Abstract:
The present disclosure generally relates to using avatars and image data for enhanced user interactions. In some examples, user status dependent avatars are generated and displayed with a message associated with the user status. In some examples, a device captures image information to scan an object to create a 3D model of the object. The device determines an algorithm for the 3D model based on the capture image information and provides visual feedback on additional image data that is needed for the algorithm to build the 3D model. In some examples, an application's operation on a device is restricted based on whether an authorized user is identified as using the device based on captured image data. In some examples, depth data is used to combine two sets of image data.
Abstract:
A device displays a camera user interface including a live view from a camera. While displaying the live view from the camera: the device records media images that are captured by the camera, while continuing to display the live view from the camera; and the device further displays representations of a plurality of media images that were recorded while displaying the live view from the camera as frames scrolling across the display in a first direction.
Abstract:
An audio output device case that includes one or more input devices and is in communication with at least one or more audio output devices and an audio source, performs a method, while the audio source is in communication with the one or more audio output devices, that includes receiving an input via the one or more input devices, and in response to receiving the input, causes the one or more audio output devices to perform an operation associated with the received input while maintaining communication of the audio source with the one or more audio output devices.
Abstract:
The method includes: displaying first graphical elements associated with first plurality of output modalities within an XR environment; while displaying the first graphical elements, detecting movement of a physical object; and in response to detecting the movement of the physical object: in accordance with a determination that the movement of the physical object causes the physical object to breach a distance threshold relative to a first graphical element among the first graphical elements, selecting a first output modality associated with the first graphical element as a current output modality for the physical object; and in accordance with a determination that the movement of the physical object causes the physical to breach the distance threshold relative to a second graphical element among the first graphical elements, selecting a second output modality associated with the second graphical element as the current output modality for the physical object.
Abstract:
The present disclosure generally relates to using avatars and image data for enhanced user interactions. In some examples, user status dependent avatars are generated and displayed with a message associated with the user status. In some examples, a device captures image information to scan an object to create a 3D model of the object. The device determines an algorithm for the 3D model based on the capture image information and provides visual feedback on additional image data that is needed for the algorithm to build the 3D model. In some examples, an application's operation on a device is restricted based on whether an authorized user is identified as using the device based on captured image data.
Abstract:
The present disclosure generally relates to using avatars and image data for enhanced user interactions. In some examples, user status dependent avatars are generated and displayed with a message associated with the user status. In some examples, a device captures image information to scan an object to create a 3D model of the object. The device determines an algorithm for the 3D model based on the capture image information and provides visual feedback on additional image data that is needed for the algorithm to build the 3D model. In some examples, an application's operation on a device is restricted based on whether an authorized user is identified as using the device based on captured image data.