Method and apparatus for alerting a target that it is subject to sensing and restricting access to sensed content associated with the target
First Claim
1. In a system including a first transceiver and second transceiver, the second transceiver including a database which defines at least one zone in which sensing a target is not permitted, a method of protecting sensed content comprising:
- (a) the first transceiver sensing a target to obtain content;
(b) the first transceiver temporarily storing the content in a first memory within the first transceiver;
(c) the first transceiver transmitting information to the second transceiver, the information indicating the location of the first transceiver;
(d) the second transceiver receiving the information from the first transceiver and determining whether the location indicated by the information is within the zone in which sensing a target is not permitted;
(e) if the second transceiver determines that the location of the first transceiver is within the zone, the second transceiver transmitting a first command signal instructing the first transceiver to delete the content from the first memory; and
(f) if the second transceiver determines that the location of the first transceiver is not within the zone, the second transceiver transmitting a second command signal instructing the first transceiver that the content in the first memory may be used as desired.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus for protecting sensed content and warning a target of sensing is disclosed. A first transceiver, (e.g., a network server), includes a database which defines at least one zone in which sensing a target is not permitted. A second transceiver, (e.g., a cell phone), senses a target to obtain content and temporarily stores the content in a memory, after being encrypted. The cell phone transmits information to the network server which indicates the location of the cell phone. The network server receives the location information from the cell phone and determines whether the target was sensed in a “Do Not Disturb Zone”. If so, the network server instructs the cell phone to delete the encrypted content from the memory. Otherwise, the network server indicates to the cell phone that the temporarily stored content may be decrypted, stored in a permanent memory and used as desired.
121 Citations
44 Claims
-
1. In a system including a first transceiver and second transceiver, the second transceiver including a database which defines at least one zone in which sensing a target is not permitted, a method of protecting sensed content comprising:
-
(a) the first transceiver sensing a target to obtain content;
(b) the first transceiver temporarily storing the content in a first memory within the first transceiver;
(c) the first transceiver transmitting information to the second transceiver, the information indicating the location of the first transceiver;
(d) the second transceiver receiving the information from the first transceiver and determining whether the location indicated by the information is within the zone in which sensing a target is not permitted;
(e) if the second transceiver determines that the location of the first transceiver is within the zone, the second transceiver transmitting a first command signal instructing the first transceiver to delete the content from the first memory; and
(f) if the second transceiver determines that the location of the first transceiver is not within the zone, the second transceiver transmitting a second command signal instructing the first transceiver that the content in the first memory may be used as desired. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method of sending a warning signal indicating that a target is subject to sensing by a sensing apparatus, the method comprising:
-
(a) activating the sensing apparatus;
(b) in response to step (a), the sensing apparatus determining field of usage (FOU) information based on the location of the sensing apparatus;
(c) the sensing apparatus identifying a communication path to at least one communication device associated with the target; and
(d) the sensing apparatus sending a warning signal to the communication device over the communication path indicating that the target is subject to sensing by the sensing apparatus. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A method of sending a warning signal indicating that a target is subject to sensing by a sensing apparatus, the method comprising:
-
(a) the sensing apparatus determining field of usage (FOU) information based on the location of the sensing apparatus;
(b) the sensing apparatus analyzing the target to be sensed to generate target analysis information;
(c) the sensing apparatus sending the FOU information and the target analysis information to a network server;
(d) the network server identifying the target and at least one communication device associated with the target; and
(e) the network server sending a warning signal to the communication device over the communication path indicating that the target is subject to sensing by the sensing apparatus.
-
-
19. Apparatus for protecting sensed content comprising:
-
(a) a first transceiver; and
(b) a second transceiver comprising;
(i) a sensing unit for sensing a target to obtain content;
(ii) a first memory which temporarily stores the content;
(iii) a position locator configured to generate information of the location of the second transceiver; and
(iv) a first transmitter which transmits the location information to the first transceiver; and
the first transceiver comprising;
(v) a first receiver which receives the location information from the first transceiver;
(vi) a “
Do Not Disturb Zone”
database which indicates zones in which sensing a target is not permitted;
(vii) a first processor which determines whether the location indicated by the location information is within a zone in the database; and
(viii) a second transmitter configured to transmit a first command signal instructing the second transceiver to delete the content from the first memory if the location of the second transceiver is within the zone, and configured to transmit a second command signal instructing the second transceiver that the content in the first memory may be used as desired. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A wireless transmit/receive unit (WTRU) for sensing and protecting sensed content comprising:
-
(a) a sensing unit for sensing a target to obtain content;
(b) a first memory which temporarily stores the content;
(c) a position locator configured to generate information of the location of the WTRU;
(d) a transmitter which generates and transmits a content verification request to a network server;
(e) a receiver for receiving a message sent by the network server in response to the content verification request;
(f) a content encryption/decryption unit which encrypts content sensed by the sensing unit before temporarily storing the content in the first memory, and decrypts the content stored in the first memory if the message indicates that the stored content is authorized for use; and
(g) a processor for initiating a process to delete the encrypted content if the message indicates that the stored content is not authorized for use. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38)
-
-
39. An integrated circuit (IC) for use in conjunction with a sensing unit which senses a target to obtain content, the IC comprising:
-
(a) a first memory which temporarily stores the content;
(b) a position locator configured to generate information of the location of the sensing unit;
(c) a transmitter which generates and transmits a content verification request to a network server;
(d) a receiver for receiving a message sent by the network server in response to the content verification request;
(e) a content encryption/decryption unit which encrypts content sensed by the sensing unit before temporarily storing the content in the first memory, and decrypts the content stored in the first memory if the message indicates that the stored content is authorized for use; and
(f) a processor for initiating a process to delete the encrypted content if the message indicates that the stored content is not authorized for use. - View Dependent Claims (40, 41, 42, 43, 44)
-
Specification