`a2) Patent Application Publication co) Pub. No.: US 2002/0169539 A1
`(43) Pub. Date: Nov. 14, 2002
`
`Menardetal.
`
`US 20020169539A1
`
`(54) METHOD AND SYSTEM FOR WIRELESS
`TRACKING
`
`(76)
`
`Inventors: Raymond J. Menard, Hastings, MN
`(US); McNeil Bryan, Amery, WI (US)
`
`Correspondence Address:
`SCHWEGMAN, LUNDBERG, WOESSNER &
`KLUTH,P.A.
`P.O. BOX 2938
`MINNEAPOLIS, MN 55402 (US)
`
`(21) Appl. No.:
`
`10/112,669
`
`(22)
`
`Filed:
`
`Mar.28, 2002
`
`Related U.S. Application Data
`
`(60) Provisional application No. 60/279,401, filed on Mar.
`28, 2001. Provisional application No. 60/279,513,
`filed on Mar. 28, 2001.
`
`Publication Classification
`
`(51) Ut, C1 cacccsssssssssstsssessetneetesesn GO1C 21/30
`(52) US. Che
`vosceccsssssssssesisttasnntasnee 701/200; 701/213
`
`(57)
`
`ABSTRACT
`
`Management of location information communicated using
`wireless devices and communication networks. Authoriza-
`
`tion to access location information may be granted implic-
`itly, explicitly or in light of predetermined circumstances.
`Location information and navigation tools can be used to
`find, or avoid, a particular location. Location information
`may be generated by a mobile device-based section, by a
`communication network-based section or by a combination
`of device-based and network-based sections. [_ocation infor-
`
`mation may be integrated with emergencyresponsefacilities
`to provide police, fire or medical assistance.
`
`100A
`
`
` USER. ao SEcrrer)
`
`(25
`
`
`
`
`Com PA
`LeeAtrans
`tfo
`
`S€eT to
`
`
`
`DE TERM [AWE
`SECTIEr3
` (4s
`
`
`Google Exhibit 1045
`Google Exhibit 1045
`Google v. Mullen
`Google v. Mullen
`
`
`
`Patent Application Publication Nov. 14, 2002 Sheet 1 of 20
`
`US 2002/0169539 Al
`
`i
`
`S00
`
`oo
`
`[o
`
`a
`
`SeconS Grauts
`
`B C
`
`omwontteder, Netusark
`
`Loo
`
`CivOovCR
`CJ
`
`[Oe
`
`
`
`Patent Application Publication Nov. 14, 2002 Sheet 2 of 20
`
`US 2002/0169539 Al
`
`sz!
`
`oO)
`
`vfv92)
`
`
`
`cd/LORS
`
`PO)LIDS
`
`Sh)
`
`Oh)
`
`22d
`
`IVI)WIIPLII
`mone|Pours|
`CIOLLIDSSE2350
`C2!I||so)
`Sil|Meee
`
`
`
`
`
`Patent Application Publication Nov. 14, 2002 Sheet 3 of 20
`
`US 2002/0169539 Al
`
`[OG
`
`Eerst
`dew n
`
`len
`
`SN
`
`3
`
`Lips
`
`a.ana
`
`a
`
`Aa
`
`300
`
`ane
`
`L4E OO
`
`FIG. 3
`
`
`
`Patent Application Publication Nov. 14, 2002 Sheet 4 of 20
`
`US 2002/0169539 Al
`
`“YPeRetad
`
`DOSEDCY
`
`Hoo?¢evfal
`
`grees|YOO)
` Ep“osYPod
`
`mornLID
`
`‘Satl¥shi
`
`
`
`
`
`Patent Application Publication Nov. 14, 2002 Sheet 5 of 20
`
`US 2002/0169539 Al
`
`
`Pobile. device. grands
`
`505
`
`gfo
`
`
`
`cco Hy leo LAL
`locadion fn 2 rinction
`
`S06
`
`§20
`
`;
`— acto a Henn
`ty Access
`
`be eation ha Lor tar eton
`
`
`
`| Staadery deste. Sends wequest
`fiw location of Hiobtle. Saye.
`
` SIS
`
` Check fir
`
`Aothow3a ion,
`
` transeat loced,
`
`Val d
`
`tn Poeune Finn
`
`
`
`Patent Application Publication Nov. 14, 2002 Sheet 6 of 20
`
`US 2002/0169539 Al
`
`pecedwe. request ts
`
`tranguat 4 query
`
`SoS
`
`S45
`
`
`SSS
`
` dransnatl
`the. quer
`
`tire AS watt
`loca Ann in forunatinn
`Lolth He. query
`
`cle. &
`
`
`
`Patent Application Publication Nov. 14, 2002 Sheet 7 of 20
`
`US 2002/0169539 Al
`
`96O
`
`S4SA
`
`}
`
`
`
`trancuat
`locafiaes
`(ndormedin,
`wot, query
`
`
`
`\
`
`
`Contos
`need 20
`?
`
`
`locahie ue pac S
`
`
`
`O pen a
`‘
`port ts
`S96
`elles remote
`
`
`VCC ts
`(oes fuse tacky.
`
`56S
`
`Yes
`
`
`
`S7O
`
`“end S7G
`
`FIG. 2ee
`
`
`
`Patent Application Publication Nov. 14, 2002 Sheet 8 of 20
`
`US 2002/0169539 Al
`
` 58O fa for mepbsn
`
`SES”
`
` Avuthar ‘gahen
`au thoude
`STE
`Ses7
`
`
`
`
`+ Vansutt
`ban tyausmissrs,
`be cation,
`of loco dex.
`
`
`infor mahon
`tn formefinn
`
`
`
`661.6
`
`
`
`Patent Application Publication Nov. 14, 2002 Sheet 9 of 20
`
`US 2002/0169539 Al
`
`
`
`
`
`bee trausmissin
`ef location
`tuforimcfion Gls
`
`D
`
`G2G
`
`LIG. 7ie
`
`
`
`Patent Application Publication Nov. 14,2002 Sheet 10 of 20
`
`US 2002/0169539 Al
`
`aaid
`
`CSE5
`MEREMMFYHSS-PSER“EYbeseOpMT“ag00.
`
`
`
`O29
`
`
`
`
`
`Patent Application Publication Nov. 14, 2002 Sheet 11 of 20
`
`US 2002/0169539 Al
`
`CaS
`
`Mv
`
`ic.
`
`If
`
`
`
`
`
`Patent Application Publication Nov. 14, 2002 Sheet 12 of 20
`
`US 2002/0169539 Al
`
`
`
`
`
`
`
`Patent Application Publication Nov. 14, 2002 Sheet 13 of 20
`
`US 2002/0169539 Al
`
`EY] 4
`
`
`
`Patent Application Publication Nov. 14, 2002 Sheet 14 0f 20
`
`US 2002/0169539 Al
`
`2/4
`
`SR
`
`po} <- ey ory
`
`-
`
`N [x
`
`30°
`
`FlG.
`
`{4
`
`
`
`
`
`Patent Application Publication Nov. 14, 2002 Sheet 15 of 20
`
`US 2002/0169539 Al
`
`
`
`Fig, 1s
`
`
`
`
`
`Patent Application Publication Nov. 14, 2002 Sheet 16 of 20)
`
`US 2002/0169539 Al
`
`fo
`ba
`
`Fig.
`
`I¢
`
`
`
`Patent Application Publication Nov. 14,2002 Sheet 17 of 20
`
`US 2002/0169539 Al
`
`7 tS300F
`
`D ——ad
`
`Pouth,
`CernJed
`
`HOF
`
`FIG, 17
`
`
`
`
`
`Patent Application Publication Nov. 14, 2002 Sheet 18 of 20)
`
`US 2002/0169539 Al
`
`Mourtsr
`
`
`
`
`
`=US 2002/0169539 Al
`
`
`
`4O3
`
`Patent Application Publication Nov. 14, 2002 Sheet 19 of 20)
`
`S3mefOS
`
`x
`
`Te Arig.
`
`FG, 19
`
`
`
`o>
`
`
`
`Patent Application Publication Nov. 14,2002 Sheet 20 of 20
`
`US 2002/0169539 Al
`
`OLolO20]Jo9GQl
`
`DOVAIALS
`
`ZNZG
`
`SS
`
`BasowA!4
`
`Awe
`CRIWOS,AD
`
`alol
`
`ny
`
`oso)
`
`
`
`
`
`US 2002/0169539 Al
`
`Nov. 14, 2002
`
`METHOD AND SYSTEM FOR WIRELESS
`TRACKING
`
`RELATED APPLICATION
`
`{0001] This application claimspriority to U.S. Provisional
`Patent Application serial No. 60/279,401, entitled VARI-
`ABLE DISTANCE RF TAG DISCLOSURE,and filed on
`Mar. 28, 2001, the specification of which is hereby incor-
`porated by reference.
`
`[0002] This application claimspriority to U.S. Provisional
`Patent Application serial No. 60/279,513, entitled RANGE
`AND BEARING INDICATOR FOR WIRELESS DEVICE,
`and filed on Mar. 28, 2001, the specification of which is
`hereby incorporated by reference.
`
`[0003] This application is related to U.S. patent applica-
`tion
`Ser. No,
`09/793,373,
`entitled EMERGENCY
`RESPONSE INFORMATION DISTRIBUTION,and filed
`on Feb. 26, 2001,
`the specification of which is hereby
`incorporated byreference.
`
`TECHNICAL FIELD
`
`[0004] This documentrelates generally to personal secu-
`rity and wireless networks and particularly, but not by way
`of limitation, to two-way wireless locating systems.
`
`BACKGROUND
`
`[0005] The increasing amount of global movement of
`goods and people has emphasized the shortcomings of
`current technology used for tracking. Typically, such sys-
`tems include a wireless transmitter and a compatible
`receiver. If the transmitted signal is no longer discernable,
`then the receiver assumes that a range has been exceeded
`and an alarm is sounded. Generally, the transmitter is not in
`audible range of the alarm and thus, has no way of knowing
`the whereabouts of the receiver, or the direction in which the
`transmitter has departed.
`
`[0006] Furthermore, after the transmitter is beyond the
`range of the receiver,
`in order to once again find the
`transmitter,
`the receiver is manually swept
`through an
`increasingly larger search grid. Searching in this manner is
`generally time intensive and costly.
`
`In addition, parents interested in monitoring the
`[0007]
`whereabouts of their children are generally unwilling to
`allow private location information to be distributed without
`restrictions.
`
`[0008] Such tracking systems are impractical for use with
`monitoring the whereabouts of children or movable objects.
`
`[0009] Therefore, there is a need for an improvedtracking
`system and method.
`
`SUMMARY
`
`[0010] The present subject matter is directed to sysiems
`and methods for managing location information based on a
`geographical location of a mobile device. The mobile device
`is adapted to communicate using wireless communication
`technology. Examples of wireless communication technol-
`ogy include, but are not limited to, BLUETOOTH® tech-
`nology, HomeRF® technology, cellular telephone technol-
`
`radio frequency (RF)
`technology,
`two-way pager
`ogy,
`technology, IEEE 802 technology and other wireless com-
`munication technology.
`
`[0011] The mobile device maybe located in, on or around
`an object, person, animal, or other physical item. The mobile
`device may include hardware and programming to function
`as a cellular telephone, a two-way pager, a personal com-
`Munication system (PCS),
`a personal digilal assistant
`(PDA), a portable computer (laptop, palm-top) or other
`portable device. The present subject matter provides meth-
`ods and systems by whichaccessto the location information
`may be granted to selected recipients and denied to other
`recipients. In addition, the accuracy of the location infor-
`mation maybetailored to suit particular objectives.
`
`[0012] The location information may be generated by a
`hardware module of the mobile device, by programming
`executing on hardware accessible to the communication
`network or by a combination of hardware within the mobile
`device and programming of the network.
`
`In one embodiment, a secondary device receives,
`[0013]
`or requests, access to the geographical location information
`of the mobile device. In one embodiment, the relationship
`between the secondary device and the mobile device can be
`viewed as a master-slave relationship with the mobile device
`assuming the role of either the master or the slave. In one
`embodiment, the relationship between the secondary device
`and the mobile device can be viewed as a peer-to-peer
`relationship with both the mobile device and the secondary
`device having substantially equal rights. Thus, one embodi-
`ment provides that a plurality of mobile devices can be
`configured in a manner wherebya first subset ofthe plurality
`of mobile devices are able to access location informationfor
`a second subset of mobile devices and are denied access to
`a location information to a third subset of mobile devices.
`
`In one embodiment, the mobile device includes a
`[0014]
`compass element. The compass element provides visible or
`audible directional information to a user. In this manner, the
`orientation of the mobile device can be adjusted and used as
`a direction finder.
`
`the present subject matter
`In one embodiment,
`[0015]
`providesa translational element for converting a message in
`a first communication protocol into a second communication
`protocol. Por example, assuming the mobile device includes
`a cellular telephone and a BLUETOOTH®transceiver and
`the secondary device to be used for monitoring the location
`of the mobile device includes a laptop computer not
`equipped with a BLUETOOTH®transceiver. Assume also
`that authorization has been granted to allow the secondary
`device to access the location information of the mobile
`device. In the event
`that
`location information from the
`mobile device is transmitted using the BLUETOOTH®
`transceiver, then an interface device, including hardware or
`software, provides
`a
`translation between the BLUE-
`TOOTH® communication protocol and a browser based
`program executing on the laptop computer. In one embodi-
`ment, the interface device converts dala in a first structure
`into data in a second structure. In one embodiment, the
`interface device converts data communicated in a first
`
`communication protocol into data in a second communica-
`tion protocol. The interface device may include a routine
`executing on the BLUETOOTH®transceiver at either the
`transmitter side or the receiver side of the communication
`
`
`
`US 2002/0169539 Al
`
`Nov. 14, 2002
`
`the interface device includes a
`link. In one embodiment,
`routine executing at a network operating center or monitor
`center, in which case, data of one type (protocol or structure)
`is received by the monitor center and returned as data of a
`second type (having a different protocol or structure).
`
`In one embodiment, location information is pro-
`[0016]
`vided in real time to an emergency response service pro-
`vider. Consider, for example, a situation wherein a mobile
`device is attached to, or carried on the interior, of a stolen
`automobile. The location of the mobile device is commu-
`nicated to a public safety answering point (PSAP)facility.
`
`the location information is
`In one embodiment,
`[0017]
`conveyed using a communication network.
`‘The network
`may be a local area network (LAN)or a wide area network
`(WAN)such as the Internet.
`
`In one embodiment, security mechanisms of the
`[0018]
`BLUETOOTH® communication protocol are utilized to
`restrict access to the location information.
`
`the present system allows
`In one embodiment,
`[0019]
`tracking of vehicles, assets, persons or animals. In one
`embodiment, the mobile device includes software and hard-
`ware. In one embodiment, the mobile device includes an
`electronic compass.
`
`In one embodiment the mobile device includes
`[0020]
`software adapted to calculate and display relative distances
`and bearings to a target location using graphical or textual
`representations.
`
`[0021] The second device may be stationary or mobile.
`The location information maybe accessible using the por-
`table device or accessible using the second device. In one
`embodiment, the relationship between the first device and
`second device can be viewed as a peer-to-peerrelationship.
`In one embodiment, the relationship betweenthefirst device
`and the second device can be viewed as a slave-master
`
`relationship.
`
`[0022] Other aspects of the invention will be apparent on
`reading the following detailed description of the invention
`and viewing the drawings that form a part thereof.
`
`BRIEF DESCRIPTION OF ‘THE DRAWINGS
`
`In the drawings, like numerals describe substan-
`[0023]
`tially similar components throughoutthe several views. Like
`numerals having different letter suffixes represent different
`instances of substantially similar components.
`
`[0024] FIG. 1 is a schematic view of networked commu-
`nications according to one embodimentof the present sub-
`ject matter.
`
`[0025] FIG. 2 is a block diagram of a mobile device
`according to one embodiment.
`
`[0026] FIG.3 illustrates serial communication between a
`mobile device and a monitor center.
`
`[0027] FIGS. 4A, 4B and 4Cillustrate location determin-
`ing sections in various embodiments.
`
`[0028] FIG. 5 illustrates a flow chart according to one
`embodiment.
`
`[0030] FIG. 7 illustrates a flow chart according to one
`embodiment.
`
`[0031] FIG. 8 illustrates a flow chart according to one
`embodiment.
`
`[0032] FIG. 9 illustrates a flow chart according to one
`embodiment.
`
`[0033] FIG. 10 illustrates a screen shot of a computer
`display according to one embodimentof the present subject
`matter.
`
`[0034] FIG. 11 illustrates a diagram of a second device.
`
`[0035] FIG. 12 illustrates a diagram ofa tag.
`
`[0036] FIG. 13 illustrates an overview of the system.
`
`[0037] FIG. 14 illustrates an embodiment of a personal
`tag system.
`
`[0038] FIG. 15 illustrates an embodiment of a courier
`tracking system.
`
`[0039] FIG. 16 illustrates an embodimentof a person-to-
`person tracking system.
`
`[0040] FIG. 17 illustrates an embodiment of a person-to-
`person tracking system used by a response agent to find a
`person in need.
`
`{0041] FIG. 18 illustrates an embodiment for requesting
`assistance from a monitor center.
`
`[0042] FIG. 19 illustrates an embodiment of the present
`system used to discover a landmark orservice.
`
`[0043] FIG. 20 includes a block diagram of an example
`embodiment of a system according to the present system.
`
`DETAILED DESCRIPTION
`
`In the following detailed description, reference is
`[0044]
`made to the accompanying drawings which form a part
`hercof, and in which is shown by wayofillustration specific
`embodiments in which the invention may be practiced.
`These embodiments are described in sufficient detail
`to
`enable those skilled in the art to practice the invention, and
`it is to be understood that the embodiments may be com-
`bined, or that other embodiments may be utilized and that
`structural,
`logical and electrical changes may be made
`without departing from the spirit and scope of the present
`invention. The following detailed description is, therefore,
`not to be taken in a limiting sense, and the scope of the
`present invention is defined by the appended claims and
`their equivalents.
`
`[0045] FIG. 1 illustrates system 10 including networked
`communications between first device 100, monitor center
`400 and second device 300. In the following description,
`first device 100 is also referred to as mobile device 100.
`Communication network 200 may include a digital local
`area network (LAN)or a wide area network (WAN)suchas
`the Internet. Other communication networks are also con-
`
`templated. For example, but not by way of limitation,
`network 200 may include a trunked radio network, a public
`switched telephone network (PSTN), a cellular telephone
`network, a two-way pager communication network.
`
`[0029] FIG. 6 illustrates a flow chart according to one
`embodiment.
`
`FIG.2 illustrates a block diagram of one embodi-
`[0046]
`ment of mobile device 100A. In the figure, wireless trans-
`
`
`
`US 2002/0169539 Al
`
`Nov. 14, 2002
`
`ceiver 110, having wireless transmitter 115 and wireless
`receiver 120, are coupled to antenna 105. Wireless trans-
`ceiver 110, in one embodiment, includes a short range radio
`frequency (RF) transceiver. In one embodiment, transceiver
`110 includes a BLUETOOTH®-compatible transceiver, a
`HomeRF®-compatible transceiver, an IEEE 802 transceiver
`or other wireless communication transceiver.
`
`[0047] Transceiver 110 is coupled to processor 130. In one
`embodiment, processor 130 includes a microprocessor or
`other computer. Processor 130 is coupled to I/O section 125
`which may include audio transducers (such as a speaker,
`microphone), a user accessible keypador buttons, or a visual
`display (such as a liquid crystal display (LCD) or light
`emitting diode (LED) display). Also coupled to processor
`130 are communication section 135, control 140 and loca-
`tion determining section 145.
`
`for
`[0048] Communication section 135 may include,
`cxample, a cellular telephone transcciver, a two-way pager
`transceiver, a personal communication transceiver, or other
`communication transceiver. In one embodiment, communi-
`cation section 135 includes a long range radio frequency
`(RF) communication transceiver.
`
`[0049] Control 140, in one embodiment, includes a switch
`to control the exchange of data between location determin-
`ing section (LDS) 145 andtransceiver 110 or between LDS
`145 and commsection 135. In one embodiment, the switch
`includes hardware or software. In various embodiments,
`control 140 includes programming executing on processor
`130 or programming, and hardware to manage the transmis-
`sion of location information from device 100A to remote
`receivers. Control 140 may represent a hardware device or
`a software routine.
