Controlling Access to Digital Images Based on Device Proximity
First Claim
1. A method of generating an access list for controlling access to an image, comprising:
- in response to capturing the image on an image capture device, sending a wireless invitation signal from the image capture device;
receiving, by the image capture device, at least one response signal from at least one responding device indicating that the respective responding device received the wireless invitation signal, wherein the respective response signals includes respective identifiers corresponding to the respective responding device; and
generating, by the image capture device, an access list corresponding to the image, wherein the access list is composed according to the respective identifiers contained in the respective response signals received by the image capture device, thereby limiting users permitted to access the image to those associated with the respective responding devices.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the invention provide techniques for controlling access to digital images based physical and temporal proximity to the image capture event. In one embodiment, an imaging device capturing a digital image broadcasts an invitation to wireless devices in the surrounding area. The wireless devices respond with an acceptance, including the email address (or some other network address) of the device owner. The digital image is made available at a network location with restricted access. Access to the image is controlled with an access list based on the acceptances received by the imaging device.
49 Citations
33 Claims
-
1. A method of generating an access list for controlling access to an image, comprising:
-
in response to capturing the image on an image capture device, sending a wireless invitation signal from the image capture device; receiving, by the image capture device, at least one response signal from at least one responding device indicating that the respective responding device received the wireless invitation signal, wherein the respective response signals includes respective identifiers corresponding to the respective responding device; and generating, by the image capture device, an access list corresponding to the image, wherein the access list is composed according to the respective identifiers contained in the respective response signals received by the image capture device, thereby limiting users permitted to access the image to those associated with the respective responding devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 28, 29)
-
-
10. A computer readable storage medium containing a program, which, when executed, performs an operation, comprising:
-
in response to capturing the image on an image capture device, sending a wireless invitation signal from the image capture device; receiving, by the image capture device, at least one response signal from at least one responding device indicating that the respective responding device received the wireless invitation signal, wherein the respective response signals includes respective identifiers corresponding to the respective responding device; and generating, by the image capture device, an access list corresponding to the image, wherein the access list is composed according to the respective identifiers contained in the respective response signals received by the image capture device, thereby limiting users permitted to access the image to those associated with the respective responding devices. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 30, 31)
-
-
19. A system, comprising:
an image capture device comprising circuitry configured to; in response to capturing an image, send a wireless invitation signal; receive at least one response signal from at least one responding device indicating that the respective responding device received the wireless invitation signal, wherein the respective response signals includes respective identifiers corresponding to the respective responding device; generate an access list corresponding to the image, wherein the access list is composed according to the respective identifiers contained in the respective response signals received by the image capture device, thereby limiting users permitted to access the image to those associated with the respective responding devices; provide the access list to a computing device configured to control access to the image based on the access list. - View Dependent Claims (20, 22, 23, 24, 25, 26, 27, 32, 33)
Specification