Systems and methods for providing conditional access to transmitted information
First Claim
Patent Images
1. A computer-implemented method for controlling access to position information by one or more location applications on a computing device, said method comprising:
- decrypting, during a first service-level decryption step, the position information using a first service-level decryption key to obtain first decrypted position information, wherein the first service-level decryption key is associated with a first location application;
processing, using a computing device, the first decrypted position information based on a first set of one or more limitations related to location services provided by the first location application;
determining a position estimate of the computing device based on the processing of the first decrypted position information;
providing the position estimate to the first location application;
determining, prior to the decrypting during the first service-level decryption step, whether the first service-level decryption key is stored on the computing device;
upon determining that the first service-level decryption key is not stored on the computing device, accessing a first developer key that is associated with the first service-level decryption key and the first location application;
sending the first developer key to a network; and
receiving the first service-level decryption key from the network in response to sending the first developer key.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems, methods and computer program products for controlling access to position information at a receiver based on various considerations, including a requested service type, a user type, a device type, a software application type, and/or other characteristics associated with a particular software application at the receiver from which the position information was requested.
215 Citations
20 Claims
-
1. A computer-implemented method for controlling access to position information by one or more location applications on a computing device, said method comprising:
-
decrypting, during a first service-level decryption step, the position information using a first service-level decryption key to obtain first decrypted position information, wherein the first service-level decryption key is associated with a first location application; processing, using a computing device, the first decrypted position information based on a first set of one or more limitations related to location services provided by the first location application; determining a position estimate of the computing device based on the processing of the first decrypted position information; providing the position estimate to the first location application; determining, prior to the decrypting during the first service-level decryption step, whether the first service-level decryption key is stored on the computing device; upon determining that the first service-level decryption key is not stored on the computing device, accessing a first developer key that is associated with the first service-level decryption key and the first location application; sending the first developer key to a network; and receiving the first service-level decryption key from the network in response to sending the first developer key. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer-implemented method for controlling access to position information b one or more location applications on a computing device, the method comprising:
-
decrypting, during a first service-level decryption step, the position information using a first service-level decryption key to obtain first decrypted position information, wherein the first service-level decryption key is associated with a first location application; processing, using a computing device, the first decrypted position information based on a first set of one or more limitations related to location services provided by the first location application; determining a position estimate of the computing device based on the processing of the first decrypted position information; providing the position estimate to the first location application; decrypting, during a second service-level decryption step, the position information using a second service-level decryption key to obtain second decrypted position information, wherein the second service-level decryption key is associated with a second location application; processing the second decrypted position information based on a second set of one or more limitations related to location services provided by the second location application; determining a second position estimate of the computing device based on the processing of the second decrypted position information; and providing the second position estimate to the second location application. - View Dependent Claims (7)
-
-
8. A computer-implemented method for controlling access to position information by one or more location applications on a computing device the method comprising:
-
decrypting, during a first service-level decryption step, the position information using a first service-level decryption key to obtain first decrypted position information, wherein the first service-level decryption key is associated with a first location application; processing, using a computing device, the first decrypted position information based on a first set of one or more limitations related to location services provided by the first location application; determining a position estimate of the computing device based on the processing of the first decrypted position information; providing the position estimate to the first location application; determining whether a second location application on the computing device may access the position information based on whether a second service-level decryption key is stored on the computing device; upon determining that the second service-level decryption key is not stored on the computing device, denying access to the position —
information by the second location application; andupon determining that the second service-level decryption key is stored on the computing device, providing the position —
information to the second location application.
