SYSTEMS AND METHODS FOR PROVIDING CONDITIONAL ACCESS TO TRANSMITTED INFORMATION
First Claim
Patent Images
1. A computer-implemented method for controlling access to position information by one or more location applications on a computing device, said method comprising:
- decrypting, during a first service-level decryption step, the position information using a first service-level decryption key to achieve first decrypted position information, wherein the first service-level decryption key is associated with a first location application;
processing using a computing device, the first decrypted position information based on a first set of one or more limitations related to location services provided by the first location application;
determining a position location estimate of the computing device based on the processing; and
providing the position location estimate to the first location application.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems, methods and computer program products for controlling access to position information at a receiver based on various considerations, including a requested service type, a user type, a device type, a software application type, and/or other characteristics associated with a particular software application at the receiver from which the position information was requested
23 Citations
19 Claims
-
1. A computer-implemented method for controlling access to position information by one or more location applications on a computing device, said method comprising:
-
decrypting, during a first service-level decryption step, the position information using a first service-level decryption key to achieve first decrypted position information, wherein the first service-level decryption key is associated with a first location application; processing using a computing device, the first decrypted position information based on a first set of one or more limitations related to location services provided by the first location application; determining a position location estimate of the computing device based on the processing; and providing the position location estimate to the first location application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system configured to control access to position information by one or more location applications on a user device, the system comprising one or more processors operable to:
-
decrypt, during a first service-level decryption step, the position information using a first service-level decryption key to achieve first decrypted position information, wherein the first service-level decryption key is associated with a first location application; process the first decrypted position information based on a first set of one or more limitations related to location services provided by the first location application; determine a position location estimate of the user device based on the processing; and provide the position location estimate to the first location application. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A computer program product comprising a computer usable medium having a computer readable program code embodied therein, said computer readable program code adapted to be executed to implement a method for controlling access to position information by one or more location applications on a user device, the method comprising:
-
decrypting, during a first service-level decryption step, the position information using a first service-level decryption key to achieve first decrypted position information, wherein the first service-level decryption key is associated with a first location application; processing the first decrypted position information based on a first set of one or more limitations related to location services provided by the first location application; determining a position location estimate of the user device based on the processing; and providing the position location estimate to the first location application. - View Dependent Claims (16, 17, 18, 19)
-
Specification