SYSTEMS AND METHODS FOR REPORTING VISIBILITY TO GROUND BASED IMAGING
First Claim
1. A system for reporting vulnerability to ground based imaging, the system comprising:
- a positioning subsystem configured to determine a location of a user;
a camera detection subsystem configured to determine a location of an imaging system able to view the user;
a visibility determination subsystem configured to determine a visibility vulnerability of the user to the imaging system based on the location of the user and the location of the imaging system; and
an output subsystem configured to report the visibility vulnerability to the user.
1 Assignment
0 Petitions
Accused Products
Abstract
A user'"'"'s vulnerability to ground based imaging may be reported to the user. A positioning subsystem may determine a location of the user. A camera detection subsystem may determine a location of an imaging system able to view the user. A visibility determination subsystem may determine a visibility vulnerability of the user to imaging by the imaging system based on the location of the user and the location of the imaging system. The vulnerability may be determined based on an image quality capturable by the imaging system of the user, such as a spatial resolution. An output subsystem may report the visibility vulnerability to the user. The subsystems may be included in a mobile communication device or a server or may be split among the device and/or server. The output subsystem may deliver the report over a communication network and/or may display a visual representation of the report.
-
Citations
198 Claims
-
1. A system for reporting vulnerability to ground based imaging, the system comprising:
-
a positioning subsystem configured to determine a location of a user; a camera detection subsystem configured to determine a location of an imaging system able to view the user; a visibility determination subsystem configured to determine a visibility vulnerability of the user to the imaging system based on the location of the user and the location of the imaging system; and an output subsystem configured to report the visibility vulnerability to the user. - View Dependent Claims (2, 6, 7, 9, 12, 13, 14, 15, 16, 17, 18, 37, 39, 41, 42, 43, 46, 48, 49, 50, 51)
-
-
3-5. -5. (canceled)
-
8. (canceled)
-
10-11. -11. (canceled)
-
19-36. -36. (canceled)
-
38. (canceled)
-
40. (canceled)
-
44-45. -45. (canceled)
-
47. (canceled)
-
52-102. -102. (canceled)
-
103. A non-transitory computer readable storage medium comprising program code configured to cause a processor to perform a method for reporting vulnerability to ground based imaging, the method comprising:
-
determining a location of a user; determining a location of an imaging system able to view the user; determining a visibility vulnerability of the user to the imaging system based on the location of the user and the location of the imaging system; and reporting the visibility vulnerability to the user. - View Dependent Claims (154, 165, 166, 169, 172, 175, 176, 178, 180, 183, 188, 189, 190, 191, 193, 195, 197)
-
-
104-153. -153. (canceled)
-
155-164. -164. (canceled)
-
167-168. -168. (canceled)
-
170-171. -171. (canceled)
-
173-174. -174. (canceled)
-
177. (canceled)
-
179. (canceled)
-
181-182. -182. (canceled)
-
184-187. -187. (canceled)
-
192. (canceled)
-
194. (canceled)
-
196. (canceled)
-
198-204. -204. (canceled)
Specification