SYSTEM AND PRACTICE FOR SURVEILLANCE PRIVACY-PROTECTION CERTIFICATION AND REGISTRATION
First Claim
1. An apparatus for the certification of privacy compliance, comprising:
- a registry of at least one of enrolled video surveillance operators, approved surveillance hardware devices, approved surveillance software programs, approved surveillance system installers, and approved entities that manage surveillance systems; and
a registry searcher, in signal communication with the registry, for receiving queries to the registry, and for determining whether at least one of a particular surveillance operator, a particular surveillance hardware device, a particular surveillance software program, a particular surveillance system installer, and a particular entity that manages a particular surveillance system is on the registry based on a given query,wherein approval is based in part upon automatic verification of compliance.
1 Assignment
0 Petitions
Accused Products
Abstract
There is provided an apparatus for the certification of privacy compliance. The apparatus includes a registry of at least one of enrolled video surveillance operators, approved surveillance hardware devices, approved surveillance software programs, approved surveillance system installers, and approved entities that manage surveillance systems. The apparatus further includes a registry searcher, in signal communication with the registry, for receiving queries to the registry, and for determining whether at least one of a particular surveillance operator, a particular surveillance hardware device, a particular surveillance software program, a particular surveillance system installer, and a particular entity that manages a particular surveillance system is on the registry based on a given query.
10 Citations
35 Claims
-
1. An apparatus for the certification of privacy compliance, comprising:
-
a registry of at least one of enrolled video surveillance operators, approved surveillance hardware devices, approved surveillance software programs, approved surveillance system installers, and approved entities that manage surveillance systems; and a registry searcher, in signal communication with the registry, for receiving queries to the registry, and for determining whether at least one of a particular surveillance operator, a particular surveillance hardware device, a particular surveillance software program, a particular surveillance system installer, and a particular entity that manages a particular surveillance system is on the registry based on a given query, wherein approval is based in part upon automatic verification of compliance. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A privacy protection verification system, comprising:
-
a compliance device for receiving at least one test stream of privacy-protected data from a privacy protection system, evaluating the at least one test stream with respect to at least one category of privacy intrusive data corresponding to a privacy protection goal using a combination of automatic and human verification, and outputting a measure of compliance of the at least one test stream with respect to the privacy protection goal; and a memory device for storing the privacy intrusive data. - View Dependent Claims (7, 8, 9, 10, 11)
-
-
12. A method for the certification of privacy compliance, comprising the steps of
maintaining a registry of at least one of enrolled video surveillance operators, approved surveillance hardware devices, approved software programs, approved surveillance system installers, and approved entities that manage surveillance systems; - and
providing access to the registry via queries directed to the registry to determine if at least one of a particular surveillance operator, a particular surveillance hardware device, a particular surveillance software program, a particular surveillance system installer, and a particular entity that manages a particular surveillance system is on the registry, wherein approval is based in part upon automatic verification of compliance. - View Dependent Claims (13, 14, 15, 16, 17)
- and
-
18. A method for privacy protection verification, comprising the steps of
receiving at least one test stream of privacy-protected data from a privacy protection system; -
evaluating the at least one test stream with respect to at least one category of privacy intrusive data corresponding to a privacy protection goal using a combination of automatic and human verification; and outputting a measure of compliance of the at least one test stream with respect to the privacy protection goal. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A method for privacy protection verification, comprising the steps of
reviewing a surveillance product that is associated with a pre-specified level of claimed privacy protection; - and
certifying whether the surveillance product meets the pre-specified level of claimed privacy protection, based in part on automatic verification of compliance. - View Dependent Claims (30, 31, 32, 33, 34, 35)
- and
Specification