-
公开(公告)号:US20240319867A1
公开(公告)日:2024-09-26
申请号:US18605490
申请日:2024-03-14
Applicant: Apple Inc.
Inventor: William D. LINDMEIER , Laura SUGDEN
IPC: G06F3/04883 , G06F3/0354
CPC classification number: G06F3/04883 , G06F3/03545
Abstract: In some embodiments, an electronic device is configured to present user interfaces to facilitate tracing of objects within a three-dimensional environment of the electronic device. In some embodiments, the objects are physical and/or virtual. In some embodiments, the electronic device detects input directed to an input object and displays virtual ink tracing objects in accordance with the input.
-
公开(公告)号:US20240143071A1
公开(公告)日:2024-05-02
申请号:US18394897
申请日:2023-12-22
Applicant: Apple Inc.
Inventor: Devin W. CHALMERS , William D. LINDMEIER , Gregory LUTTER , Jonathan C. MOISANT-THOMPSON , Rahul NAIR
CPC classification number: G06F3/013 , G02B27/0093 , G02B27/0172 , G02B27/0179 , G06T5/70 , G06T19/006 , G02B2027/0185 , G02B2027/0187
Abstract: One or more techniques for managing virtual objects between one or more displays are described. In accordance with some embodiments, exemplary techniques for displaying a virtual object are described.
-
公开(公告)号:US20180321826A1
公开(公告)日:2018-11-08
申请号:US16035419
申请日:2018-07-13
Applicant: Apple Inc.
Inventor: Marek BEREZA , Adi BERENSON , Jeffrey Traer BERNSTEIN , Lukas Robert Tom GIRLING , Mark HAUENSTEIN , Amir HOFFNUNG , William D. LINDMEIER , Joseph A. MALIA , Julian MISSIG
IPC: G06F3/0484 , G06T19/20 , G06F3/0488 , G06F3/041 , G06F3/0481
Abstract: The present disclosure generally relates to using avatars and image data for enhanced user interactions. In some examples, user status dependent avatars are generated and displayed with a message associated with the user status. In some examples, a device captures image information to scan an object to create a 3D model of the object. The device determines an algorithm for the 3D model based on the capture image information and provides visual feedback on additional image data that is needed for the algorithm to build the 3D model. In some examples, an application's operation on a device is restricted based on whether an authorized user is identified as using the device based on captured image data. In some examples, depth data is used to combine two sets of image data.
-
-