Managing virtual ports
First Claim
Patent Images
1. A method for managing a gesture based computing environment, comprising:
- receiving a plurality of depth images of a capture area;
generating a model of a first user based on at least part of the first user being depicted in one of the depth images and based at least in part on depth values of pixels of one of the depth images;
associating the first user with a primary virtual port, the primary virtual port having associated therewith a feature that a secondary virtual port does not have, a user of the computing environment being able to be bound or unbound to the primary virtual port, the user being bound to the primary virtual port being indicative of the user being able to provide input to the computing environment via the primary virtual port;
identifying a second user based on at least part of the second user being depicted in one of the depth images;
associating the second user with the secondary virtual port in response to identifying the second user;
disassociating the first user from the primary virtual port and updating an association of the second user from the secondary virtual port to the primary virtual port, in response to determining that at least part of the first user is no longer depicted in a subsequent depth image based at least in part on depth values of pixels in the subsequent depth image.
2 Assignments
0 Petitions
Accused Products
Abstract
Techniques for managing virtual ports are disclosed herein. Each such virtual port may have different associated features such as, for example, privileges, rights or options. When one or more users are in a capture scene of a gesture based system, the system may associate virtual ports with the users and maintain the virtual ports. Also provided are techniques for disassociating virtual ports with users or swapping virtual ports between two or more users.
246 Citations
20 Claims
-
1. A method for managing a gesture based computing environment, comprising:
-
receiving a plurality of depth images of a capture area; generating a model of a first user based on at least part of the first user being depicted in one of the depth images and based at least in part on depth values of pixels of one of the depth images; associating the first user with a primary virtual port, the primary virtual port having associated therewith a feature that a secondary virtual port does not have, a user of the computing environment being able to be bound or unbound to the primary virtual port, the user being bound to the primary virtual port being indicative of the user being able to provide input to the computing environment via the primary virtual port; identifying a second user based on at least part of the second user being depicted in one of the depth images; associating the second user with the secondary virtual port in response to identifying the second user; disassociating the first user from the primary virtual port and updating an association of the second user from the secondary virtual port to the primary virtual port, in response to determining that at least part of the first user is no longer depicted in a subsequent depth image based at least in part on depth values of pixels in the subsequent depth image. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for managing a gesture based computing environment, comprising:
-
a processor; and a memory bearing processor-executable instructions that, when executed on the processor, causes the system to at least; receive a plurality of depth images of a capture area; identify a first user based on at least part of the first user being depicted in one of the depth images and based at least in part on depth values of pixels of one of the depth images; associate the first user with a primary virtual port, the primary virtual port having associated therewith a feature that a secondary virtual port does not have, a user of the computing environment being able to be bound or unbound to the primary virtual port, the user being bound to the primary virtual port being indicative of the user being able to provide input to the computing environment via the primary virtual port; identify a second user based on at least part of the second user being depicted in one of the depth images; associate the second user with the secondary virtual port in response to identifying the second user; disassociate the first user from the primary virtual port, and updating an association of the second user from the secondary virtual port to the primary virtual port, in response to determining that at least part of the first user is no longer depicted in a subsequent depth image based at least in part on depth values of pixels of the subsequent depth image. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-readable storage medium excluding signals bearing computer executable instructions for managing a gesture based computing environment that, when executed on a computer, cause the computer to perform operations comprising:
-
receiving a plurality of depth images of a capture area; generating a model of a first user based on at least part of the first user being depicted in one of the depth images and based at least in part on depth values of pixels of one of the depth images; associating the first user with a primary virtual port, the primary virtual port having associated therewith a feature that a secondary virtual port does not have, a user of the computing environment being able to be bound or unbound to the primary virtual port, the user being bound to the primary virtual port being indicative of the user being able to provide input to the computing environment via the primary virtual port; identifying a second user based on at least part of the second user being depicted in one of the depth images; associating the second user with the secondary virtual port in response to identifying the second user; disassociating the first user from the primary virtual port, and updating an association of the second user from the secondary virtual port to the primary virtual port, in response to determining that at least part of the first user is no longer depicted in a subsequent depth image based at least in part on depth values of pixels in the subsequent depth image. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification