The present invention is related generally to computing devices and, more particularly, to communications among such devices.
As personal communications devices (e.g., cell phones) are developed to support greater and greater functionality, people are using them to do much more than talk. As is well known, these devices now usually allow their users to create media files (e.g., by taking a picture or by recording a video using a camera on the device) and to download media files from remote servers (via a web interface supported by the device). People want to use their devices to share these media files with their friends.
However, the development of new functionality on these devices has far outpaced the development of friendly interfaces that allow a user to comfortably control his device's new capabilities. Sometimes, the design of a user interface is constrained by the small size of the device and by the sheer number of functions that the device supports. For whatever reason, a user often finds that the control interface for a new function of his device is at best cumbersome and sometimes confusing. For example, if the user wishes to send a media file stored on his device to a friend standing next to him, he may first have to navigate through a list of contact and then pull up a separate media-sharing menu. This sort of complication limits the utility and attractiveness of the new features.
The above considerations, and others, are addressed by the present invention, which can be understood by referring to the specification, drawings, and claims. According to aspects of the present invention, face-recognition software is used for enabling a communicative act. For example, a user points the camera on his device at a friend. Software (on the device or accessed remotely) analyzes the image produced by the camera, detects the friend's face, and recognizes the friend. The recognized face is then associated with a profile (e.g., in a contacts list on the user's device), and an address for the friend is retrieved from the profile. The address can be used in communicating with the friend, all without the user ever having to explicitly manipulate his contacts list.
The image containing the face may be captured by a camera local to the device, as in the example above, or it may be retrieved by the user's device from a remote source. For example, the face may be detected in a movie clip downloaded from a media server.
Aspects of the present invention are directed toward any type of communicative act. As a few examples, the user may send an e-mail to the friend, post a file on the friend's social networking site, or establish a live communications link with the friend. The image with the friend's face may be sent to the friend, but the invention does not require that.
The communicative act need not be directed toward the friend whose face was recognized. For example, when that friend's profile is retrieved, it can be searched for a reference to another person, e.g., the friend's mother, and the communicative act is then directed to that other person.
In some embodiments, a user interface presents the image (whether captured locally or retrieved from a remote source) to the user. If the image contains a plurality of faces, the user can choose which face to recognize.
While the appended claims set forth the features of the present invention with particularity, the invention, together with its objects and advantages, may be best understood from the following detailed description taken in conjunction with the accompanying drawings of which:
Turning to the drawings, wherein like reference numerals refer to like elements, the invention is illustrated as being implemented in a suitable environment. The following description is based on embodiments of the invention and should not be taken as limiting the invention with regard to alternative embodiments that are not explicitly described herein.
In the communications environment 100 of
To direct his communications to his friend 106, the user 102 may use traditional methods such as pulling up a list of contacts on his personal communications device 104, searching through the list of contacts until he sees the contact profile of his friend 106, and then retrieving an e-mail address of the friend 106 from her stored profile. As an example of one aspect of the present invention, the user 102 may instead point a camera on his device 104 at his friend 106 (assuming, of course, that she is within camera range), capture an image that includes her face, and then use facial-recognition software that associates the face in the captured image with contact information for the friend 106. (The contact information itself may be stored in a list of contacts on the device 104 as in the previous art.) This method of using facial recognition to address communications can be easier to use and more intuitive that previously known addressing methods.
A typical user interface of the personal communications device 104 includes, in addition to the main display 200, a keypad and other user-input devices. The keypad may be physical or virtual, involving virtual keys displayed on a touch screen 200.
The flowchart of
The method of
In step 302, facial-detection software is applied to the image, and at least one face is detected in the image. Methods of facial detection are well known in the art, and different known methods may be appropriate in different embodiments.
