US 11,676,373 B2
Personal computing device control using face detection and recognition
Jeff Gonion, Campbell, CA (US); and Duncan Robert Kerr, San Francisco, CA (US)
Assigned to Apple Inc., Cupertino, CA (US)
Filed by Apple Inc., Cupertino, CA (US)
Filed on Jul. 24, 2020, as Appl. No. 16/938,362.
Application 16/938,362 is a continuation of application No. 14/980,344, filed on Dec. 28, 2015, granted, now 10,726,242, issued on Jul. 28, 2020.
Application 14/980,344 is a continuation of application No. 14/090,344, filed on Nov. 26, 2013, granted, now 9,223,397, issued on Dec. 29, 2015.
Application 14/090,344 is a continuation of application No. 12/074,985, filed on Mar. 6, 2008, granted, now 8,600,120, issued on Dec. 3, 2013.
Claims priority of provisional application 61/009,888, filed on Jan. 3, 2008.
Prior Publication US 2020/0356761 A1, Nov. 12, 2020
Int. Cl. G06V 40/16 (2022.01); G06F 1/3231 (2019.01); G06F 21/32 (2013.01); G06F 21/62 (2013.01); G06K 9/62 (2022.01); G06F 3/00 (2006.01); G06F 3/0482 (2013.01); G06F 3/0485 (2022.01); G06V 10/94 (2022.01); G06F 18/40 (2023.01)
CPC G06V 10/945 (2022.01) [G06F 1/3231 (2013.01); G06F 3/005 (2013.01); G06F 3/0482 (2013.01); G06F 3/0485 (2013.01); G06F 18/40 (2023.01); G06F 21/32 (2013.01); G06F 21/629 (2013.01); G06V 40/16 (2022.01); G06V 40/164 (2022.01); G06V 40/172 (2022.01); Y02D 10/00 (2018.01)] 54 Claims
OG exemplary drawing
 
1. A method for controlling a computing system, the method comprising:
receiving, with the computing system, a communication from a second computing system;
in response to receiving the communication from the second computing system, evaluating, with the computing system, an environment of the computing system;
when the evaluating identifies existence of a person in the environment, initiating a first operation of the computing system that is related to the received communication from the second computing system; and
when the evaluating does not identify existence of a person in the environment, initiating a second operation of the computing system that is related to the received communication from the second computing system, wherein the second operation is different than the first operation.