METHODS, SYSTEMS, AND DEVICES FOR FACILITATING VIABLE DISTRIBUTION OF DATA COLLECTED BY WEARABLE COMPUTATION
1 Assignment
0 Petitions
Accused Products
Abstract
A method substantially as shown and described the detailed description and/or drawings and/or elsewhere herein. A device substantially as shown and described the detailed description and/or drawings and/or elsewhere herein.
18 Citations
12 Claims
-
1-4. -4. (canceled)
-
5. A computationally-implemented method, comprising:
-
acquiring an image through use of an image capture device, wherein said image includes at least one representation of a feature of at least one entity; detecting a presence of a privacy beacon in the acquired image, wherein further image process operation on image data unrelated to detection of the presence of the privacy beacon is avoided prior to encryption of the acquired image data, said privacy beacon associated with the at least one entity; encrypting the acquired image, through use of a unique device encryption key that is unique to the image capture device that acquired the image; facilitating transmission of the encrypted image and privacy beacon data associated with the privacy beacon to an image processing server configured to perform one or more process on one or more of the encrypted image and the privacy beacon data; acquiring, at the image processing server, the encrypted image and the privacy beacon data associated with the privacy beacon; obtaining term data at least partly based on the privacy beacon data, wherein said term data corresponds to one or more terms of service that are associated with a use of the image that contains the representation of the feature of the at least one entity; generating a valuation of the image, said valuation at least partly based on one or more of the privacy beacon data and the representation of the feature of the entity in the image; determining, at least partly based on the generated valuation of the image and at least partly based on the obtained term data, to allow one or more processes on the encrypted image; decrypting the image in response to the determination to allow one or more processes on the encrypted image; creating a client-based encrypted image through encryption of the decrypted image through use of a particular client code that is associated with a client that is linked to the image capture device that acquired the image; delivering the client-based encrypted image to a particular location; procuring a client-based decryption key that is at least partly based on the particular client code that is associated with the client that is linked to the image capture device that captured the image; and decrypting the client-based encrypted image through use of the client-based decryption key that is at least partly based on the particular client code that is associated with the client that is linked to the image capture device that captured the image; - View Dependent Claims (6, 7, 8, 9, 10, 11, 12)
-
Specification