-
公开(公告)号:US20250156516A1
公开(公告)日:2025-05-15
申请号:US19025509
申请日:2025-01-16
Applicant: Apple Inc.
Inventor: Jiaying DENG , Benjamin BIRON , Kyle C. BROGLE , Tomislav SUCHAN
Abstract: The present disclosure generally relates to enrolling a biometric feature for use with a peripheral device. While a computer system is connected to an external device, the computer system receives a first request to enroll a biometric feature. In response to receiving the request and in accordance with a determination that the request satisfies a first set of one or more criteria, the computer system displays a user interface object prompting a user to provide an authorization input to one or more input devices physically connected to the computer system. While displaying the first user interface object, the computer system receives user input. In response to receiving the user input and in accordance with a determination that the user input includes the authentication input, the computer system initiates a process to enroll the biometric feature using a biometric sensor that is integrated with the external device.
-
2.
公开(公告)号:US20240404216A1
公开(公告)日:2024-12-05
申请号:US18663167
申请日:2024-05-14
Applicant: Apple Inc.
Inventor: Tomislav SUCHAN
Abstract: In accordance with some embodiments, a method for presenting a system user interface in an extended reality environment is described.
-
公开(公告)号:US20230273985A1
公开(公告)日:2023-08-31
申请号:US18167767
申请日:2023-02-10
Applicant: Apple Inc.
Inventor: Tomislav SUCHAN , Jay MOON , Jonathan R. DASCOLA , Vitalii KRAMAR , Gianpaolo FASOLI , Anton K. DIEDERICH , Luojie XIANG
Abstract: In some examples, a change in a current viewpoint of a user is detected while a three-dimensional environment is visible. In some examples, in accordance with a determination that at least a threshold amount of the object is visible from the viewpoint of the user, user authorization of the secure operation, using a virtual user interface object, is enabled. In some examples, the user is biometrically authenticated, at a first time, to perform a first type of biometric authentication. In some examples, a request to perform the secure operation is received at a second time. In some examples, in accordance with a determination that the user met respective criteria between the first time and the second time, the secure operation is performed without performing, after receiving the request, the first type of biometric authentication.
-
-