`
`[0050] Location determining section 145, in one embodi-
`ment, includes a global positioning system (GPS) receiver or
`a long range navigation (LORAN)receiver. The output of
`LDS 145 is supplied as an electronic location signal to
`processor 130, and in one embodiment, and depending on
`the status of control 140, is provided to transceiver 110 or
`comm section 135. The electronic location signal may
`include digital data or an analog signal representing a
`geographical location.
`
`(0051] FIG. 3 illustrates serial communications between
`first device 100 and monitor center 400. Consider an
`
`example wherebyfirst device 100 is carried by a child. In
`this case,
`the location information of the child is to be
`safeguarded and access to the information is limited to
`authorized users only. Here, device 100 includes a short
`range transceiver such as BLUETOOTH® and using fre-
`quency hopping spread spectrum technology, the transceiver
`communicates the location information of device 100 to
`BLUETOOTH®-compatible pager device 150. In the event
`that pager device 150 is not an authorized recipient of the
`location information, then security protocols implemented
`by BLUETOOTH®precludes access to the location infor-
`mation by a user of pager device 150. The location infor-
`mation is relayed, or forwarded, to laptop 155 using either
`the two-waypagertransceiver or the BLUETOOTH®trans-
`ceiver of pager device 150. If laptop 155 is authorized to
`receive and access the location information, then the loca-
`tion information is displayed on the screen of laptop 155.
`Displaying location information on laptop 155 may include
`rendering a map image or textual description. In the event
`
`laptop 155 is not authorized to access the location informa-
`tion, then a transceiver executing in laptop 155 relays or
`forwards the information to second device 300.
`In one
`
`embodiment, laptop 155 is coupled to a network connection,
`either by a wired or wireless connection, and the location
`information is routed across the network to monitoring
`center 400. Second device 300, in one embodiment, includes
`a transceiver that relays the information to monitor center
`400 using a wireless connection. In this example, second
`device 300 is authorized to access the location information.
`A display screen of the second device 300 depicts a map,
`graphical image, or textual message representing the loca-
`tion information. In one embodiment, the location informa-
`tion is forwardedin a data stream, thus providing nearly real
`time representation of the location of first device 100.
`[0052]
`In one embodiment, programming executing on
`device 300, or device 100, determines the range between
`device 300 and device 100. Range information may be
`displayed on a display screen of device 100 or device 300.
`In one embodiment, programming executing on device 300
`determines the relative bearing to device 100. Bearing
`information may be displayed on a display screen of device
`300. In one embodiment, programming executing on device
`100 determines the relative bearing to device 300. Bearing
`information may be displayed on a display screen of device
`100.
`
`In one embodiment, device 300, or device 100,
`[0053]
`receives screen data from a monitor center, a central station,
`or a network center. The screen data includes coding to allow
`device 300, or device 100,
`to render a graphical image
`including such fields showingrelative orientation, bearing,
`distance and other data. In one embodiment, the screen data
`is generated by a third party device and provided to device
`300 or device 100 by wireless transmission.
`[0054]
`In one embodiment, an alarm signalis triggered if
`range or bearing information exceeds or falls below a
`predetermined threshold. Monitoring center 400 is adapted
`to automatically notify an emergency authority if such
`conditions exist.
`
`[0055] FIGS. 4A, 4B and 4C illustrate that the location
`determining section may be mobile device-based, network-
`based, or a combination of device-based and network-based.
`FIG.4Aillustrates one embodimentof location determining
`section 145, herein depicted as LDS 145A.In the figure,
`LDS 145Ais integrated with device 100B. For example,
`LDS 145A may include a GPS receiver positioned internal
`to device 100B. FIG.4B illustrates communication network
`200A having integral LDS 165A. Location information, in
`one embodiment, is based on a geographicallocationoffirst
`device 100C andis determined based on timing information
`for wireless signals between network 200A and device
`100C. Second device 300 is also connected to communica-
`
`tion network 200A.In one embodiment, a server coupled to
`network 200A includes programming to determine location
`information and selected clients accessing the server are able
`to receive the location information. Selected clients are those
`authorized to receive the location information. FIG. 4C
`illustrates LDS 145B and LDS 165B within first device
`100D and network 200B, respectively. In such an embodi-
`ment,
`the combination of information generated by LDS
`145B and LDS 165B provides the location information.
`[0056]
`In one embodiment, device 100 includes an elec-
`tronic circuit or an electronic circuit and programming for
`
`
`
`US 2002/0169539 Al
`
`Nov. 14, 2002
`
`determining location. In one embodiment, LDS 145 uses a
`terrestrial location system. There are several varieties of
`terrestrial solutions,
`including time differential,
`signal
`strength, angle of arrival and varieties of triangulation. In
`one embodiment, LDS 145 uses a combination ofterrestrial
`and satellite navigation systems.
`
`[0057] FIG. 5 illustrates a flowchart of method 500
`according to one embodimentof the present system. Method
`500 depicts a portion of a method implemented by a pro-
`cessor executing a program according to one embodiment.
`After start 501 and at 505, a mobile device grants authori-
`zation to access location information for the mobile device.
`The mobile device may include a suitably equipped cellular
`telephone transceiver, a two-way pager transceiver, a PCS
`transceiver or a PDA device with a transceiver. Other
`
`transceivers are also contemplated, and in one embodiment,
`the mobile device includes a transceiver dedicated for use as
`
`described herein. In one embodiment, the granting of autho-
`rization to access location information may be performed by
`a network element, such as a server, or a supervisory device
`or agent for the mobile device. For example, mobile device
`100 may be a slave to the monitoring, or second, device 300.
`
`[0058] At 510, the secondary device 300 submits a request
`to receive location information for mobile device 100. The
`
`request may be a coded message. The request may be
`received by device 100 or by communication network 200.
`In one embodiment, the request includes an authorization
`code, The absence of an authorization code is handled as
`though the authorization code were invalid.
`
`[0059] At 515, the method performs a check of the autho-
`rization. Multiple authorization codes may bevalid. In the
`event that the authorization is valid, at 525, the location
`information is transmitted to the second device 300. ‘The
`
`location information may be transmitted by a network
`element, such as a server, or by device 100. In the event that
`the authorization is invalid, at 520, the location information
`is withheld and not communicated to that requester. This
`portion of the method cndsat 526.
`
`[0060] FIG. 6 illustrates a flowchart of method 530
`according to one embodiment. After starting at 531,
`the
`method includes receiving a request to transmit a query. For
`example, the query may include a coded message such as
`“where is the nearest automatic teller machine (ATM)?” The
`coded message may be transmitted in response to user
`activation of a particular programmed key or a spoken
`command. At 540, the method determines if the request
`includes a location-dependent context. A location-dependent
`context may relate to the question of “where?” A suitable
`reply to a request having a location-dependent context
`includes evaluation of the location of the requester. The
`ATM example illustrates a location-dependent context.
`Location-dependent context requests include implicit autho-
`rizations to access location information.
`
`[0061] The method proceeds to 545 if the request includes
`a location-dependent context and to 550 if not. At 545, the
`method includes selecting a suitable location information
`accuracy. For example, to locate the nearest ATM machine,
`a low accuracy response is adequate. In one embodiment,
`accuracy need not be greater than 1000! resolution and an
`expected reply might include a list of the five nearest ATM
`machines. Thus, the accuracy of the location information is
`degraded to provide a measure of privacy protection for the
`
`requester. On the other hand, if the request calls for the
`nearest fire department, geographical accuracy will be more
`important than privacy protection for the requester, and in
`that case, accuracy may be degraded to a 50' resolution.
`
`[0062] At 555, the location information, along with the
`query, is transmitted. As noted the location information may
`be degraded.
`
`Ifthe query is not location-dependent, then at 550,
`[0063]
`the query is transmitted without inclusion of the location
`information. This portion of the method ends at 556.
`
`[0064] FIG. 7 includesa portion of a method commencing
`with 545A wherein the location information accuracy is
`selected. At 565, the method determinesif the nature of the
`requestjustifies continuing updates to the location informa-
`tion. For example,
`if a suitable response to the query
`includes periodic updates, as may be appropriate for travel
`information, then the method proceeds to 570. At 570, a port
`is opened to allow remote access to location information for
`a predetermined time period. If updated location information
`is not needed,
`then at 575,
`the location information is
`transmitted with the qucry and no further updates are
`provided. The method ends at 576.
`
`[0065] FIG. 8 illustrates a flowchart according to one
`embodiment. Beginning at 576, at 580, the location infor-
`mation is generated. The location information may be gen-
`erated by the mobile device or by the communication
`network or a combination of the device and the network. At
`
`585, a message is reccived. The message may include, for
`example,
`a
`request
`to send location information. For
`instance, a parent may send a message requesting the
`whereabouts of a child carrying a mobile device. The
`message may be sent from a computer, a cellular telephone,
`a BLUETOOTH®-equipped device, a PDA, a PCS or other
`such device. The message, in one embodiment, includes an
`authorization. The authorization mayinclude a password or
`coded message. The authorization, at 590 is checked for
`authenticity. If the authorizationis authentic, then at 595, the
`location information is transmitted. If the authorization is
`not authentic,
`then at 596,
`the transmission of location
`information is barred. The method ends at 597.
`
`FIG.9 illustrates a portion of one embodimentof
`[0066]
`a method including time-limited access to location informa-
`tion. At 590A, the method determinesif the authorization is
`authentic. If so, at 605, a timeris started. The timer may be
`implemented in software or hardware within the network or
`device 100. The duration of the timer maybe user-selectable
`using hardware or software. The timer may include a user-
`operable control at either end of the communication link. At
`610, the method determines if the timer has expired. If not
`expired, then, at 620, the method determinesif a request for
`location information has been received. If not,
`then the
`method returns to 610. If a request for location information
`has beenreceived, then after sending location information at
`625, the method returns to 610. In the event that the timer
`has expired, at 615, the transmission of location information
`is barred. Other methodsoflimiting the time of accessibility
`to location information are also contemplated.
`
`[0067] FIG. 10 illustrates a screen shot appearing on a
`computer display according to one embodiment of the
`present system. For example, a teenager mayaccess screen
`630 using a computer. In one embodiment, the program is
`
`
`
`US 2002/0169539 Al
`
`Nov. 14, 2002
`
`server based and accessible by a network connection, such
`as a LAN or WAN (for example,
`the Internet). In one
`embodiment, the screen is generated by software executing
`on a personal computer.In field 635, the user is notified that
`this screen is knownas the Location Information Access and
`Selection Screen. Fields within portion 640 allow user
`selection of authorized recipients of the location information
`for the teenager’s mobile device. Pull-down menus allow
`user selection of predetermined recipients and their associ-
`ated devices. Fields within portion 645 allow the teenager to
`specify the location information accuracy for each of the
`authorized recipients. As noted, some are to receive maxi-
`mum accuracy (limited by the technological hardware and
`program available) and others are to receive degraded accu-
`racy. Fields within portion 650 allow the teenager to specify
`restrictions on access to the location information. As noted
`
`in the figure, some recipients have norestrictions and others
`have
`time-dependent
`restrictions. Portion 655 allows
`changes to be applicd or cancelled. Other screens are also
`contemplated which allowcustomization of the distribution
`of the location information.
`
`In various embodiments, security methods are
`[0068]
`implemented to restrict access to location information. [or
`example, in one embodiment, the location of mobile device
`100 is only released with authorization of the user of mobile
`device 100. Authorization may be granted implicitly in a
`request or directly. In the absence of authorization, then
`location information is not released.
`
`In one embodiment, an authority can override
`[0069]
`restrictions on access that may have been implemented by a
`user. For example, in an emergency, a court order or sub-
`poena may force the release of location information without
`user authorization.
`
`the location information is
`In one embodiment,
`[0070]
`generated by network-based technology. In such an embodi-
`ment,
`the authorization to access location information is
`resolved by one or more servers coupled to the network. In
`one embodiment, the communication network has a trust
`relationship with a particular user and the user authorizes the
`network to release the location information.
`
`the location information is
`In one embodiment,
`(0071]
`