US20100287611A1 - System and method for managing captured content - Google Patents
System and method for managing captured content Download PDFInfo
- Publication number
- US20100287611A1 US20100287611A1 US12/839,017 US83901710A US2010287611A1 US 20100287611 A1 US20100287611 A1 US 20100287611A1 US 83901710 A US83901710 A US 83901710A US 2010287611 A1 US2010287611 A1 US 2010287611A1
- Authority
- US
- United States
- Prior art keywords
- media content
- captured
- content
- authorization
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/2866—Architectures; Arrangements
- H04L67/30—Profiles
- H04L67/303—Terminal profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/52—Network services specially adapted for the location of the user terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72409—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
- H04M1/72412—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/029—Location-based management or tracking services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/20—Services signaling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2250/00—Details of telephonic subscriber devices
- H04M2250/02—Details of telephonic subscriber devices including a Bluetooth interface
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2250/00—Details of telephonic subscriber devices
- H04M2250/52—Details of telephonic subscriber devices including functional features of a camera
Definitions
- the invention relates generally to a method and a system of managing media content. Specifically, the invention relates to a method and system for authorizing and exchanging information related to captured media content.
- a tourist may ask a friend to take a picture of him in front of the U.S. Capitol Building. After taking the picture with her own mobile device, the friend would have control over whether the picture is saved, deleted or used. As such, the subject of the photograph would be unable to dictate whether the photograph was suitable or appropriate for printing or saving. Even if the photographer transmitted the picture to the subject's mobile device, the subject still could not control the use or existence of the photograph on the photographer's device. In an alternate situation, a mobile device user may inadvertently capture a stranger while photographing a scene. The stranger would have no notice that such a photograph was taken and thus, no control over the use or distribution of his or her own image. For a variety of reasons, including security and privacy, the subject of any form of multimedia content may want the ability to exercise control over his or her image.
- the transmission of captured media can result in the quick depletion of a receiving device's storage resources.
- a receiving party would have to constantly manage the files and storage on his or her mobile device to maintain storage capacity.
- a large media file also requires more resources and time to transmit and render. As such, not only must a user wait for a file to finish transferring, the user would also have to wait while the media is rendered on the receiving device.
- a receiving party is only receiving media content to determine whether or not he or she wants a copy. In such cases, the transfer and processing times of large media files may be wasted if the receiving party determines that he or she does not want the media.
- Embodiments of the invention provide a method and system of controlling ownership and authorization of captured media content.
- the subject of captured content would be empowered to authorize and control the ownership of the captured content.
- the capturing device may send a content authorization request to one or more subjects of the captured content. Each user would then be able to preview the photograph or other content and decide whether to authorize the capturing device to use the content.
- a user that is the subject of captured content may exercise control over the use and existence of the captured content.
- the capturing device may automatically delete the content from storage.
- the capturing device may store the content and allow the content to be transmitted, printed or otherwise used by the user of the capturing device.
- Such a feature may also be enabled or disabled according to a capturing device user's preferences.
- a content capturing device may detect one or more devices having one or more predetermined characteristics (e.g., proximity of location) at the time a particular content was captured.
- a capturing device may determine such a list of devices from which to request authorization using wireless networking methods.
- the capturing device and other mobile devices in proximity to the capturing device may have BLUETOOTH wireless capabilities.
- the capturing device may detect and communicate with the other BLUETOOTH wireless devices within a wireless range.
- the capturing device may communicate with a wireless or cellular server that may determine a list of matching devices based on stored information that matches a set of received parameters.
- the captured content may contain metadata that includes a variety of information related to the captured content.
- metadata may include the time the content was captured, the duration of the content (i.e., video content), the size of the content and/or authorization information.
- authorization may be embedded within the metadata of a content file storing the content.
- authorization information may be used to determine whether the content may be published or printed by a third party photograph printer.
- a subject of captured content may provide qualified authorization for the use of the captured content.
- a subject of a photograph may determine that the photographer may print the photograph up to 10 times or that the photographer may only use the photograph in its digital format (i.e., no printing). Other restrictions may be implemented such as an expiration of use date and the like.
- users receiving captured content may preview the content file and the associated metadata through a representative token.
- the tokens may be of a limited size to ensure quick transfers and fast rendering times.
- the tokens may contain a sample of the captured content (e.g., thumbnail image, brief clip of a video) as well as some or all of the metadata associated with the content. This permits the user to make a quick decision as to whether or not he or she would like a copy of the content. If the user does want a copy, a complete version of the media may be requested using a request token and the media file may be subsequently transferred.
- Tokens may further be used in order to search for similar or identical content on a target device.
- a user who wants to locate images similar to a picture of Buckingham Palace may send a query token containing various media data to one or more target devices.
- the target devices would then use the query token to determine if any of its media files are similar to the image associated with the query token.
- the representative tokens of captured content may be further be stored on a target device for later use.
- a user may view or browse a gallery of stored tokens and subsequently request the full content file corresponding to one of the tokens.
- Stored tokens may have a variety of other uses as well.
- FIG. 1 illustrates a block diagram of a communication network in which various systems and methods of the present invention may be implemented.
- FIG. 2A illustrates an side view of an exemplary operating environment in which a mobile content capture device implementing one or more systems and methods of the present invention may be used.
- FIG. 2B illustrates a top view of the exemplary operating environment of FIG. 2A .
- FIG. 3A is a flow chart showing an exemplary method for controlling ownership of media content according to an illustrative embodiment of the present invention.
- FIG. 3B is a flow chart showing an exemplary method for detecting one or more authorization devices according to an illustrative embodiment of the present invention.
- FIG. 4A illustrates an operating environment in which one or more devices are outside a detection range of a capture device according to an illustrative embodiment of the present invention.
- FIG. 4B illustrates an operating environment in which one or more devices lack short range wireless detection capabilities according to an illustrative embodiment of the present invention.
- FIG. 5 is a flow chart showing an exemplary method for controlling ownership using a third-party device according to an illustrative embodiment of the present invention.
- FIG. 6 illustrates another exemplary method for controlling ownership of captured content according to an illustrative embodiment.
- FIG. 7 is a flow chart showing an exemplary method for controlling ownership in the environment described in FIG. 4A using a peer-to-peer network according to an illustrative embodiment of the present invention.
- FIGS. 8A & 8B illustrate preview and authorization request interfaces according to an illustrative embodiment of the present invention.
- FIGS. 9A & 9B are diagrams illustrating the process of querying one or more target devices according to an illustrative embodiment.
- FIG. 1 describing one embodiment of the invention, illustrates a block diagram of a communication network in which various systems and methods of the present invention may be implemented.
- the communication network may include both wired and wireless components.
- Such wireless components may include mobile telecommunication devices 105 , personal data assistants (PDAs) 110 , digital cameras 115 and other wireless computing devices.
- the wired components may include a network server 130 , network printing providers 135 , personal computers (PCs) 125 , multimedia telephones 120 and the like.
- the wireless and wired components may communicate through a variety of methods including a cellular network 150 and/or a wired computer network 155 .
- a cellular telephone 105 may transmit data through a wireless cellular network 150 to a network server 130 .
- the network server 130 may then retransmit the data to a land-line telephone 120 through a line-based telephone network 155 .
- the network server 130 may forward the data to a Voice Over IP (VOIP) capable communications device through a computer network.
- the computer network may include wireless networks such as a wireless local area network (WLAN) or wired networks such as a Local Area Network (LAN).
- WLAN wireless local area network
- LAN Local Area Network
- the communication devices may further capture, store and transmit a variety of data types including audio, video and text.
- a mobile telephone 105 may include a digital camera component.
- the mobile telephone 105 may capture, store and transmit both audio and video data.
- Communication devices may transmit multimedia data using any of several protocols that are well known in the art. Examples of transmission protocols that support multimedia data include Internet Protocol (TCP/IP), BLUETOOTH, GSM, CDMA and the like.
- BLUETOOTH systems in particular, may form a piconet of up to eight different BLUETOOTH-enabled wireless devices. A piconet allows a single master device to facilitate the communications between the other slave devices.
- multimedia data that is initially sent using one protocol may be repacketized or recomposed to adapt to another network protocol.
- a cellular phone 105 may transmit a photo and accompanying audio to a PC located on an IP network using CDMA transmission methods.
- the server 130 may repacketize the multimedia data to conform the transmission packet architecture to that used by the destination device (i.e., IP). This process insures cross-network compatibility.
- FIGS. 2A & 2B illustrate different view of an exemplary operating environment in which a mobile device implementing one or more systems and methods of the present invention may be used.
- a user carrying a mobile capture device such as, for example, a mobile phone 210 with an integrated digital camera may use the device 210 in a variety of situations including on vacation, during a business trip or at a sporting event.
- Other forms of mobile capture devices may include portable audio recorders, video cameras and digital cameras.
- the user can use the mobile phone 210 to record media content such as video, audio, still images and the like. Often, the recordation of media content will contain the image or audio of one or more subjects 215 .
- a user may take a photograph of his sister 215 in front of a particularly memorable location (e.g., the Eiffel Tower) to commemorate the occasion.
- his sister 215 would be a subject of the captured media content (i.e., photograph).
- the captured content may contain the image or audio of one or more additional subjects that may or may not be familiar with the content capturer.
- the capture device 210 may record other information that relates to one or more characteristics of the recorded content.
- the capture device may detect positional coordinates using, for example, a Global Positioning System (GPS).
- GPS Global Positioning System
- the stored content may thus include a latitude and longitude of where the image was taken.
- the capture device 210 may also include one or more components that are able to determine an elevation 230 and/or an azimuth 225 of the capture device 210 in relation to one or more reference points or axes at the time the content was captured.
- the elevation 230 of the capture device 210 may reflect an angular distance measured based on the horizon.
- a gyroscopic unit of capture device 210 may measure the elevation 230 of the device 210 in relation to a “level” position defined by the earth's gravitational field.
- Other information that may be stored or associated with the captured content includes a capture size and a maximum capture distance.
- a maximum capture distance may be a preset range defined by the user, a default value or some other limitation (e.g., a maximum focus distance of a digital camera).
- the maximum capture distance may be defined by the distance to the farthest captured object, as determined by a range detection component such as a laser range finder. In FIGS.
- the photograph 215 is confined to a rectangular capture area defined by a vertical viewing size 245 and a horizontal viewing size 240 .
- the captured content 215 may be stored with data specifying the corresponding vertical 245 and horizontal 240 dimensions.
- Other types of characteristic information may include a frequency range for audio content, color data for image content, a recordation period for video data, a zoom ratio for video or image content and a time stamp.
- the captured content may be stored in a structure that allows for the embedding of metadata. Using such a storage scheme, captured device 210 may detect various types of content data (e.g., positional information, location data and audio and video characteristics) and associate the information as metadata with the captured content.
- a subject 215 of captured content may wish to control the use and/or existence of his or her own captured image or voice.
- the subject 215 of the captured content may carry or use a mobile device 220 capable of receiving and rendering data of one or more media types.
- the capture device 210 may automatically transmit the captured content either directly or indirectly to the subject's mobile device 220 for approval and authorization upon capturing the content.
- Direct methods include infrared transfers, BLUETOOTH networking methods and other proximity transfer technologies.
- the capture device 210 may transmit the captured content indirectly via a cellular network, a wired network or other networks that use a third-party device to coordinate and facilitate the transfer. Such transfer methods, as they relate to aspects of the invention, will be described in further detail below.
- FIG. 3A is a flowchart showing an exemplary method for requesting authorization for captured content from one or more devices.
- the capturing device captures media content and determines one or more characteristics of the captured content or of the capturing device (e.g., longitude, latitude, zoom ratio, time stamp). The characteristics and other information may be stored as metadata and associated with the captured content in a content file.
- the capture device may determine a list of one or more target devices that are within a predetermined range in step 310 .
- This range may be defined by variety of factors such as the wireless detection range of the capture device or a maximum capture distance specified in the associated metadata.
