World-driven access control using trusted certificates
First Claim
1. A method comprising:
- by one or more computing devices;
receiving audio, image, or video events that characterize a physical environment sensed by the one or more computing devices, the audio, image, or video events including individual audio, image, or video events characterizing a person that is present in the sensed physical environment;
identifying a triggering cue in the audio, image, or video events that characterize the sensed physical environment;
responsive to identifying the triggering cue in the audio, image, or video events that characterize the sensed physical environment, obtaining a policy associated with the person that is present in the sensed physical environment;
obtaining a certificate associated with the policy and a public key associated with a certificate-originating entity;
determining whether the policy is valid based at least on whether the certificate is decrypted using the public key associated with the certificate-originating entity; and
when the policy is determined to be valid, governing behavior of one or more applications with respect to the individual audio, image, or video information characterizing the person that is present in the sensed physical environment, the behavior being governed by filtering or modifying the individual audio, image, or video events characterizing the person that is present in the sensed physical environment.
2 Assignments
0 Petitions
Accused Products
Abstract
Functionality is described herein for receiving events which characterize features in an environment, and for identifying at least one policy based on the events. The functionality consults a certificate, associated with the policy, to determine whether the policy is valid. If valid, the functionality uses the policy to govern the behavior of at least one application, such as by controlling the application'"'"'s consumption of events. A trusted passport authority may be employed to generate the certificates. Each certificate may: (1) identify that it originated from the trusted passport authority; (2) contain context information which describes a context in which the policy is intended to be applied within an environment; and/or (3) contain machine-readable content that, when executed, carries out at least one aspect of the policy.
-
Citations
20 Claims
-
1. A method comprising:
by one or more computing devices; receiving audio, image, or video events that characterize a physical environment sensed by the one or more computing devices, the audio, image, or video events including individual audio, image, or video events characterizing a person that is present in the sensed physical environment; identifying a triggering cue in the audio, image, or video events that characterize the sensed physical environment; responsive to identifying the triggering cue in the audio, image, or video events that characterize the sensed physical environment, obtaining a policy associated with the person that is present in the sensed physical environment; obtaining a certificate associated with the policy and a public key associated with a certificate-originating entity; determining whether the policy is valid based at least on whether the certificate is decrypted using the public key associated with the certificate-originating entity; and when the policy is determined to be valid, governing behavior of one or more applications with respect to the individual audio, image, or video information characterizing the person that is present in the sensed physical environment, the behavior being governed by filtering or modifying the individual audio, image, or video events characterizing the person that is present in the sensed physical environment. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
17. One or more computing devices comprising:
-
one or more storage resources storing instructions; and one or more processing devices configured to execute the instructions, the instructions, when executed by the one or more processing devices, causing the one or more processing devices to; obtain audio, image, or video events that characterize a sensed physical environment using sensor information obtained by at least one sensing mechanism, the audio, image, or video events including audio, image, or video information characterizing an inanimate object that is present in the sensed physical environment; process the audio, image, or video events to identify a triggering cue in the sensed physical environment that identifies a policy relating to the inanimate object that is present in the sensed physical environment; receive a certificate associated with the policy; determine whether the policy is valid based at least on whether the certificate is decrypted using a public key associated with a certificate-originating entity; responsive to a determination that the certificate is valid, set application permission information based at least on the policy; and govern behavior of one or more applications based at least on the application permission information by filtering or modifying the audio, image, or video information characterizing the inanimate object that is present in the sensed physical environment before providing the audio, image, or video information characterizing the inanimate object to the one or more applications. - View Dependent Claims (18)
-
-
19. One or more computing devices comprising:
-
one or more storage resources storing instructions; and one or more processing devices configured to execute the instructions, the instructions, when executed by the one or more processing devices, causing the one or more processing devices to; obtain audio, image, or video events that characterize a sensed physical environment using sensor information obtained by at least one sensing mechanism; process the audio, image, or video events to identify a triggering cue that is present in the sensed physical environment and a target feature that is present in the sensed physical environment; obtain a policy identified by the triggering cue, the policy restricting application access to individual audio, image, or video events that characterize the target feature that is present in the sensed physical environment; obtain a certificate associated with the policy and determine whether the policy is valid based at least on whether the certificate is decrypted using a public key associated with a certificate-originating entity; responsive to a determination that the certificate is valid, set application permission information based at least on the policy; and govern behavior of one or more applications based at least on the application permission information by filtering or modifying the individual audio, image, or video events that characterize the target feature before providing the audio, image, or video events to the one or more applications. - View Dependent Claims (20)
-
Specification