摘要 |
Computationally implemented methods and systems include determining that a device has particular data that is designated as potentially valuable wherein access to the particular data is restricted, determining one or more services configured to be carried out on the device, said one or more services using the particular data to which the access is restricted, and facilitating presentation of an offer to facilitate carrying out one or more services that use the particular data. In addition to the foregoing, other aspects are described in the claims, drawings, and text. |