Apple To Acquire Polar Rose Face Recognition Firm

The facial recognition software made by the Swedish company can be used in the cloud, on a computer or on iPhone and Android smartphones.

Apple has acquired Polar Rose, a Swedish company that makes facial recognition software that can be used in the cloud, on a computer or on iPhone and Android smartphones.

Norwegian Mac site Mac1 reported the acquisition on Monday, according to a translation of the site via Google Translate. Financial details were not disclosed. Apple did not respond to a request for comment.

Polar Rose has developed technology that uses complex algorithms to identify photos, so they can be linked to other information. The company focuses on facial recognition, making the technology particularly useful in social networks. For example, the technology could be used to identify and tag people in a group photo.

What Apple has planned for the Polar Rose technology is not known. The company does not comment on future product plans. However, Apple uses facial recognition technology in iPhoto to help users organize their photos based on particular people.

Apple could expand Polar Rose's technology on the iPhone in competing against Google which has developed image recognition software called Goggles for smartphones running the search engine's Android operating systems.

Goggles makes it possible for people to take pictures of landmarks, artwork, text and other objects in order to launch a search for more information. Because of privacy concerns, Google has not expanded the capabilities to include facial recognition.

Polar Rose has three products: FaceCloud, FaceLib and FaceCore.

FaceCloud enables service providers and social networks to use the facial-recognition technology on websites. The company's FaceLib product is for developers building applications for iPhones and Android phones. FaceCore is for applications developed to run on a server or Linux, Mac OS X or Windows desktop or laptop.

Earlier this month, Polar Rose shut down its free face-tagging service that has been offered on its website for several years. The offering had started out with a browser plug in and search engine. In the middle of last year, the company launched tagging of Facebook friends in Flickr photos, which was later expanded to include Facebook photos.


Swedish Startup Offering Image-Based Search

Beware the Rose

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-03-21
Remote file inclusion allows an attacker to craft a specific URL referencing the Schneider Electric Modicon BMXNOC0401, BMXNOE0100, BMXNOE0110, BMXNOE0110H, BMXNOR0200H, BMXP342020, BMXP342020H, BMXP342030, BMXP3420302, BMXP3420302H, or BMXP342030H PLC web server, which, when launched, will result i...
PUBLISHED: 2019-03-21
Reflected Cross-Site Scripting (nonpersistent) allows an attacker to craft a specific URL, which contains Java script that will be executed on the Schneider Electric Modicon BMXNOC0401, BMXNOE0100, BMXNOE0110, BMXNOE0110H, BMXNOR0200H, BMXP342020, BMXP342020H, BMXP342030, BMXP3420302, BMXP3420302H, ...
PUBLISHED: 2019-03-21
A vulnerability has been identified in SICAM A8000 CP-8000 (All versions < V14), SICAM A8000 CP-802X (All versions < V14), SICAM A8000 CP-8050 (All versions < V2.00). Specially crafted network packets sent to port 80/TCP or 443/TCP could allow an unauthenticated remote attacker to cause a D...
PUBLISHED: 2019-03-21
Certain versions between 2.x to 5.x (refer to advisory) of the NetApp Service Processor firmware were shipped with a default account enabled that could allow unauthorized arbitrary command execution. Any platform listed in the advisory Impact section may be affected and should be upgraded to a fixed...
PUBLISHED: 2019-03-21
An XML External Entity Injection (XXE) vulnerability in the Management System (console) of BlackBerry AtHoc versions earlier than 7.6 HF-567 could allow an attacker to potentially read arbitrary local files from the application server or make requests on the network by entering maliciously crafted X...