`
`US 8,374,575 B2
`(10) Patent No.:
`a2) United States Patent
`Mullen
`(45) Date of Patent:
`*Feb. 12, 2013
`
`
`(54) SYSTEMS AND METHODS FOR LOCATING
`CELLULAR PHONES AND SECURITY
`MEASURESFOR THE SAME
`
`(76)
`
`Inventor:
`
`Jeffrey D Mullen, New York, NY (US)
`
`(*) Notice:
`
`Subject to any disclaimer, the term ofthis
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`:
`‘
`5
`‘
`Foe
`This patent is subject to a terminal dis
`claimer.
`
`(21) Appl. No.: 11/387,384
`
`(22)
`
`Filed:
`
`Mar.22, 2006
`
`(65)
`
`Prior Publication Data
`US 2006/0183486 Al
`Aug. 17, 2006
`
`5,337,344 A
`oei4 ‘
`’
`’
`5,388,147 A
`5,442,805 A
`5,479,482 A
`5,502,757 A
`5,519,760 A
`acletc A
`248,
`5,551,058 A
`5,555,286 A
`3.719.563 A
`
`8/1994 Alvesalo
`*re won e al.
`vesalo
`2/1995 Grimes
`8/1995 Sagarsetal.
`12/1995 Grimes
`3/1996 Bales etal.
`5/1996 Borkowskiet al.
`wove eva Jr. et al.
`eVaney
`8/1996 Hutchesonetal.
`9/1996 Tendler
`2/1998 ‘Thompson
`.
`(Continued)
`
`FOREIGN PATENT DOCUMENTS
`
`WO
`WO
`
`WO 99/00717
`WO 99/09775
`
`2/1999
`2/1999
`(Continued)
`
`OTHER PUBLICATIONS
`
`Related U.S. Application Data
`(63) Continuation of application No. 10/400,296, filed on
`Mar. 25, 2003.
`
`ETSI TS 101 513. “Digital Cellular Telecommunications System
`(Phase 2): Location Services (LCS),” GSM 12.71, version 8.0.1.
`1999.
`
`(60) Provisional application No. 60/367,967, filed on Mar.
`25, 2002.
`
`(51)
`
`Int. Cl.
`(2006.01)
`HO4M 11/04
`(52) US. Ch. oe 455/404.1, 455/404.2; 455/410;
`455/456.1; 455/456.2; 455/456.3, 455/457
`(58) Field of Classification Search............... 455/404.1,
`455/404.2, 410, 456.1-456.3, 457
`See application file for complete search history.
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`4,654,879 A
`5,043,736 A
`5,086,390 A
`5,097,416 A
`5,197,092 A
`5,305,201 A
`5,327,144 A
`
`3/1987 Goldman etal.
`8/1991 Darnellet al.
`2/1992 Matthews
`3/1992 Matthews
`3/1993 Bamburak
`4/1994 Matthews
`7/1994 Stilp et al.
`
`(Continued)
`
`Primary Examiner — Quynh Nguyen
`
`ABSTRACT
`(57)
`Systems and methods for locating a cellular phone are pro-
`vided. Moreparticularly, systems and methodsfor providing
`the location of a requested user’s cellular phone from a
`requesting user’s device (e.g., a secondcellular phone) based
`on access rights defined by the requested user. Location
`descriptions may be provided at a multitude of levels. For
`example,ifa cellular phone,or an identity associated to (e.g.,
`loggedinto) a cellular phone, has been given accessrights to
`acell phone’s exact location for an indefinite amount oftime,
`that cell phone can receive, on command,the exact location of
`the approvedcell phone. Other levels of location information
`that can be granted include, for example, proximities, states,
`and countries.
`
`46 Claims, 17 Drawing Sheets
`
`Facility)
`
`Database
`
`Cell Phone
`Base Station
`
`Non-Wireless Facility (e.g.,
`Credit Card Authorization
`
`Non-Wireless Device
`(e.g., Computer)
`
`
`
`Google v. Mullen
`
`Google Exhibit 1001
`Google Exhibit 1001
`Google v. Mullen
`
`
`
`US 8,374,575 B2
`
`Page 2
`
`9/2003 Seki
`6,622,020 B1
`U.S. PATENT DOCUMENTS
`9/2003 Rachabathuniet al.
`6,628,938 Bl
`11/2003 Owensby
`6,647,257 B2
`oa ‘
`loo Deti
`6,662,014 Bl* 12/2003 Walsh vveccccscsceeee 455/456.2
`TTB,
`6,665,389 BI
`12/2003 Haste,II
`eosog ‘
`hoon raport et al.
`6,677,894 B2
`1/2004 Sheynblat
`3815538 A
`9/1908. Grelletal.
`6,714,791 B2
`3/2004 Friedman
`epok Ak
`Lh ioon Reps]
`6,716,101 BL*
`4/2004 Meadowsetal. .......... 455/456.1
`3847076 A
`12/1908 Doseurret
`0,735,564 BI
`5/2004 Puhakainen
`3575398 A
`2/1999 Seapp
`eee Bi
`Sood Cadeeal
`5,890,062 A
`3/1999 Courtneyet al.
`6.798.358 B2
`9/2004 To
`tal
`5,920,820 A
`7/1999 Qureshiet al.
`5798,
`2
`ce et al.
`6,799,094 BL
`9/2004 Vaidaetal.
`EAE ‘
`ston janky et al. eal
`
`
`5961569 A 10/1999 Craportetal. 6,806,813 Bl 10/2004 Chengetal.
`
`S96's72 A
`10/1999 Craport etal,
`6,816,735 BI
`11/2004 Rayburnet al.
`5.978.747 A
`11/1999 Craport et al.
`Ceeee BL
`L2opod Suerstrom et al.
`6,023,241 A
`2/2000 Clapper
`687082) B2
`3/2005 Balogh
`6,028,537 A
`2/2000 Suman et al.
`6.879.838 B2
`4/2005 Rankin etal.
`6,032,042 A
`2/2000 Kauppi
`6,882,837 B2
`4/2005 Fernandezet al.
`6,035,189 A
`3/2000 All-Vehmas
`6,882,856 B1
`4/2005 Alterman
`Oeae ‘
`sobog Cauntaey etal
`6,885,874 B2*
`4/2005 Grubeet al.
`caccccssseeceue 455/520
`“
`‘
`5
`.
`6,047,051 A
`4/2000 Ginzboorg
`Poteas BI
`Orbos pomnnz,
`1
`6,049,711 A
`4/2000 Ben-Yehezkel
`oe
`.
`undy Stal
`ied
`6,920,319 B2
`7/2005 Knutssonet al.
`rer ‘
`F008 ‘anata ¢ al.
`6,920,328 B2
`7/2005 Wollrab
`6.091.959 A
`7/2000. Souissiet al.
`oeeog BS
`ooo Seligman etal.
`6,138,003 A
`10/2000 Kingdonet al.
`6'944'447 Bo
`9/2005 Porhranetal
`6,144,336 A
`11/2000 Prestonetal.
`6.968.179 BL
`11/2005 De Vries
`,
`6,157,841 A
`12/2000 Bolducetal.
`6975908 BI* 12/2008
`6,166,626 A
`12/2000 Janky et al.
`6909777 BL*
`22006
`6,173,182 BL
`1/2001 Cha
`7013 148 BL
`3/2006
`6,201,803 Bl
`3/2001 Mundayet al.
`772956 BD.
`-7/2006
`6,208,866 Bl
`3/2001 Rouhollahzadehet al.
`7130630 Bl
`10/2006
`/2001 Bennett et al.
`aA’
`>
`Oeacs Bt
`toot Bennett era
`7,177,651 BL*
`2/2007 Almassy secs 455/456.1
`Cee RL
`eoboL Camere
`7,203,674 B2
`4/2007 Cohen
`6240060 B1
`3/2001 Alperovich
`7,215,965 B2*
`5/2007 Fournier et al.
`............ 455/456.1
`Cree BL
`COOOL Beko
`7,248,872 B2*
`7/2007 Bassett et al aronarun 455/433
`6,246,861 Bl
`6/2001 Messieret al.
`seoaoe Bi
`oooy vee etal.
`6,252,543 Bl
`6/2001 Camp
`7979°900 BL
`9/2007 Zhang
`6,256,498 Bl
`7/2001 Ludwig
`7394893 BL
`1/2008 Roses
`6,259,923 BL
`7/2001 Limetal.
`7'400.499 B2
`8/2008. Kaufman
`6,275,771 Bl
`8/2001 Berstiset al.
`7.870.958 B2
`8/2009 Krasner
`6,311,060 BI
`Ieee wa etal.
`2001/0029184 Al
`10/2001 L’Anson et al.
`estate BI
`ttan emi
`2002/0042277 AL*
`4/2002 Smith vcs 455/456
`its
`ano
`2002/0086683 Al
`7/2002: Kohar etal.
`6,321,092 BL
`11/2001 Fitch et al.
`2002/0102980 Al*
`8/2002 Calvert et al. ceceecccceen 455/456
`oie BI
`bo00L pennison et a
`2002/0115453 Al
`8/2002. Poulinet al.
`e3e01o1 BL
`3/2002 ae eet al.
`2002/0141434 Al
`10/2002 Grundvig
`oo leD BL
`000. Eeais etal
`2002/0164998 AL* 11/2002 Younis ecccssssseseeeee 455/456
`. 455/427
`300,
`Wi
`c
`rersesersersees
`2002/0183059 AL* 12/2002 Noreenetal.
`
`Ceeog BI
`5be aeeington et al.
`2003/0013456 AL*
`1/2003 Bates et al.
`ccecccecccecee 455/456
`6377310 BL
`4/2002 Geizeretal
`2003/0023726 Al
`1/2003 Rice etal.
`377,
`8
`2003/0045301 Al
`3/2003. Wollrab
`Ooone BI
`ae005 none ;
`2003/0119522 Al
`6/2003. Barclayet al.
`6400946 Bi
`6/2002 Vaywan et al.
`2004/0054428 Al
`3/2004 Sheha
`400986 BL
`2002 Rickwn
`2004/0077359 Al*
`4/2004 Bernas et al... 455/456.1
`C408186 BL
`6/0002 Pack cra
`2004/0127231 Al
`7/2004. Dorr
`6.421.009 B2
`7/2002 Suprunov
`2004/0180669 AL*
`9/2004 Kall eccccscsssssssesseee 455/456.1
`
`
`
`.
`
`455/457
`
`6,438,381 BL
`C4d0486 BL
`6,456,854 BL
`1464,033 S
`6,466,788 BL
`6,532,360 BL
`6,564,064 B1
`6,580,914 BL
`6,580,918 BL
`6,584,314 BL
`6,587,691 BL
`6,603,969 BL
`6,603,977 BL
`6,611,687 BL
`6,618,593 BL
`6,618,671 B2
`
`8/2002 Alberth,Jr. et al.
`9/2002 Rew
`9/2002. Chern
`10/2002 Piano Poirier
`10/2002 Carlsson
`3/2003 Shaffer
`5/2003. Ciganer etal.
`6/2003 Smith
`6/2003. Leickel
`6/2003 _Haumont
`7/2003 Granstam
`8/2003. Vuoristo
`8/2003. Walshetal.
`8/2003. Clark
`9/2003. Drutman et al.
`9/2003 Dooleyet al.
`
`2009/0029717 Al
`1/2009 Bateset al.
`FOREIGN PATENT DOCUMENTS
`WO 99/51051
`3/1999
`WO00/28760
`5/2000
`WO 00/35228
`6/2000
`WO 00/38350
`6/2000
`WO 00/64075
`10/2000
`WO 00/76 194
`12/2000
`WO 00/76243
`12/2000
`WO OL/OL711
`1/2001
`WO OL/O1718
`1/2001
`WO 01/03406
`1/2001
`WO 01/03454
`1/2001
`WO 01/03461
`1/2001
`WO 01/10718
`1/2001
`WO 01/20938
`3/2001
`
`wo
`WO
`Wo
`Wo
`WO
`Wo
`Wo
`Wo
`Wo
`WO
`WO
`Wo
`WO
`WO
`
`
`
`US 8,374,575 B2
`
`Page 3
`
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`
`WO 01/33885
`WO 01/39525
`WO 01/39528
`WO 01/41468
`WO 01/50544
`WO 01/86880
`WO 01/89251
`WO 02/03718
`
`5/2001
`5/2001
`5/2001
`6/2001
`7/2001
`11/2001
`11/2001
`1/2002
`
`OTHER PUBLICATIONS
`
`ETSI TS 101 527 “Digital Cellular Telecommunications System
`(Phase 2+): Location Services (LCS): Mobile Station (MS): Serving
`Mobile Location Centre (SMLC),” Radio Resource LCS Protocol
`(RRLP), GSM 04.31, version 8.1.0. 1999.
`Wrolstad, Jay, “Sprint Claims First With E911-Capable Phone,”
`newsfactor.com (as viewed at http://www.newsfactor.com/perl/
`story/13952.html on Jan. 22, 2007), Oct. 4, 2001).
`Wrolstad, Jay, “Sprint Rolls Out E911 Services,” newsfactor.com (as
`viewedat http://www.newsfactor.com/perl/story/15506.html on Jan.
`22, 2007), Dec. 26, 2001).
`“Sprint PCS First Quarterly E911 Implementation Report,” Before
`the Federal Communications Commission,In the Matter of Revision
`of the Commission’s Rules to Ensure Compatibility With Enhanced
`911 Emergency Calling Systems , Feb. 1, 2002.
`“Who is Integrated Data Communications?,” presented at the FCC
`E911 Automatic Location Identification Round Table, Jun. 28, 1999.
`“Wireless Telecommunications Bureau Seeks Comment on Request
`to Commence Rulemaking to Establish Fair Location Information
`Practices,” DA 01-696, (as viewed at http://www.fcc.gov.Bureaus/
`Wireless/PublicNotices/9001/da010696.html on Jan. 22, 2007), Mar.
`16, 2001.
`“Go2 Systems & Integrated Data Communications to Deliver Loca-
`tion Services Automatically to Wireless Phones; Alliance Enables
`Automatic Recognition of Wireless Caller’s Location,” Business
`Wire
`(as viewed at http://www.findarticles.com/p/articles/mi_
`mOEIN/is_2000_Feb_28/ai/59621222 on Jan. 22, 2007), Feb. 28,
`2000.
`“Before the Federal Communications Commission: In the Matterof:
`E911 Automatic Location Identification Round Table,” Transcript,
`Jun. 28, 1999.
`“Pulver.com’s Location Based Services Report,” pulver.com (as vis-
`ited at http://pulver.com/Ibareport/lastlbareport.16jan01.txt on Jan.
`22, 2007), Jan. 2001.
`“Pulver.com’s Location Based Services Report,” pulver.com (as vis-
`ited at http://pulver.com/Ibareport/lastlbareport.26feb0 1.txt on Jan.
`22, 2007), Feb. 2001.
`“Pulver.com’s Location Based Services Report,” pulver.com (as vis-
`ited at http://pulver.com/Ibareport/lastlbareport.26mar01.txt on Jan.
`22, 2007), Mar. 2001.
`“Pulver.com’s Location Based Services Report,” pulver.com (as vis-
`ited at http://pulver.com/Ibareport/lastlbareport.0Sapr01.txt on Jan.
`22, 2007), Apr. 2001.
`“Pulver.com’s Location Based Services Report,” pulver.com (as vis-
`ited at http://pulver.com/Ibareport/lastlbareport.0 Lmay0 1 .txt on Jan.
`22, 2007), May, 2001.
`“Pulver.com’s Location Based Services Report,” pulver.com (as vis-
`ited at http://pulver.com/Ibareport/lastlbareport.10jun01.txt on Jan.
`22, 2007), Jun. 2001.
`
`
`
`“Pulver.com’s Location Based Services Report,” pulver.com (asvis-
`ited at http://pulver.com/Ibareport/lastlbareport.05jul0 1 .txt on Jan.
`22, 2007), Jul. 2001.
`“Pulver.com’s Location Based Services Report,” pulver.com (asvis-
`ited at http://pulver.com/Ibareport/lastlbareport.0 laug01.txt on Jan.
`22, 2007), Aug. 2001.
`“Pulver.com’s Location Based Services Report,” pulver.com (asvis-
`ited at http://pulver.com/Ibareport/lastlbareport.04sep0 1.txt on Jan.
`22, 2007) Sep. 2001.
`“Pulver.com’s Location Based Services Report,” pulver.com (asvis-
`ited at http://pulver.com/Ibareport/lastlbareport.02o0ct01.txt on Jan.
`22, 2007), Oct. 2001.
`“Pulver.com’s Location Based Services Report,” pulver.com (asvis-
`ited at http://pulver.com/Ibareport/lastlbareport.02nov01.txt on Jan.
`22, 2007), Nov. 2001.
`“Pulver.com’s Location Based Services Report,” pulver.com (asvis-
`ited at http://pulver.com/Ibareport/lastlbareport.03dec01.txt on Jan.
`22, 2007), Dec. 2001.
`“Pulver.com’s Location Based Services Report,” pulver.com (asvis-
`ited at http://pulver.com/Ibareport/lastlbareport.07jan02.txt on Jan.
`22, 2007), Jan. 2002.
`“Pulver.com’s Location Based Services Report,” pulver.com (asvis-
`ited at http://pulver.com/Ibareport/lastlbareport.04feb02.txt on Jan.
`22, 2007), Feb. 2002.
`“Pulver.com’s Location Based Services Report,” pulver.com (asvis-
`ited at http://pulver.com/Ibareport/lastlbareport.04mar02.txt on Jan.
`22, 2007), Mar. 2002.
`“Spring PCS First Quarterly E911 Implementation Report,” Before
`the Federal Communications Commission,In the Matter of Revison
`of the Commission’s Rules To Ensure Compatibility With Enhanced.
`911 Emergency Calling Systems, Feb. 1, 2002.
`“Whois Integrated Data Communications?, ” presented at the FCC
`E-911 Automatic Location Identification Round Table, Jun. 28, 1999.
`“Wireless Telecommunications Bureau Seeks Comment On Request
`To Commence Rulemaking To Establish Fair Location Information
`Practices,’ DA 01-696 (as viewed at http://www.fcc.gov.Bureaus/
`Wireless/PublicNotices/900 1/da010696.html on Jan. 22, 2007), Mar.
`16, 2001.
`“Go2 Systems & Integrated Data Communications to Deliver Loca-
`tion Services Automatically to Wireless Phones; Alliance Enables
`Automatic Recognition of Wireless Caller’s Location,” Business
`Wire (as viewed at http://www.findarticles.com/p/articles/mi_
`MOEIN/is_; 5999__Feb__28/ai/59621222 on Jan. 22, 2007), Feb. 28,
`2000.
`“Before the Federal Communications Commission: In the Matter of:
`E-911 Automatic Location Identification Round Table,” Transcript,
`Jun. 28, 1999.
`“Pulver.com’s Location Based Services Report,” pulver.com (as
`viewed. at http://pulver.com/Ibareport/lastlbareport.16jan01.txt on
`Jan. 22, 2007), Jan. 2001.
`“Pulver.com’s Location Based Services Report,” pulver.com (asvis-
`ited at http://pulver.com/Ibareport/lastlbareport.0 Lmay0 1 txt on Jan.
`22, 2007), May 2001.
`“Pulver.com’s Location Based Services Report,” pulver.com (asvis-
`ited at http://pulver.com/Ibareport/lastlbareport.04sep0 1 .txt on Jan.
`22, 2007), Sep. 2001.
`
`* cited by examiner
`
`
`
`U.S. Patent
`
`Feb. 12, 2013
`
`Sheet 1 of 17
`
`US8,374,575 B2
`
`101
`
`POSITIONING
`SATELLITE
`
`SATELLITE
`
`POSITIONING
`
`POSITIONING
`
`SATELLITE
`
`FIG. 1
`
`
`
`U.S. Patent
`
`Feb. 12, 2013
`
`Sheet 2 of 17
`
`US 8,374,575 B2
`
`Location Request
`Received
`
`Access Allowed?
`
`No Access 204
`NO
`
`
`202
`
`206
`
`200
`
`208
`
`210
`
`YES
`
`Get Location
`
`Allowed Attributes
`
`According to
`
`Provide Location
`
`FIG. 2
`
`
`
`U.S. Patent
`
`Sheet 3 of 17
`
`DISPLAY SCREEN
`
`320
`
`Feb. 12, 2013
`
`US8,374,575 B2 (300
`
`
`
`U.S. Patent
`
`Feb. 12, 2013
`
`Sheet 4 of 17
`
`US 8,374,575 B2
`
`Locate
`
`“BillMarantz
`Brenden Epps
`Eric Nicklaus
`
`
`
`Jef Leon
`Ken Gould
`_ Mike Gerome
`Bret
`
`100
`
`C
`
`FIG. 4 \ 400
`
`
`
`U.S. Patent
`
`Feb. 12, 2013
`
`Sheet 5 of 17
`
`US8,374,575 B2
`
`910
`
`Locating Susan Pracht.. .
`NS
`
`FIG. 5
`
`NL 900
`
`
`
`U.S. Patent
`
`Feb. 12, 2013
`
`Sheet 6 of 17
`
`US 8,374,575 B2
`
`
`
`Susan Pracht Found At
`
`4251 Avenue of the Americas, New York, NY
`(49th-50th Street&6th Avenue)~~6109
`620
`
`
`
`
`
`
`
`
`
`
`
`Susan Pracht
`is 2.5 Miles Away
`
`
`
`NNW
`
`
`
`:
`
`
`
`U.S. Patent
`
`Feb. 12, 2013
`
`Sheet 7 of 17
`
`US 8,374,575 B2
`
`-MapofyourLocation >—
`Mapof Susan Pracht's Location
`
`Set Location Alerts
`
`Directions
`
`Susan Pracht's Travel Time To You
`
`FIG. 7
`
`700
`
`
`
`U.S. Patent
`
`Feb. 12, 2013
`
`Sheet 8 of 17
`
`US 8,374,575 B2
`
`Susan Pracht Has Not Given You
`Locate Rights
`
`
`
`FIG. 8
`
`800
`
`
`
`U.S. Patent
`
`Feb. 12, 2013
`
`Sheet 9 of 17
`
`US 8,374,575 B2
`
`Give/ModityLocateRights[o___
`BillMarantz
`Brenden Epps
`Eric Nicklaus
`Jef leon
`Ken Gould
`
`(7820
`
`SusanPracht=sss | FIG. 9
`
`900
`
`
`
`U.S. Patent
`
`Feb. 12, 2013
`
`Sheet 10 of 17
`
`US 8,374,575 B2
`
`LetMikeGeromeLocateYouBy
`‘Country
`State
`City
`
`a 020
`
`Exact Location
`
`FIG. 10
`
`1000
`
`
`
`U.S. Patent
`
`Feb. 12, 2013
`
`Sheet 11 of 17
`
`US 8,374,575 B2
`
`Alert Me When Susan Pracht
`
`Is In The Same City
`Is within 1 mile
`
`locates Me
`
`1120
`
`Enters New York City
`
`FIG. 11
`
`1100
`
`
`
`U.S. Patent
`
`Feb. 12, 2013
`
`Sheet 12 of 17
`
`US 8,374,575 B2
`
`
`
`ALERT
`
`1210
`
`SUSAN PRACHT HAS JUST
`ENTERED NEW YORK
`
`FIG. 12
`
`NO
`
`1200
`
`
`
`U.S. Patent
`
`Feb. 12, 2013
`
`Sheet 13 of 17
`
`US8,374,575 B2
`
`**
`Please Enter Locate Password
`
`Please Enter Locate Login
`
`FIG. 13
`
`1300
`
`FIG. 14
`
`1400
`
`
`
`U.S. Patent
`
`US 8,374,575 B2
`
`System
`
`Positioning
`
`Feb. 12, 2013
`
`Sheet 14 of 17
`
`FIG. 15
`
`
`
`U.S. Patent
`
`Feb. 12, 2013
`
`Sheet 15 of 17
`
`US8,374,575 B2
`
`(1600
`
`1606
`
`1601
`
`1601
`
`
`Wireless Device
`System
`(e.g., Watch, Cell Phone)
`| Ae
`Communications
`Network
`
`
`
`Cell Phone
`ke BaseStation
`
`1603
`
`16
`
`Database FL
`
`Ae1610
`
`
`
`
`Non-Wireless Facility (e.g.,
`.
`2
`Ne
`Credit Card Authorization
`Facility)
`
`604
`
`Non-Wireless Device
`(e.g., Computer)
`=
`1605
`
`FIG. 16
`
`
`
`U.S. Patent
`
`Feb. 12, 2013
`
`Sheet 16 of 17
`
`US 8,374,575 B2
`
`
`
`1700~ START|170
`
`
`
`NO
`
`170
`
`NO
`
`Location a
`
`
`equested?
`
`
`
`
`
`
`172
`
`
`Request
`Rights
`
`
`
`Check Access
`Rights
`
`
`
`
`172
`
`Given?
`
`
`QO Deliver "No-
`
`Access" Results
`
`
`Access
`Rights?
`
`
`
`Get Location
`
`
`According To
`Access Rights
`
`1706
`
`Report Location
`Information
`
`170
`
`FIG. 17
`
`
`
`U.S. Patent
`
`Feb. 12, 2013
`
`Sheet 17 of 17
`
`US8,374,575 B2
`
`1800~,
`
`
`
`180
`
`
`
`FIG. 18
`
`
`
`US 8,374,575 B2
`
`1
`SYSTEMS AND METHODS FOR LOCATING
`CELLULAR PIIONES AND SECURITY
`MEASURES FOR THE SAME
`
`CROSS-REFERENCE TO RELATED
`APPLICATIONS
`
`This application is a continuation of U.S. patent applica-
`tion Ser. No. 10/400,196, filed on Mar. 25, 2003, which
`claims the benefit of U.S. Provisional Application No.
`60/367,967, filed on Mar. 25, 2002, both of which are incor-
`porated by reference herein in their entirety.
`
`BACKGROUND OF THE INVENTION
`
`This invention relates to systems and methodsfor deter-
`mining a device’s location. Moreparticularly, this invention
`relates to systems and methods for remotely determining a
`device’s location.
`
`The Global Positioning System (GPS) has been developed
`in which a ground-based system can receive GPS signals
`from satellites and determine its location based on the time
`
`that it takes the GPS signals to reach the ground-based sys-
`tem. Generally, three satellite signals are needed to determine
`where in the world a receiveris located (i.e., position trian-
`gulation).
`GPS systems have been integrated into cellular phones.
`However, these systems are deficient because the location of
`a device that is determined by these GPSsignals are only
`minimally utilized. It is therefore desirable to provide sys-
`tems and methods whichbetter utilize the information about
`a device’s location.
`
`SUMMARYOF THE INVENTION
`
`In accordance with the present invention, systems and
`methods are provided for locating cellular phones. Morepar-
`ticularly, the present invention provides systems and methods
`for allowing a user of a cellular phone(e.g., a requesting user
`or a requestor) to locate the position of a different user’s
`cellular phone(e.g., a requested user) based upon requestor-
`assigned accessrights.
`One object of the present invention is to provide a security
`feature which allows a user to limit and/or deny location
`access to a particularuser. In preferred embodiments,only the
`usersthat have been granted access to the location of a user’s
`cellular phone can actually locate that user’s cellular phone.
`Furthermore,different types of access levels may be provided
`that allow a userto filter location information to a different
`
`user. In this manner, a cell phone user may give access,
`through his or her cell phone, to a friend so that the friend can
`locate him or her dependent on the level of access that is
`granted to thatfriend.
`For example, suppose that Phil tells Bill that he will be
`shopping in Manhattan andthat Bill should locate him when
`Bill gets to Manhattan through their cell phones. In such an
`example, Phil may grant Bill access the exact location of his
`cell phone for a specific period of time (e.g., the next two
`hours). As a result, when Bill tries to access Phil’s location,
`Bill will be told exactly where in Manhattan Phil’s cell phone
`is located. Thus, Bill does not have to contact Phil directly to
`see where heis and, therefore, Phil does not have to spend any
`time giving Bill verbal directions; Bill can simply see what
`store Phil is currently in and goto it.
`As mentioned previously, levels in the scope of access may
`be controlled by a user such that, for example, only a user’s
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`exact location, approximate location, city, state, or country
`can be accessed bya particular user.
`Location alerts and monitoring features are also provided.
`For example, Phil may give Jen, a resident of Pittsburgh,city
`access so that when Phil travels into Pittsburgh, Jen will be
`alerted of Phil’s presence. Such an alert may take the form of,
`for example, a display on Jen’s cell phone that communicates
`to Jen “Phil is in Pittsburgh.”
`Locating a cellular phone may be accomplishedin several
`ways. For example, satellite positioning systems such as the
`GlobalPositional System and the soon to be deployed Galileo
`system may beusedto locate a user’s cell phone.
`User positions and security settings may be regularly or
`manually transmitted to a remote system, such a remote data-
`base so that requesting users can locate a requested user’s
`position even if the requested user turns his/her cell phone
`OFF.Placing the security measures on a remote system (e.g.,
`remote database, computer, or server) provides an informa-
`tion brokering scheme such that the system is still operable
`even when cell phones are added, removed, or modified from
`the system.
`Additionally, the present invention may be configured to
`provide additional information aboutthe location of a user.
`Such additional information may be, for example, a map, a
`location marker on a map, a map that changes as the user
`moves, a compass, coordinates of the located cell phone,
`directions to the located cell phone, where a useris in relation
`to anotheruser, and information aboutthe location the located
`user is currently positioned in or nearby locations such as
`landmarks. Such information may be provided by a remote
`information provider (e.g., a remote map information pro-
`vider) and accessed by an information broker through a com-
`munications network.
`
`Manyother features are also employedthat realizes advan-
`tageous locating functionality. As per an example, suppose
`that a wife wants to see if her husbandhasleft work yet. She
`can locate her husband, without having to talk to him, and
`realize that he is driving home on a highway. Thus, a travel
`time option may beprovidedto the user. This option would
`compute the distance between the wife’s location and hus-
`band’s location by taking multiple location readings of the
`husband’s location to see how fast the husbandis traveling.
`Alternatively, because the husband’s position will map to a
`highway, the system may assumethatthe useris driving and
`may provide the wife with an estimate on the husband’s
`arrival time based on an assumed route. In this manner, the
`present invention may determine how muchtimeit will take
`the husbandto reach the wife and display this information to
`the wife.
`
`Asper other examples, a “see my friends” option mayalso
`be provided that brings up a map ofa desired area. Dots or
`symbols maybe present on the mapto signify the location of
`all user’s from which the requesting user has location infor-
`mation for. Similarly, a “find closest friend” option may be
`employed whichfindsthe closest user with whichthe request-
`ing user has location access to.
`Acell phone location may by accessedby a variety of other
`devices. Alternatively, a cell phone maybe usedto access the
`location of a variety of other devices. For example, ifthe wife
`wasat home, that wife may connectto the internet and access
`a remote databaseto either provide the most recent location
`information about the husband’s cell phoneto her or request
`a location update from the husband’s cell phone. The wife’s
`location may be already stored in such a database by associ-
`ating the location to the IP address of the computer or by a
`manualinput of the wife’s location. The wife’s identity may
`be determined by, for example, a login and password on a
`
`
`
`US 8,374,575 B2
`
`3
`website. Thus, the above-identified security measures are not
`limited to device-to-device locating rather user to user locat-
`ing; the wife may only access the husband’s location if the
`husband has granted access for the wife to do so. If, by
`accident, the wife’s cell phone breaks, she may login on a
`friend’s cell phone and determine the husband’s location
`according to the device that the husbandis loggedinto.
`Security is preferably taken into account in the present
`invention and, therefore, location rights for a specific user
`may be given to a different user only by that specific user.
`However, a user may request location access rights from a
`different user. For example, a user may be provided with a
`request location screen on his cell phoneandthatuser(e.g.,
`user ““X”) may enter in the cell phone numberof the cell
`phone whose location is desired. The user associated to the
`FIG. 1 depicts a network topology of device location net-
`entered cell phone numbermaythenreceive an alert that says
`work 100 incorporating principles of the present invention.
`“user X has requested access to your location.” Location
`Network 100 includes one or morepositioning satellites 110,
`access maythen be given or denied on multiple levels and the
`112, and 114 that can locate the position of one or more cell
`requesting user notified of the decision.
`phones 120, 122, 126, and 124 (and other locatable devices)
`The location feature ofthe present invention may be turned
`on Earth 101. Positioning satellites 110, 112, and 114 may be,
`for example, the Global Positioning System (GPS) or the
`ONor OFFat any time. Users may be added,individually or
`upcoming Galileo satellite network.
`in groups, to a list of users with location access rights to a
`Preferably, any cell phone in network 100 may locate a
`specific user by that specific user. A specific user may, at any
`different cell phone,as long as access to location information
`time, modify, delete, or add users allowed to access his or her
`is allowed, through the utilization of positioning satellites
`location. Login and password information may be included to
`110, 112, and 114. Persons skilled in the art will appreciate
`increase security orto create a userprofile, allowingaspecific
`that other positioning systems and methods may be used in
`userto log into any cell phone and be recognize by the present
`locating the position of auser on a cell phone ofnetwork 100.
`invention (and thereby be located with that cell phone or
`To route information to and from a cell phone of network
`locatable device).
`100 additional facilities and communication paths may be
`included. For example, a main facility (not shown in FIG.1)
`containing user location access rights may be included in
`network 100. Such a mainfacility mayretrieve location infor-
`mation directly from a positioning system or a cellular phone
`and then route this information to a cellular phone or posi-
`tioning system.
`Personsskilled in theart will appreciate that if the Global
`Positioning System (GPS)is used as the positioning system
`then GPSreceivers will be incorporated into cellular phones
`of the present invention. Persons skilled in the art will also
`appreciate that devices other than cellular phones may
`include positioning features. For example, watches, clothing,
`laptop computers, personaldigital assistants (PDAs), may all
`contain location systems(e.g., GPS) andutilize the security
`principles of the present invention to allow different user’s to
`access these locations.
`
`4
`FIG. 13 is a display screen of a login feature in accordance
`with the principles of the present invention;
`FIG. 14 is a display screen of a login feature in accordance
`with the principles of the present invention;
`FIG. 15 is a wireless device in accordance with the prin-
`ciples of the present invention;
`FIG. 16 is an embodimentof a network topology in accor-
`dance with the principles of the present invention;
`FIG. 17 is an embodimentof a locating feature in accor-
`dance with the principles of the present invention; and
`FIG. 18 is an embodiment of a communications signal in
`accordance with the principles of the present invention.
`
`DETAILED DESCRIPTION OF THE INVENTION
`
`10
`
`15
`
`20
`
`30
`
`35
`
`40
`
`45
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`The principles and advantages of the present invention can
`be more clearly understood from the following detailed
`description considered in conjunction with the following
`drawings, in which the same reference numerals denote the
`same structural elements throughout, and in which:
`FIG. 1 is a network topology of a cell phone locating
`network in accordance with the principles of the present
`invention;
`FIG.2 is a flow chart of the locating feature in accordance
`with the principles of the present invention;
`FIG.3 is an illustration of a cell phone in accordance with
`the principles of the present invention;
`FIG. 4 is a display screen for a locate feature in accordance
`with with the principles of the present invention;
`FIG. 5 is a display screen for a retrieving location status
`feature in accordancewiththe principles ofthe present inven-
`tion;
`FIG.6 is a display screen for a displaying location feature
`in accordance with the principles of the present invention;
`FIG. 7 is a display screen listing optionsfor a locate feature
`in accordance with the principles of the present invention;
`FIG.8 is a display screen of a failed locate feature due to
`insufficient rights in accordance with the principles of the
`present invention;
`FIG. 9 is a display screen of adding and modifying locate
`rights and optionsto a user in accordance with the principles
`ofthe present invention;
`FIG. 10 is a display screen of assigning location rights to a
`user in accordance with the principles of the present inven-
`tion;
`FIG. 11 is a display screen of alert options in accordance
`with the principles of the present invention;
`FIG. 12 is a display screen ofanalert feature in accordance
`with the principles of the present invention;
`
`50
`
`55
`
`60
`
`65
`
`FIG. 2 showsflow chart 200 ofa simplified locating feature
`constructed in accordance with the principles of the present
`invention. Step 202 initiates when a user requests the location
`of another user’s cell phone. Step 206 evaluates if the user
`initiating the location request has the rights to access the
`location ofthe desired user. Ifno accessrights for the request-
`ing user have been granted then step 204 will preferably
`inform the requesting user that he/she has not been given
`access to the requested location. In this manner, every user
`may assign rights (e.g. govern the security) to whom may or
`may not locate him/her. In preferred embodiments, these
`rights will be stored in, or functionality executed from, a
`remote facility and accessed and utilized by a user’s cell
`phoneor other requesting device (e.g., a watch or PDA).
`If access has been given by a particularuser that allows for
`the requesting user to locate that particular user, step 208 is
`initiated and the allowed location information is provided to
`the user in step 210. Step 208 may optionally filter the loca-
`tion information such that only a portion information is
`passed to the requesting user. The requested user may have,
`
`
`
`US 8,374,575 B2
`
`5
`for example, defined that the requesting user only can obtain
`the city, state, or country ofhis/her location. Persons skilledin
`the art will appreciate that only the location ofthe desired user
`needs to have a cell phone or a positioning system. The
`requesting user may user other means(e.g., the internet) to
`request the location of the desired user.
`Personsskilled in the art will appreciate thatthe location of
`a user’s cell phone maybe retrieved, in step 208, from a
`remote database, facility, distribution center, or any other
`system. Moreparticularly, a remote database may periodi-
`cally request the location ofa cell phone user with a position-
`ing system andstore this information. This database mayalso
`keep a record of those people allowed to access that user’s
`location, the extent to which access is allowed, and the extent
`to which a user has requested a user’s location. A user may
`update, add, manipulate, or remove access at any time by
`doing so at this database. Thus, a requesting user only has to
`contact the remote database, have his/her identity recognized,
`have his/her access rights for the requested user location
`determined, and,if the requesting user has the correct access
`rights, be provided with the requested user’s location.
`Instead of a remote database periodically obtaining loca-
`tion information for a user, the database can obtain a user’s
`locations when a request is made for that user’s location,
`providing the requesting user has access to the requested
`user’s location. However, persons skilled in the art will rec-
`ognize that a remote database is utilized in the above
`examples that contains the locations, in most circumstances,
`of a multitude of users. Thus, to increase security even more,
`a requesting user’s cell phone maydirectly request a user’s
`location from the requested user’s cell phone without the
`need for a database. In such an example a user adds, manipu-
`lates, or removes access rights locally on his/her cell phone
`and does not have to worry aboutsecurity issues that surround
`placing his location on a remote database. Furthermore, in
`such an embodiment a user’s location does not have to be
`
`6
`user) that fits his/her “looking for’profile, the user may be
`alerted of the proximity of a matching us