-
公开(公告)号:US11935327B1
公开(公告)日:2024-03-19
申请号:US18053043
申请日:2022-11-07
Applicant: Apple Inc.
Inventor: Eslam A. Mostafa , Kelsey Y. Ho
CPC classification number: G06V40/172 , G06F18/217 , G06F21/32 , G06N3/045 , G06V10/751 , G06V40/50
Abstract: When a software update is provided to a device that implements a facial recognition authentication process, a new authentication algorithm to operate the facial recognition authentication process may be included as part of software update. For a period of time, the new authentication algorithm may operate a “virtual” facial recognition authentication process alongside operation of the existing facial recognition authentication process using the existing (e.g., earlier version) authentication algorithm. The performance of the new authentication algorithm in providing facial recognition authentication (as assessed by the “virtual” process) may be compared to the performance of the existing authentication algorithm in providing facial recognition authentication during the period of time. When the performance of the new authentication algorithm is determined to have a satisfactory performance, operation of the actual facial recognition authentication process on the device may be switched to the new authentication algorithm.
-
公开(公告)号:US10430645B2
公开(公告)日:2019-10-01
申请号:US16240970
申请日:2019-01-07
Applicant: Apple Inc.
Inventor: Eslam A. Mostafa , Thorsten Gernoth , Kelsey Y. Ho
Abstract: A facial recognition authentication on a device having a camera may operate with multiple enrollment profiles on the device. Multiple enrollment profiles may include separate profiles for different appearances of a user and/or separate profiles for different users authorized to use the device. The enrollment profiles may be generated using an enrollment process where the enrollment process is operated separately to generate each of the different enrollment profiles. During the facial recognition authentication process, a user may unlock the device by having a matching score for image(s) captured of the user that that exceeds an unlock threshold for at least one of the enrollment profiles. The user may have a matching score that exceeds the unlock threshold for multiple enrollment profiles. Each enrollment profile unlocks the device for the user may be updated using a template update process that operates independently for each enrollment profile.
-
公开(公告)号:US20180336399A1
公开(公告)日:2018-11-22
申请号:US15934578
申请日:2018-03-23
Applicant: Apple Inc.
Inventor: Thorsten Gernoth , Joerg A. Liebelt , Onur C. Hamsici , Kelsey Y. Ho
CPC classification number: G06K9/00288 , G06F1/3231 , G06F1/3265 , G06F3/012 , G06F15/76 , G06K9/00255 , G06K9/00268 , G06K9/6274 , G06K9/6277 , G06N3/0445 , G06N3/08 , G06N20/00 , G06N20/10
Abstract: Detection of a user paying attention to a device may be used to enable or support biometric security (e.g., facial recognition) enabled features on the device. Images captured by a camera on the device may be used to determine if the user is paying attention to the device. Facial features of the user's face in the images may be assessed to determine if the user is paying attention to the device. Facial features may be assessed through comparison of feature vectors generated from the captured image feature to a set of known feature vectors. The known feature vectors for attention may be generated using a machine learning process.
-
公开(公告)号:US20140067293A1
公开(公告)日:2014-03-06
申请号:US13627249
申请日:2012-09-26
Applicant: APPLE INC.
Inventor: Nima Parivar , Christopher T. Mullens , Kelsey Y. Ho
CPC classification number: G06F1/3203 , G06F1/3206
Abstract: An electronic device that includes an integrated circuit and a memory is described. This integrated circuit monitors power sub-states within different operating modes of the electronic device. These power sub-states are associated with configurations of the electronic device and average power-consumption rates. Then, the integrated circuit stores information specifying a power-sub-state history of the electronic device in the memory, where the power-sub-state history includes amounts of time the electronic device was in one or more of the power sub-states. The stored information can be used to improve a power usage model for the electronic device and/or to modify a user experience, such as changing a performance of the electronic device or a time until a battery needs to be recharged.
Abstract translation: 描述了包括集成电路和存储器的电子设备。 该集成电路监视电子设备的不同工作模式下的电源子状态。 这些电源子状态与电子设备的配置和平均功耗率相关联。 然后,集成电路将指定电子设备的功率子状态历史的信息存储在存储器中,其中功率子状态历史包括电子设备处于一个或多个功率子状态的时间量。 存储的信息可以用于改进电子设备的功率使用模型和/或修改用户体验,例如改变电子设备的性能或直到电池需要被充电的时间。
-
公开(公告)号:US11675412B2
公开(公告)日:2023-06-13
申请号:US17377843
申请日:2021-07-16
Applicant: Apple Inc.