-
-
9. A system for controlling access to position information by one or more location applications on a computing device, the system comprising one or more processors or other devices that:
-
decrypt, during a first service-level decryption step, the position information using a first service-level decryption key to obtain first decrypted position information, wherein the first service-level decryption key is associated with a first location application; process the first decrypted position information —
based on a first set of one or more limitations related to location services provided by the first location application;determine a position estimate of the computing device based on the processing of the first decrypted position information; provide the position estimate to the first location application; determine, prior to the decrypting during the first service-level decryption step, whether the first service-level decryption key is stored on the computing device; upon determining that the first service-level decryption key is not stored on the computing device, access a first developer key that is associated with the first service-level decryption key and the first location application; send the first developer key to a network; and receive the first service-level decryption key from the network in response to sending the first developer key. - View Dependent Claims (10, 11)
-
-
12. A system for controlling access to position information by one or more location applications on a computing device, the system comprising one or more processors or other devices that:
-
decrypt, during a first service-level decryption step, the position information using a first service-level decryption key to obtain first decrypted position information, wherein the first service-level decryption key is associated with a first location application; process the first decrypted position information based on a first set of one or more limitations related to location services provided by the first location application; determine a position estimate of the computing device based on the processing of the first decrypted position information; provide the position estimate to the first location application; decrypt, during a second service-level decryption step, the position information using a second service-level decryption key to obtain second decrypted position information, wherein the second service-level decryption key is associated with a second location application; process the second decrypted position information based on a second set of one or more limitations related to location services provided by the second location application; determine a second position estimate of the computing device based on the processing of the second decrypted position information; and provide the second position estimate to the second location application. - View Dependent Claims (13)
-
-
14. A system for controlling access to position information by one or more location applications on a computing device, the system comprising one or more processors or other devices that:
-
decrypt, during a first service-level decryption step, the position information using a first service-level decryption key to obtain first decrypted position information, wherein the first service-level decryption key is associated with a first location application; process the first decrypted position information based on a first set of one or more limitations related to location services provided by the first location application; determine a position estimate of the computing device based on the processing of the first decrypted position information; provide the position estimate to the first location application; determine whether a second location application on the computing device may access the position information based on whether a second service-level decryption key is stored on the computing device; upon determining that the second service-level decryption key is not stored on the computing device, deny access to the position information by the second location application; and upon determining that the second service-level decryption key is stored on the computing device, provide the position information to the second location application.
-
-
15. A non-transitory computer-readable medium having a computer readable program code embodied therein, said computer readable program code adapted to be executed to implement a method for controlling access to position information by one or more location applications on a computing device, the method comprising:
-
decrypting, during a first service-level decryption step, the position information using a first service-level decryption key to obtain first decrypted position information, wherein the first service-level decryption key is associated with a first location application; processing the first decrypted position information based on a first set of one or more limitations related to location services provided by the first location application; determining a position estimate of the computing device based on the processing of the first decrypted position information; providing the position estimate to the first location application; determining, prior to the decrypting during the first service-level decryption step, whether the first service-level decryption key is stored on the computing device; upon determining that the first service-level decryption key is not stored on the computing device, accessing a first developer key that is associated with the first service-level decryption key and the first location application; sending the first developer key to a network; and receiving the first service-level decryption key from the network in response to sending the first developer key. - View Dependent Claims (16, 17)
-
-
18. A non-transitory computer-readable medium having a computer readable program code embodied therein, said computer readable program code adapted to be executed to implement a method for controlling access to position information by one or more location applications on a computing device, the method comprising:
-
decrypting, during a first service-level decryption step, the position information using a first service-level decryption key to obtain first decrypted position information, wherein the first service-level decryption key is associated with a first location application; processing the first decrypted position information based on a first set of one or more limitations related to location services provided by the first location application; determining a position estimate of the computing device based on the processing of the first decrypted position information; providing the position estimate to the first location application; decrypting, during a second service-level decryption step, the position information using a second service-level decryption key to obtain second decrypted position information, wherein the second service-level decryption key is associated with a second location application; processing the second decrypted position information based on a second set of one or more limitations related to location services provided by the second location application; determining a second position estimate of the computing device based on the processing of the second decrypted position information; and providing the second position estimate to the second location application. - View Dependent Claims (19)
-
-
20. A non-transitory computer-readable medium having a computer readable program code embodied therein, said computer readable program code adapted to be executed to implement a method for controlling access to position information by one or more location applications on a computing device, the method comprising:
-
decrypting, during a first service-level decryption step, the position information using a first service-level decryption key to obtain first decrypted position information, wherein the first service-level decryption key is associated with a first location application; processing the first decrypted position information based on a first set of one or more limitations related to location services provided by the first location application; determining a position estimate of the computing device based on the processing of the first decrypted position information; providing the position estimate to the first location application; determining whether a second location application on the computing device may access the position information based on whether a second service-level decryption key is stored on the computing device; upon determining that the second service-level decryption key is not stored on the computing device, denying access to the position information by the second location application; and upon determining that the second service-level decryption key is stored on the computing device, providing the position information to the second location application.
-
Specification