Systems and methods for providing conditional access to transmitted information
First Claim
Patent Images
1. A system for controlling access to encrypted data received from a transmitter network, and for controlling access to different estimates of a receiver'"'"'s position by one or more applications, the system comprising:
- a processor;
a first cryptography component; and
a second cryptography component,wherein the first cryptography component is operable to decrypt, using a first key, encrypted data retrieved from one or more signals that were transmitted by a terrestrial transmitter,wherein the encrypted data includes data representing the terrestrial transmitter'"'"'s position coordinates, and further includes data representing an atmospheric measurement that was measured at the terrestrial transmitter,wherein the processor is operable to determine an estimate of a receiver'"'"'s position using (i) an atmospheric measurement from a sensor of the receiver and (ii) the decrypted data representing the terrestrial transmitter'"'"'s position coordinates and representing the atmospheric measurement that was measured at the terrestrial transmitter,wherein the estimate of the receiver'"'"'s position includes an estimated latitude, an estimated longitude, and an estimated altitude of the receiver'"'"'s position, andwherein the second cryptography component is operable to encrypt, using a second key associated with a first application, a first set of coordinates from the estimated latitude, the estimated longitude, and the estimated altitude that the first application is permitted to receive.
3 Assignments
0 Petitions
Accused Products
Abstract
Controlling access to position information at a receiver, or at another device external to the receiver. Various considerations, including a requested service type, a user type, a device type, a software application type, a payment, and/or other characteristics associated with a particular software application or distributor of that software application, may be used to control access to position information.
-
Citations
42 Claims
-
1. A system for controlling access to encrypted data received from a transmitter network, and for controlling access to different estimates of a receiver'"'"'s position by one or more applications, the system comprising:
-
a processor; a first cryptography component; and a second cryptography component, wherein the first cryptography component is operable to decrypt, using a first key, encrypted data retrieved from one or more signals that were transmitted by a terrestrial transmitter, wherein the encrypted data includes data representing the terrestrial transmitter'"'"'s position coordinates, and further includes data representing an atmospheric measurement that was measured at the terrestrial transmitter, wherein the processor is operable to determine an estimate of a receiver'"'"'s position using (i) an atmospheric measurement from a sensor of the receiver and (ii) the decrypted data representing the terrestrial transmitter'"'"'s position coordinates and representing the atmospheric measurement that was measured at the terrestrial transmitter, wherein the estimate of the receiver'"'"'s position includes an estimated latitude, an estimated longitude, and an estimated altitude of the receiver'"'"'s position, and wherein the second cryptography component is operable to encrypt, using a second key associated with a first application, a first set of coordinates from the estimated latitude, the estimated longitude, and the estimated altitude that the first application is permitted to receive. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for controlling access to encrypted data received from a transmitter network, and for controlling access to different estimates of a receiver'"'"'s position by one or more applications, the system comprising:
-
a processor; a first cryptography component; and a second cryptography component, wherein the first cryptography component is operable to decrypt, using a first key, encrypted data retrieved from one or more signals that were transmitted by a terrestrial transmitter, wherein the processor is operable to determine a first estimate of a receiver'"'"'s position using the data that was decrypted by the first cryptography component, and wherein the second cryptography component is operable to encrypt, using a second key associated with a first application, a revised estimate of the receiver'"'"'s position that is less accurate than the first estimate of the receiver'"'"'s position, and that is generated using the first estimate of the receiver'"'"'s position and a first level of accuracy permitted for the first application. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method for controlling access to encrypted data received from a transmitter network, and for controlling access to different estimates of a receiver'"'"'s position by one or more applications, the method comprising:
-
decrypting, using a first key, encrypted data retrieved from one or more signals that were transmitted by a terrestrial transmitter; determining a first estimate of a receiver'"'"'s position using the data that was decrypted; and encrypting, using a second key associated with a first application, a revised estimate of the receiver'"'"'s position that is less accurate than the first estimate of the receiver'"'"'s position, and that is generated using the first estimate of the receiver'"'"'s position and a first level of accuracy permitted for the first application. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. A method for controlling access to encrypted data received from a transmitter network, and for controlling access to different estimates of a receiver'"'"'s position by one or more applications, the method comprising:
-
decrypting, using a first key, encrypted data retrieved from one or more signals that were transmitted by a terrestrial transmitter, wherein the encrypted data includes data representing the terrestrial transmitter'"'"'s position coordinates, and further includes data representing an atmospheric measurement that was measured at the terrestrial transmitter; determining an estimate of a receiver'"'"'s position using (i) an atmospheric measurement from a sensor of the receiver and (ii) the decrypted data representing the terrestrial transmitter'"'"'s position coordinates and representing the atmospheric measurement that was measured at the terrestrial transmitter, wherein the estimate of the receiver'"'"'s position includes an estimated latitude, an estimated longitude, and an estimated altitude of the receiver'"'"'s position; and encrypting, using a second key associated with a first application, a first set of coordinates from the estimated latitude, the estimated longitude, and the estimated altitude that the first application is permitted to receive. - View Dependent Claims (23, 24, 25, 26, 27, 28)
-
-
29. One or more non-transitory processor-readable media embodying program instructions that, when executed by one or more processors, cause the one or more processors to perform a method for controlling access to encrypted data received from a transmitter network, and for controlling access to different estimates of a receiver'"'"'s position by one or more applications, the method comprising:
-
decrypting, using a first key, encrypted data retrieved from one or more signals that were transmitted by a terrestrial transmitter; determining a first estimate of a receiver'"'"'s position using the data that was decrypted; and encrypting, using a second key associated with a first application, a revised estimate of the receiver'"'"'s position that is less accurate than the first estimate of the receiver'"'"'s position, and that is generated using the first estimate of the receiver'"'"'s position and a first level of accuracy permitted for the first application. - View Dependent Claims (30, 31, 32, 33, 34, 35)
-
-
36. One or more non-transitory processor-readable media embodying program instructions that, when executed by one or more processors, cause the one or more processors to perform a method for controlling access to encrypted data received from a transmitter network, and for controlling access to different estimates of a receiver'"'"'s position by one or more applications, the method comprising:
-
decrypting, using a first key, encrypted data retrieved from one or more signals that were transmitted by a terrestrial transmitter, wherein the encrypted data includes data representing the terrestrial transmitter'"'"'s position coordinates, and further includes data representing an atmospheric measurement that was measured at the terrestrial transmitter; determining an estimate of a receiver'"'"'s position using (i) an atmospheric measurement from a sensor of the receiver and (ii) the decrypted data representing the terrestrial transmitter'"'"'s position coordinates and representing the atmospheric measurement that was measured at the terrestrial transmitter, wherein the estimate of the receiver'"'"'s position includes an estimated latitude, an estimated longitude, and an estimated altitude of the receiver'"'"'s position; and encrypting, using a second key associated with a first application, a first set of coordinates from the estimated latitude, the estimated longitude, and the estimated altitude that the first application is permitted to receive. - View Dependent Claims (37, 38, 39, 40, 41, 42)
-
Specification