Location privacy manager for a wireless communication device and method therefor
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04Q-007/20
출원번호
US-0686553
(2003-10-14)
등록번호
US-7512405
(2009-03-31)
발명자
/ 주소
Walsh,Patrick Jay
출원인 / 주소
SBC Properties, L.P.
대리인 / 주소
Brinks Hofer Gilson & Lione
인용정보
피인용 횟수 :
4인용 특허 :
41
초록▼
Rules of communication are established between a wireless communication device (102) and a remote source (108). Communications between the wireless communication device (102) and the remote source (108) are managed to prohibit at least one of an identity and a location of the wireless communication
Rules of communication are established between a wireless communication device (102) and a remote source (108). Communications between the wireless communication device (102) and the remote source (108) are managed to prohibit at least one of an identity and a location of the wireless communication device (102) from being known to the remote source (108) responsive to the established rules of communication. The steps of establishing and managing may be implemented in a wireless communication device (102), a wireless communication network (104), and/or a location privacy manager (106). The rules of communication preferably include a password generated by the remote source (108), an identity of the remote source (108), an identity of a location privacy manager (106), and/or masking of the identity of the wireless communication device (102). The wireless communication device (102) is preferably a cellular telephone device. The remote source (108) is preferably a location-enabled service, such as, for example, a map service, a people finder service, or a remote party.
대표청구항▼
What is claimed is: 1. A method for providing privacy management for a wireless communication device, the method comprising the steps of: establishing rules of communication between the wireless communication device and a remote source; and managing communications between the wireless communication
What is claimed is: 1. A method for providing privacy management for a wireless communication device, the method comprising the steps of: establishing rules of communication between the wireless communication device and a remote source; and managing communications between the wireless communication device and the remote source in response to establishing the rules of communication to: (a) allow the remote source to know either an identity or a location of the wireless communication device while prohibiting the remote source from knowing both the identity and location of the wireless communication device in response to determining the wireless device approves of the remote source; and (b) prohibit the location of the wireless communication device from being known to the remote source in response to determining the wireless device does not approve of the remote source. 2. The method of claim 1 wherein the step of managing communications between the wireless communications device and the remote source comprises: receiving a request for location information associated with the wireless communication device from the remote source; determining whether the wireless communication device approves of the remote source in response to receiving the request for location information; sending the location information to the remote source in response to determining that the wireless communication device approves of the remote source; and rejecting the request from the remote source in response to determining that the wireless communication device does not approve of the remote source. 3. The method of claim 2 wherein the remote source is a location privacy manager, the wireless communication device approves of the location privacy manager when the wireless communication device is registered to operate with the location privacy manager, and the wireless communication device does not approve of the location privacy manager when the wireless communication device is not registered to operate with the location privacy manager. 4. The method of claim 2 wherein the remote source is a location-enabled service, the wireless communication device approves of the location-enabled service when the wireless communication device accepts an identity of the location-enabled service, and the wireless communication device does not approve of the location-enabled service when the wireless communication device does not accept the identity of the location-enabled service. 5. The method of claim 2 wherein a wireless communication device manages communications between the wireless communications device and the remote source. 6. The method of claim I wherein the step of managing communications between the wireless communications device and the remote source comprises: receiving a request for location information associated with the wireless communication device from the remote source; determining whether the wireless communication device approves of the remote source in response to receiving the request for location information; sending a request for the location information to the wireless communication device in response to determining that the wireless communication device approves of the remote source; receiving the location information from the wireless communication device in response to sending the request for the location information to the wireless communication device; sending the location information to the remote source in response to receiving the location information from the wireless communication device; and rejecting the request from the remote source in response to determining that the wireless communication device does not approve of the remote source. 7. The method of claim 6 wherein the remote source is a location privacy manager, the wireless communication device approves of the location privacy manager when the wireless communication device is registered to operate with the location privacy manager, and the wireless communication device does not approve of the location privacy manager when the wireless communication device is not registered to operate with the location privacy manager. 8. The method of claim 6 wherein the remote source is a location-enabled service, the wireless communication device approves of the location-enabled service when the wireless communication device accepts an identity of the location-enabled service, and the wireless communication device does not approve of the location-enabled service when the wireless communication device does not accept the identity of the location-enabled service. 9. The method of claim 6 wherein at least a wireless communication network or a location privacy manager manages communications between the wireless communications device and the remote source. 10. The method of claim 1 wherein the wireless communication device establishes the rules of communication and manages the communication between the wireless communications device and the remote source. 11. The method of claim 1 wherein a wireless communication network establishes the rules of communication and manages the communication between the wireless communications device and the remote source. 12. The method of claim 1 wherein a location privacy manager establishes the rules of communication and manages the communication between the wireless communications device and the remote source. 13. A method, performed by a location privacy manager, comprising: establishing rules of communication between a wireless communication device and a location-enabled service; and managing communications between a wireless communication device and a location-enabled service in response to establishing the rules of communication to: (a) allow the location-enabled service to know either an identity or a location of the wireless communication device while prohibiting the location-enabled service from knowing both the identify and location of the wireless communication device in response to determining the wireless device approves of the location-enabled service; and (b) prohibit the location of the wireless communication device from being known to the location-enabled service in response to determining the wireless device does not approve of the remote source. 14. A wireless communication network comprising: an antenna for communicating radio frequency signals over a radio frequency communication channel between the wireless communication network and a wireless communication device; a receiver, coupled to the antenna, for receiving the radio frequency signals from the wireless communication device; a transmitter, coupled to the antenna, for transmitting the radio frequency signals to the wireless communication device; a communication switch, coupled to the transmitter and the receiver, for routing information communicated over radio frequency communication channel; a memory device for storing rules of communication between the wireless communication device and a remote source; a location privacy manager interface, coupled to the remote source, for communicating signals between the wireless communication network and the remote source; and a controller, coupled to the communication switch, the memory device and the location privacy manager interface, for managing communications between the wireless communication device and the remote source in response to the rules of communication to: (a) allow the remote source to know either an identity or a location of the wireless communication device while prohibiting the remote source from knowing both the identify and location of the wireless communication device in response to determining the wireless communication device approves of the remote source; and (b) prohibit the location of the wireless communication device from being known to the remote source in response to determining the wireless communication device does not approve of the remote source. 15. A method for providing privacy management for a wireless communication device, the method comprising the steps of: establishing rules of communication between the wireless communication device and a remote source; and managing communications between the wireless communication device and the remote source to prohibit the remote source from knowing both an identity and a location of the wireless communication device; wherein the rules of communication further comprise: a rule that the wireless communication device shall only communicate with the remote source having an acceptable identity, and wherein the step of managing the communications further comprises the steps of: receiving a request for location information associated with the wireless communication device from the remote source responsive to the remote source being pushed to the wireless communication device by the remote source; determining whether or not an identity of the remote source is acceptable to the wireless communication device responsive to the step of determining that the request is received from the remote source; sending a request for the location information to the wireless communication device responsive to determining that the identity of the remote source is acceptable to the wireless communication device; receiving the location information from the wireless communication device responsive to the step of sending the request; sending the location information to the remote source responsive to the step of receiving the location information; and rejecting the request from the remote source responsive to determining that the identity of the remote source is not acceptable to the wireless communication device. 16. The method of claim 15 wherein at least a wireless communication network or a location privacy manager provides the privacy management for the wireless communications device. 17. A method, performed by a location privacy manager, comprising the steps of: establishing rules of communication between a wireless communication device and a location-enabled service; and managing communications between a wireless communication device and a location-enabled service to prohibit the location-enabled service from knowing both an identity and a location of the wireless communication device; wherein the rules of communication further comprise: a rule that the wireless communication device shall only communicate with the location-enabled service having an acceptable identity, and wherein the step of managing the communications further comprises the steps of: receiving a request for location information associated with the wireless communication device from the location-enabled service responsive to the location-enabled service being pushed to the wireless communication device by the location-enabled service; determining whether or not an identity of the location-enabled service is acceptable to the wireless communication device responsive to the step of determining that the request is received from the location-enabled service; sending a request for the location information to the wireless communication device responsive to determining that the identity of the location-enabled service is acceptable to the wireless communication device; receiving the location information from the wireless communication device responsive to the step of sending the request; sending the location information to the location-enabled service responsive to the step of receiving the location information; and rejecting the request from the location-enabled service responsive to determining that the identity of the location-enabled service is not acceptable to the wireless communication device.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (41)
Alanara Seppo,FIX ; Tarkiainen Mika Pekka Antero,FIX, Cellular communication system providing cell transmitter location information.
Lin Jyh-Han ; Alfano Nicholas P.,CAX ; Upp Steven D., Method and apparatus for performing bearer independent wireless application service provisioning.
Kearns Lloyd (10833 Scotsman Way Rancho Cordova CA 95620) Petersen David E. (1888 Blubell Dr. Livermore CA 94550), Personal emergency response communications system.
Camp ; Jr. William O. ; Zangi Pambiz ; Ramesh Rajaram, Reduced global positioning system receiver code shift search space for a cellular telephone system.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.