Systems and methods for providing conditional access to transmitted information
First Claim
1. A method for controlling access to position information by one or more applications, the method comprising:
- decrypting, using a first key, a first set of encrypted position signals received from a network of terrestrial transmitters;
determining position information from the first set of decrypted position signals;
identifying a first set of the position information, wherein the first set of the position information is identified based on a first level of service associated with a first application;
encrypting the first set of the position information using a second key; and
providing the encrypted first set of the position information to the first application.
4 Assignments
0 Petitions
Accused Products
Abstract
This disclosure relates to systems, methods, computer program products, and means that control access to position information at a receiver, or at another device external to the receiver, based on various considerations, including a requested service type, a user type, a device type, a software application type, a payment, and/or other characteristics associated with a particular software application or distributor of that software application. The disclosure further relates to systems, methods, computer program products and means for carrying out secure data transmissions intended for a particular application among other applications.
211 Citations
40 Claims
-
1. A method for controlling access to position information by one or more applications, the method comprising:
-
decrypting, using a first key, a first set of encrypted position signals received from a network of terrestrial transmitters; determining position information from the first set of decrypted position signals; identifying a first set of the position information, wherein the first set of the position information is identified based on a first level of service associated with a first application; encrypting the first set of the position information using a second key; and providing the encrypted first set of the position information to the first application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A non-transitory computer-readable medium embodying program instructions adapted to be executed to implement a method for controlling access to position information by one or more applications, the method comprising:
-
decrypting, using a first key, a first set of encrypted position signals received from a network of terrestrial transmitters; determining position information from the first set of decrypted position signals; identifying a first set of the position information, wherein the first set of the position information is identified based on a first level of service associated with a first application; encrypting the first set of the position information using a second key; and providing the encrypted first set of the position information to the first application. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40)
-
Specification