DEVICES, METHODS, AND SYSTEMS FOR ANALYZING CAPTURED IMAGE DATA AND PRIVACY DATA
1 Assignment
0 Petitions
Accused Products
Abstract
Computationally implemented methods and systems include acquiring a block of encrypted data that corresponds to an image that has been encrypted through use of a unique device code associated with an image capture device configured to capture the image that includes a representation of a feature of an entity, obtaining a privacy metadata that corresponds to a detection of a privacy beacon in the image, said at least one image captured by the image capture device, said privacy beacon associated with the entity, and determining, at least partly based on the obtained privacy metadata, and partly based on a calculation related to the block of encrypted data that corresponds to the whether to allow one or more processes related to the encrypted data block. In addition to the foregoing, other aspects are described in the claims, drawings, and text.
-
Citations
247 Claims
-
1-163. -163. (canceled)
-
164. A device, comprising:
-
an encrypted image that includes at least one representation of a feature of an entity and that has been encrypted through use of a unique device code associated with an image capture device configured to perform image capture obtaining module; a beacon metadata related to a presence, in the encrypted image, of a privacy beacon that is associated with the at least one entity acquiring module, said encrypted image that was captured and encrypted by the image capture device; and a determination with regard to allowance of manipulation of the encrypted image that is at least partly based on the acquired beacon data and at least partly based on a calculation that involves the encrypted image performing module block. - View Dependent Claims (172, 173, 175, 176, 177, 180, 181, 182, 183, 187, 190, 193, 194, 195, 197, 198, 202, 203, 208, 209, 210, 211, 213, 214, 215, 216, 217, 218, 223, 225, 227, 233, 234, 235, 236, 237, 238, 241, 242)
-
-
165. (canceled)
-
166. (canceled)
-
167. (canceled)
-
168. (canceled)
-
169. (canceled)
-
170. (canceled)
-
171. (canceled)
-
174. (canceled)
-
178. (canceled)
-
179. (canceled)
-
184. (canceled)
-
185. (canceled)
-
186. (canceled)
-
188. (canceled)
-
189. (canceled)
-
191. (canceled)
-
192. (canceled)
-
196. (canceled)
-
199. (canceled)
-
200. (canceled)
-
201. (canceled)
-
204. (canceled)
-
205. (canceled)
-
206. (canceled)
-
207. (canceled)
-
212. (canceled)
-
219. (canceled)
-
220. (canceled)
-
221. (canceled)
-
222. (canceled)
-
224. (canceled)
-
226. (canceled)
-
228. (canceled)
-
229. (canceled)
-
230. (canceled)
-
231. (canceled)
-
232. (canceled)
-
239. (canceled)
-
240. (canceled)
-
243. (canceled)
-
244. (canceled)
-
245. (canceled)
-
246. (canceled)
-
247. A device, comprising:
-
one or more elements of programmable hardware programmed to function as an encrypted image that includes at least one representation of a feature of an entity and that has been encrypted through use of a unique device code associated with an image capture device configured to perform image capture obtaining module; the one or more elements of programmable hardware programmed to function as a beacon metadata related to a presence, in the encrypted image, of a privacy beacon that is associated with the at least one entity acquiring module, said encrypted image that was captured and encrypted by the image capture device; and the one or more elements of programmable hardware programmed to function as an determination with regard to allowance of manipulation of the encrypted image that is at least partly based on the acquired beacon data and at least partly based on a calculation that involves the encrypted image performing module block.
-
Specification