- the performance of steps 305 and 310 are not restricted by the order illustrated in FIG. 3A and may be performed in interchangeable order (i.e., step 310 may be performed before step 305 and vice versa).
- the capture device determines a second list of target devices from which to request authorization to use the captured media content.
- the second list of devices is selected based on whether a detected device has characteristics matching or similar to those of the content file.
- a capturing device takes a photograph at a first location in the direction of a stranger who is walking 40 feet away carrying a mobile device.
- the capture device embeds metadata in the content file to indicate a capture range of 50 feet.
- the 50 foot capture range may reflect a focusing distance limitation or a wireless range limitation of the capture device.
- the capturing device may add the target device (i.e., the stranger's mobile device) to the list of devices from which to request authorization.
- the capturing device may use different or additional characteristics to further determine authorizing devices.
- the capture device may compare the time at which a target device was at a given location with the time stamp of the media content captured by the capturing device.
- the capture device may, in step 315 , determine an authorization list based on proximity of target devices.
- FIG. 3B describing one embodiment of the invention, illustrates a flowchart of an exemplary method for detecting and determining a list of target devices that are within a predetermined proximity to the capturing device at the time of content capture.
- FIG. 3B is meant to illustrate step 315 in additional detail according to an illustrative embodiment.
- the capturing device embeds metadata comprising information associated with the captured content in a content file.
- the capturing device transmits the metadata to the list of target devices determined according to step 310 .
- the target devices may then evaluate the received metadata to determine if the information matches their own stored data in step 365 .
- a target mobile device may periodically detect and record a variety of information including device location, altitude, time and combinations thereof in memory for this purpose. If a target device's data matches the metadata received from the capturing device, the capture device may receive a positive response including a request for the media content file from the target device in steps 370 .
- metadata transmitted from the capturing device may include a set of coordinates and a timestamp. The receiving target device may retrieve its past location data by searching for a timestamp in temporal proximity to the timestamp of the received metadata.
- the metadata may include angles (e.g., elevation) and measurements that represent a direction of the captured content (i.e., relative to the captured device).
- a target device may determine whether it was within the specified angles and distance of the capture device and respond accordingly. Such a process may involve using geometric calculations to determine if a target device's latitude, longitude and elevation fall within a capture area of a capture device having a specified latitude, longitude, elevation and direction.
- the capturing device may add any target device that responds affirmatively to the list of devices from which authorization is to be requested. This step is performed automatically by the capturing device upon receiving an affirmative response from a target device.
- a user may, instead, manually control and determine whether to send an authorization request to one or more target devices that provide an affirmative response. However, if a target device either does not respond or responds in the negative, the capturing device may ignore the device or eliminate it from the authorization list in step 380 .
- the capture device subsequently transmits the captured content file and an authorization request to each of the one or more authorizing devices in step 320 .
- the capturing device then awaits a response in step 325 to the authorization request while each of the authorizing devices receives and renders the captured content.
- An authorizing device may respond with a variety of options including authorize, refuse authorization, delete the content file or provide qualified authorization.
- a capture device may determine whether authorization was granted or denied in step 330 . If the capture device receives a response granting authorization, the capture device may embed such authorization in the content file in step 335 .
- the capture device may receive, as in step 340 , a delete response
- the content file may be automatically deleted from the capture device in step 345 .
- the response may allow restricted authorization of the content file.
- a user may use the content subject to certain restrictions specified by a user of an authorizing device. Such restrictions may include a time restriction, a purpose restriction, a payment requirement, a frequency of use restriction and/or combinations thereof.
- the capture device may embed the restrictive parameters in the content file, as illustrated in step 335 .
- the content file transmitted to the authorizing device may either be kept for future use or automatically deleted once a response is sent. Such a determination may be made in accordance with user preferences or other considerations.
- the capture device may initially transmit the entire content file (including the captured content and associated metadata) along with the authorization request to one or more target devices regardless of whether they are authorizing devices.
- a target device may immediately render the captured content upon determining that it is an authorizing device without having to separately request the content file from the capture device.
- the target device may view and respond to the authorization request without having to initiate additional transmissions or communications to receive the authorization request. Those devices that find the content file to be irrelevant may simply ignore the authorization request and delete the content file.
- FIGS. 4A & 4B describing further embodiments of the invention, illustrate operating environments in which one or more devices 430 are outside a detection range of a capture device 410 according to an illustrative embodiment of the present invention.
- the wireless detection range 415 of the capture device 410 may be smaller than a content capture range 420 of the capturing device 410 .
- the capturing device 410 may be able to capture a subject (i.e., a target) 425 at a greater distance than the device 410 is able to detect wirelessly.
- Wireless technologies such as BLUETOOTH and WLAN have detection ranges that are limited by a variety of factors including both power capacity and antenna capabilities and device class.
- a foreign device 430 of a subject 425 captured by the capturing device 410 may be outside the relevant wireless range 415 .
- a third-party device 435 within the wireless range 415 of capture device 410 and the subject's device 430 may act as a link between the subject's device 430 and the capture device 410 .
- the capture device 410 , the third-party device 435 and the subject's device 430 may form a piconet.
- the third-party device 435 may act as the master device for facilitating communications between two or more slave devices (i.e., the subject's device 430 and the capture device 410 ).
- FIG. 4B depicts a system that includes a capture device 410 and a subject device 430 where either both or one of the devices 410 & 430 do not have proximity-based wireless capabilities.
- the devices 410 & 430 may be connected to a communication network 435 and have the ability to transmit and receive data via a network server 440 .
- the network server may consist of a variety of components including a PC and/or a smartphone running an mApache server.
- the capture device 410 includes peer-to-peer wireless components and the target device (i.e., subject's device) 430 does not, it may still detect the target device 430 using the network server 435 as a communication conduit.
- the network server 440 may store data corresponding to each of the devices 410 & 430 using the network 435 and/or network server 440 .
- the target device 430 may detect its own location and a timestamp at a predefined interval. The target device 430 may then forward this data to the network server 440 for storage in order to reduce its own memory load.
- the network server 440 may periodically request and store updated data from the devices 410 & 430 .
- FIG. 5 describing one embodiment of the invention, is a flow chart showing an exemplary method for exercising ownership control through a third-party device according to an illustrative embodiment. Such a method could be used in an operating environment such as the one described in FIG. 4B to overcome device detection obstacles.
- the third-party device e.g., network server
- a network server (i.e., a third-party device) initially sits in a listening mode, waiting for a transmission packet from a capturing device in step 505 .
- the transmission packet received from the capturing device may contain captured content, an authorization request and metadata to reduce the number of transmissions.
- the metadata, content file and authorization request may be sent separately or in various combinations as they are requested by the network server or target device.
- the metadata may include a variety of content or device information such as location, altitude, azimuth, elevation, zoom ratio and/or combinations thereof.
- the authorization request may be a uniform message constructed to request authorization from one or more target devices.
- the network server may acquire device information from one or more target devices known to the network server.
- the network server may acquire a target device's information in numerous ways including requesting the information from the target device or listening for periodic updates transmitted independently by the target device.
- the target device may detect its own characteristics (e.g., location, timestamp, altitude) at periodic intervals as described previously. Alternatively, the target device may only determine its characteristics upon receiving a request by the network server or another device.
- the network server compares the received device information with the metadata of the content file to determine whether one or more target devices match the data associated with the captured content.
- a “match” may be defined by a predetermined threshold value.
- the threshold value may be a percentage of characteristics matching or some other measuring rubric.
- the various characteristics and device information may be weighted to provide greater importance to some factors and less importance to others.
- the network server may optionally provide the list of matching devices to the capturing device.
- the step of determining a list of authorizing devices may also be performed at the target device, as described in FIG. 3B , by transmitting at least the metadata to the target device for evaluation.
- the network server may compose a list based upon the positive and negative responses from the target devices.
- the network server upon determining the list of one or more target devices having matching characteristics, the network server then distributes the content file as well as the authorization request to the one of more devices in step 520 .
- the content file is transmitted so that the target device may render the image, video or audio and for a user of the target device to determine whether to grant or deny authorization.
- the network server may transfer a thumbnail or otherwise reduced media file instead of the full media file. This may reduce the transfer and authorization time of especially large media files such as videos and high-quality images.
- the network server listens for and receives authorization responses from the one or more target devices.
- the authorization responses may be transmitted from the one or more target devices in response to a user's manual determination or automatically by the target device.
- An automatic authorization response may be generated by a rule stored on the target device.
- a rule may instruct the target device to deny any authorization requests to which a user has not manually responded in a predetermine amount of time.
- the authorization responses may be directly retransmitted to the capture device in step 530 .
- the network server may send the one or more received authentication responses to the capture device at predefined intervals.
- the network server may also send the one or more authentication responses once all of the target devices have responded.
- Silence from a particular device may indicate a default response of either granting or denying authorization. Alternatively, silence may provide authorization to the capturing device for a predetermined amount of time before authorization must be requested again.
- the network server may further embed the one or more authentication responses in the content file and transmit the content file back to the capturing device.
- the server may instruct the capture device to embed the responses in the content file itself. If the server embeds the authentication data, the server may instruct the capture device to replace any other versions of the content file with the one transmitted by the server. On the other hand, if the capturing device embeds the authentication data, the server may request confirmation that the content file was, in fact, updated.
- FIG. 6 illustrates another exemplary method for controlling ownership of captured content according to an illustrative embodiment.
- a target device may check if the network server is storing any content files that require authorization. Thus, the network server might not initiate any comparison or determination of authorizing devices until requested to do so by a target device. If the network server determines that it is storing a content file requiring authorization, the target device may send its information to the network server to determine if the target device should be an authorizing device in steps 607 & 610 . Such a determination may be made in step 613 using methods described previously, including matching metadata in the content file with target device information.
- the content file and an authorization request are transmitted to the target device for rendering and authorization in step 615 .
- a user of the target device may then decide whether to authorize the capture device's use of the content file and respond accordingly in step 620 .
- a user of the target device may decide that the picture is too blurry and issue a delete command to the network server. The network server would then instruct the capture device to delete the content file and, optionally, request confirmation.
- FIG. 7 describing one embodiment of the invention, is a flow chart showing yet another exemplary method for controlling ownership in the environment.
- the method allows for the authorization of content by devices in a peer-to-peer network environment as described in FIG. 4 .
- a capture device and a target device are not within the wireless detection ranges of one another.
- an intermediary device in the peer-to-peer network may be used to facilitate authorization requests and responses between the capture device and the target device, respectively.
- the capture device may transmit a content file to the intermediate device along with an authorization request. Since the capture device is unable to communicate with the target device due to wireless range limitations, the capture device may request that the intermediary device convey the authorization request to the target device. More particularly, the intermediate device may act as a proxy for the capture device and detect one or more target devices that have matching characteristics. In step 715 , the intermediate device detects one or more target devices that have characteristics matching those embedded in the content file. The intermediate device then transmits the content file (or a representative portion thereof) and the authorization request to one or more matching target devices in step 720 . As with the previous methods described herein, the user of the target device may then determine whether to provide authorization for the content to the capture device.
- the intermediate device Upon receiving an authorization response from the target authorizing device in step 723 , the intermediate device subsequently communicates the response to the capture device in step 725 .
- the intermediate device may modify the authorization data of the content file and transmit the content file back to the capture device along with the authorization response.
- FIGS. 8A & 8B illustrate a preview and authorization request interface according to an illustrative embodiment of the present invention.
- FIG. 8A illustrates a preview pane in which a user of a target authorizing device may render and view the captured content 825 .
- the user interface may include resizing features, brightness/darkness adjusters and other image modification options.
- the user interface may further display a timestamp 820 , location information 810 and the like along with the image 825 .
- the source (not shown) of the captured content may also be identified.
- the user may be presented with an option 815 to view authorization options or to respond to the authorization request.
- an authorization response screen is illustrated with a menu of possible responses. For example, a user could request that the content file be deleted or specify that the file may not be printed.
- An option 830 on the menu may further allow the user to switch to the preview pane illustrated in FIG. 8A .
- the content authorization methods and systems described herein may further implement tokens to facilitate the transmission and sharing of media content.
- an authorization request or a response thereto may be transmitted in the form of one or more tokens.
- Tokens are generally small data structures representing media content that include metadata related to the media content or a device owner.
- the metadata may include information related to a time and place of creation, contact information of the device owner, a content type and the like.
- the metadata of a token may further provide information corresponding to the people or devices that were in proximity to the capturing device at the time of content capture.
- the token may include a representative portion of the media content to provide a receiving user a preview of the content.
- the token may include a thumbnail of the digital image.
- a representative clip of video content may be included in a token instead of the entire video.
- Tokens may be transmitted using methods similar to those previously described.
- a token may be downloaded or distributed to foreign mobile devices through a personal web page or a web server or any type of network medium.
- a capture device may send just a token to increase transfer speed and improve rendering time.
- a target device user may request a copy of the full content file from the capture device using a request token.
- the request token may contain sufficient information for the capture device to identify the requested content file. For example, a thumbnail or video clip might not be included in a request token since the capture device already has the full content file.
- a capture device upon receiving a request token, may locate the content file corresponding to the provided identification information and transmit the file to the target device.
- a capture device may, on the other hand, request information from the requesting device in return for the content file.
- the requested information may include the identity of the requesting device user and/or similar content.
- the token system may be used as a way to trade information or media content by enticing users through the use of tokens.
- a target device user may further search for additional images or media content that is similar to content currently stored on the target device.
- the currently stored content may have been captured by the target device, provided in a received token or derived from a received content file.
- FIG. 9A describing one embodiment of the invention, illustrates a diagram of using query tokens to retrieve matching content from one or more target devices.
- the request device may issue a query token 900 to one or more receiving devices using various transmission techniques.
- the one or more receiving devices are determined based on a proximity to the requesting device at the time of content capture.
- the query token 900 may further include information or parameters for the search including a keyword (e.g., “Lambretta”), time of capture, a location (e.g., “Italy”) and a content type.
- a keyword e.g., “Lambretta”
- time of capture e.g., “Time of capture”
- location e.g., “Italy”
- a content type e.g., “Lambretta”
- Each of the receiving devices may then conduct a search on their local content databases to determine whether they have any content matching the specified parameters. If the receiving device finds one or more matches, the receiving device may then issue one or more query hit tokens 905 identifying the matching content.
- a request device may issue a request token for any of the content identified by the query hit tokens 905 .
- the original content files 910 may be downloaded from the corresponding target device.
- tokens may also contain a variety of fields and parameters such as a popularity indicator that may be increased with each request for
- FIG. 9B is another diagram illustrating query token usage between multiple device users.
- Mobile device 920 of user ‘Betsy’ may initially render an image of a location in Italy as well as provide the metadata information (i.e., place, people and time).
- the mobile device 920 may identify the people (i.e., Liza, Jason and Bob) in the picture based on proximity detection and device identification as discussed previously.
- Betsy may decide that her image is not sufficiently clear and request matching images from other users.
- Betsy may choose from a list of people that the device 920 has detected as being in proximity at the time the picture was taken. Betsy may then select one or more of the people from which to request matching images.
- Query tokens 925 are then transmitted to each of the devices 930 of the selected people.
- Devices 930 may then evaluate the metadata and/or content data to determine whether they are storing matching images. If one or more of the devices 930 are storing a matching image, a query hit token may be returned as described in FIG. 9A .
- a device user may occasionally decide to modify, add or delete content from a content database stored on the device.
- the tokens transmitted to other devices corresponding to the content may require modification or updating (e.g. the tokens may include requests for other device and user).
- originally transmitted tokens may contain identification information allowing a receiving device to request the full content file from a transmitting device based on the identification data.
- the original token may need to be updated to reflect the name change.
- a transmitting device i.e., the device storing the modified or deleted content file
- An update token may either provide new information to replace old information in the original token or, the update token may simply replace the original token entirely.
- a removal token may instruct a receiving device to delete the original token from the receiving device's database.
- a token may be assigned an expiration time. At the expiration time, the token must be updated or be deleted from the database.
- a token may contain a constant unique identifier associated with a content file.
- the unique identifier may constitute a randomly assigned alphanumeric code, a generated identification number or a unique name.
- the unique identifier may also be evaluated as a hash value calculated based on the corresponding content.
- a token may contain an application or an applet that is needed for rendering the media content, and/or to execute the requests that token includes.
- a target device may automatically launch the application to render or otherwise process the media content.
- a user of a target device may be given the option of launching the embedded application or applet or executing a pre-existing application.
- tokens may be stored for later use on a target device. For example, a user may wish to collect tokens of captured content for later viewing or browsing. At such a later time, the user may request the full content file corresponding to one or more of the stored tokens. Numerous other uses of stored tokens may also be implemented in the systems and methods described.
- Each of the methods and systems for requesting authorization to control and use captured content may further implement an expiration time or distance feature.
- a capturing device may continuously search for target devices from which to request authorization as long as it is within a certain distance of the capturing location. Alternatively, the capturing device may continue the search until a predetermined time is reached. Other parameters may also be used to limit the duration of a capturing device's search for authorizing devices including a limit to the number of authorizing devices.
- a user of a capture device or of a target device may enable or disable the authorization features described herein. Thus, a user would not be forced to delete a content file if the user does not so desire.
- the methods and features recited herein may further be implemented through any number of computer readable mediums that are able to store computer readable instructions.
- Examples of computer readable mediums that may be used include RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, DVD or other optical disk storage, magnetic cassettes, magnetic tape, magnetic storage and the like.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Human Computer Interaction (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Storage Device Security (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Provided are apparatuses and methods in a mobile communication and content capturing device for controlling ownership and use of captured content. A mobile device capturing content of a user of a target device may automatically request authorization to use and own the captured content from the target device and user. The mobile device may detect the target device by comparing metadata associated with the captured content with device information of a target device. Alternatively, the capture device may communicate with a server to facilitate the authorization request process. The capture device may further establish a piconet with one or more intermediate wireless devices to detect and request authorization from a target device outside of the capture device's wireless range. Tokens may further be implemented to reduce transmission and processing times of various communication information including authorization requests and content files.
Description
- The invention relates generally to a method and a system of managing media content. Specifically, the invention relates to a method and system for authorizing and exchanging information related to captured media content.
- Many devices exist today that allow a user to capture a variety of multimedia content including pictures, video and audio recordings. These devices have become increasingly mobile and compact to provide users the freedom to capture content in a variety of places and circumstances. For example, tourists often take pictures of scenery and people (e.g., themselves) to remember a vacation or trip. With the increasing popularity and widespread adoption of mobile telephones, the attractiveness of integrating multimedia capture capabilities with mobile telephones has grown. Such an integration of technologies permits a user to carry and utilize a single mobile device to both wirelessly communicate as well as to capture multimedia content. Thus, users are able to take a photograph or record a video segment and immediately transfer that content to a friend or family member via a wireless or cellular communications network. The subject of a photograph may also request that the photographer transfer the photograph to the subject for approval or previewing.
- In one instance, a tourist may ask a friend to take a picture of him in front of the U.S. Capitol Building. After taking the picture with her own mobile device, the friend would have control over whether the picture is saved, deleted or used. As such, the subject of the photograph would be unable to dictate whether the photograph was suitable or appropriate for printing or saving. Even if the photographer transmitted the picture to the subject's mobile device, the subject still could not control the use or existence of the photograph on the photographer's device. In an alternate situation, a mobile device user may inadvertently capture a stranger while photographing a scene. The stranger would have no notice that such a photograph was taken and thus, no control over the use or distribution of his or her own image. For a variety of reasons, including security and privacy, the subject of any form of multimedia content may want the ability to exercise control over his or her image.
- In addition, the transmission of captured media, especially larger files such as videos, can result in the quick depletion of a receiving device's storage resources. Thus, a receiving party would have to constantly manage the files and storage on his or her mobile device to maintain storage capacity. Furthermore, a large media file also requires more resources and time to transmit and render. As such, not only must a user wait for a file to finish transferring, the user would also have to wait while the media is rendered on the receiving device. Oftentimes, a receiving party is only receiving media content to determine whether or not he or she wants a copy. In such cases, the transfer and processing times of large media files may be wasted if the receiving party determines that he or she does not want the media.
- For the foregoing reasons, a system and method for managing use of captured content is needed.
- Embodiments of the invention provide a method and system of controlling ownership and authorization of captured media content. With such a system and method, the subject of captured content would be empowered to authorize and control the ownership of the captured content. The capturing device may send a content authorization request to one or more subjects of the captured content. Each user would then be able to preview the photograph or other content and decide whether to authorize the capturing device to use the content. As such, a user that is the subject of captured content may exercise control over the use and existence of the captured content. If authorization is denied, the capturing device may automatically delete the content from storage. Alternatively, if authorization is granted, the capturing device may store the content and allow the content to be transmitted, printed or otherwise used by the user of the capturing device. Such a feature may also be enabled or disabled according to a capturing device user's preferences.
- In one aspect, a content capturing device may detect one or more devices having one or more predetermined characteristics (e.g., proximity of location) at the time a particular content was captured. A capturing device may determine such a list of devices from which to request authorization using wireless networking methods. In one example, the capturing device and other mobile devices in proximity to the capturing device may have BLUETOOTH wireless capabilities. Thus, the capturing device may detect and communicate with the other BLUETOOTH wireless devices within a wireless range. Alternatively, the capturing device may communicate with a wireless or cellular server that may determine a list of matching devices based on stored information that matches a set of received parameters.
- In another aspect of the invention, the captured content may contain metadata that includes a variety of information related to the captured content. Such metadata may include the time the content was captured, the duration of the content (i.e., video content), the size of the content and/or authorization information. For example, if a subject of captured content authorizes the use and storage of the captured content, such authorization may be embedded within the metadata of a content file storing the content. Such authorization information may be used to determine whether the content may be published or printed by a third party photograph printer.
- In yet another aspect of the invention, a subject of captured content may provide qualified authorization for the use of the captured content. For example, a subject of a photograph may determine that the photographer may print the photograph up to 10 times or that the photographer may only use the photograph in its digital format (i.e., no printing). Other restrictions may be implemented such as an expiration of use date and the like.
- In another aspect of the invention, users receiving captured content may preview the content file and the associated metadata through a representative token. The tokens may be of a limited size to ensure quick transfers and fast rendering times. The tokens may contain a sample of the captured content (e.g., thumbnail image, brief clip of a video) as well as some or all of the metadata associated with the content. This permits the user to make a quick decision as to whether or not he or she would like a copy of the content. If the user does want a copy, a complete version of the media may be requested using a request token and the media file may be subsequently transferred. Tokens may further be used in order to search for similar or identical content on a target device. For example, a user who wants to locate images similar to a picture of Buckingham Palace may send a query token containing various media data to one or more target devices. The target devices would then use the query token to determine if any of its media files are similar to the image associated with the query token. The representative tokens of captured content may be further be stored on a target device for later use. In one example, a user may view or browse a gallery of stored tokens and subsequently request the full content file corresponding to one of the tokens. Stored tokens may have a variety of other uses as well.
- These as well as other advantages and aspects of the invention are apparent and understood from the following detailed description of the invention, the attached claims, and the accompanying drawings.
- The present invention is illustrated by way of example and not limited in the accompanying figures in which like reference numerals indicate similar elements and in which:
-
FIG. 1 illustrates a block diagram of a communication network in which various systems and methods of the present invention may be implemented. -
FIG. 2A illustrates an side view of an exemplary operating environment in which a mobile content capture device implementing one or more systems and methods of the present invention may be used. -
FIG. 2B illustrates a top view of the exemplary operating environment ofFIG. 2A . -
FIG. 3A is a flow chart showing an exemplary method for controlling ownership of media content according to an illustrative embodiment of the present invention. -
FIG. 3B is a flow chart showing an exemplary method for detecting one or more authorization devices according to an illustrative embodiment of the present invention. -
FIG. 4A illustrates an operating environment in which one or more devices are outside a detection range of a capture device according to an illustrative embodiment of the present invention. -
FIG. 4B illustrates an operating environment in which one or more devices lack short range wireless detection capabilities according to an illustrative embodiment of the present invention. -
FIG. 5 is a flow chart showing an exemplary method for controlling ownership using a third-party device according to an illustrative embodiment of the present invention. -
FIG. 6 illustrates another exemplary method for controlling ownership of captured content according to an illustrative embodiment. -
FIG. 7 is a flow chart showing an exemplary method for controlling ownership in the environment described inFIG. 4A using a peer-to-peer network according to an illustrative embodiment of the present invention. -
FIGS. 8A & 8B illustrate preview and authorization request interfaces according to an illustrative embodiment of the present invention. -
FIGS. 9A & 9B are diagrams illustrating the process of querying one or more target devices according to an illustrative embodiment. - In the following description of the various embodiments, reference is made to the accompanying drawings, which form a part hereof, and in which is shown by way of illustration various embodiments in which the invention may be practiced. It is to be understood that other embodiments may be utilized and structural and functional modifications may be made without departing from the scope of the present invention.
-
FIG. 1 , describing one embodiment of the invention, illustrates a block diagram of a communication network in which various systems and methods of the present invention may be implemented. The communication network may include both wired and wireless components. Such wireless components may includemobile telecommunication devices 105, personal data assistants (PDAs) 110,digital cameras 115 and other wireless computing devices. The wired components may include anetwork server 130,network printing providers 135, personal computers (PCs) 125,multimedia telephones 120 and the like. The wireless and wired components may communicate through a variety of methods including acellular network 150 and/or awired computer network 155. For example, acellular telephone 105 may transmit data through a wirelesscellular network 150 to anetwork server 130. Thenetwork server 130 may then retransmit the data to a land-line telephone 120 through a line-basedtelephone network 155. Alternatively, thenetwork server 130 may forward the data to a Voice Over IP (VOIP) capable communications device through a computer network. The computer network may include wireless networks such as a wireless local area network (WLAN) or wired networks such as a Local Area Network (LAN). - The communication devices may further capture, store and transmit a variety of data types including audio, video and text. In one example, a
mobile telephone 105 may include a digital camera component. Thus, themobile telephone 105 may capture, store and transmit both audio and video data. Communication devices may transmit multimedia data using any of several protocols that are well known in the art. Examples of transmission protocols that support multimedia data include Internet Protocol (TCP/IP), BLUETOOTH, GSM, CDMA and the like. BLUETOOTH systems, in particular, may form a piconet of up to eight different BLUETOOTH-enabled wireless devices. A piconet allows a single master device to facilitate the communications between the other slave devices. One of skill in the art will appreciate that there exists a plethora of both wired and wireless transmission protocols that may be used in the systems and methods described herein. Furthermore, multimedia data that is initially sent using one protocol may be repacketized or recomposed to adapt to another network protocol. For example, acellular phone 105 may transmit a photo and accompanying audio to a PC located on an IP network using CDMA transmission methods. Upon reaching thenetwork server 130, theserver 130 may repacketize the multimedia data to conform the transmission packet architecture to that used by the destination device (i.e., IP). This process insures cross-network compatibility. -
FIGS. 2A & 2B , describing further embodiments of the invention, illustrate different view of an exemplary operating environment in which a mobile device implementing one or more systems and methods of the present invention may be used. A user carrying a mobile capture device such as, for example, amobile phone 210 with an integrated digital camera may use thedevice 210 in a variety of situations including on vacation, during a business trip or at a sporting event. Other forms of mobile capture devices may include portable audio recorders, video cameras and digital cameras. In the above example, the user can use themobile phone 210 to record media content such as video, audio, still images and the like. Often, the recordation of media content will contain the image or audio of one ormore subjects 215. In one particular example, a user may take a photograph of hissister 215 in front of a particularly memorable location (e.g., the Eiffel Tower) to commemorate the occasion. In such a situation, hissister 215 would be a subject of the captured media content (i.e., photograph). In other examples, the captured content may contain the image or audio of one or more additional subjects that may or may not be familiar with the content capturer. - Additionally, during the capturing stage, the
capture device 210 may record other information that relates to one or more characteristics of the recorded content. In one embodiment, the capture device may detect positional coordinates using, for example, a Global Positioning System (GPS). The stored content may thus include a latitude and longitude of where the image was taken. In addition, thecapture device 210 may also include one or more components that are able to determine anelevation 230 and/or anazimuth 225 of thecapture device 210 in relation to one or more reference points or axes at the time the content was captured. Theelevation 230 of thecapture device 210 may reflect an angular distance measured based on the horizon. For example, a gyroscopic unit ofcapture device 210 may measure theelevation 230 of thedevice 210 in relation to a “level” position defined by the earth's gravitational field. Other information that may be stored or associated with the captured content includes a capture size and a maximum capture distance. A maximum capture distance may be a preset range defined by the user, a default value or some other limitation (e.g., a maximum focus distance of a digital camera). Alternatively, the maximum capture distance may be defined by the distance to the farthest captured object, as determined by a range detection component such as a laser range finder. InFIGS. 2A & 2B , thephotograph 215 is confined to a rectangular capture area defined by avertical viewing size 245 and ahorizontal viewing size 240. The capturedcontent 215 may be stored with data specifying the corresponding vertical 245 and horizontal 240 dimensions. Other types of characteristic information may include a frequency range for audio content, color data for image content, a recordation period for video data, a zoom ratio for video or image content and a time stamp. One of skill in the art will appreciate that a multitude of other characteristic information may be stored instead of or in addition to the information described above. To facilitate the use and association of related data, the captured content may be stored in a structure that allows for the embedding of metadata. Using such a storage scheme, captureddevice 210 may detect various types of content data (e.g., positional information, location data and audio and video characteristics) and associate the information as metadata with the captured content. - In some circumstances, a subject 215 of captured content may wish to control the use and/or existence of his or her own captured image or voice. Thus, the subject 215 of the captured content may carry or use a
mobile device 220 capable of receiving and rendering data of one or more media types. Thecapture device 210 may automatically transmit the captured content either directly or indirectly to the subject'smobile device 220 for approval and authorization upon capturing the content. Direct methods include infrared transfers, BLUETOOTH networking methods and other proximity transfer technologies. Alternatively, thecapture device 210 may transmit the captured content indirectly via a cellular network, a wired network or other networks that use a third-party device to coordinate and facilitate the transfer. Such transfer methods, as they relate to aspects of the invention, will be described in further detail below. - Current methods of authorizing the use or storage of captured content by the subjects of the captured content require that the subjects manually request the content and approve it. As discussed previously, the ultimate decision of use and storage is left to the content capturer (i.e., user of the capture device).
FIG. 3A , describing one embodiment of the invention, is a flowchart showing an exemplary method for requesting authorization for captured content from one or more devices. Instep 305, the capturing device captures media content and determines one or more characteristics of the captured content or of the capturing device (e.g., longitude, latitude, zoom ratio, time stamp). The characteristics and other information may be stored as metadata and associated with the captured content in a content file. Once the content has been captured and the relevant information has been determined, the capture device may determine a list of one or more target devices that are within a predetermined range instep 310. This range may be defined by variety of factors such as the wireless detection range of the capture device or a maximum capture distance specified in the associated metadata. The performance ofsteps FIG. 3A and may be performed in interchangeable order (i.e., step 310 may be performed beforestep 305 and vice versa). - In
step 315, the capture device determines a second list of target devices from which to request authorization to use the captured media content. The second list of devices is selected based on whether a detected device has characteristics matching or similar to those of the content file. In one example, a capturing device takes a photograph at a first location in the direction of a stranger who is walking 40 feet away carrying a mobile device. In storing the photo, the capture device embeds metadata in the content file to indicate a capture range of 50 feet. The 50 foot capture range may reflect a focusing distance limitation or a wireless range limitation of the capture device. Since the stranger is within the capture range, the capturing device may add the target device (i.e., the stranger's mobile device) to the list of devices from which to request authorization. The capturing device may use different or additional characteristics to further determine authorizing devices. In another example, the capture device may compare the time at which a target device was at a given location with the time stamp of the media content captured by the capturing device. - In one embodiment, the capture device may, in
step 315, determine an authorization list based on proximity of target devices.FIG. 3B , describing one embodiment of the invention, illustrates a flowchart of an exemplary method for detecting and determining a list of target devices that are within a predetermined proximity to the capturing device at the time of content capture.FIG. 3B is meant to illustratestep 315 in additional detail according to an illustrative embodiment. As described, the capturing device embeds metadata comprising information associated with the captured content in a content file. Instep 360, the capturing device transmits the metadata to the list of target devices determined according tostep 310. The target devices may then evaluate the received metadata to determine if the information matches their own stored data instep 365. A target mobile device may periodically detect and record a variety of information including device location, altitude, time and combinations thereof in memory for this purpose. If a target device's data matches the metadata received from the capturing device, the capture device may receive a positive response including a request for the media content file from the target device insteps 370. In one example, metadata transmitted from the capturing device may include a set of coordinates and a timestamp. The receiving target device may retrieve its past location data by searching for a timestamp in temporal proximity to the timestamp of the received metadata. Additionally, the metadata may include angles (e.g., elevation) and measurements that represent a direction of the captured content (i.e., relative to the captured device). A target device may determine whether it was within the specified angles and distance of the capture device and respond accordingly. Such a process may involve using geometric calculations to determine if a target device's latitude, longitude and elevation fall within a capture area of a capture device having a specified latitude, longitude, elevation and direction. Instep 375, the capturing device may add any target device that responds affirmatively to the list of devices from which authorization is to be requested. This step is performed automatically by the capturing device upon receiving an affirmative response from a target device. A user may, instead, manually control and determine whether to send an authorization request to one or more target devices that provide an affirmative response. However, if a target device either does not respond or responds in the negative, the capturing device may ignore the device or eliminate it from the authorization list instep 380. - Returning to
FIG. 3A , once the capture device determines a list of authorizing devices, the capture device subsequently transmits the captured content file and an authorization request to each of the one or more authorizing devices instep 320. The capturing device then awaits a response instep 325 to the authorization request while each of the authorizing devices receives and renders the captured content. An authorizing device may respond with a variety of options including authorize, refuse authorization, delete the content file or provide qualified authorization. Upon receiving a response to the authorization request, a capture device may determine whether authorization was granted or denied instep 330. If the capture device receives a response granting authorization, the capture device may embed such authorization in the content file instep 335. Alternatively, if the capture device receives, as instep 340, a delete response, the content file may be automatically deleted from the capture device instep 345. In one variation, the response may allow restricted authorization of the content file. In other words, a user may use the content subject to certain restrictions specified by a user of an authorizing device. Such restrictions may include a time restriction, a purpose restriction, a payment requirement, a frequency of use restriction and/or combinations thereof. The capture device may embed the restrictive parameters in the content file, as illustrated instep 335. The content file transmitted to the authorizing device may either be kept for future use or automatically deleted once a response is sent. Such a determination may be made in accordance with user preferences or other considerations. - In an alternate embodiment, the capture device may initially transmit the entire content file (including the captured content and associated metadata) along with the authorization request to one or more target devices regardless of whether they are authorizing devices. Using such a method, a target device may immediately render the captured content upon determining that it is an authorizing device without having to separately request the content file from the capture device. Similarly, the target device may view and respond to the authorization request without having to initiate additional transmissions or communications to receive the authorization request. Those devices that find the content file to be irrelevant may simply ignore the authorization request and delete the content file.
-
FIGS. 4A & 4B , describing further embodiments of the invention, illustrate operating environments in which one ormore devices 430 are outside a detection range of acapture device 410 according to an illustrative embodiment of the present invention. InFIG. 4A , thewireless detection range 415 of thecapture device 410 may be smaller than acontent capture range 420 of thecapturing device 410. In other words, thecapturing device 410 may be able to capture a subject (i.e., a target) 425 at a greater distance than thedevice 410 is able to detect wirelessly. Wireless technologies such as BLUETOOTH and WLAN have detection ranges that are limited by a variety of factors including both power capacity and antenna capabilities and device class. Thus, aforeign device 430 of a subject 425 captured by thecapturing device 410 may be outside therelevant wireless range 415. However, a third-party device 435 within thewireless range 415 ofcapture device 410 and the subject'sdevice 430 may act as a link between the subject'sdevice 430 and thecapture device 410. In one implementation using BLUETOOTH transmission standards, thecapture device 410, the third-party device 435 and the subject'sdevice 430 may form a piconet. The third-party device 435 may act as the master device for facilitating communications between two or more slave devices (i.e., the subject'sdevice 430 and the capture device 410). - In an alternative scenario,
FIG. 4B depicts a system that includes acapture device 410 and asubject device 430 where either both or one of thedevices 410 & 430 do not have proximity-based wireless capabilities. However, thedevices 410 & 430 may be connected to acommunication network 435 and have the ability to transmit and receive data via anetwork server 440. The network server may consist of a variety of components including a PC and/or a smartphone running an mApache server. Thus, even if thecapture device 410 includes peer-to-peer wireless components and the target device (i.e., subject's device) 430 does not, it may still detect thetarget device 430 using thenetwork server 435 as a communication conduit. In one embodiment, thenetwork server 440 may store data corresponding to each of thedevices 410 & 430 using thenetwork 435 and/ornetwork server 440. For example, thetarget device 430 may detect its own location and a timestamp at a predefined interval. Thetarget device 430 may then forward this data to thenetwork server 440 for storage in order to reduce its own memory load. Alternatively, thenetwork server 440 may periodically request and store updated data from thedevices 410 & 430. -
FIG. 5 , describing one embodiment of the invention, is a flow chart showing an exemplary method for exercising ownership control through a third-party device according to an illustrative embodiment. Such a method could be used in an operating environment such as the one described inFIG. 4B to overcome device detection obstacles. The third-party device (e.g., network server) acts as a communications conduit between a capture device and a target device allowing the capture device to determine whether authorization is necessary from the target device. - A network server (i.e., a third-party device) initially sits in a listening mode, waiting for a transmission packet from a capturing device in
step 505. The transmission packet received from the capturing device may contain captured content, an authorization request and metadata to reduce the number of transmissions. As described with respect toFIG. 3B , the metadata, content file and authorization request may be sent separately or in various combinations as they are requested by the network server or target device. The metadata may include a variety of content or device information such as location, altitude, azimuth, elevation, zoom ratio and/or combinations thereof. The authorization request may be a uniform message constructed to request authorization from one or more target devices. Instep 510, the network server may acquire device information from one or more target devices known to the network server. The network server may acquire a target device's information in numerous ways including requesting the information from the target device or listening for periodic updates transmitted independently by the target device. The target device, in turn, may detect its own characteristics (e.g., location, timestamp, altitude) at periodic intervals as described previously. Alternatively, the target device may only determine its characteristics upon receiving a request by the network server or another device. Instep 515, the network server compares the received device information with the metadata of the content file to determine whether one or more target devices match the data associated with the captured content. A “match” may be defined by a predetermined threshold value. The threshold value may be a percentage of characteristics matching or some other measuring rubric. The various characteristics and device information may be weighted to provide greater importance to some factors and less importance to others. The network server may optionally provide the list of matching devices to the capturing device. The step of determining a list of authorizing devices may also be performed at the target device, as described inFIG. 3B , by transmitting at least the metadata to the target device for evaluation. The network server may compose a list based upon the positive and negative responses from the target devices. - Returning to
FIG. 5 , upon determining the list of one or more target devices having matching characteristics, the network server then distributes the content file as well as the authorization request to the one of more devices instep 520. The content file is transmitted so that the target device may render the image, video or audio and for a user of the target device to determine whether to grant or deny authorization. In one or more embodiments, the network server may transfer a thumbnail or otherwise reduced media file instead of the full media file. This may reduce the transfer and authorization time of especially large media files such as videos and high-quality images. Instep 525, the network server listens for and receives authorization responses from the one or more target devices. The authorization responses may be transmitted from the one or more target devices in response to a user's manual determination or automatically by the target device. An automatic authorization response may be generated by a rule stored on the target device. For example, a rule may instruct the target device to deny any authorization requests to which a user has not manually responded in a predetermine amount of time. The authorization responses may be directly retransmitted to the capture device instep 530. In one embodiment, the network server may send the one or more received authentication responses to the capture device at predefined intervals. The network server may also send the one or more authentication responses once all of the target devices have responded. Silence from a particular device may indicate a default response of either granting or denying authorization. Alternatively, silence may provide authorization to the capturing device for a predetermined amount of time before authorization must be requested again. - In
step 535, the network server may further embed the one or more authentication responses in the content file and transmit the content file back to the capturing device. In one variation, the server may instruct the capture device to embed the responses in the content file itself. If the server embeds the authentication data, the server may instruct the capture device to replace any other versions of the content file with the one transmitted by the server. On the other hand, if the capturing device embeds the authentication data, the server may request confirmation that the content file was, in fact, updated. -
FIG. 6 , describing one embodiment of the invention, illustrates another exemplary method for controlling ownership of captured content according to an illustrative embodiment. Instep 605 ofFIG. 6 , a target device may check if the network server is storing any content files that require authorization. Thus, the network server might not initiate any comparison or determination of authorizing devices until requested to do so by a target device. If the network server determines that it is storing a content file requiring authorization, the target device may send its information to the network server to determine if the target device should be an authorizing device insteps 607 & 610. Such a determination may be made instep 613 using methods described previously, including matching metadata in the content file with target device information. In response to a positive determination, the content file and an authorization request are transmitted to the target device for rendering and authorization instep 615. A user of the target device may then decide whether to authorize the capture device's use of the content file and respond accordingly instep 620. In one example, a user of the target device may decide that the picture is too blurry and issue a delete command to the network server. The network server would then instruct the capture device to delete the content file and, optionally, request confirmation. -
FIG. 7 , describing one embodiment of the invention, is a flow chart showing yet another exemplary method for controlling ownership in the environment. InFIG. 7 , the method allows for the authorization of content by devices in a peer-to-peer network environment as described inFIG. 4 . In other words, a capture device and a target device are not within the wireless detection ranges of one another. In such an instance, an intermediary device in the peer-to-peer network may be used to facilitate authorization requests and responses between the capture device and the target device, respectively. - In
step 710, the capture device may transmit a content file to the intermediate device along with an authorization request. Since the capture device is unable to communicate with the target device due to wireless range limitations, the capture device may request that the intermediary device convey the authorization request to the target device. More particularly, the intermediate device may act as a proxy for the capture device and detect one or more target devices that have matching characteristics. Instep 715, the intermediate device detects one or more target devices that have characteristics matching those embedded in the content file. The intermediate device then transmits the content file (or a representative portion thereof) and the authorization request to one or more matching target devices instep 720. As with the previous methods described herein, the user of the target device may then determine whether to provide authorization for the content to the capture device. Upon receiving an authorization response from the target authorizing device instep 723, the intermediate device subsequently communicates the response to the capture device instep 725. Alternatively, the intermediate device may modify the authorization data of the content file and transmit the content file back to the capture device along with the authorization response. -
FIGS. 8A & 8B , describing further embodiments of the invention, illustrate a preview and authorization request interface according to an illustrative embodiment of the present invention.FIG. 8A illustrates a preview pane in which a user of a target authorizing device may render and view the capturedcontent 825. The user interface may include resizing features, brightness/darkness adjusters and other image modification options. The user interface may further display atimestamp 820,location information 810 and the like along with theimage 825. The source (not shown) of the captured content may also be identified. Additionally, the user may be presented with anoption 815 to view authorization options or to respond to the authorization request. InFIG. 8B , an authorization response screen is illustrated with a menu of possible responses. For example, a user could request that the content file be deleted or specify that the file may not be printed. Anoption 830 on the menu may further allow the user to switch to the preview pane illustrated inFIG. 8A . - In one or more alternative embodiments, the content authorization methods and systems described herein may further implement tokens to facilitate the transmission and sharing of media content. For example, an authorization request or a response thereto may be transmitted in the form of one or more tokens. Tokens are generally small data structures representing media content that include metadata related to the media content or a device owner. The metadata may include information related to a time and place of creation, contact information of the device owner, a content type and the like. The metadata of a token may further provide information corresponding to the people or devices that were in proximity to the capturing device at the time of content capture. Additionally, the token may include a representative portion of the media content to provide a receiving user a preview of the content. For example, if the captured media was a digital image, the token may include a thumbnail of the digital image. In another example, a representative clip of video content may be included in a token instead of the entire video. Tokens may be transmitted using methods similar to those previously described. In addition, a token may be downloaded or distributed to foreign mobile devices through a personal web page or a web server or any type of network medium.
- Thus, rather than transmitting the entire content file to a target device for preview and authorization, a capture device may send just a token to increase transfer speed and improve rendering time. In one alternative embodiment, a target device user may request a copy of the full content file from the capture device using a request token. The request token may contain sufficient information for the capture device to identify the requested content file. For example, a thumbnail or video clip might not be included in a request token since the capture device already has the full content file. A capture device, upon receiving a request token, may locate the content file corresponding to the provided identification information and transmit the file to the target device. A capture device may, on the other hand, request information from the requesting device in return for the content file. The requested information may include the identity of the requesting device user and/or similar content. As such, the token system may be used as a way to trade information or media content by enticing users through the use of tokens.
- A target device user may further search for additional images or media content that is similar to content currently stored on the target device. The currently stored content may have been captured by the target device, provided in a received token or derived from a received content file.
FIG. 9A , describing one embodiment of the invention, illustrates a diagram of using query tokens to retrieve matching content from one or more target devices. To conduct a search for similar or identical content, the request device may issue aquery token 900 to one or more receiving devices using various transmission techniques. In one example, the one or more receiving devices are determined based on a proximity to the requesting device at the time of content capture. Thequery token 900 may further include information or parameters for the search including a keyword (e.g., “Lambretta”), time of capture, a location (e.g., “Italy”) and a content type. Each of the receiving devices may then conduct a search on their local content databases to determine whether they have any content matching the specified parameters. If the receiving device finds one or more matches, the receiving device may then issue one or more query hittokens 905 identifying the matching content. As discussed previously, a request device may issue a request token for any of the content identified by the query hittokens 905. In response to the request token, the original content files 910 may be downloaded from the corresponding target device. In addition, tokens may also contain a variety of fields and parameters such as a popularity indicator that may be increased with each request for the corresponding content file. The tokens may further include logs that provide information regarding times of access, request and/or modification. -
FIG. 9B , describing one embodiment of the invention, is another diagram illustrating query token usage between multiple device users.Mobile device 920 of user ‘Betsy’ may initially render an image of a location in Italy as well as provide the metadata information (i.e., place, people and time). Themobile device 920 may identify the people (i.e., Liza, Jason and Bob) in the picture based on proximity detection and device identification as discussed previously. Betsy may decide that her image is not sufficiently clear and request matching images from other users. In one embodiment, Betsy may choose from a list of people that thedevice 920 has detected as being in proximity at the time the picture was taken. Betsy may then select one or more of the people from which to request matching images.Query tokens 925 are then transmitted to each of thedevices 930 of the selected people.Devices 930 may then evaluate the metadata and/or content data to determine whether they are storing matching images. If one or more of thedevices 930 are storing a matching image, a query hit token may be returned as described inFIG. 9A . - In addition a device user may occasionally decide to modify, add or delete content from a content database stored on the device. In such instances, the tokens transmitted to other devices corresponding to the content may require modification or updating (e.g. the tokens may include requests for other device and user). For example, originally transmitted tokens may contain identification information allowing a receiving device to request the full content file from a transmitting device based on the identification data. Thus, if the name of a content file has changed, the original token may need to be updated to reflect the name change. As such, a transmitting device (i.e., the device storing the modified or deleted content file) may issue an update token or removal token for a particular content file if that content file has been modified or deleted, respectively. An update token may either provide new information to replace old information in the original token or, the update token may simply replace the original token entirely. A removal token, on the other hand, may instruct a receiving device to delete the original token from the receiving device's database. Alternatively, a token may be assigned an expiration time. At the expiration time, the token must be updated or be deleted from the database.
- In other instances, a token may contain a constant unique identifier associated with a content file. Thus, even if the path of a content file were to change on the transmitting device, the unique identifier of the content file would remain the same. The tokens on a receiving device would not need to be updated since the unique identifier may still be used to request the corresponding content. The unique identifier may constitute a randomly assigned alphanumeric code, a generated identification number or a unique name. The unique identifier may also be evaluated as a hash value calculated based on the corresponding content.
- In further instances, a token may contain an application or an applet that is needed for rendering the media content, and/or to execute the requests that token includes. Upon receiving such a token, a target device may automatically launch the application to render or otherwise process the media content. In other instances, a user of a target device may be given the option of launching the embedded application or applet or executing a pre-existing application. Additionally, tokens may be stored for later use on a target device. For example, a user may wish to collect tokens of captured content for later viewing or browsing. At such a later time, the user may request the full content file corresponding to one or more of the stored tokens. Numerous other uses of stored tokens may also be implemented in the systems and methods described.
- Each of the methods and systems for requesting authorization to control and use captured content may further implement an expiration time or distance feature. In one example, a capturing device may continuously search for target devices from which to request authorization as long as it is within a certain distance of the capturing location. Alternatively, the capturing device may continue the search until a predetermined time is reached. Other parameters may also be used to limit the duration of a capturing device's search for authorizing devices including a limit to the number of authorizing devices. In addition, a user of a capture device or of a target device may enable or disable the authorization features described herein. Thus, a user would not be forced to delete a content file if the user does not so desire.
- The methods and features recited herein may further be implemented through any number of computer readable mediums that are able to store computer readable instructions. Examples of computer readable mediums that may be used include RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, DVD or other optical disk storage, magnetic cassettes, magnetic tape, magnetic storage and the like.
- The present invention has been described in terms of preferred and exemplary embodiments thereof. Numerous other embodiments, modifications and variations within the scope and spirit of the appended claims will occur to persons of ordinary skill in the art from a review of this disclosure.
Claims (21)
1-38. (canceled)
39. A method comprising:
determining to store at least one of metadata of media content and the media content captured by a capture device; and
determining whether a user of at least one device is captured in the media content due proximity to the capture device when the media content is captured based at least in part on a location characteristic of the at least one device.
40. A method of claim 39 , further comprising:
determining to transmit a request for an authorization for using the media content to the at least one device, when the user is determined to be captured in the media content.
41. A method of claim 40 , further comprising:
receiving a response to the request for the authorization from the at least one device.
42. A method of claim 39 , wherein the metadata includes location information of the capture device, the method further comprising:
comparing the location characteristic of the at least one device with the metadata to determine whether the user is captured in the media content.
43. A method of claim 42 , further comprising:
evaluating additional metadata of the of media content for use in the determination of whether the user is captured in the media content,
wherein the additional metadata includes at least one of a maximum capture distance of the capture device, a pointing angle of the capture device, a pointing direction of the capture device, global positioning system (GPS) coordinates of the capture device, a frequency range of the media content, a zoom ratio of the media content, a time stamp of the media content, or a combination thereof.
44. A method of claim 39 , further comprising:
determining to transmit the metadata to the at least one device; and
receiving a response from the at least one device indicating whether the user is captured in the media content.
45. A method of claim 39 , further comprising:
selectively determining to transmit a request for media content that resembles the media content to the at least one device when the user is determined to be captured in the media content.
46. A method of claim 39 , wherein either the capture device, the at least one device, or both devices are mobile.
47. A method of claim 39 , wherein the method is implemented by the capture device or an intermediate device.
48. A method of claim 47 , wherein the intermediate device is a server.
49. A method of claim 47 , further comprising:
determining to transmit a request for an authorization for using the media content from the capture device to the intermediate device if the user is determined to be in the media content.
50. A method of claim 49 , further comprising:
determining to transmit the request for the authorization from the intermediate device to the at least one device;
receiving a response to the request for the authorization from the at least one device at the intermediate device; and
determining to transmit the response from the intermediate device to the capture device.
51. A method comprising:
receiving metadata of media content and a request for an authorization for using the media content captured by a capture device at another device; and
determining, at the other device, whether a user of the other device is captured in the media content due to proximity to the capture device when the media content is captured based at least in part on a location characteristic of the other device.
52. A method of claim 51 , further comprising:
determining to transmit a response to the request for the authorization from the other device to the capturing device.
53. A method of claim 51 , further comprising:
comparing the location characteristic of the other device with the metadata to determine whether the user of the other device is captured in the media content, wherein the metadata includes location information of the capture device when the media content is captured.
54. An apparatus comprising:
at least one processor; and
at least one memory including computer program code for one or more programs,
the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following,
determine to store at least one of metadata of media content and the media content captured by the apparatus; and
determine whether a user of at least one device is captured in the media content due proximity to the apparatus when the media content is captured based at least in part on a location characteristic of the at least one device.
55. An apparatus of claim 54 , wherein the apparatus is further caused to:
determine to transmit a request for an authorization for using the media content to the at least one device, when the user is determined to be captured in the media content.
56. An apparatus of claim 55 , wherein the apparatus is further caused to:
receive a response to the request for the authorization from the at least one device.
57. An apparatus comprising:
at least one processor; and
at least one memory including computer program code for one or more programs,
the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following,
receive metadata of media content and a request for an authorization for using the media content captured by a capture device; and
determine whether a user of the apparatus is captured in the media content due to proximity to the capture device when the media content is captured based at least in part on a location characteristic of the apparatus.
58. An apparatus of claim 57 , wherein the apparatus is further caused to:
compare the location characteristic of the apparatus with the metadata to determine whether the user of the apparatus is captured in the media content, wherein the metadata includes location information of the capture device when the media content is captured.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/839,017 US20100287611A1 (en) | 2006-01-06 | 2010-07-19 | System and method for managing captured content |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/275,470 US7797740B2 (en) | 2006-01-06 | 2006-01-06 | System and method for managing captured content |
US12/839,017 US20100287611A1 (en) | 2006-01-06 | 2010-07-19 | System and method for managing captured content |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/275,470 Continuation US7797740B2 (en) | 2006-01-06 | 2006-01-06 | System and method for managing captured content |
Publications (1)
Publication Number | Publication Date |
---|---|
US20100287611A1 true US20100287611A1 (en) | 2010-11-11 |
Family
ID=38228590
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/275,470 Expired - Fee Related US7797740B2 (en) | 2006-01-06 | 2006-01-06 | System and method for managing captured content |
US12/839,017 Abandoned US20100287611A1 (en) | 2006-01-06 | 2010-07-19 | System and method for managing captured content |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/275,470 Expired - Fee Related US7797740B2 (en) | 2006-01-06 | 2006-01-06 | System and method for managing captured content |
Country Status (4)
Country | Link |
---|---|
US (2) | US7797740B2 (en) |
EP (1) | EP1969827A4 (en) |
JP (1) | JP4956553B2 (en) |
WO (1) | WO2007077521A2 (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130018867A1 (en) * | 2011-07-14 | 2013-01-17 | Nuance Communications, Inc. | Methods and apparatus for initiating an action |
US20140181105A1 (en) * | 2012-12-22 | 2014-06-26 | Continental Automotive Systems, Inc. | Vehicle point and select |
US9124730B2 (en) | 2011-12-16 | 2015-09-01 | Empire Technology Development Llc | Automatic privacy management for image sharing networks |
US9438606B1 (en) * | 2015-03-23 | 2016-09-06 | International Business Machines Corporation | Environmental-based location monitoring |
US20180007149A1 (en) * | 2015-01-05 | 2018-01-04 | Picpocket, Inc. | Use of a dynamic geofence to control media sharing and aggregation associated with a mobile target |
US10148748B2 (en) | 2015-02-26 | 2018-12-04 | Microsoft Technology Licensing, Llc | Co-locating peer devices for peer matching |
US10146925B1 (en) | 2017-05-19 | 2018-12-04 | Knowledge Initiatives LLC | Multi-person authentication and validation controls for image sharing |
US10270849B2 (en) | 2015-02-26 | 2019-04-23 | Microsoft Technology Licensing, Llc | Scalable peer matching |
US10327034B2 (en) | 2014-03-27 | 2019-06-18 | Tvu Networks Corporation | Methods, apparatus and systems for exchange of video content |
US10541999B1 (en) | 2017-05-19 | 2020-01-21 | Knowledge Initiatives LLC | Multi-person authentication and validation controls for image sharing |
US10609097B2 (en) | 2014-03-27 | 2020-03-31 | Tvu Networks Corporation | Methods, apparatus, and systems for instantly sharing video content on social media |
US20200106779A1 (en) * | 2018-10-02 | 2020-04-02 | Ca, Inc. | Peer authentication by source devices |
US10771763B2 (en) | 2018-11-27 | 2020-09-08 | At&T Intellectual Property I, L.P. | Volumetric video-based augmentation with user-generated content |
Families Citing this family (77)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4759574B2 (en) | 2004-12-23 | 2011-08-31 | ソレラ ネットワークス インコーポレイテッド | Method and apparatus for network packet capture distributed storage system |
US7797740B2 (en) * | 2006-01-06 | 2010-09-14 | Nokia Corporation | System and method for managing captured content |
US20070198632A1 (en) * | 2006-02-03 | 2007-08-23 | Microsoft Corporation | Transferring multimedia from a connected capture device |
US7844661B2 (en) * | 2006-06-15 | 2010-11-30 | Microsoft Corporation | Composition of local media playback with remotely generated user interface |
US8793303B2 (en) * | 2006-06-29 | 2014-07-29 | Microsoft Corporation | Composition of local user interface with remotely generated user interface and media |
US20120170412A1 (en) * | 2006-10-04 | 2012-07-05 | Calhoun Robert B | Systems and methods including audio download and/or noise incident identification features |
US20080109404A1 (en) * | 2006-11-03 | 2008-05-08 | Sony Ericsson Mobile Communications Ab | Location dependent music search |
US7908292B2 (en) * | 2006-12-05 | 2011-03-15 | Nokia Corporation | Metadata broker |
US20080182591A1 (en) * | 2006-12-13 | 2008-07-31 | Synthesis Studios, Inc. | Mobile Proximity-Based Notifications |
US8914897B2 (en) * | 2007-05-23 | 2014-12-16 | International Business Machines Corporation | Controlling access to digital images based on device proximity |
US9129307B2 (en) * | 2007-05-23 | 2015-09-08 | International Business Machines Corporation | Fee-based distribution of media based on device proximity |
US8027954B2 (en) * | 2007-05-31 | 2011-09-27 | Red Hat, Inc. | Portable media player recommendation system |
US7987140B2 (en) | 2008-02-26 | 2011-07-26 | International Business Machines Corporation | Digital rights management of captured content based on criteria regulating a combination of elements |
US8095991B2 (en) | 2008-02-26 | 2012-01-10 | International Business Machines Corporation | Digital rights management of streaming captured content based on criteria regulating a sequence of elements |
US8185959B2 (en) | 2008-02-26 | 2012-05-22 | International Business Machines Corporation | Digital rights management of captured content based on capture associated locations |
US8625642B2 (en) | 2008-05-23 | 2014-01-07 | Solera Networks, Inc. | Method and apparatus of network artifact indentification and extraction |
US8521732B2 (en) | 2008-05-23 | 2013-08-27 | Solera Networks, Inc. | Presentation of an extracted artifact based on an indexing technique |
US8433895B1 (en) * | 2008-05-30 | 2013-04-30 | Symantec Corporation | Methods and systems for securely managing multimedia data captured by mobile computing devices |
US8213925B2 (en) * | 2008-07-01 | 2012-07-03 | Hewlett-Packard Development Company, L.P. | Processing messages from a mobile computing device for diagnosis or service selection |
US20100026816A1 (en) * | 2008-07-30 | 2010-02-04 | Jonathan Bergstrom | Wireless data capture and sharing system, such as image capture and sharing of digital camera images via a wireless cellular network |
US20100029326A1 (en) * | 2008-07-30 | 2010-02-04 | Jonathan Bergstrom | Wireless data capture and sharing system, such as image capture and sharing of digital camera images via a wireless cellular network and related tagging of images |
US8385971B2 (en) * | 2008-08-19 | 2013-02-26 | Digimarc Corporation | Methods and systems for content processing |
EP2313847A4 (en) * | 2008-08-19 | 2015-12-09 | Digimarc Corp | Methods and systems for content processing |
US8805110B2 (en) * | 2008-08-19 | 2014-08-12 | Digimarc Corporation | Methods and systems for content processing |
US9158897B2 (en) | 2008-11-15 | 2015-10-13 | Adobe Systems Incorporated | Methods and systems for distributing right-protected asset |
US9456007B2 (en) * | 2008-11-15 | 2016-09-27 | Adobe Systems Incorporated | Session aware notifications |
US9002486B1 (en) * | 2009-04-14 | 2015-04-07 | Smith Micro Software, Inc. | Audio systems and methods |
US8392957B2 (en) * | 2009-05-01 | 2013-03-05 | T-Mobile Usa, Inc. | Automatic content tagging, such as tagging digital images via a wireless cellular network using metadata and facial recognition |
US9866609B2 (en) * | 2009-06-08 | 2018-01-09 | Time Warner Cable Enterprises Llc | Methods and apparatus for premises content distribution |
US8478820B2 (en) * | 2009-08-26 | 2013-07-02 | Qualcomm Incorporated | Methods and systems for service discovery management in peer-to-peer networks |
US8190607B2 (en) * | 2009-09-11 | 2012-05-29 | Sony Ericsson Mobile Communications Ab | Method for tagging media content, portable electronic device, and computer program |
US8121618B2 (en) | 2009-10-28 | 2012-02-21 | Digimarc Corporation | Intuitive computing methods and systems |
US20110289537A1 (en) * | 2010-05-24 | 2011-11-24 | Joe Buehl | Temporary authorization for a user device to remotely access a video on-demand service |
US9326116B2 (en) | 2010-08-24 | 2016-04-26 | Rhonda Enterprises, Llc | Systems and methods for suggesting a pause position within electronic text |
US9135664B2 (en) | 2010-10-29 | 2015-09-15 | Nokia Corporation | Method and apparatus for granting rights for content on a network service |
US8579198B2 (en) * | 2010-12-01 | 2013-11-12 | Symbol Technologies, Inc. | Enhanced laser barcode scanning |
US8849991B2 (en) | 2010-12-15 | 2014-09-30 | Blue Coat Systems, Inc. | System and method for hypertext transfer protocol layered reconstruction |
US8677503B2 (en) | 2011-01-04 | 2014-03-18 | Motorola Mobility Llc | Mechanism for embedding device identification information into graphical user interface objects |
US8721337B2 (en) | 2011-03-08 | 2014-05-13 | Bank Of America Corporation | Real-time video image analysis for providing virtual landscaping |
US8922657B2 (en) | 2011-03-08 | 2014-12-30 | Bank Of America Corporation | Real-time video image analysis for providing security |
US9773285B2 (en) | 2011-03-08 | 2017-09-26 | Bank Of America Corporation | Providing data associated with relationships between individuals and images |
US9317860B2 (en) | 2011-03-08 | 2016-04-19 | Bank Of America Corporation | Collective network of augmented reality users |
US8873807B2 (en) | 2011-03-08 | 2014-10-28 | Bank Of America Corporation | Vehicle recognition |
US9224166B2 (en) | 2011-03-08 | 2015-12-29 | Bank Of America Corporation | Retrieving product information from embedded sensors via mobile device video analysis |
US9317835B2 (en) | 2011-03-08 | 2016-04-19 | Bank Of America Corporation | Populating budgets and/or wish lists using real-time video image analysis |
US8718612B2 (en) | 2011-03-08 | 2014-05-06 | Bank Of American Corporation | Real-time analysis involving real estate listings |
US20120233003A1 (en) * | 2011-03-08 | 2012-09-13 | Bank Of America Corporation | Providing retail shopping assistance |
US8666985B2 (en) | 2011-03-16 | 2014-03-04 | Solera Networks, Inc. | Hardware accelerated application-based pattern matching for real time classification and recording of network traffic |
US9146909B2 (en) * | 2011-07-27 | 2015-09-29 | Qualcomm Incorporated | Web browsing enhanced by cloud computing |
US20130188922A1 (en) * | 2012-01-23 | 2013-07-25 | Research In Motion Limited | Multimedia File Support for Media Capture Device Position and Location Timed Metadata |
US9311640B2 (en) | 2014-02-11 | 2016-04-12 | Digimarc Corporation | Methods and arrangements for smartphone payments and transactions |
US20140259182A1 (en) * | 2013-03-06 | 2014-09-11 | Sony Dadc Us Inc. | System and method for managing media content |
US9148489B2 (en) | 2013-03-11 | 2015-09-29 | Qualcomm Incorporated | Exchanging a contact profile between client devices during a communication session |
US20140280706A1 (en) * | 2013-03-14 | 2014-09-18 | Qualcomm Incorporated | System and method for prioritizing file transfer |
US9622275B2 (en) | 2013-03-15 | 2017-04-11 | Qualcomm Incorporated | System and method for allowing multiple devices to communicate in a network |
JP2015032934A (en) * | 2013-08-01 | 2015-02-16 | ソニー株式会社 | Control device, control method, transmission terminal, transmission method, reception terminal, reception method, and control system |
US20150111601A1 (en) * | 2013-10-18 | 2015-04-23 | Logos Technologies, Llc | Systems and methods for displaying distant images at mobile computing devices |
KR101561628B1 (en) * | 2013-12-30 | 2015-10-20 | 주식회사 케이티 | Search apparatus for providing realtime display information of smart glass and method thereof |
EP3105897A1 (en) * | 2014-02-14 | 2016-12-21 | Telefonaktiebolaget LM Ericsson (publ) | Methods and nodes supporting lawful intercept |
US20160014176A1 (en) * | 2014-07-09 | 2016-01-14 | Liveu Ltd. | System and method for content solicitation |
US9430673B1 (en) | 2014-12-30 | 2016-08-30 | Emc Corporation | Subject notification and consent for captured images |
JP6067041B2 (en) * | 2015-02-18 | 2017-01-25 | エンパイア テクノロジー ディベロップメント エルエルシー | Automatic privacy management for image sharing networks |
US10757216B1 (en) | 2015-02-20 | 2020-08-25 | Amazon Technologies, Inc. | Group profiles for group item recommendations |
US11363460B1 (en) * | 2015-03-03 | 2022-06-14 | Amazon Technologies, Inc. | Device-based identification for automated user detection |
US10102881B2 (en) * | 2015-04-24 | 2018-10-16 | Wowza Media Systems, LLC | Systems and methods of thumbnail generation |
US10433196B2 (en) | 2016-06-08 | 2019-10-01 | Bank Of America Corporation | System for tracking resource allocation/usage |
US10291487B2 (en) | 2016-06-08 | 2019-05-14 | Bank Of America Corporation | System for predictive acquisition and use of resources |
US10581988B2 (en) | 2016-06-08 | 2020-03-03 | Bank Of America Corporation | System for predictive use of resources |
US10129126B2 (en) | 2016-06-08 | 2018-11-13 | Bank Of America Corporation | System for predictive usage of resources |
US10178101B2 (en) | 2016-06-08 | 2019-01-08 | Bank Of America Corporation | System for creation of alternative path to resource acquisition |
CA2975517C (en) * | 2016-09-06 | 2022-06-14 | Legic Identsystems Ag | Method and devices for transmitting a secured data package to a communication device |
US11064453B2 (en) * | 2016-11-18 | 2021-07-13 | Nokia Technologies Oy | Position stream session negotiation for spatial audio applications |
US11889138B2 (en) * | 2017-05-02 | 2024-01-30 | Hanwha Techwin Co., Ltd. | Systems, servers and methods of remotely providing media to a user terminal and managing information associated with the media |
CN110753347B (en) * | 2019-09-11 | 2024-01-12 | 上海二三四五网络科技有限公司 | Control method and control device for silence authorization |
US11188760B2 (en) * | 2019-12-10 | 2021-11-30 | Medal B.V. | Method and system for gaming segment generation in a mobile computing platform |
US20220038795A1 (en) * | 2019-12-10 | 2022-02-03 | Medal B.V. | Capturing content in a mobile computing platform |
US11997486B2 (en) * | 2019-12-20 | 2024-05-28 | Lenovo (Singapore) Pte. Ltd | Method and system of providing WiFi credentials through remote invitations |
Citations (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5659732A (en) * | 1995-05-17 | 1997-08-19 | Infoseek Corporation | Document retrieval over networks wherein ranking and relevance scores are computed at the client for multiple database documents |
US5748954A (en) * | 1995-06-05 | 1998-05-05 | Carnegie Mellon University | Method for searching a queued and ranked constructed catalog of files stored on a network |
US5845278A (en) * | 1997-09-12 | 1998-12-01 | Inioseek Corporation | Method for automatically selecting collections to search in full text searches |
US6247009B1 (en) * | 1997-03-10 | 2001-06-12 | Canon Kabushiki Kaisha | Image processing with searching of image data |
US6332193B1 (en) * | 1999-01-18 | 2001-12-18 | Sensar, Inc. | Method and apparatus for securely transmitting and authenticating biometric data over a network |
US20020039479A1 (en) * | 2000-10-04 | 2002-04-04 | Mikio Watanabe | Recording apparatus, communications apparatus, recording system, communications system, and methods therefor |
US20030093693A1 (en) * | 2001-11-12 | 2003-05-15 | Palm, Inc. | System and method for providing secured access to mobile devices |
US20030120940A1 (en) * | 2001-12-21 | 2003-06-26 | Timo Vataja | Location-based content protection |
US20030159044A1 (en) * | 2001-01-17 | 2003-08-21 | International Business Machines Corporation | Secure integrated device with secure, dynamically-selectable capabilities |
US20040202382A1 (en) * | 2003-04-11 | 2004-10-14 | Hewlett-Packard Development Company, L.P. | Image capture method, device and system |
US20040207719A1 (en) * | 2003-04-15 | 2004-10-21 | Tervo Timo P. | Method and apparatus for exploiting video streaming services of mobile terminals via proximity connections |
US20040236945A1 (en) * | 2003-05-21 | 2004-11-25 | Hank Risan | Method and system for controlled media sharing in a network |
US20050050577A1 (en) * | 1999-03-30 | 2005-03-03 | Paul Westbrook | System for remotely controlling client recording and storage behavior |
US20050177419A1 (en) * | 2002-03-23 | 2005-08-11 | Choi Min J. | Multimedia advertising service through a mobile communication network and multimedia content controlling apparatus and method of a mobile terminal supporting said service |
US20050188399A1 (en) * | 2004-02-24 | 2005-08-25 | Steven Tischer | Methods, systems, and storage mediums for providing multi-viewpoint media sharing of proximity-centric content |
US20060026184A1 (en) * | 2004-06-24 | 2006-02-02 | Texas Instruments Incorporated | Generation and use of files having embedded location information |
US20060069756A1 (en) * | 2004-09-24 | 2006-03-30 | Singh Munindar P | Parental and corporate controls for camera-phones |
US20060280494A1 (en) * | 2005-06-13 | 2006-12-14 | Fujitsu Limited | Electronic device, photographing control method, and photographing control program |
US20070092104A1 (en) * | 2005-10-26 | 2007-04-26 | Shinhaeng Lee | Content authentication system and method |
US20070129012A1 (en) * | 2003-04-01 | 2007-06-07 | Iceberg Systems Limited | Portable digital devices |
US20070232347A1 (en) * | 2004-10-07 | 2007-10-04 | Per Persson | Method and apparatus for indicating proximity co-presence |
US20080195863A1 (en) * | 2007-02-09 | 2008-08-14 | Microsoft Corporation | Securing wireless communications between devices |
US7797740B2 (en) * | 2006-01-06 | 2010-09-14 | Nokia Corporation | System and method for managing captured content |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1991009368A1 (en) | 1989-12-13 | 1991-06-27 | Araco | Method and apparatus for storing, transmitting and retrieving graphical and tabular data |
SE0102367L (en) | 2001-07-02 | 2003-01-03 | Telia Ab | System and method for positioning real-time digital images |
WO2004080064A1 (en) | 2003-03-06 | 2004-09-16 | Fujitsu Limited | Information processing deice, information processing method, and information processing program |
JP4345424B2 (en) * | 2003-10-01 | 2009-10-14 | 株式会社ニコン | Camera system |
US8077980B2 (en) * | 2004-05-18 | 2011-12-13 | Panasonic Corporation | Image processing apparatus |
US20070011099A1 (en) * | 2005-07-11 | 2007-01-11 | Conrad Sheehan | SECURE ELECTRONIC TRANSACTIONS BETWEEN A MOBILE DEVICE AND OTHER MOBILE, FIXED, or VIRTUAL DEVICES |
-
2006
- 2006-01-06 US US11/275,470 patent/US7797740B2/en not_active Expired - Fee Related
-
2007
- 2007-01-03 JP JP2008549077A patent/JP4956553B2/en not_active Expired - Fee Related
- 2007-01-03 WO PCT/IB2007/000007 patent/WO2007077521A2/en active Application Filing
- 2007-01-03 EP EP07700004A patent/EP1969827A4/en not_active Withdrawn
-
2010
- 2010-07-19 US US12/839,017 patent/US20100287611A1/en not_active Abandoned
Patent Citations (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5659732A (en) * | 1995-05-17 | 1997-08-19 | Infoseek Corporation | Document retrieval over networks wherein ranking and relevance scores are computed at the client for multiple database documents |
US5748954A (en) * | 1995-06-05 | 1998-05-05 | Carnegie Mellon University | Method for searching a queued and ranked constructed catalog of files stored on a network |
US6247009B1 (en) * | 1997-03-10 | 2001-06-12 | Canon Kabushiki Kaisha | Image processing with searching of image data |
US5845278A (en) * | 1997-09-12 | 1998-12-01 | Inioseek Corporation | Method for automatically selecting collections to search in full text searches |
US6332193B1 (en) * | 1999-01-18 | 2001-12-18 | Sensar, Inc. | Method and apparatus for securely transmitting and authenticating biometric data over a network |
US20050050577A1 (en) * | 1999-03-30 | 2005-03-03 | Paul Westbrook | System for remotely controlling client recording and storage behavior |
US20020039479A1 (en) * | 2000-10-04 | 2002-04-04 | Mikio Watanabe | Recording apparatus, communications apparatus, recording system, communications system, and methods therefor |
US20050285944A1 (en) * | 2000-10-04 | 2005-12-29 | Mikio Watanabe | Recording apparatus, communications apparatus, recording system, communications system, and methods therefor |
US20030159044A1 (en) * | 2001-01-17 | 2003-08-21 | International Business Machines Corporation | Secure integrated device with secure, dynamically-selectable capabilities |
US20030093693A1 (en) * | 2001-11-12 | 2003-05-15 | Palm, Inc. | System and method for providing secured access to mobile devices |
US20030120940A1 (en) * | 2001-12-21 | 2003-06-26 | Timo Vataja | Location-based content protection |
US20050177419A1 (en) * | 2002-03-23 | 2005-08-11 | Choi Min J. | Multimedia advertising service through a mobile communication network and multimedia content controlling apparatus and method of a mobile terminal supporting said service |
US20070129012A1 (en) * | 2003-04-01 | 2007-06-07 | Iceberg Systems Limited | Portable digital devices |
US20040202382A1 (en) * | 2003-04-11 | 2004-10-14 | Hewlett-Packard Development Company, L.P. | Image capture method, device and system |
US20040207719A1 (en) * | 2003-04-15 | 2004-10-21 | Tervo Timo P. | Method and apparatus for exploiting video streaming services of mobile terminals via proximity connections |
US20040236945A1 (en) * | 2003-05-21 | 2004-11-25 | Hank Risan | Method and system for controlled media sharing in a network |
US20050188399A1 (en) * | 2004-02-24 | 2005-08-25 | Steven Tischer | Methods, systems, and storage mediums for providing multi-viewpoint media sharing of proximity-centric content |
US20060026184A1 (en) * | 2004-06-24 | 2006-02-02 | Texas Instruments Incorporated | Generation and use of files having embedded location information |
US20060069756A1 (en) * | 2004-09-24 | 2006-03-30 | Singh Munindar P | Parental and corporate controls for camera-phones |
US20070232347A1 (en) * | 2004-10-07 | 2007-10-04 | Per Persson | Method and apparatus for indicating proximity co-presence |
US20060280494A1 (en) * | 2005-06-13 | 2006-12-14 | Fujitsu Limited | Electronic device, photographing control method, and photographing control program |
US20070092104A1 (en) * | 2005-10-26 | 2007-04-26 | Shinhaeng Lee | Content authentication system and method |
US7797740B2 (en) * | 2006-01-06 | 2010-09-14 | Nokia Corporation | System and method for managing captured content |
US20080195863A1 (en) * | 2007-02-09 | 2008-08-14 | Microsoft Corporation | Securing wireless communications between devices |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130018867A1 (en) * | 2011-07-14 | 2013-01-17 | Nuance Communications, Inc. | Methods and apparatus for initiating an action |
US9489457B2 (en) * | 2011-07-14 | 2016-11-08 | Nuance Communications, Inc. | Methods and apparatus for initiating an action |
US9124730B2 (en) | 2011-12-16 | 2015-09-01 | Empire Technology Development Llc | Automatic privacy management for image sharing networks |
US20140181105A1 (en) * | 2012-12-22 | 2014-06-26 | Continental Automotive Systems, Inc. | Vehicle point and select |
US10609097B2 (en) | 2014-03-27 | 2020-03-31 | Tvu Networks Corporation | Methods, apparatus, and systems for instantly sharing video content on social media |
US10327034B2 (en) | 2014-03-27 | 2019-06-18 | Tvu Networks Corporation | Methods, apparatus and systems for exchange of video content |
US10785323B2 (en) * | 2015-01-05 | 2020-09-22 | Picpocket Labs, Inc. | Use of a dynamic geofence to control media sharing and aggregation associated with a mobile target |
US20180007149A1 (en) * | 2015-01-05 | 2018-01-04 | Picpocket, Inc. | Use of a dynamic geofence to control media sharing and aggregation associated with a mobile target |
US10270849B2 (en) | 2015-02-26 | 2019-04-23 | Microsoft Technology Licensing, Llc | Scalable peer matching |
US10148748B2 (en) | 2015-02-26 | 2018-12-04 | Microsoft Technology Licensing, Llc | Co-locating peer devices for peer matching |
US9438606B1 (en) * | 2015-03-23 | 2016-09-06 | International Business Machines Corporation | Environmental-based location monitoring |
US9665797B2 (en) * | 2015-03-23 | 2017-05-30 | International Business Machines Corporation | Environmental-based location monitoring |
US9536176B2 (en) | 2015-03-23 | 2017-01-03 | International Business Machines Corporation | Environmental-based location monitoring |
US20160321815A1 (en) * | 2015-03-23 | 2016-11-03 | International Business Machines Corporation | Environmental-based location monitoring |
US10146925B1 (en) | 2017-05-19 | 2018-12-04 | Knowledge Initiatives LLC | Multi-person authentication and validation controls for image sharing |
US10541999B1 (en) | 2017-05-19 | 2020-01-21 | Knowledge Initiatives LLC | Multi-person authentication and validation controls for image sharing |
US11012439B1 (en) | 2017-05-19 | 2021-05-18 | Knowledge Initiatives LLC | Multi-person authentication and validation controls for image sharing |
US20200106779A1 (en) * | 2018-10-02 | 2020-04-02 | Ca, Inc. | Peer authentication by source devices |
US10965676B2 (en) * | 2018-10-02 | 2021-03-30 | Ca, Inc. | Peer authentication by source devices |
US10771763B2 (en) | 2018-11-27 | 2020-09-08 | At&T Intellectual Property I, L.P. | Volumetric video-based augmentation with user-generated content |
US11206385B2 (en) | 2018-11-27 | 2021-12-21 | At&T Intellectual Property I, L.P. | Volumetric video-based augmentation with user-generated content |
Also Published As
Publication number | Publication date |
---|---|
JP4956553B2 (en) | 2012-06-20 |
WO2007077521A3 (en) | 2007-10-18 |
EP1969827A2 (en) | 2008-09-17 |
JP2009522679A (en) | 2009-06-11 |
US20070162971A1 (en) | 2007-07-12 |
WO2007077521A2 (en) | 2007-07-12 |
US7797740B2 (en) | 2010-09-14 |
EP1969827A4 (en) | 2012-04-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7797740B2 (en) | System and method for managing captured content | |
US9936086B2 (en) | Wireless image distribution system and method | |
JP5466494B2 (en) | Electrophotographic device, method and system for photo authentication (photo authentication system) | |
US6914626B2 (en) | Location-informed camera | |
US7844611B2 (en) | Time-shift image distribution system, time-shift image distribution method, time-shift image requesting apparatus, and image server | |
US9141825B2 (en) | System and method for controlling access to assets in a network-based media sharing system using tagging | |
US10165178B2 (en) | Image file management system and imaging device with tag information in a communication network | |
US20110069179A1 (en) | Network coordinated event capture and image storage | |
KR101909194B1 (en) | Method and apparatus for providing video service based on location | |
GB2360658A (en) | Camera with user identity data | |
JP2009239397A (en) | Imaging apparatus, imaging system, control method of imaging apparatus, and control program | |
US20120041982A1 (en) | Method and system for associating co-presence information with a media item | |
US20150180965A1 (en) | Method, device, and system for ad-hoc resource selection | |
US8768377B2 (en) | Portable electronic device and method of providing location-based information associated with an image | |
JP2003067309A (en) | Data transmission method, transmission destination- deciding device and imaging terminal | |
JPWO2009087801A1 (en) | File sharing system, access right management method and terminal | |
EP2211529B1 (en) | Method for sharing file between control point and media server in a DLNA system, and system thereof | |
JP4371205B2 (en) | Information acquisition system, information request / providing device, information providing device, information requesting device, and information acquisition method | |
KR20100023270A (en) | System for providing image contents and method for registering, storing, searching thereof | |
JP2012186732A (en) | Imaging device, method of controlling imaging device, and program | |
GB2360661A (en) | Location informed camera | |
KR20190005053A (en) | Image information providing system based on shooting location, device and method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |