Feeds

Apple pictures iOS on your wall

Tag team pico projectors

  • alert
  • submit to reddit

SANS - Survey on application security programs

Apple has filed a patent application for an entirely new type of user interface that combines pico projectors, inter-device communications, and gesture recognition.

The filing, "Projected display shared workspaces", envisions users interacting with displays projected by pico projector–equipped devices such as iPhones and iPads, or accessory projectors attached to laptops or desktops.

Apple shared-display patent illustration

Pico projectors would let you to share your iDevice's display without passing it around to your grimy coworkers

The filing notes that today's devices make screen-sharing easy. "However," it notes, "to facilitate portability, these display screens may be small, which may inhibit viewing by larger groups of people. Further, to facilitate viewing on the display screen, the electronic device may be transferred between viewers, which may be inconvenient."

That explains the projectors, which the filing states could be of many types: holographic laser, LCD, DLP, liquid crystal on silicon (LCOS), or LED, "among others".

The filing, however, goes beyond mere projection to describe a user interface that takes advantage of communication among the devices, either peer-to-peer or through an intermediary server.

Multiple projected displays would thus be aware of one another, and users could move objects among the displays using hand gestures – or the shadows of gestures – that would be detected by the devices' cameras. Alternatively, users could move objects among displays by manipulating those object's icons on, say, their iPhone displays.

Apple shared-display patent illustration

Your iDevice's camera would interpret your gestures, and distribute files accordingly

Sharing permissions could be set up by users or administrators, and file and communication encryption would also be provided.

The items moved from one display to another wouldn't necessarily need to be resident on the devices themselves – the filing lists as further sources streamed image data or image data captured live by the devices themselves.

Items could be zoomed, grouped, shared, duplicated, or distributed in any number of ways. If, for example, multiple displays were communicating among one another, the filing envisions that a gesture of a "larger magnitude" might toss an item through intervening displays all the way to the furthest participating display.

In addition to manipulating items among the projected displays using hand gestures, the filing also envisions a dedicated touchscreen device that could be used to manage the content displayed by each of the participating devices' projectors.

The projections could also be combined into a single display. In one example, the filing envisions the devices being able to pinpoint the locations of their peers, and use that location data to seamlessly create a unified display, presumably by varying the display angle and focal length of the devices' projectors.

Apple shared-display patent illustration

An iPhone and iPad combine in a bit of patriotic E pluribus unum

In addition to the projected displays, users would have access to controls on their devices themselves. These on-screen user interfaces could include controls for display positioning and prioritization, soft keyboards for data entry, interfaces for file-system management and item sharing, and the like.

Apple shared-display patent illustration

Using your iPhone, you could set display location (top), choose files (center), or distribute images (bottom)

There are, of course, multiple hurdles to be, well, hurdled before "Projected display shared workspaces" could become a reality, not the least of which being the low luminance of pico projectors.

That said, the filing does describe what might be a quite convenient way for iDevice users to quickly and easily share files. Or we might imagine you and your buddies getting together in your dimly lit man cave and combining your iPhone displays for a big-screen evening of mature edification and enjoyment.

Whether devices that use this technology ever see the light of day – or the darkness of a conference room – the filing does demonstrate that the World's Biggest Company is not so big that it can't think outside the box. ®

3 Big data security analytics techniques

More from The Register

next story
Virgin Media so, so SORRY for turning spam fire-hose on its punters
Hundreds of emails flood inboxes thanks to gaffe
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
AT&T threatens to pull out of FCC wireless auctions over purchase limits
Company wants ability to buy more spectrum space in auction
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
Google looks to LTE and Wi-Fi to help it lube YouTube tubes
Bandwidth hogger needs tube embiggenment if it's to succeed
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.