METHODS, SYSTEMS, AND DEVICES FOR HANDLING IMAGE CAPTURE DEVICES AND CAPTURED IMAGES
First Claim
Patent Images
1. A computationally-implemented method, comprising:
- acquiring an encrypted image that is a captured image that has been encrypted through use of a particular device code associated with an image capture device that captured the captured image, wherein the captured image includes a representation of a feature of an entity;
decrypting the acquired encrypted image that was encrypted through use of the particular device code;
performing a validation detection operation to detect a privacy beacon associated with the entity in the decrypted captured image; and
storing outcome data that includes at least a result of the performed validation detection operation to detect the privacy beacon in the captured image.
1 Assignment
0 Petitions
Accused Products
Abstract
Computationally implemented methods and systems include acquiring an encrypted image that is a captured image that has been encrypted through use of a particular device code associated with an image capture device that captured the captured image, wherein the captured image includes a representation of a feature of an entity, decrypting the acquired encrypted image that was encrypted through use of the particular device code, and performing a validation detection operation to detect a privacy beacon associated with the entity in the decrypted captured image. In addition to the foregoing, other aspects are described in the claims, drawings, and text.
55 Citations
109 Claims
-
1. A computationally-implemented method, comprising:
-
acquiring an encrypted image that is a captured image that has been encrypted through use of a particular device code associated with an image capture device that captured the captured image, wherein the captured image includes a representation of a feature of an entity; decrypting the acquired encrypted image that was encrypted through use of the particular device code; performing a validation detection operation to detect a privacy beacon associated with the entity in the decrypted captured image; and storing outcome data that includes at least a result of the performed validation detection operation to detect the privacy beacon in the captured image. - View Dependent Claims (2, 5, 6, 7, 8, 9, 10, 11, 12, 14, 16, 17, 18, 20, 22, 23, 26, 27, 28, 29)
-
-
3. (canceled)
-
4. (canceled)
-
13. (canceled)
-
15. (canceled)
-
19. (canceled)
-
21. (canceled)
-
24. (canceled)
-
25. (canceled)
-
30-87. -87. (canceled)
-
88. A computationally-implemented system, comprising:
-
circuitry for emitting a capture beacon from a device configured to capture a particular image; circuitry for receiving, in response to the emitted capture beacon, permission data from at least one device, wherein said permission data includes one or more permissions for capture of the particular image; circuitry for capturing the particular image through use of an image capture component; and circuitry for performing, on the captured particular image, one or more operations related to the received permission data. - View Dependent Claims (89, 90, 91, 92, 94, 95, 96, 97, 98, 99, 103, 104, 105, 106, 107, 108, 109)
-
-
93. (canceled)
-
100. (canceled)
-
101. (canceled)
-
102. (canceled)
Specification