In one embodiment of steps 300 and 302, the camera on the personal communications device 104 faces the front of the device 104. Software monitors the image captured by the camera and tries to recognize any faces. Often, the face of the user 102 is detected as the user 102 views the display 200. The software detects this face but, recognizing it to be the face of its user 102, the software ignores it. When, however, a different face is detected (e.g., the user 102 turns the device 104 toward his friend 106, and the camera captures an image of her face), the utility proceeds with the remainder of the method of
Step 304 may be applied when, in step 302, more than one face is detected in the image. Step 304 selects one face in order to proceed. The selection may be automatic if, for example, one face predominates (e.g., one face covers more of the image than any other face, is in better focus, or is in a central position). In other embodiments, the user 102 may be presented with the image on the screen 200 of his personal communications device 104. The user 102 then chooses one face. In the example of
(In some embodiments, more than one face can be selected and used for communications: Steps 306 through 312, below, are then performed for each selected face, that is, the communicative act of step 312 is performed with multiple recipients.)
Well known facial-recognition software is used in step 306 to analyze the selected face. That is, parametric information is derived from the facial image such as distance between the eyes, hair color, cheek-bone prominence, and the like. In some embodiments, this facial-recognition step 306 may be performed on a remote server 108. This allows the use of more computationally intensive methods than could be comfortably performed by the personal communications device 104.
The output of the facial-recognition software is used in step 308 to associate the detected face with a stored profile. For example, the user 102 may have previously taken pictures of his friends, analyzed each picture with the facial-recognition software, and stored the output parameters of the recognition as part of each friend's contact information stored on the personal communications device 104. In other embodiments, the association of the face with a profile is performed partly or wholly on a remote server 108. The stored profile itself may reside on this remote server 108.
Some facial-recognition software provides to its user a confidence score for the recognition task. In some embodiments, this confidence score can be presented to the user 102 for further consideration. If, for example, the software has only a low level of confidence that its recognition is correct, then the user 102 can be queried to see if he wishes to continue. The user 102 may decide to take a clearer picture and then re-run the method of steps 300 through 308.
Once the stored profile that is associated with the detected face has been identified in step 308, contact information is retrieved from that profile in step 310. The particular type of contact information retrieved depends in part upon the nature of the communicative act that the user 102 wishes to perform in step 312. If, for example, the user 102 wishes to send an e-mail to his friend 106, then her e-mail address is retrieved from the stored profile in step 310, and the e-mail is sent in step 312.
As another example, the user 102 may wish to post some information to his friend's social-networking site. Then, the address of that site is retrieved from the profile in step 310.
The user 102 may also use the above method as a dialer to make a telephone call from his personal communications device 104 to a telephone registered to his friend 106.
In the above examples, the contact information is mostly static. In some situations, however, the contact information may be dynamic, as in some social-networking situations. Thus, the user 102 can use these methods to query if the user 106 is currently participating in an on-line game or in some other social milieu, and, if so, the user 102 can retrieve the dynamic information necessary to join the game (assuming, of course, that this information is available).
The user 102 can also join a local peer-to-peer network with his friend 106 and share content over that network with her. In this case, the friend's Bluetooth ad hoc, Wi-Fi ad hoc, or Wi-Fi Direct networking information is retrieved from the stored profile.
Other communicative acts are contemplated for step 312. The possibilities are only limited by the availability of contact information accessible in step 310.
Note that in one of the examples of
In the above example, the communication act of step 312 was performed with the person whose profile is accessed in step 310. That is not always the case, however. Instead, the profile information from step 310 can be used to retrieve other contact information. Consider, for example, the case where the user 102 wishes to tell the mother of his friend 106 that she is well. He can retrieve the stored profile of his friend 106 using the above methods and, if her profile includes contact information for her mother, retrieve that contact information and send an e-mail to the mother.
In view of the many possible embodiments to which the principles of the present invention may be applied, it should be recognized that the embodiments described herein with respect to the drawing figures are meant to be illustrative only and should not be taken as limiting the scope of the invention. For example, the communicative act may be used for public-safety purposes rather than for social interaction. Therefore, the invention as described herein contemplates all such embodiments as may come within the scope of the following claims and equivalents thereof.