Systems and methods for providing conditional access to transmitted information
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04L-029/06
G06F-021/62
H04W-012/02
H04W-012/08
H04L-029/08
H04W-004/02
G01S-019/05
G01S-005/02
H04W-004/00
H04W-004/06
H04W-004/22
출원번호
US-0010437
(2013-08-26)
등록번호
US-9390279
(2016-07-12)
발명자
/ 주소
Raghupathy, Arun
Meiyappan, Subramanian
Joseph, Deepak
Vajjhala, Varaprasad
출원인 / 주소
NextNav, LLC
인용정보
피인용 횟수 :
0인용 특허 :
142
초록▼
Systems, methods and computer program products for controlling access to position information at a receiver based on various considerations, including a requested service type, a user type, a device type, a software application type, and/or other characteristics associated with a particular software
Systems, methods and computer program products for controlling access to position information at a receiver based on various considerations, including a requested service type, a user type, a device type, a software application type, and/or other characteristics associated with a particular software application at the receiver from which the position information was requested.
대표청구항▼
1. A computer-implemented method for controlling access to position information by one or more location applications on a computing device, said method comprising: decrypting, during a first service-level decryption step, the position information using a first service-level decryption key to obtain
1. A computer-implemented method for controlling access to position information by one or more location applications on a computing device, said method comprising: decrypting, during a first service-level decryption step, the position information using a first service-level decryption key to obtain first decrypted position information, wherein the first service-level decryption key is associated with a first location application;processing, using a computing device, the first decrypted position information based on a first set of one or more limitations related to location services provided by the first location application;determining a position estimate of the computing device based on the processing of the first decrypted position information;providing the position estimate to the first location application;determining, prior to the decrypting during the first service-level decryption step, whether the first service-level decryption key is stored on the computing device;upon determining that the first service-level decryption key is not stored on the computing device, accessing a first developer key that is associated with the first service-level decryption key and the first location application;sending the first developer key to a network; andreceiving the first service-level decryption key from the network in response to sending the first developer key. 2. The computer-implemented method of claim 1, further comprising: receiving the position information from a remote transmitter, wherein the position information is encrypted; anddecrypting, prior to the decrypting during the first service-level decryption step, the position information using a first system-level decryption key associated with the transmitter. 3. The computer-implemented method of claim 1, wherein the first set of one or more limitations specify one or more of a maximum level of position location accuracy available to the first location application, a coverage area within which the position information may be provided to the first location application, or a time period during which the position information may be provided to the first location application. 4. The method of claim 1, wherein the first set of limitations specify one or more of a maximum level of position location accuracy available to a user of the computing device, a coverage area within which the position information may be provided to the user, or a time period during which the position information may be provided to the user. 5. The computer-implemented method of claim 1, wherein the position information comprises latitude, longitude and altitude information. 6. A computer-implemented method for controlling access to position information b one or more location applications on a computing device, the method comprising: decrypting, during a first service-level decryption step, the position information using a first service-level decryption key to obtain first decrypted position information, wherein the first service-level decryption key is associated with a first location application;processing, using a computing device, the first decrypted position information based on a first set of one or more limitations related to location services provided by the first location application;determining a position estimate of the computing device based on the processing of the first decrypted position information;providing the position estimate to the first location application;decrypting, during a second service-level decryption step, the position information using a second service-level decryption key to obtain second decrypted position information, wherein the second service-level decryption key is associated with a second location application;processing the second decrypted position information based on a second set of one or more limitations related to location services provided by the second location application;determining a second position estimate of the computing device based on the processing of the second decrypted position information; andproviding the second position estimate to the second location application. 7. The computer-implemented method of claim 6, wherein the second set of one or more limitations specify one or more of a maximum level of position accuracy available to the second location application, a coverage area within which the position information may be provided to the second location application, or a time period during which the position information may be provided to the second location application, said method further comprising: determining, prior to the decrypting during the second service-level decryption step, whether the second service-level decryption key is stored on the computing device;upon determining that the second service-level decryption key is not stored on the computing device, accessing a second developer key that is associated with the second service-level decryption key and the second location application;sending the second developer key to a network; andreceiving the second service-level decryption key from the network in response to sending the second developer key. 8. A computer-implemented method for controlling access to position information by one or more location applications on a computing device the method comprising: decrypting, during a first service-level decryption step, the position information using a first service-level decryption key to obtain first decrypted position information, wherein the first service-level decryption key is associated with a first location application;processing, using a computing device, the first decrypted position information based on a first set of one or more limitations related to location services provided by the first location application;determining a position estimate of the computing device based on the processing of the first decrypted position information;providing the position estimate to the first location application;determining whether a second location application on the computing device may access the position information based on whether a second service-level decryption key is stored on the computing device;upon determining that the second service-level decryption key is not stored on the computing device, denying access to the position —information by the second location application; andupon determining that the second service-level decryption key is stored on the computing device, providing the position —information to the second location application. 