公告)号:US20220244838A1
公开(公告)日:2022-08-04
申请号:US17725311
申请日:2022-04-20
Applicant: Apple Inc.
Inventor: Marek BEREZA , Adi BERENSON , Jeffrey Traer BERNSTEIN , Lukas Robert Tom GIRLING , Mark HAUENSTEIN , Amir HOFFNUNG , William D. LINDMEIER , Joseph A. MALIA , Julian MISSIG
IPC: G06F3/04845 , G06F3/041 , G06T19/20 , G06F3/04883 , G06F3/04842 , G06F3/04815 , G06F3/0488
Abstract: The present disclosure generally relates to using avatars and image data for enhanced user interactions. In some examples, user status dependent avatars are generated and displayed with a message associated with the user status. In some examples, a device captures image information to scan an object to create a 3D model of the object. The device determines an algorithm for the 3D model based on the capture image information and provides visual feedback on additional image data that is needed for the algorithm to build the 3D model. In some examples, an application's operation on a device is restricted based on whether an authorized user is identified as using the device based on captured image data.
-
公开(公告)号:US20180088787A1
公开(公告)日:2018-03-29
申请号:US15714887
申请日:2017-09-25
Applicant: Apple Inc.
Inventor: Marek BEREZA , Adi BERENSON , Jeffrey Traer BERNSTEIN , Lukas Robert Tom GIRLING , Mark HAUENSTEIN , Amir HOFFNUNG , William D. LINDMEIER , Joseph A. MALIA , Julian MISSIG
IPC: G06F3/0484 , G06F3/041 , G06F3/0481 , G06F3/0488 , G06T19/20
CPC classification number: G06F3/04845 , G06F3/0412 , G06F3/0416 , G06F3/04815 , G06F3/04842 , G06F3/0488 , G06F3/04883 , G06Q50/01 , G06T19/20
Abstract: The present disclosure generally relates to using avatars and image data for enhanced user interactions. In some examples, user status dependent avatars are generated and displayed with a message associated with the user status. In some examples, a device captures image information to scan an object to create a 3D model of the object. The device determines an algorithm for the 3D model based on the capture image information and provides visual feedback on additional image data that is needed for the algorithm to build the 3D model. In some examples, an application's operation on a device is restricted based on whether an authorized user is identified as using the device based on captured image data.
-
-
-