Feeds

Apple preps iPhone face recognition

Channels Oprah

Choosing a cloud hosting partner with confidence

The US Patent and Trademark Office published 33 new Apple patent applications on Thursday, bringing the total filed in July to 55 - and we're not even a third of the way through the month.

Today's cluster of creativity ranged from flexible cabling to scrolling lyrics, but the bulk of the filings described new powers for the ubiquitous iPhone and its little brother, the iPod touch - especially when the 'Pod is equipped with a camera, which it seems destined to be.

Two of the filings are directly camera-related. One focuses on object identification and the other on face recognition. The former is targeted specifically for handhelds, while the latter's reach extends both into your pocket and out to the entire universe of consumer electronics.

The object-identification filing describes a system in which a handheld's camera captures an image of an object either in visual light or infrared, then compares that image with information stored over a network. The network then asks the you what information about that object you'd like to download, then provides it.

The filing also describes the system using an RFID reader rather than a camera, but the detect-compare-download sequence remains the same.

Apple uses a museum visit to illustrate the utility of this technology: You could simply point your iPhone at a work of art and quickly be presented with info about its artist, genre, provenance, and the availability of T-shirts featuring that work in the museum store - which another of Thursday's filings, on online shopping, could help you buy.

Tapping into a handheld's GPS and digital compass could also enable the system to provide location-based resources - the filing suggests a "RESTAURANT mode" to help you find east in Vegas - and to support the captioned landscapes provided by augmented reality that are getting so much press lately.

Apple object-recognition patent illustration

Claude Monet at his most minimalist, captured and ID-ed by your iPhone

Finally, the filing includes a way for you to capture a log of all the identified objects, complete with downloaded multimedia content for creating a record of your peregrinations. Look for such a media-rich slideshow to appear in some student's "How I Spent My Summer Vacation" school assignment.

The face-recognition filing describes two different system: one that merely checks for a face - any face - and a second that matches what it sees with a database of whom it knows.

The system that doesn't care who you are is merely looking to see if anyone's using it - and if someone is, it won't time out, as would an iPhone, or fire up a screensaver, as would a PC. The system that knows you by your dashing good looks would also be aware of your privileges level, and allow access to its services based on that level.

Apple, as usual in its patent applications, isn't shy about the scope of this technology. It list 37 different devices that could incorporate it, from personal communications devices to vehicle operating systems to automatic teller machines. Then just in case it forgot anything, adds "any like computing device capable of interfacing with a person."

That should just about cover it.

Intelligent flash storage arrays

More from The Register

next story
Mighty Blighty broadbanders beg: Let us lay cable in BT's, er, ducts
Complain to Ofcom that telco has 'effective monopoly'
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
Ofcom tackles complaint over Premier League footie TV rights
Virgin Media: UK fans pay the most for the fewest matches
FCC: Gonna need y'all to cough up $1.5bn to put broadband in schools
Kids need more fiber, says Wheeler, and you'll pay for it
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.