Inventor: Benjamin Biron , Ronnie G. Misra , Christopher K. Thomas , Weijie Zhang , Roberto G. Yepez , Anthony J. Guetta , Kelsey Y. Ho , Paul W. Chinn , Myra Haggerty , Curtis Rothert , Peter D. Anton , Jonathan E. Drummond , Andrew B. Cato
IPC: G06F1/3231 , G06F1/324 , G06F1/3234 , G06F1/3287 , G06F1/3296
CPC classification number: G06F1/3231 , G06F1/324 , G06F1/3265 , G06F1/3287 , G06F1/3296 , Y02D10/00
Abstract: In an embodiment, a device may include an attention detection service. The attention detection service may monitor various peripheral devices in the device for indications that a user is paying attention to the device. Various clients may register for notification of attention detection and attention lost (attention no longer detected) events, or may poll the service for the events. If a user is not paying attention to the device, it may be possible to take various actions to permit reduced energy consumption.
-
公开(公告)号:US11527107B1
公开(公告)日:2022-12-13
申请号:US16457811
申请日:2019-06-28
Applicant: Apple Inc.
Inventor: Eslam A. Mostafa , Kelsey Y. Ho
Abstract: When a software update is provided to a device that implements a facial recognition authentication process, a new authentication algorithm to operate the facial recognition authentication process may be included as part of software update. For a period of time, the new authentication algorithm may operate a “virtual” facial recognition authentication process alongside operation of the existing facial recognition authentication process using the existing (e.g., earlier version) authentication algorithm. The performance of the new authentication algorithm in providing facial recognition authentication (as assessed by the “virtual” process) may be compared to the performance of the existing authentication algorithm in providing facial recognition authentication during the period of time. When the performance of the new authentication algorithm is determined to have a satisfactory performance, operation of the actual facial recognition authentication process on the device may be switched to the new authentication algorithm.
-
公开(公告)号:US10712799B2
公开(公告)日:2020-07-14
申请号:US15655112
申请日:2017-07-20
Applicant: Apple Inc.
Inventor: Nima Parivar , Kelsey Y. Ho
IPC: G06F9/46 , G06F1/3215 , G06F1/3231 , H04W52/02 , G06F3/041
Abstract: An electronic device is disclosed. The electronic device includes a first input device; a second input device capable of operating in a first operating mode; and a system management module in communication with the first input device and the second input device. The system management module is configured for switching the second input device to a second operating mode in response to detecting, by the first input device, a presence of a user without receiving any operation-specific input from the user.
-
公开(公告)号:US10303866B1
公开(公告)日:2019-05-28
申请号:US16141084
申请日:2018-09-25
Applicant: Apple Inc.
Inventor: Marcel Van Os , Thorsten Gernoth , Kelsey Y. Ho
Abstract: An operation of a facial recognition authentication process may fail to authenticate a user even if the user is an authorized user of the device. In such cases, the facial recognition authentication process may automatically re-initiate to provide another attempt to authenticate the user using additional captured images. For the new attempt (e.g., the retry) to authenticate the user, one or more criteria for the images used in the facial recognition authentication process may be adjusted. For example, criteria for distance between the camera and the user's face and/or occlusion of the user's face in the images may be adjusted before the new attempt to authenticate the user. Adjustment of these criteria may increase the likelihood that the authorized user will be successfully authenticated in the new attempt.
-
公开(公告)号:US20180348842A1
公开(公告)日:2018-12-06
申请号:US15787307
申请日:2017-10-18
Applicant: Apple Inc.
Inventor: Benjamin Biron , Ronnie G. Misra , Christopher K. Thomas , Weijie Zhang , Roberto G. Yepez , Anthony J. Guetta , Kelsey Y. Ho , Paul W. Chinn , Myra Haggerty , Curtis Rothert , Peter D. Anton , Jonathan E. Drummond , Andrew B. Cato
IPC: G06F1/32
Abstract: In an embodiment, a device may include an attention detection service. The attention detection service may monitor various peripheral devices in the device for indications that a user is paying attention to the device. Various clients may register for notification of attention detection and attention lost (attention no longer detected) events, or may poll the service for the events. If a user is not paying attention to the device, it may be possible to take various actions to permit reduced energy consumption.
-
公开(公告)号:US11693937B2
公开(公告)日:2023-07-04
申请号:US16395979
申请日:2019-04-26
Applicant: Apple Inc.
Inventor: Marcel Van Os , Thorsten Gernoth , Kelsey Y. Ho
CPC classification number: G06F21/32 , G06V40/166 , G06V40/171 , G06V40/172
Abstract: An operation of a facial recognition authentication process may fail to authenticate a user even if the user is an authorized user of the device. In such cases, the facial recognition authentication process may automatically re-initiate to provide another attempt to authenticate the user using additional captured images. For the new attempt (e.g., the retry) to authenticate the user, one or more criteria for the images used in the facial recognition authentication process may be adjusted. For example, criteria for distance between the camera and the user's face and/or occlusion of the user's face in the images may be adjusted before the new attempt to authenticate the user. Adjustment of these criteria may increase the likelihood that the authorized user will be successfully authenticated in the new attempt.
-
-
-
-
-
-
-
-
-