9. A system for controlling access to position information by one or more location applications on a computing device, the system comprising one or more processors or other devices that: decrypt, during a first service-level decryption step, the position information using a first service-level decryption key to obtain first decrypted position information, wherein the first service-level decryption key is associated with a first location application;process the first decrypted position information —based on a first set of one or more limitations related to location services provided by the first location application;determine a position estimate of the computing device based on the processing of the first decrypted position information;provide the position estimate to the first location application;determine, prior to the decrypting during the first service-level decryption step, whether the first service-level decryption key is stored on the computing device;upon determining that the first service-level decryption key is not stored on the computing device, access a first developer key that is associated with the first service-level decryption key and the first location application;send the first developer key to a network; andreceive the first service-level decryption key from the network in response to sending the first developer key. 10. The system of claim 9, wherein the one or more processors or other devices: receive the position information from a transmitter, wherein the position information is encrypted; anddecrypt, prior to the decrypting during the first service-level decryption step, the position information using a first system level decryption key associated with the transmitter. 11. The system of claim 9, wherein the first set of one or more limitations specify one or more of a maximum level of position location accuracy available to the first location application or to a user of the computing device, a coverage area within which the position information may be provided to the first location application or the user, or a time period during which the position information may be provided to the first location application or the user. 12. A system for controlling access to position information by one or more location applications on a computing device, the system comprising one or more processors or other devices that: decrypt, during a first service-level decryption step, the position information using a first service-level decryption key to obtain first decrypted position information, wherein the first service-level decryption key is associated with a first location application;process the first decrypted position information based on a first set of one or more limitations related to location services provided by the first location application;determine a position estimate of the computing device based on the processing of the first decrypted position information;provide the position estimate to the first location application;decrypt, during a second service-level decryption step, the position information using a second service-level decryption key to obtain second decrypted position information, wherein the second service-level decryption key is associated with a second location application;process the second decrypted position information based on a second set of one or more limitations related to location services provided by the second location application;determine a second position estimate of the computing device based on the processing of the second decrypted position information; andprovide the second position estimate to the second location application. 13. The system of claim 12, wherein the second set of one or more limitations specify one or more of a maximum level of position accuracy available to the second location application, a coverage area within which the position information may be provided to the second location application, or a time period during which the position information may be provided to the second location application, wherein the one or more processors or other devices: determine, prior to the decrypting during the second service-level decryption step, whether the second service-level decryption key is stored on the computing device;upon determining that the second service-level decryption key is not stored on the computing device, access a second developer key that is associated with the second service-level decryption key and the second location application;send the second developer key to a network; andreceive the second service-level decryption key from the network in response to sending the second developer key. 14. A system for controlling access to position information by one or more location applications on a computing device, the system comprising one or more processors or other devices that: decrypt, during a first service-level decryption step, the position information using a first service-level decryption key to obtain first decrypted position information, wherein the first service-level decryption key is associated with a first location application;process the first decrypted position information based on a first set of one or more limitations related to location services provided by the first location application;determine a position estimate of the computing device based on the processing of the first decrypted position information;provide the position estimate to the first location application;determine whether a second location application on the computing device may access the position information based on whether a second service-level decryption key is stored on the computing device;upon determining that the second service-level decryption key is not stored on the computing device, deny access to the position information by the second location application; andupon determining that the second service-level decryption key is stored on the computing device, provide the position information to the second location application. 15. A non-transitory computer-readable medium having a computer readable program code embodied therein, said computer readable program code adapted to be executed to implement a method for controlling access to position information by one or more location applications on a computing device, the method comprising: decrypting, during a first service-level decryption step, the position information using a first service-level decryption key to obtain first decrypted position information, wherein the first service-level decryption key is associated with a first location application;processing the first decrypted position information based on a first set of one or more limitations related to location services provided by the first location application;determining a position estimate of the computing device based on the processing of the first decrypted position information;providing the position estimate to the first location application;determining, prior to the decrypting during the first service-level decryption step, whether the first service-level decryption key is stored on the computing device;upon determining that the first service-level decryption key is not stored on the computing device, accessing a first developer key that is associated with the first service-level decryption key and the first location application;sending the first developer key to a network; andreceiving the first service-level decryption key from the network in response to sending the first developer key. 16. The computer-readable medium of claim 15, the method further comprising: receiving the position information from a remote transmitter, wherein the position information is encrypted; anddecrypting, prior to the decrypting during the first service-level decryption step, the position information using a first system-level decryption key associated with the transmitter. 17. The computer-readable medium of claim 15, wherein the first set of one or more limitations specify one or more of a maximum level of position location accuracy available to the first location application or to a user of the computing device, a coverage area within which the position information may be provided to the first location application or the user, or a time period during which the position information may be provided to the first location application or the user. 18. A non-transitory computer-readable medium having a computer readable program code embodied therein, said computer readable program code adapted to be executed to implement a method for controlling access to position information by one or more location applications on a computing device, the method comprising: decrypting, during a first service-level decryption step, the position information using a first service-level decryption key to obtain first decrypted position information, wherein the first service-level decryption key is associated with a first location application;processing the first decrypted position information based on a first set of one or more limitations related to location services provided by the first location application;determining a position estimate of the computing device based on the processing of the first decrypted position information;providing the position estimate to the first location application;decrypting, during a second service-level decryption step, the position information using a second service-level decryption key to obtain second decrypted position information, wherein the second service-level decryption key is associated with a second location application;processing the second decrypted position information based on a second set of one or more limitations related to location services provided by the second location application;determining a second position estimate of the computing device based on the processing of the second decrypted position information; andproviding the second position estimate to the second location application. 19. The computer-readable medium of claim 18, wherein the second set of one or more limitations specify one or more of a maximum level of position accuracy available to the second location application, a coverage area within which the position information may be provided to the second location application, or a time period during which the position information may be provided to the second location application, the method further comprising: determining, prior to the decrypting during the second service-level decryption step, whether the second service-level decryption key is stored on the computing device;upon determining that the second service-level decryption key is not stored on the computing device, accessing a second developer key that is associated with the second service-level decryption key and the second location application;sending the second developer key to a network; andreceiving the second service-level decryption key from the network in response to sending the second developer key. 20. A non-transitory computer-readable medium having a computer readable program code embodied therein, said computer readable program code adapted to be executed to implement a method for controlling access to position information by one or more location applications on a computing device, the method comprising: decrypting, during a first service-level decryption step, the position information using a first service-level decryption key to obtain first decrypted position information, wherein the first service-level decryption key is associated with a first location application;processing the first decrypted position information based on a first set of one or more limitations related to location services provided by the first location application;determining a position estimate of the computing device based on the processing of the first decrypted position information;providing the position estimate to the first location application;determining whether a second location application on the computing device may access the position information based on whether a second service-level decryption key is stored on the computing device;upon determining that the second service-level decryption key is not stored on the computing device, denying access to the position information by the second location application; andupon determining that the second service-level decryption key is stored on the computing device, providing the position information to the second location application.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (142)
Anderson, Robert J.; Bull, Jeffrey F.; Czarnecki, Paul; Ginter, Thomas Stephan; Ward, Matthew L., Advanced triggers for location-based service applications in a wireless location system.
Louis A. Stilp ; Joseph W. Sheehan ; Alan E. E. Rogers ; Robert J. Anderson ; Andrew F. Harbison, Antenna selection method for a wireless location system.
Stilp, Louis A.; Sheehan, Joseph W.; Rogers, Alan E. E.; Anderson, Robert J.; Harbison, Andrew F., Antenna selection method for a wireless location system.
Moon, Hi-Chan; Lim, Chae-Man; Maeng, Seung-Joo; Yoon, Soon-Young; Lee, Hyeon-Woo; Kang, Hee-Won; Ahn, Jae-Min, Apparatus and method for synchronizing channels in a W-CDMA communication system.
Stilp Louis A. ; Sheehan Joseph W. ; Harris Tim J. ; Bull Jeffrey F. ; Anderson Robert J., Architecture for a signal collection system of a wireless location system.
Gaal,Peter; Soliman,Samir, Base station time calibration using position measurement data sent by mobile stations during regular position location sessions.
Louis A. Stilp ; Joseph W. Sheehan ; Alan E. E. Rogers ; Robert J. Anderson ; Andrew F. Harbison, Baseline selection method for use in a wireless location system.
Petry, Brian D.; Connors, Dennis P.; Marsh, Gene W.; Gummadi, Srikanth; Govind, Keerthi S.; Burchill, William S.; Madan, Seema, Convergence sublayer for use in a wireless broadcasting system.
Duffett-Smith, Peter James; Rowe, Robert Willem; Jarvis, Murray Robert; Hern, Simon David; Graube, Nicolas Guy Albert, Determining the change in time at a mobile terminal.
Jin, Xin; Grant, Christopher James; Rosselet, Andrew Jonathan Gilbert, Frequency aiding method and system for navigation satellite receiver with crystal oscillator frequency hysteresis.
Sampath, Ashwin; Palanki, Ravi; Khandekar, Aamod D.; Bachu, Raja Sekhar, Method and apparatus for sequencing and correlating a positioning reference signal.
Grilli, Francesco; Wheatley, III, Charles E.; Willenegger, Serge D.; Subrahmanya, Parvathanathan, Method and apparatus for time-aligning transmissions from multiple base stations in a CDMA communication system.
Grilli, Francesco; Wheatley, III, Charles E.; Willenegger, Serge D.; Subrahmanya, Parvathanathan, Method and apparatus for time-aligning transmissions from multiple base stations in a CDMA communication system.
Grilli,Francesco; Wheatley, III,Charles E.; Willenegger,Serge; Subrahmanya,Parvathanathan, Method and apparatus for time-aligning transmissions from multiple base stations in a CDMA communication system.
Dunn Michael J. (Issaquah WA) Atherly Don H. (Eugene OR) Reudink Douglas O. J. (Bellevue WA) Feuerstein Martin J. (Kirkland WA) Foerster Ronald E. (Seattle WA) Chuang Ching (Issaquah WA) Vendetti Din, Method and system for determining the position of a mobile receiver.
Markhovsky, Russ; Osipov, Sergei; Vityaev, Evgenii; Mikhienko, Evgenii; Tiurlikov, Andrey; Ivaniya, Sergei; Markhovsky, Stanislav, Method and system for rangefinding using RFID and virtual triangulation.
Bruno Ronald ; Schuchman Leonard ; Engelbrecht Lloyd, Method of avoiding near-far interference problems in an array of navigation signal beacons having selected CDMA or GPS-like navigation signals.
Mukkavilli, Krishna Kiran; Ling, Fuyun; Walker, Gordon Kent; Chari, Murali Ramaswamy, Methods and apparatus for position location in a wireless network.
Mukkavilli, Krishna Kiran; Ling, Fuyun; Walker, Gordon Kent; Chari, Murali Ramaswamy, Methods and apparatus for position location in a wireless network.
Fischer, Sven; Burroughs, Kirk Allan; Lin, Ie-Hong; Marshall, Grant Alexander; Edge, Stephen W., Methods and apparatuses supporting multiple positioning protocol versions in wireless communication networks.
Yushkov, Andrey; Zhulanov, Vladimir; Markhovsky, Felix; Prevatt, Truman; Weill, Lawrence, Methods and system for multi-path mitigation in tracking objects using reduced attenuation RF technology.
Bruno Ronald (Arlington VA) Schuchman Leonard (Potomac MD) Engelbrecht Lloyd (Reston VA), Position enhanced communication system including system for embedding CDMA navigation beacons under the communications s.
Rabinowitz, Matthew; Spilker, Jr., James J.; Furman, Scott; Rubin, Dimitri; Samra, Harvind; Burgess, David; Opshaug, Guttorm; Omura, Jim, Positioning and time transfer using television synchronization signals.
Edge, Stephen W.; Black, Peter John; Wu, Qiang; Zhao, Wanlun; Tokgoz, Yeliz; Padovani, Roberto; Naguib, Ayman Fawzy; Kim, Je Woo; Dayal, Pranav; Agashe, Parag Arun, Positioning using enhanced pilot signal.
Riley, Wyatt T.; Moeglein, Mark L.; Biacs, Zoltan, Selecting a navigation solution used in determining the position of a device in a wireless communication system.
Dunn Michael Jeffrey ; Atherly Don Harold ; Reudink Douglas Otto John ; Feuerstein Martin Jay ; Foerster Ronald Ernest ; Chuang Ching ; Vendetti Dino John, Signal time of arrival position determining method for calculating cellular telephone billing charges.
Markhovsky, Russ; Osipov, Sergei; Tiurlikov, Andrey; Ivaniya, Sergei; Markhovsky, Stanislav; Vityaev, Evgenii; Mikhienko, Evgenii, System and method for locating a target using RFID.
Ingvalson, Ryan; Elgersma, Michael R.; Soehren, Wayne A., Systems and methods for differential altitude estimation utilizing spatial interpolation of pressure sensor data.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.