SYSTEMS AND METHODS FOR PROVIDING CONDITIONAL ACCESS TO TRANSMITTED INFORMATION
First Claim
1. A method for controlling access to position information by one or more applications, the method comprising:
- decrypting, using a first key, a first set of encrypted position signals received from a network of terrestrial transmitters;
determining position information from the first set of decrypted position signals;
identifying a first set of the position information, wherein the first set of the position information is identified based on a first level of service associated with a first application;
encrypting the first set of the position information using a second key; and
providing the encrypted first set of the position information to the first application.
4 Assignments
0 Petitions
Accused Products
Abstract
This disclosure relates to systems, methods, computer program products, and means that control access to position information at a receiver, or at another device external to the receiver, based on various considerations, including a requested service type, a user type, a device type, a software application type, a payment, and/or other characteristics associated with a particular software application or distributor of that software application. The disclosure further relates to systems, methods, computer program products and means for carrying out secure data transmissions intended for a particular application among other applications.
15 Citations
20 Claims
-
1. A method for controlling access to position information by one or more applications, the method comprising:
-
decrypting, using a first key, a first set of encrypted position signals received from a network of terrestrial transmitters; determining position information from the first set of decrypted position signals; identifying a first set of the position information, wherein the first set of the position information is identified based on a first level of service associated with a first application; encrypting the first set of the position information using a second key; and providing the encrypted first set of the position information to the first application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification