throbber
as United States
`a2) Patent Application Publication co) Pub. No.: US 2002/0169539 A1
`(43) Pub. Date: Nov. 14, 2002
`
`Menardetal.
`
`US 20020169539A1
`
`(54) METHOD AND SYSTEM FOR WIRELESS
`TRACKING
`
`(76)
`
`Inventors: Raymond J. Menard, Hastings, MN
`(US); McNeil Bryan, Amery, WI (US)
`
`Correspondence Address:
`SCHWEGMAN, LUNDBERG, WOESSNER &
`KLUTH,P.A.
`P.O. BOX 2938
`MINNEAPOLIS, MN 55402 (US)
`
`(21) Appl. No.:
`
`10/112,669
`
`(22)
`
`Filed:
`
`Mar.28, 2002
`
`Related U.S. Application Data
`
`(60) Provisional application No. 60/279,401, filed on Mar.
`28, 2001. Provisional application No. 60/279,513,
`filed on Mar. 28, 2001.
`
`Publication Classification
`
`(51) Ut, C1 cacccsssssssssstsssessetneetesesn GO1C 21/30
`(52) US. Che
`vosceccsssssssssesisttasnntasnee 701/200; 701/213
`
`(57)
`
`ABSTRACT
`
`Management of location information communicated using
`wireless devices and communication networks. Authoriza-
`
`tion to access location information may be granted implic-
`itly, explicitly or in light of predetermined circumstances.
`Location information and navigation tools can be used to
`find, or avoid, a particular location. Location information
`may be generated by a mobile device-based section, by a
`communication network-based section or by a combination
`of device-based and network-based sections. [_ocation infor-
`
`mation may be integrated with emergencyresponsefacilities
`to provide police, fire or medical assistance.
`
`100A
`
`
` USER. ao SEcrrer)
`
`(25
`
`
`
`
`Com PA
`LeeAtrans
`tfo
`
`S€eT to
`
`
`
`DE TERM [AWE
`SECTIEr3
` (4s
`
`
`Google Exhibit 1045
`Google Exhibit 1045
`Google v. Mullen
`Google v. Mullen
`
`

`

`Patent Application Publication Nov. 14, 2002 Sheet 1 of 20
`
`US 2002/0169539 Al
`
`i
`
`S00
`
`oo
`
`[o
`
`a
`
`SeconS Grauts
`
`B C
`
`omwontteder, Netusark
`
`Loo
`
`CivOovCR
`CJ
`
`[Oe
`
`

`

`Patent Application Publication Nov. 14, 2002 Sheet 2 of 20
`
`US 2002/0169539 Al
`
`sz!
`
`oO)
`
`vfv92)
`
`
`
`cd/LORS
`
`PO)LIDS
`
`Sh)
`
`Oh)
`
`22d
`
`IVI)WIIPLII
`mone|Pours|
`CIOLLIDSSE2350
`C2!I||so)
`Sil|Meee
`
`
`
`

`

`Patent Application Publication Nov. 14, 2002 Sheet 3 of 20
`
`US 2002/0169539 Al
`
`[OG
`
`Eerst
`dew n
`
`len
`
`SN
`
`3
`
`Lips
`
`a.ana
`
`a
`
`Aa
`
`300
`
`ane
`
`L4E OO
`
`FIG. 3
`
`

`

`Patent Application Publication Nov. 14, 2002 Sheet 4 of 20
`
`US 2002/0169539 Al
`
`“YPeRetad
`
`DOSEDCY
`
`Hoo?¢evfal
`
`grees|YOO)
` Ep“osYPod
`
`mornLID
`
`‘Satl¥shi
`
`
`
`

`

`Patent Application Publication Nov. 14, 2002 Sheet 5 of 20
`
`US 2002/0169539 Al
`
`
`Pobile. device. grands
`
`505
`
`gfo
`
`
`
`cco Hy leo LAL
`locadion fn 2 rinction
`
`S06
`
`§20
`
`;
`— acto a Henn
`ty Access
`
`be eation ha Lor tar eton
`
`
`
`| Staadery deste. Sends wequest
`fiw location of Hiobtle. Saye.
`
` SIS
`
` Check fir
`
`Aothow3a ion,
`
` transeat loced,
`
`Val d
`
`tn Poeune Finn
`
`

`

`Patent Application Publication Nov. 14, 2002 Sheet 6 of 20
`
`US 2002/0169539 Al
`
`pecedwe. request ts
`
`tranguat 4 query
`
`SoS
`
`S45
`
`
`SSS
`
` dransnatl
`the. quer
`
`tire AS watt
`loca Ann in forunatinn
`Lolth He. query
`
`cle. &
`
`

`

`Patent Application Publication Nov. 14, 2002 Sheet 7 of 20
`
`US 2002/0169539 Al
`
`96O
`
`S4SA
`
`}
`
`
`
`trancuat
`locafiaes
`(ndormedin,
`wot, query
`
`
`
`\
`
`
`Contos
`need 20
`?
`
`
`locahie ue pac S
`
`
`
`O pen a
`‘
`port ts
`S96
`elles remote
`
`
`VCC ts
`(oes fuse tacky.
`
`56S
`
`Yes
`
`
`
`S7O
`
`“end S7G
`
`FIG. 2ee
`
`

`

`Patent Application Publication Nov. 14, 2002 Sheet 8 of 20
`
`US 2002/0169539 Al
`
` 58O fa for mepbsn
`
`SES”
`
` Avuthar ‘gahen
`au thoude
`STE
`Ses7
`
`
`
`
`+ Vansutt
`ban tyausmissrs,
`be cation,
`of loco dex.
`
`
`infor mahon
`tn formefinn
`
`
`
`661.6
`
`

`

`Patent Application Publication Nov. 14, 2002 Sheet 9 of 20
`
`US 2002/0169539 Al
`
`
`
`
`
`bee trausmissin
`ef location
`tuforimcfion Gls
`
`D
`
`G2G
`
`LIG. 7ie
`
`

`

`Patent Application Publication Nov. 14,2002 Sheet 10 of 20
`
`US 2002/0169539 Al
`
`aaid
`
`CSE5
`MEREMMFYHSS-PSER“EYbeseOpMT“ag00.
`
`
`
`O29
`
`
`
`

`

`Patent Application Publication Nov. 14, 2002 Sheet 11 of 20
`
`US 2002/0169539 Al
`
`CaS
`
`Mv
`
`ic.
`
`If
`
`
`
`

`

`Patent Application Publication Nov. 14, 2002 Sheet 12 of 20
`
`US 2002/0169539 Al
`
`
`
`
`
`

`

`Patent Application Publication Nov. 14, 2002 Sheet 13 of 20
`
`US 2002/0169539 Al
`
`EY] 4
`
`

`

`Patent Application Publication Nov. 14, 2002 Sheet 14 0f 20
`
`US 2002/0169539 Al
`
`2/4
`
`SR
`
`po} <- ey ory
`
`-
`
`N [x
`
`30°
`
`FlG.
`
`{4
`
`
`
`

`

`Patent Application Publication Nov. 14, 2002 Sheet 15 of 20
`
`US 2002/0169539 Al
`
`
`
`Fig, 1s
`
`
`
`

`

`Patent Application Publication Nov. 14, 2002 Sheet 16 of 20)
`
`US 2002/0169539 Al
`
`fo
`ba
`
`Fig.
`
`I¢
`
`

`

`Patent Application Publication Nov. 14,2002 Sheet 17 of 20
`
`US 2002/0169539 Al
`
`7 tS300F
`
`D ——ad
`
`Pouth,
`CernJed
`
`HOF
`
`FIG, 17
`
`
`
`

`

`Patent Application Publication Nov. 14, 2002 Sheet 18 of 20)
`
`US 2002/0169539 Al
`
`Mourtsr
`
`
`
`

`

`=US 2002/0169539 Al
`
`
`
`4O3
`
`Patent Application Publication Nov. 14, 2002 Sheet 19 of 20)
`
`S3mefOS
`
`x
`
`Te Arig.
`
`FG, 19
`
`
`
`o>
`
`

`

`Patent Application Publication Nov. 14,2002 Sheet 20 of 20
`
`US 2002/0169539 Al
`
`OLolO20]Jo9GQl
`
`DOVAIALS
`
`ZNZG
`
`SS
`
`BasowA!4
`
`Awe
`CRIWOS,AD
`
`alol
`
`ny
`
`oso)
`
`
`
`

`

`US 2002/0169539 Al
`
`Nov. 14, 2002
`
`METHOD AND SYSTEM FOR WIRELESS
`TRACKING
`
`RELATED APPLICATION
`
`{0001] This application claimspriority to U.S. Provisional
`Patent Application serial No. 60/279,401, entitled VARI-
`ABLE DISTANCE RF TAG DISCLOSURE,and filed on
`Mar. 28, 2001, the specification of which is hereby incor-
`porated by reference.
`
`[0002] This application claimspriority to U.S. Provisional
`Patent Application serial No. 60/279,513, entitled RANGE
`AND BEARING INDICATOR FOR WIRELESS DEVICE,
`and filed on Mar. 28, 2001, the specification of which is
`hereby incorporated by reference.
`
`[0003] This application is related to U.S. patent applica-
`tion
`Ser. No,
`09/793,373,
`entitled EMERGENCY
`RESPONSE INFORMATION DISTRIBUTION,and filed
`on Feb. 26, 2001,
`the specification of which is hereby
`incorporated byreference.
`
`TECHNICAL FIELD
`
`[0004] This documentrelates generally to personal secu-
`rity and wireless networks and particularly, but not by way
`of limitation, to two-way wireless locating systems.
`
`BACKGROUND
`
`[0005] The increasing amount of global movement of
`goods and people has emphasized the shortcomings of
`current technology used for tracking. Typically, such sys-
`tems include a wireless transmitter and a compatible
`receiver. If the transmitted signal is no longer discernable,
`then the receiver assumes that a range has been exceeded
`and an alarm is sounded. Generally, the transmitter is not in
`audible range of the alarm and thus, has no way of knowing
`the whereabouts of the receiver, or the direction in which the
`transmitter has departed.
`
`[0006] Furthermore, after the transmitter is beyond the
`range of the receiver,
`in order to once again find the
`transmitter,
`the receiver is manually swept
`through an
`increasingly larger search grid. Searching in this manner is
`generally time intensive and costly.
`
`In addition, parents interested in monitoring the
`[0007]
`whereabouts of their children are generally unwilling to
`allow private location information to be distributed without
`restrictions.
`
`[0008] Such tracking systems are impractical for use with
`monitoring the whereabouts of children or movable objects.
`
`[0009] Therefore, there is a need for an improvedtracking
`system and method.
`
`SUMMARY
`
`[0010] The present subject matter is directed to sysiems
`and methods for managing location information based on a
`geographical location of a mobile device. The mobile device
`is adapted to communicate using wireless communication
`technology. Examples of wireless communication technol-
`ogy include, but are not limited to, BLUETOOTH® tech-
`nology, HomeRF® technology, cellular telephone technol-
`
`radio frequency (RF)
`technology,
`two-way pager
`ogy,
`technology, IEEE 802 technology and other wireless com-
`munication technology.
`
`[0011] The mobile device maybe located in, on or around
`an object, person, animal, or other physical item. The mobile
`device may include hardware and programming to function
`as a cellular telephone, a two-way pager, a personal com-
`Munication system (PCS),
`a personal digilal assistant
`(PDA), a portable computer (laptop, palm-top) or other
`portable device. The present subject matter provides meth-
`ods and systems by whichaccessto the location information
`may be granted to selected recipients and denied to other
`recipients. In addition, the accuracy of the location infor-
`mation maybetailored to suit particular objectives.
`
`[0012] The location information may be generated by a
`hardware module of the mobile device, by programming
`executing on hardware accessible to the communication
`network or by a combination of hardware within the mobile
`device and programming of the network.
`
`In one embodiment, a secondary device receives,
`[0013]
`or requests, access to the geographical location information
`of the mobile device. In one embodiment, the relationship
`between the secondary device and the mobile device can be
`viewed as a master-slave relationship with the mobile device
`assuming the role of either the master or the slave. In one
`embodiment, the relationship between the secondary device
`and the mobile device can be viewed as a peer-to-peer
`relationship with both the mobile device and the secondary
`device having substantially equal rights. Thus, one embodi-
`ment provides that a plurality of mobile devices can be
`configured in a manner wherebya first subset ofthe plurality
`of mobile devices are able to access location informationfor
`a second subset of mobile devices and are denied access to
`a location information to a third subset of mobile devices.
`
`In one embodiment, the mobile device includes a
`[0014]
`compass element. The compass element provides visible or
`audible directional information to a user. In this manner, the
`orientation of the mobile device can be adjusted and used as
`a direction finder.
`
`the present subject matter
`In one embodiment,
`[0015]
`providesa translational element for converting a message in
`a first communication protocol into a second communication
`protocol. Por example, assuming the mobile device includes
`a cellular telephone and a BLUETOOTH®transceiver and
`the secondary device to be used for monitoring the location
`of the mobile device includes a laptop computer not
`equipped with a BLUETOOTH®transceiver. Assume also
`that authorization has been granted to allow the secondary
`device to access the location information of the mobile
`device. In the event
`that
`location information from the
`mobile device is transmitted using the BLUETOOTH®
`transceiver, then an interface device, including hardware or
`software, provides
`a
`translation between the BLUE-
`TOOTH® communication protocol and a browser based
`program executing on the laptop computer. In one embodi-
`ment, the interface device converts dala in a first structure
`into data in a second structure. In one embodiment, the
`interface device converts data communicated in a first
`
`communication protocol into data in a second communica-
`tion protocol. The interface device may include a routine
`executing on the BLUETOOTH®transceiver at either the
`transmitter side or the receiver side of the communication
`
`

`

`US 2002/0169539 Al
`
`Nov. 14, 2002
`
`the interface device includes a
`link. In one embodiment,
`routine executing at a network operating center or monitor
`center, in which case, data of one type (protocol or structure)
`is received by the monitor center and returned as data of a
`second type (having a different protocol or structure).
`
`In one embodiment, location information is pro-
`[0016]
`vided in real time to an emergency response service pro-
`vider. Consider, for example, a situation wherein a mobile
`device is attached to, or carried on the interior, of a stolen
`automobile. The location of the mobile device is commu-
`nicated to a public safety answering point (PSAP)facility.
`
`the location information is
`In one embodiment,
`[0017]
`conveyed using a communication network.
`‘The network
`may be a local area network (LAN)or a wide area network
`(WAN)such as the Internet.
`
`In one embodiment, security mechanisms of the
`[0018]
`BLUETOOTH® communication protocol are utilized to
`restrict access to the location information.
`
`the present system allows
`In one embodiment,
`[0019]
`tracking of vehicles, assets, persons or animals. In one
`embodiment, the mobile device includes software and hard-
`ware. In one embodiment, the mobile device includes an
`electronic compass.
`
`In one embodiment the mobile device includes
`[0020]
`software adapted to calculate and display relative distances
`and bearings to a target location using graphical or textual
`representations.
`
`[0021] The second device may be stationary or mobile.
`The location information maybe accessible using the por-
`table device or accessible using the second device. In one
`embodiment, the relationship between the first device and
`second device can be viewed as a peer-to-peerrelationship.
`In one embodiment, the relationship betweenthefirst device
`and the second device can be viewed as a slave-master
`
`relationship.
`
`[0022] Other aspects of the invention will be apparent on
`reading the following detailed description of the invention
`and viewing the drawings that form a part thereof.
`
`BRIEF DESCRIPTION OF ‘THE DRAWINGS
`
`In the drawings, like numerals describe substan-
`[0023]
`tially similar components throughoutthe several views. Like
`numerals having different letter suffixes represent different
`instances of substantially similar components.
`
`[0024] FIG. 1 is a schematic view of networked commu-
`nications according to one embodimentof the present sub-
`ject matter.
`
`[0025] FIG. 2 is a block diagram of a mobile device
`according to one embodiment.
`
`[0026] FIG.3 illustrates serial communication between a
`mobile device and a monitor center.
`
`[0027] FIGS. 4A, 4B and 4Cillustrate location determin-
`ing sections in various embodiments.
`
`[0028] FIG. 5 illustrates a flow chart according to one
`embodiment.
`
`[0030] FIG. 7 illustrates a flow chart according to one
`embodiment.
`
`[0031] FIG. 8 illustrates a flow chart according to one
`embodiment.
`
`[0032] FIG. 9 illustrates a flow chart according to one
`embodiment.
`
`[0033] FIG. 10 illustrates a screen shot of a computer
`display according to one embodimentof the present subject
`matter.
`
`[0034] FIG. 11 illustrates a diagram of a second device.
`
`[0035] FIG. 12 illustrates a diagram ofa tag.
`
`[0036] FIG. 13 illustrates an overview of the system.
`
`[0037] FIG. 14 illustrates an embodiment of a personal
`tag system.
`
`[0038] FIG. 15 illustrates an embodiment of a courier
`tracking system.
`
`[0039] FIG. 16 illustrates an embodimentof a person-to-
`person tracking system.
`
`[0040] FIG. 17 illustrates an embodiment of a person-to-
`person tracking system used by a response agent to find a
`person in need.
`
`{0041] FIG. 18 illustrates an embodiment for requesting
`assistance from a monitor center.
`
`[0042] FIG. 19 illustrates an embodiment of the present
`system used to discover a landmark orservice.
`
`[0043] FIG. 20 includes a block diagram of an example
`embodiment of a system according to the present system.
`
`DETAILED DESCRIPTION
`
`In the following detailed description, reference is
`[0044]
`made to the accompanying drawings which form a part
`hercof, and in which is shown by wayofillustration specific
`embodiments in which the invention may be practiced.
`These embodiments are described in sufficient detail
`to
`enable those skilled in the art to practice the invention, and
`it is to be understood that the embodiments may be com-
`bined, or that other embodiments may be utilized and that
`structural,
`logical and electrical changes may be made
`without departing from the spirit and scope of the present
`invention. The following detailed description is, therefore,
`not to be taken in a limiting sense, and the scope of the
`present invention is defined by the appended claims and
`their equivalents.
`
`[0045] FIG. 1 illustrates system 10 including networked
`communications between first device 100, monitor center
`400 and second device 300. In the following description,
`first device 100 is also referred to as mobile device 100.
`Communication network 200 may include a digital local
`area network (LAN)or a wide area network (WAN)suchas
`the Internet. Other communication networks are also con-
`
`templated. For example, but not by way of limitation,
`network 200 may include a trunked radio network, a public
`switched telephone network (PSTN), a cellular telephone
`network, a two-way pager communication network.
`
`[0029] FIG. 6 illustrates a flow chart according to one
`embodiment.
`
`FIG.2 illustrates a block diagram of one embodi-
`[0046]
`ment of mobile device 100A. In the figure, wireless trans-
`
`

`

`US 2002/0169539 Al
`
`Nov. 14, 2002
`
`ceiver 110, having wireless transmitter 115 and wireless
`receiver 120, are coupled to antenna 105. Wireless trans-
`ceiver 110, in one embodiment, includes a short range radio
`frequency (RF) transceiver. In one embodiment, transceiver
`110 includes a BLUETOOTH®-compatible transceiver, a
`HomeRF®-compatible transceiver, an IEEE 802 transceiver
`or other wireless communication transceiver.
`
`[0047] Transceiver 110 is coupled to processor 130. In one
`embodiment, processor 130 includes a microprocessor or
`other computer. Processor 130 is coupled to I/O section 125
`which may include audio transducers (such as a speaker,
`microphone), a user accessible keypador buttons, or a visual
`display (such as a liquid crystal display (LCD) or light
`emitting diode (LED) display). Also coupled to processor
`130 are communication section 135, control 140 and loca-
`tion determining section 145.
`
`for
`[0048] Communication section 135 may include,
`cxample, a cellular telephone transcciver, a two-way pager
`transceiver, a personal communication transceiver, or other
`communication transceiver. In one embodiment, communi-
`cation section 135 includes a long range radio frequency
`(RF) communication transceiver.
`
`[0049] Control 140, in one embodiment, includes a switch
`to control the exchange of data between location determin-
`ing section (LDS) 145 andtransceiver 110 or between LDS
`145 and commsection 135. In one embodiment, the switch
`includes hardware or software. In various embodiments,
`control 140 includes programming executing on processor
`130 or programming, and hardware to manage the transmis-
`sion of location information from device 100A to remote
`receivers. Control 140 may represent a hardware device or
`a software routine.
`
`[0050] Location determining section 145, in one embodi-
`ment, includes a global positioning system (GPS) receiver or
`a long range navigation (LORAN)receiver. The output of
`LDS 145 is supplied as an electronic location signal to
`processor 130, and in one embodiment, and depending on
`the status of control 140, is provided to transceiver 110 or
`comm section 135. The electronic location signal may
`include digital data or an analog signal representing a
`geographical location.
`
`(0051] FIG. 3 illustrates serial communications between
`first device 100 and monitor center 400. Consider an
`
`example wherebyfirst device 100 is carried by a child. In
`this case,
`the location information of the child is to be
`safeguarded and access to the information is limited to
`authorized users only. Here, device 100 includes a short
`range transceiver such as BLUETOOTH® and using fre-
`quency hopping spread spectrum technology, the transceiver
`communicates the location information of device 100 to
`BLUETOOTH®-compatible pager device 150. In the event
`that pager device 150 is not an authorized recipient of the
`location information, then security protocols implemented
`by BLUETOOTH®precludes access to the location infor-
`mation by a user of pager device 150. The location infor-
`mation is relayed, or forwarded, to laptop 155 using either
`the two-waypagertransceiver or the BLUETOOTH®trans-
`ceiver of pager device 150. If laptop 155 is authorized to
`receive and access the location information, then the loca-
`tion information is displayed on the screen of laptop 155.
`Displaying location information on laptop 155 may include
`rendering a map image or textual description. In the event
`
`laptop 155 is not authorized to access the location informa-
`tion, then a transceiver executing in laptop 155 relays or
`forwards the information to second device 300.
`In one
`
`embodiment, laptop 155 is coupled to a network connection,
`either by a wired or wireless connection, and the location
`information is routed across the network to monitoring
`center 400. Second device 300, in one embodiment, includes
`a transceiver that relays the information to monitor center
`400 using a wireless connection. In this example, second
`device 300 is authorized to access the location information.
`A display screen of the second device 300 depicts a map,
`graphical image, or textual message representing the loca-
`tion information. In one embodiment, the location informa-
`tion is forwardedin a data stream, thus providing nearly real
`time representation of the location of first device 100.
`[0052]
`In one embodiment, programming executing on
`device 300, or device 100, determines the range between
`device 300 and device 100. Range information may be
`displayed on a display screen of device 100 or device 300.
`In one embodiment, programming executing on device 300
`determines the relative bearing to device 100. Bearing
`information may be displayed on a display screen of device
`300. In one embodiment, programming executing on device
`100 determines the relative bearing to device 300. Bearing
`information may be displayed on a display screen of device
`100.
`
`In one embodiment, device 300, or device 100,
`[0053]
`receives screen data from a monitor center, a central station,
`or a network center. The screen data includes coding to allow
`device 300, or device 100,
`to render a graphical image
`including such fields showingrelative orientation, bearing,
`distance and other data. In one embodiment, the screen data
`is generated by a third party device and provided to device
`300 or device 100 by wireless transmission.
`[0054]
`In one embodiment, an alarm signalis triggered if
`range or bearing information exceeds or falls below a
`predetermined threshold. Monitoring center 400 is adapted
`to automatically notify an emergency authority if such
`conditions exist.
`
`[0055] FIGS. 4A, 4B and 4C illustrate that the location
`determining section may be mobile device-based, network-
`based, or a combination of device-based and network-based.
`FIG.4Aillustrates one embodimentof location determining
`section 145, herein depicted as LDS 145A.In the figure,
`LDS 145Ais integrated with device 100B. For example,
`LDS 145A may include a GPS receiver positioned internal
`to device 100B. FIG.4B illustrates communication network
`200A having integral LDS 165A. Location information, in
`one embodiment, is based on a geographicallocationoffirst
`device 100C andis determined based on timing information
`for wireless signals between network 200A and device
`100C. Second device 300 is also connected to communica-
`
`tion network 200A.In one embodiment, a server coupled to
`network 200A includes programming to determine location
`information and selected clients accessing the server are able
`to receive the location information. Selected clients are those
`authorized to receive the location information. FIG. 4C
`illustrates LDS 145B and LDS 165B within first device
`100D and network 200B, respectively. In such an embodi-
`ment,
`the combination of information generated by LDS
`145B and LDS 165B provides the location information.
`[0056]
`In one embodiment, device 100 includes an elec-
`tronic circuit or an electronic circuit and programming for
`
`

`

`US 2002/0169539 Al
`
`Nov. 14, 2002
`
`determining location. In one embodiment, LDS 145 uses a
`terrestrial location system. There are several varieties of
`terrestrial solutions,
`including time differential,
`signal
`strength, angle of arrival and varieties of triangulation. In
`one embodiment, LDS 145 uses a combination ofterrestrial
`and satellite navigation systems.
`
`[0057] FIG. 5 illustrates a flowchart of method 500
`according to one embodimentof the present system. Method
`500 depicts a portion of a method implemented by a pro-
`cessor executing a program according to one embodiment.
`After start 501 and at 505, a mobile device grants authori-
`zation to access location information for the mobile device.
`The mobile device may include a suitably equipped cellular
`telephone transceiver, a two-way pager transceiver, a PCS
`transceiver or a PDA device with a transceiver. Other
`
`transceivers are also contemplated, and in one embodiment,
`the mobile device includes a transceiver dedicated for use as
`
`described herein. In one embodiment, the granting of autho-
`rization to access location information may be performed by
`a network element, such as a server, or a supervisory device
`or agent for the mobile device. For example, mobile device
`100 may be a slave to the monitoring, or second, device 300.
`
`[0058] At 510, the secondary device 300 submits a request
`to receive location information for mobile device 100. The
`
`request may be a coded message. The request may be
`received by device 100 or by communication network 200.
`In one embodiment, the request includes an authorization
`code, The absence of an authorization code is handled as
`though the authorization code were invalid.
`
`[0059] At 515, the method performs a check of the autho-
`rization. Multiple authorization codes may bevalid. In the
`event that the authorization is valid, at 525, the location
`information is transmitted to the second device 300. ‘The
`
`location information may be transmitted by a network
`element, such as a server, or by device 100. In the event that
`the authorization is invalid, at 520, the location information
`is withheld and not communicated to that requester. This
`portion of the method cndsat 526.
`
`[0060] FIG. 6 illustrates a flowchart of method 530
`according to one embodiment. After starting at 531,
`the
`method includes receiving a request to transmit a query. For
`example, the query may include a coded message such as
`“where is the nearest automatic teller machine (ATM)?” The
`coded message may be transmitted in response to user
`activation of a particular programmed key or a spoken
`command. At 540, the method determines if the request
`includes a location-dependent context. A location-dependent
`context may relate to the question of “where?” A suitable
`reply to a request having a location-dependent context
`includes evaluation of the location of the requester. The
`ATM example illustrates a location-dependent context.
`Location-dependent context requests include implicit autho-
`rizations to access location information.
`
`[0061] The method proceeds to 545 if the request includes
`a location-dependent context and to 550 if not. At 545, the
`method includes selecting a suitable location information
`accuracy. For example, to locate the nearest ATM machine,
`a low accuracy response is adequate. In one embodiment,
`accuracy need not be greater than 1000! resolution and an
`expected reply might include a list of the five nearest ATM
`machines. Thus, the accuracy of the location information is
`degraded to provide a measure of privacy protection for the
`
`requester. On the other hand, if the request calls for the
`nearest fire department, geographical accuracy will be more
`important than privacy protection for the requester, and in
`that case, accuracy may be degraded to a 50' resolution.
`
`[0062] At 555, the location information, along with the
`query, is transmitted. As noted the location information may
`be degraded.
`
`Ifthe query is not location-dependent, then at 550,
`[0063]
`the query is transmitted without inclusion of the location
`information. This portion of the method ends at 556.
`
`[0064] FIG. 7 includesa portion of a method commencing
`with 545A wherein the location information accuracy is
`selected. At 565, the method determinesif the nature of the
`requestjustifies continuing updates to the location informa-
`tion. For example,
`if a suitable response to the query
`includes periodic updates, as may be appropriate for travel
`information, then the method proceeds to 570. At 570, a port
`is opened to allow remote access to location information for
`a predetermined time period. If updated location information
`is not needed,
`then at 575,
`the location information is
`transmitted with the qucry and no further updates are
`provided. The method ends at 576.
`
`[0065] FIG. 8 illustrates a flowchart according to one
`embodiment. Beginning at 576, at 580, the location infor-
`mation is generated. The location information may be gen-
`erated by the mobile device or by the communication
`network or a combination of the device and the network. At
`
`585, a message is reccived. The message may include, for
`example,
`a
`request
`to send location information. For
`instance, a parent may send a message requesting the
`whereabouts of a child carrying a mobile device. The
`message may be sent from a computer, a cellular telephone,
`a BLUETOOTH®-equipped device, a PDA, a PCS or other
`such device. The message, in one embodiment, includes an
`authorization. The authorization mayinclude a password or
`coded message. The authorization, at 590 is checked for
`authenticity. If the authorizationis authentic, then at 595, the
`location information is transmitted. If the authorization is
`not authentic,
`then at 596,
`the transmission of location
`information is barred. The method ends at 597.
`
`FIG.9 illustrates a portion of one embodimentof
`[0066]
`a method including time-limited access to location informa-
`tion. At 590A, the method determinesif the authorization is
`authentic. If so, at 605, a timeris started. The timer may be
`implemented in software or hardware within the network or
`device 100. The duration of the timer maybe user-selectable
`using hardware or software. The timer may include a user-
`operable control at either end of the communication link. At
`610, the method determines if the timer has expired. If not
`expired, then, at 620, the method determinesif a request for
`location information has been received. If not,
`then the
`method returns to 610. If a request for location information
`has beenreceived, then after sending location information at
`625, the method returns to 610. In the event that the timer
`has expired, at 615, the transmission of location information
`is barred. Other methodsoflimiting the time of accessibility
`to location information are also contemplated.
`
`[0067] FIG. 10 illustrates a screen shot appearing on a
`computer display according to one embodiment of the
`present system. For example, a teenager mayaccess screen
`630 using a computer. In one embodiment, the program is
`
`

`

`US 2002/0169539 Al
`
`Nov. 14, 2002
`
`server based and accessible by a network connection, such
`as a LAN or WAN (for example,
`the Internet). In one
`embodiment, the screen is generated by software executing
`on a personal computer.In field 635, the user is notified that
`this screen is knownas the Location Information Access and
`Selection Screen. Fields within portion 640 allow user
`selection of authorized recipients of the location information
`for the teenager’s mobile device. Pull-down menus allow
`user selection of predetermined recipients and their associ-
`ated devices. Fields within portion 645 allow the teenager to
`specify the location information accuracy for each of the
`authorized recipients. As noted, some are to receive maxi-
`mum accuracy (limited by the technological hardware and
`program available) and others are to receive degraded accu-
`racy. Fields within portion 650 allow the teenager to specify
`restrictions on access to the location information. As noted
`
`in the figure, some recipients have norestrictions and others
`have
`time-dependent
`restrictions. Portion 655 allows
`changes to be applicd or cancelled. Other screens are also
`contemplated which allowcustomization of the distribution
`of the location information.
`
`In various embodiments, security methods are
`[0068]
`implemented to restrict access to location information. [or
`example, in one embodiment, the location of mobile device
`100 is only released with authorization of the user of mobile
`device 100. Authorization may be granted implicitly in a
`request or directly. In the absence of authorization, then
`location information is not released.
`
`In one embodiment, an authority can override
`[0069]
`restrictions on access that may have been implemented by a
`user. For example, in an emergency, a court order or sub-
`poena may force the release of location information without
`user authorization.
`
`the location information is
`In one embodiment,
`[0070]
`generated by network-based technology. In such an embodi-
`ment,
`the authorization to access location information is
`resolved by one or more servers coupled to the network. In
`one embodiment, the communication network has a trust
`relationship with a particular user and the user authorizes the
`network to release the location information.
`
`the location information is
`In one embodiment,
`(0071]
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket