Anonymous location service for wireless networks

Information

  • Patent Grant
  • 9571958
  • Patent Number
    9,571,958
  • Date Filed
    Friday, December 13, 2013
    11 years ago
  • Date Issued
    Tuesday, February 14, 2017
    8 years ago
Abstract
An anonymous location wireless network service for use in a wireless network. The service provides content providers with the location of network users without revealing their identities. The service includes a wireless network having a proxy server, a network communication link to a plurality of web sites, and a wireless communication link to a plurality of handheld devices. The proxy server blocks identity by reading the location and identity information of network devices, generating dummy identifications, relating the dummy identifications to the identity information, storing the relationships in a memory storage, and forwarding the location information and dummy identifications to the global computer network. Upon receiving messages from the global computer network, the proxy server reads the dummy identifications, looks up the related identification information in the memory storage, and forwards the data to the appropriate network devices.
Description
BACKGROUND

1. Field of the Invention


The present invention relates to the field of wireless networks, and in particular, to wireless networks that track the location and identity of wireless network devices.


2. Background of the Invention


Enhanced wireless 911 (E911) services help ensure that wireless telephones provide 911 call centers, or Public Safety Answering Points (PSAPs), with vital information necessary to locate and identify a caller in an emergency. To comply with E911 standards promulgated by the Federal Communications Commission (FCC), wireless network providers will soon be required to track the location and identity information of all wireless callers, with the purpose of providing such information to emergency personnel when a caller dials 911 from a wireless telephone. The FCC's wireless E911 rules require certain Commercial Mobile Radio Services (CMRS) carriers to begin transmission of enhanced location and identity information in two phases. Phase I requires carriers to transmit a caller's telephone number and general location to a PSAP. Phase II requires carriers to provide more precise location information to the PSAP.


Under the FCC rules, wireless networks and the corresponding wireless handheld devices, such as cellular telephones, will provide both the identity and location of the caller to a 911 dispatcher. To provide a caller's identity, the wireless handheld device will furnish a device identification, e.g., a mobile identification number (MIN), indicating in most instances the telephone number of the device. The wireless network and wireless handheld devices will provide the location of callers using a network-based location system (e.g., triangulation), global positioning systems (GPSs) within the handheld devices, or a combination of the two systems.


In emergency situations, quickly communicating this location and identity information is an invaluable, life-saving tool. Indeed, although the location and identity information is generally perceived as private information, the public policy behind the E911 regulations favors disclosing such private information in hopes of administering the aid a caller needs in an emergency. However, outside of emergencies, most cellular device users view their location and identity information as intimately private, and express strong reservations against involuntary and automatic disclosures of such information.


These reservations are not without merit, as wireless network providers have several ways to exploit the location and identity information of network users. For example, a network provider could furnish a retailer with the identities of network users near the retailer's store, so that the retailer, in turn, could send an advertisement to the devices of the nearby network users, encouraging them to stop in and shop at the store. Knowing the identity of a network user, the retailer could also access profiling information on the user from data sources such as auxiliary marketing databases or historical databases chronicling previous business with the user. The profiling information would allow the retailer to provide targeted advertisements that are more likely to attract the user's business. However, in providing the identity information necessary for these targeted advertisements, the wireless network provider risks offending the network users with a significant invasion of privacy.


The wireless network provider therefore faces a dilemma in satisfying two customers with opposing interests: 1) the network users who desire reasonable privacy, and 2) the content providers (e.g., businesses and advertisers) who aim to appeal to the network users by obtaining as much information about the network users as possible. Thus, to appease both customers, a wireless network provider must provide enough information to content providers to promote effective content delivery and advertising, but at the same time must limit such information to guard the network users' privacy.


SUMMARY OF THE INVENTION

The present invention is an anonymous location wireless network service for use in a wireless network that tracks the location and identity of network users, such as networks complying with the E911 standards. The anonymous location wireless network service provides content providers (e.g., businesses and advertisers) with the location information of network users without revealing the identity of those network users. The service enables content providers to deliver (or “push”) advertisements that appeal to a certain class of network users based on location. For example, a class of network users could include users in locations convenient to the business's store or to users who have similar interests and who assemble in a single location, e.g., fans attending a sporting event at a stadium. The service also enables network users to query content providers to obtain information about the local area from which they are transmitting (referred to herein as “pull messaging”). Most importantly though, with either push or pull messaging, the service prevents the content provider from learning the identity of a network user and maintains this vital information in strict privacy.


In a preferred embodiment of the present invention, the anonymous location wireless network service includes a wireless network having a proxy server, a network communication link to a plurality of web sites, and a wireless communication link to a plurality of handheld devices. The proxy server includes a memory storage, as an integral or separate component, for storing the device identifications (e.g., MINs—mobile identification numbers) and dummy identifications of network users.


To provide location information, the overall system architecture of the present invention includes a location system. The location system provides the wireless network with position coordinates of a handheld device that indicate where a network user is located. The location system can be a part of the wireless network, can be contained in the handheld devices, or can be a combination of the two. In the preferred embodiment of the present invention, the location system is both a part of the wireless network and is also contained in the handheld devices. For example, a suitable method of determining location as a part of the wireless network is by a Wireless Access Protocol (WAP) location service, or perhaps by triangulation across cell sites or cell sectors. An example of a suitable location system in the handheld devices is a GPS.


In the preferred embodiment of the present invention, the proxy server performs the identity blocking function. Preferably, the proxy server reads the location and identity information of network users, generates a dummy identification, relates the dummy identification to the identity information, stores the relationship in the memory storage, and forwards the location information and dummy identification to the content provider in the global computer network. Upon receiving return messages from the global computer network, the proxy server reads the dummy identification, looks up the related identity information in the memory storage, and forwards the data to the appropriate network user.


As an alternate preferred embodiment of the present invention, instead of using a different dummy identification for the device identification of each device, the dummy identification corresponds to the location of the device. Thus, the proxy server substitutes the location of a device for the identity information and stores the relationship between the device location and device identification in memory. The substituted location could be the same for multiple devices. In this manner, the content provider's response would be a different content addressed to each location. In turn, the proxy server would look up in the memory storage the devices marked with the location to which the content provider addressed the content, would determine the corresponding device identification of each device marked with the location, and would return each different content to the corresponding devices.


In blocking identity, the proxy server acts as an intermediary between the plurality of handheld devices and the global computer network to provide security, administrative control, and caching service (e.g., caches material from popular web sites to reduce access times). Preferably, the proxy server is associated with or is part of a gateway server that separates the wireless network from the Internet. The proxy server could also be associated with a firewall server that separates the wireless network from the public network.


The proxy server communicates with the plurality of handheld devices through the wireless communication link. The proxy server provides routing selection (i.e., what transport bearer is to be used), access control, addressing, protocol conversion (i.e., WML text to WML binary), caching, and transport interface between wireless and wired networks (e.g., WAP stack to traditional IP stack, HTTP/TCP/IP). The proxy server runs one or more of the general operating systems, such as Windows 95™, Macintosh™, or UNIX™.


Accordingly, it is an object of the present invention to block identity information on wireless networks that track location and identity information, such as wireless networks that comply with E911 standards.


Another object of the present invention is to provide content providers (e.g., businesses and advertisers) with the location information of wireless network users without revealing the identity of those network users.


Another object of the present invention is to protect the identity of wireless network users while still providing a content provider with enough information to promote effective targeted content delivery (e.g., advertising).


Another object of the present invention is to allow wireless network users to query content providers for information relating to a particular location without revealing their identities.


These and other objects of the present invention are described in greater detail in the detailed description of the invention, the appended drawings, and the attached claims.





DESCRIPTION OF THE DRAWINGS


FIG. 1 is a schematic diagram of a system architecture that provides the anonymous location service according to a preferred embodiment of the present invention.



FIG. 2a is a schematic diagram of the system architecture illustrated in FIG. 1, showing the provision of an anonymous location service for pull messaging.



FIG. 2b is a flow chart corresponding to FIG. 2a, which traces the steps for providing anonymous location service for pull messaging.



FIG. 2c is a schematic diagram of a specific implementation of the preferred embodiment of the anonymous location service of FIG. 2a for pull messaging.



FIG. 3a is a schematic diagram of the system architecture illustrated in FIG. 1, showing the provision of an anonymous location service for push messaging.



FIG. 3b is a flow chart corresponding to FIG. 3a, which traces the steps for providing anonymous location service for push messaging.



FIG. 3c is a schematic diagram of a specific implementation of the preferred embodiment of the anonymous location service of FIG. 2a for push messaging.



FIG. 4 is a schematic diagram of an alternate embodiment of the system architecture illustrated in FIG. 1, in which the proxy server is used to control the delivery of web page banner advertisements.





DETAILED DESCRIPTION OF THE INVENTION

The present invention is an anonymous location service for use in a wireless network that tracks the location and identity of network users. The anonymous location service blocks the identity of a network user and provides only location information to a content provider. The present invention contemplates future enhanced digital cellular networks, in which network users will use digital cellular handheld devices to access data from a global computer network, and in which digital cellular network providers will track the identity and location of each network user.


Referring to FIG. 1, the primary components of the present invention include a proxy server 100, memory storage 102, a network communication link 104 to a plurality of web sites, and a wireless communication link 106 to a plurality of handheld devices 112. Each of these components is a part of a wireless network 110.


The system architecture in which the present invention operates further includes a plurality of handheld devices 112 in communication with wireless communication link 106, a global computer network 114 in communication with network communication link 104, and a plurality of web sites 116 and a plurality of content providers 118 in communication with global computer network 114. To track the location of wireless handheld devices 112, the system architecture includes one or both of handheld location systems (e.g., GPS) 120 or a network-based location system 122. Handheld location systems 120 are provisioned in wireless handheld devices 112 while network-based location system 122 is a part of wireless network 110, in communication with proxy server 100.


Proxy server 100 is essential to the present invention. Specifically, proxy server 100 receives, in conjunction with data messages, the location and identity information of wireless handheld devices 112, generates dummy identifications and substitutes the dummy identifications for the device identifications of devices 112, records the dummy identifications and their associated device identifications in memory storage 102, and forwards the data messaging with the location information and dummy identification to web sites 116 and content providers 118 via global computer network 114. On the return path, proxy server 100 receives a return data message from web sites 116 and content providers 118, reads the dummy identifications, consults memory storage 102 to determine the device identification that corresponds to the dummy identification, replaces the dummy identification with the device identification, and forwards the return data message to the appropriate wireless handheld device.


In the preferred embodiment of the present invention, proxy server 100 is a server that is dedicated to providing wireless handheld devices 112 with access to global computer network 114, and ultimately with information content available from web sites 116 and content providers 118. More preferably, proxy server 100 is a Wireless Application Protocol (WAP) server. WAP is an application environment and set of communication protocols for wireless devices designed to enable manufacturer-, vendor-, and technology-independent access to the Internet and advanced telephony services. WAP provides wireless Internet access through all digital cellular networks, giving network users a menu driven method for downloading information, such as flight schedules and bank balances, to cellular telephones from the Internet. WAP is described in WAP version 1.1, which is herein incorporated by reference in its entirety.


Memory storage 102 is a database or other memory storage device that can record relationships between device identifications (e.g., MINs) and dummy identifications.


Although shown as a separate component in FIG. 1, memory storage 102 could be contained in proxy server 100.


Wireless handheld devices 112 operate over wireless network 110 and provide means by which to exchange text data. Familiar examples include interactive pagers and cellular telephones with text messaging capabilities. Preferably, devices 112 are WAP-compatible thin clients having thin browsers adapted to communicate with proxy server 100 and to access global computer network 114. Global computer network 114 is preferably the Internet.


The plurality of web sites 116 and the plurality of content providers 118 are also preferably compatible with WAR Web sites 116 and content providers 118 communicate with devices 112 through global computer network 114 and wireless network 110. As with traditional web sites, content providers 118 and web sites 116 can transmit data to devices 112 in response to a query, or on their own initiative as a push message.


Handheld location system 120 and network-based location system 122 provide proxy server 100 with the locations of wireless handheld devices 112. Depending on the desired degree of accuracy, one or both of the location systems can be used to determine a device's location. The preferred embodiment of handheld location system 120 is individual GPSs provisioned in wireless handheld devices 112. The preferred embodiment of network-based location system 122 is a WAP location service.


With proxy server 100 providing the identity blocking function of the present invention, there are an unlimited number of applications for the anonymous location service. For clarity, set forth below are two examples of how the preferred embodiment of the present invention is implemented in different situations: 1) in response to a network user's query for information related to her location (pull messaging), or 2) in response to a content provider's desire to push messages to network users in a particular location (push messaging). In each example, proxy server 100 receives the location and identity information of wireless handheld devices 112 and forwards only the location information to web sites 116 and content providers 118 via global computer network 114. Proxy server 100 obtains the location and identity information of devices 112 by monitoring a user's accessing of the network (e.g., browsing the internet), by querying devices 112 on its own initiative, or by querying devices 112 at the request of web sites 116 and content providers 118.


Although these examples best illustrate the identification blocking feature of the present invention, one of ordinary skill in the art would appreciate that the anonymous location service is applicable to other wireless network messaging situations in which a caller on a network that tracks location and identity wishes to keep her identity private. In addition, while the system operation described herein and illustrated in the diagrams and flowcharts contains many specific details, these specific details should not be construed as limitations on the scope of the invention, but rather as examples of preferred embodiments thereof. As would be apparent to one of ordinary skill in the art, many other variations on the system operation are possible, including differently grouped and ordered method steps. Accordingly, the scope of the invention should be determined not by the embodiments illustrated, but by the appended claims and their equivalents.


In the case of a user query (pull messaging), as shown in FIGS. 2a and 2b, wireless handheld device 200 forwards a query 202 to proxy server 100 (step 250 in FIG. 2b). Query 202 contains the IP address of a web site 204 that the user wishes to access, the device identification of device 200, and, if device 200 includes handheld location system 120 (e.g., a GPS), the location of the device. Optionally, as shown in step 252, if the location system is a part of wireless network 110, proxy server 100, upon receipt of query 202, obtains the location of device 200 from network-based location system 122. Having the location and identity (e.g., MIN) of handheld wireless device 200, in step 254, proxy server 100 generates a dummy identification, replaces the device identification with the dummy identification, and relates the device identification to the dummy identification in memory storage 102. In step 256, proxy server 100 then forwards query 206 to the IP address of web site 204 through global computer network 114.


In step 258, the web server of web site 204 reads the location information associated with query 206 and formulates an answer based on the location of device 200. The web server of web site 204 then returns an answer message 208 to proxy server 100 through global computer network 114, in step 260. Then, in step 262, proxy server 100 reads the dummy identification in answer message 208, consults memory storage 102 for the related device identification, and substitutes the device identification for the dummy identification. Finally, in step 264, proxy server 100 returns answer message 210 to the user's device 200. Thus, by removing and replacing the device identification, proxy server 100 blocks the identity of the network user from reaching the external web server of web site 204.



FIG. 2c illustrates a specific implementation of the anonymous location service for pull messaging. This specific implementation demonstrates one example of how a web server can be blocked from receiving a user's identity, while still receiving and responding to the user's location-dependent query. As an example of a typical query, the user could ask the web server, “Tell me which restaurants are within walking distance of my current location.”


As shown in FIG. 2c, the system architecture for this specific implementation corresponds generally to the architecture of FIG. 2a. The dashed lines indicate generally which components of FIG. 2a relate to those of FIG. 2c. For example, mobile gateway 270 and privacy agent 272 perform the functions of proxy server 100 and memory storage 102.



FIG. 2c also shows arrows labeled in sequence, indicating the information flow and process steps of this specific implementation. In step 281, a user initiates a query from his wireless device 200 to the web server of web site 204. The query includes a location request, a device identification for wireless device 200, and a parameter for location preference. The location preference parameter indicates whether the user wants his identity forwarded or wants to remain anonymous. In this example, the user wants to block his identity. Therefore, in step 282, wireless device 200 marks the location preference anonymous. The user can execute this anonymous setting by, for example, configuring the default preference of wireless device 200, or by selecting a manual override (e.g., a menu selection or key sequence).


If wireless device 200 includes a location system, in step 283a, wireless device 200 requests location information from location system 120. In step 283b, location system 120 provides the location information, which wireless device 200 then incorporates into the query to web site 204. If wireless device 200 does not include a location system, then wireless device 200 incorporates a location request message in the query to web site 204. In step 284, wireless device 200 sends the query to mobile gateway 270.


If wireless device 200 does not have a location system and the query includes a location request message, then, in step 285a, mobile gateway 270 queries network-based location system 122 for the location of wireless device 200. The query to location system 122 references the device identification of wireless device 200. In response, network-based location system 122 provides mobile gateway 270 with the location information of wireless device 200, in step 285b.


In step 286a, as mobile gateway 270 forwards the query to web site 204, privacy agent 272 intercepts the message because it is marked anonymous. In step 286b, privacy agent 272 replaces the device identification of wireless device 200 with a dummy identification and forwards the query message to web site 204. At the same time, privacy agent 272 records the association between the device identification and the dummy identification.


In step 287, web server 204 receives the query message via global computer network 114 and sends a response back through network 114. Web site 204 formulates the response based on the location information, and addresses the response to the dummy identification.


In step 288, mobile gateway 270 recognizes that the response message includes a dummy identification and queries privacy agent 272 for the “real” device identification of wireless device 200. In step 289, privacy agent 272 finds the device identification associated with the dummy identification and sends the device identification to mobile gateway 270. Finally, in step 290, mobile gateway 270 sends the response message to wireless device 200, as identified by the device identification.


Referring to FIGS. 3a and 3b, for push messages, an external web server, from the plurality of web sites 116 or the plurality of content providers 118, delivers messages to network users in a particular location, without being prompted by user queries. For example, content provider 300 could be a typical Internet advertiser such as DoubleClick™. In such a case, as shown in step 350 in FIG. 3b, content provider 300 forwards a query 302 to proxy server 100 asking proxy server 100 to monitor for wireless handheld devices 112 that enter a particular location. In response, in step 352, proxy server 100 reads the location information of wireless handheld devices 112 that are powered on. Network-based location system 122, handheld location system 120, or a combination of both systems provides this location information.


As shown in step 354, proxy server 100 evaluates whether the location information it reads corresponds to the particular location noted the query by content provider 300. When the location information matches the location corresponding to query 302, proxy server 100 substitutes a dummy identification for the device identification of the wireless handheld device 304 (step 356), as described above for the user query example. Proxy server 100 forwards a notification message 306 to content provider 300 including the dummy identification and location information, in step 358. Then, in step 360, content provider 300 prepares a content message 308 (e.g., an advertisement), which references the dummy identification, and pushes content message 308 back to proxy server 100. In step 362, proxy server 100 translates the dummy identification to its corresponding device identification by consulting memory storage 102. Finally, in step 364, proxy server 100 delivers content message 310 to wireless handheld device 304, which is associated with a network user in the desired location. Thus, proxy server 100 blocks the network user identification so that it never reaches content provider 300.



FIG. 3c illustrates a specific implementation of the anonymous location service for push messaging. This specific implementation demonstrates one example of how a web server can be blocked from receiving a user's identity, while still receiving the user's location information and forwarding location-dependent messages. As an example, the web server of content provider 300 could provide alerts or content (e.g., banner advertisements) to a wireless device when the device 304 moves into a targeted area (e.g., a shopping mall).


As shown in FIG. 3c, the system architecture for this specific implementation corresponds generally to the architecture of FIG. 3a. The dashed lines indicate generally which components of FIG. 3a relate to those of FIG. 3c. For example, mobile gateway 370 and privacy agent 372 perform the functions of proxy server 100 and memory storage 102. In addition, as an alternative to the preferred embodiment described in FIGS. 3a and 3b, in which proxy server 100 evaluates whether location information matches a targeted area, this specific implementation monitors for a device in a targeted area using a handheld location monitor 374 in handheld location system 120 or a network location monitor 375 in network-based location system 122. To help illustrate specific processing functions, this specific implementation also includes handheld location agent 376 as a component of handheld location system 120 and network location agent 377 as a component of network-based location system 122.



FIG. 3c also shows arrows labeled in sequence, indicating the information flow and process steps of this specific implementation. The process begins under the assumption that wireless device 304 has chosen the anonymous identity option (i.e., the location preference parameter is equal to anonymous) and that content provider 300 has specified the targeted areas into which it wants to deliver messages to users. In step 381a, if wireless device 304 includes a handheld location system 120, handheld location agent 376 provides handheld location monitor 374 with the location of wireless device 304. If wireless device 304 does not include a handheld location system, network location agent 377 provides network location monitor 375 with the location of wireless device 304 in step 381b.


If wireless device 304 includes handheld location system 120, handheld location monitor 374 determines that wireless device 304 is within the targeted area and has chosen the anonymous option. If wireless device 304 does not include handheld location system 120, network location monitor 375 determines that wireless device 304 is within the targeted area and has chosen the anonymous option.


In step 382a, if wireless device 304 includes handheld location system 120, handheld location monitor 374 initiates an “in the area” message in wireless device 304 and forwards the message to content provider 300 (through mobile gateway 370). Alternately, if wireless device 304 does not include a handheld location system 120, in step 382b, network location monitor 375 sends an “in the area” message through global computer network 114 to content provider 300. In both steps 382a and 382b, the message also includes a device identification for wireless device 304, and a parameter for location preference. The location preference parameter indicates whether the user wants his identity forwarded or wants to remain anonymous. In this example, the location preference is marked anonymous.


In step 383a, before the message (from either wireless device 304 or network based location system 122) passes to global computer network 114, privacy agent 372 intercepts the message because it is marked anonymous. In step 383b, privacy agent 372 replaces the device identification of wireless device 304 with a dummy identification and forwards the message to content provider 300. At the same time, privacy agent 372 records the association between the device identification and the dummy identification.


In step 384, content provider 300 receives the “in the area” message via global computer network 114 and sends a response (e.g., an alert or content) back through network 114. Web site 300 formulates the response based on the location information and addresses the response to the dummy identification.


In step 385, mobile gateway 370 recognizes that the response message includes a dummy identification and queries privacy agent 372 for the “real” device identification of wireless device 304. In step 386, privacy agent 372 finds the device identification associated with the dummy identification and sends the device identification to mobile gateway 370. Finally, in step 387, mobile gateway 370 sends the response message to wireless device 304, as identified by the device identification.



FIG. 3c illustrates alternative preferred embodiments of communicating location information to an outside party, e.g., content provider 300. As shown, the communication could be between mobile gateway 370 and content provider 300 or could be between network-based location system 122 and content provider 300. As one of ordinary skill in the art would appreciate, many other solutions to providing this communication are possible, e.g., by direct communication between wireless device 304 and content provider 300.


In the push implementation, proxy server 100 monitors wireless handheld devices 112 that are powered on. In most instances, a network user simply turns on his wireless handheld device and leaves the network interface open to a web page. The initial accessing of the web page or the completion of any other wireless transmission (e.g., placing of a wireless telephone call) provides proxy server 100 with location and identity information. In addition, each time the web page automatically refreshes, or each time the network user enters a browse command, proxy server 100 receives updated location information. In this manner, proxy server 100 can continually monitor for devices that enter a location to which a content provider wants to push content messages.


With regard to both push and pull messages, in most cases, proxy server 100 preferably removes identity information from a user message before the message enters global computer network 114. Removing the identity information within wireless network 110 ensures the greatest privacy, yet still accommodates generic network access needs. For example, a web site would not need the identity of a network user to provide general data, such as stock prices, television guides, and flight schedules. The web site would simply respond to a request for this public information, without regard for the identity of the requesting party.


However, in some cases, web sites must know the identity of a network user to provide private customer-specific information. For example, instead of just stock prices, a network user may want to view the performance of his particular stock portfolio. The web site administering his portfolio would need to know his identity to access the correct portfolio data and to provide the data in a secured transaction. Presumably, the network user would authorize the web site to receive his identity information under the condition that his identity not be passed on to other web sites. However, conflicting with this conditional authorization, these same web sites often sell advertisements off of their web pages in the form of banner ads. Typically, when the network user opens a web page with a banner ad, the web site calls out to the advertiser to have an advertisement downloaded. In this exchange, the advertisers, seeking to maximize effectiveness, ask the web sites for as much information about the network user as possible, including location and identity. The danger is that the web site will relinquish this private identity information to the advertiser.



FIG. 4 illustrates an alternate embodiment of the invention that prevents this breach of privacy. Thus, when wireless handheld device 400 accesses web site 402 and opens a web page having a banner ad, web site 402 calls out to proxy server 100 along path 404, instead of directly to content provider 406 along path 408. When proxy server 100 receives the request to insert a banner ad, proxy server 100 substitutes a dummy identification for the device identification, as described above, and forwards the dummy identification and location information to content provider 406 along path 410. Using the location information, content provider 406 returns a targeted content to proxy server 100 along path 412. Proxy server 100 translates the dummy identification embedded in the content into the appropriate device identification, and forwards the content and device identification to web site 402 along path 414a for display on wireless handheld device 400 along with other content provided by web site 402. Alternately, proxy server 100 could forward the content directly to wireless handheld device 400 along path 414b. Therefore, the private identification information never passes to an unauthorized third party.


In an alternate preferred embodiment of the present invention, the dummy identification that the proxy server associates with a device identification is the location of the device. Thus, instead of using a different dummy identification for the device identification of each device, the dummy identification corresponds to a device's location, which could be the same for multiple devices. Thus, the proxy server substitutes the location of a device for the identity information and stores the relationship between the device location and device identification in memory. In this manner, the content provider's response would be a different content addressed to each location. In turn, the proxy server would look up in the memory storage the devices marked with the location to which the content provider addressed the content, would determine the corresponding device identification of each device marked with the location, and would return each different content to the corresponding devices.


For example, if devices A and B are in location X and device F is in location Y, the proxy server would substitute X for the device identifications of devices A and B, and would substitute Y for the device identification of device F. In memory, the proxy server would associate the identifications of devices A and B to X and the identification of F to Y. The content provider would forward content X addressed to X and would forward content Y addressed to Y. Then, the proxy server would read the X and Y addresses, consult the memory for device identifications associated with the X and Y addresses (locations), and forward content X to devices A and B and content Y to device F.


Although discussed above in the context of ordinary web sites, one of ordinary skill in the art would appreciate that the present invention is applicable to communications beyond HyperText Markup Language (HTML) and Wireless Markup Language (WML). Indeed, the present invention is applicable to such communications as voice calls and video calls. The true spirit and scope of the invention should not be limited to the web site embodiments described above, but instead should be defined by the claims appended hereto, and by their equivalents.


The foregoing disclosure of embodiments of the present invention has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise forms disclosed. Many variations and modifications of the embodiments described herein will be obvious to one of ordinary, skill in the art in light of the above disclosure. The scope of the invention is to be defined only by the claims appended hereto and by their equivalents.

Claims
  • 1. A method comprising: receiving, at a system comprising a processor, a request regarding a targeted area, the request being received from a requester;receiving, by the system, a device identifier associated with a wireless device located within the targeted area;determining, by the system, that a preference associated with the wireless device indicates that the device identifier is not to be shared; andsending, by the system and to the requester, a dummy identification that is a substitute for the device identifier.
  • 2. The method of claim 1, further comprising: determining, by the system, location information that indicates a location of the wireless device; anddetermining, by the system, that the wireless device is located within the targeted area based upon the location information.
  • 3. The method of claim 1, further comprising: associating, by the system, the device identifier with the dummy identification to form a stored association between the device identifier and the dummy identification.
  • 4. The method of claim 3, wherein receiving the request comprises receiving a plurality of requests associated with a plurality of wireless devices located within the targeted area.
  • 5. The method of claim 4, wherein receiving the device identifier comprises receiving a plurality of device identifiers for the plurality of wireless devices.
  • 6. The method of claim 5, wherein associating the device identifier with the dummy identification comprises associating the plurality of device identifiers with a single dummy identification.
  • 7. The method of claim 1, wherein the wireless device comprises a first wireless device, wherein the dummy identification comprises a first dummy identification, and wherein the targeted area comprises a first targeted area.
  • 8. The method of claim 7, further comprising: receiving, by the system, a second device identifier that corresponds to a second wireless device associated with a second targeted area; andassociating, by the system, the second device identifier with a second dummy identification in response to determining that the second wireless device is associated with the second targeted area.
  • 9. The method of claim 1, further comprising: receiving, by the system, a further request from a further requester, the further request relating to the targeted area; andsending, by the system, the dummy identification to the further requester in response to receiving the further request.
  • 10. The method of claim 1, wherein the dummy identification is associated with the targeted area.
  • 11. A method comprising: receiving, at a proxy server comprising a processor, a request that relates to a targeted area, the request being received from a requester;receiving, by the proxy server, a device identifier associated with a wireless device that is located within the targeted area;determining, by the proxy server, that a preference associated with the wireless device indicates that the device identifier is not to be shared; andsending, by the proxy server and to the requester, a dummy identification that is a substitute for the device identifier.
  • 12. The method of claim 11, further comprising: associating, by the proxy server, the device identifier with the dummy identification to form a stored association between the device identifier and the dummy identification.
  • 13. The method of claim 12, wherein receiving the request comprises receiving a plurality of requests associated with plurality of wireless devices located within the targeted area, wherein receiving the device identifier comprises receiving a plurality of device identifiers for the plurality of wireless devices, and wherein associating the device identifier with the dummy identification comprises associating the plurality of device identifiers with a single dummy identification.
  • 14. The method of claim 11, wherein the wireless device comprises a first wireless device, wherein the dummy identification comprises a first dummy identification, and wherein the targeted area comprises a first targeted area.
  • 15. The method of claim 14, further comprising: receiving, by the proxy server, a second device identifier that corresponds to a second wireless device associated with a second targeted area; andassociating, by the proxy server, the second device identifier with a second dummy identification in response to determining that the second wireless device is associated with the second targeted area.
  • 16. A method comprising: receiving, at a system comprising a processor, a request regarding a pre-identified vicinity, the request being received from a requester;receiving, by the system, identification information that corresponds to a wireless device associated with the pre-identified vicinity;determining, by the system, location information that indicates a location of the wireless device;determining, by the system, that a privacy setting associated with the wireless device is set to disallow communication of identification information associated with the wireless device;in response to determining that the privacy setting is set to disallow the communication of the identification information, associating, by the system, the location information with a dummy identification that is a substitute for the identification information; andsending, by the system and to the requester, the dummy identification.
  • 17. The method of claim 16, wherein determining that the privacy setting is set to disallow communication further comprises determining that the privacy setting is set to allow communication of the location information.
  • 18. The method of claim 16, wherein the wireless device comprises a cellular telephone.
  • 19. The method of claim 11, wherein the dummy identification corresponds to a location of the wireless device.
  • 20. The method of claim 16, wherein the dummy identification corresponds to the location of the wireless device.
CROSS REFERENCE TO RELATED APPLICATIONS

This patent application is a continuation of U.S. patent application Ser. No. 13/778,264, filed Feb. 27, 2013, now U.S. Pat. No. 8,645,505, which is incorporated by reference in its entirety; and which is a continuation of U.S. patent application Ser. No. 13/246,193, now U.S. Pat. No. 8,402,117, filed Sep. 27, 2011, which is incorporated by reference in its entirety; and which is a continuation of U.S. patent application Ser. No. 12/198,346, now U.S. Pat. No. 8,041,817, filed Aug. 26, 2008, which is incorporated by reference in its entirety; and which is a continuation of U.S. patent application Ser. No. 11/375,849, now U.S. Pat. No. 7,418,503, filed Mar. 15, 2006, which is incorporated by reference in its entirety; and which is a continuation of U.S. patent application Ser. No. 10/819,940, now U.S. Pat. No. 7,069,319, filed Apr. 8, 2004, which is incorporated by reference in its entirety; and which is a continuation of U.S. patent application Ser. No. 09/606,535, now U.S. Pat. No. 6,738,808, filed Jun. 30, 2000, which is incorporated herein by reference in its entirety.

US Referenced Citations (366)
Number Name Date Kind
4014004 Fuller Mar 1977 A
4445118 Taylor et al. Apr 1984 A
4757267 Riskin Jul 1988 A
4893335 Fuller et al. Jan 1990 A
5127042 Gillig et al. Jun 1992 A
5128981 Tsukamoto et al. Jul 1992 A
5303393 Noreen et al. Apr 1994 A
5321242 Heath, Jr. Jun 1994 A
5353334 O'Sullivan Oct 1994 A
5367563 Sainton Nov 1994 A
5375161 Fuller et al. Dec 1994 A
5440758 Grube et al. Aug 1995 A
5444444 Ross Aug 1995 A
5451757 Heath, Jr. Sep 1995 A
5511111 Serbetcioglu et al. Apr 1996 A
5512908 Herrick Apr 1996 A
5528248 Steiner et al. Jun 1996 A
5544222 Robinson et al. Aug 1996 A
5566235 Hetz Oct 1996 A
5588037 Fuller et al. Dec 1996 A
5588042 Comer Dec 1996 A
5596625 LeBlanc Jan 1997 A
5610970 Fuller et al. Mar 1997 A
5610973 Comer Mar 1997 A
5625364 Herrick et al. Apr 1997 A
5657375 Connolly et al. Aug 1997 A
5663734 Krasner Sep 1997 A
5673299 Fuller et al. Sep 1997 A
5694453 Fuller et al. Dec 1997 A
5696815 Smyk Dec 1997 A
5701301 Weisser, Jr. Dec 1997 A
5712899 Pace, II Jan 1998 A
5713075 Threadgill et al. Jan 1998 A
5715297 Wiedeman Feb 1998 A
5720033 Deo Feb 1998 A
5727057 Emery et al. Mar 1998 A
5729537 Billstrom Mar 1998 A
5751760 Fuller et al. May 1998 A
5752191 Fuller et al. May 1998 A
5754938 Herz et al. May 1998 A
5771283 Chang et al. