Devices, methods, and systems for managing representations of entities through use of privacy beacons
First Claim
1. A system comprising:
- a memory bearing one or more executable instructions; and
a processor operably coupled to the memory, the processor programmed by the one or more executable instructions to perform operations including at least;
acquiring an image including a representation of at least one feature of an entity;
detecting a privacy beacon in the image that includes the representation of the at least one feature of the entity;
obtaining one or more terms of usage broadcast from the privacy beacon;
obfuscating the representation of the at least one feature of the entity in response to detecting the privacy beacon in the image;
providing the one or more terms of usage for user acceptance, the one or more terms of usage being automatically adjusted based at least partly on a popularity of the entity and a type of the at least one feature of the entity; and
releasing obfuscation of the image including the representation of the at least one feature of the entity upon user acceptance of the one or more terms of usage.
1 Assignment
0 Petitions
Accused Products
Abstract
Computationally implemented methods and systems include acquiring a block of encrypted data that corresponds to an image that has been encrypted through use of a unique device code associated with an image capture device configured to capture the image that includes a representation of a feature of an entity, obtaining a privacy metadata that corresponds to a detection of a privacy beacon in the image, said at least one image captured by the image capture device, said privacy beacon associated with the entity, and determining, at least partly based on the obtained privacy metadata, and partly based on a calculation related to the block of encrypted data that corresponds to the whether to allow one or more processes related to the encrypted data block. In addition to the foregoing, other aspects are described in the claims, drawings, and text.
262 Citations
34 Claims
-
1. A system comprising:
-
a memory bearing one or more executable instructions; and a processor operably coupled to the memory, the processor programmed by the one or more executable instructions to perform operations including at least; acquiring an image including a representation of at least one feature of an entity; detecting a privacy beacon in the image that includes the representation of the at least one feature of the entity; obtaining one or more terms of usage broadcast from the privacy beacon; obfuscating the representation of the at least one feature of the entity in response to detecting the privacy beacon in the image; providing the one or more terms of usage for user acceptance, the one or more terms of usage being automatically adjusted based at least partly on a popularity of the entity and a type of the at least one feature of the entity; and releasing obfuscation of the image including the representation of the at least one feature of the entity upon user acceptance of the one or more terms of usage.
-
-
2. A system comprising:
-
circuitry configured for acquiring an image including a representation of at least one feature of an entity that has been obfuscated; circuitry configured for detecting identifier metadata associated with the image that includes the representation of the at least one feature of the entity; circuitry configured for providing one or more terms of usage for user acceptance based on the identifier metadata, the one or more terms of usage being automatically adjusted based at least partly on a popularity of the entity and a type of the at least one feature of the entity; and circuitry configured for releasing obfuscation of the image including the representation of the at least one feature of the entity upon user acceptance of the one or more terms of usage.
-
-
3. A method implemented by at least one computer processor programmed by one or more machine instructions, the method comprising:
-
acquiring an image including a representation of at least one feature of an entity; detecting a privacy beacon in the image that includes the representation of the at least one feature of the entity; obtaining one or more terms of usage broadcast from the privacy beacon; obfuscating the representation of the at least one feature of the entity in response to detecting the privacy beacon; providing the one or more terms of usage for user acceptance, the one or more terms of usage being automatically adjusted based at least partly on a popularity of the entity and a type of the at least one feature of the entity; and releasing obfuscation of the image including the representation of the at least one feature of the entity upon user acceptance of the one or more terms of usage. - View Dependent Claims (4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
17. The method of 16, wherein the generating the one or more terms of usage that specify one or more damages for use of the image the contains the representation of the at least one feature of the entity comprises:
generating the one or more terms of usage that specify one or more liquidated damages for distribution to a social network of the image the contains the representation of the at least one feature of the entity.
Specification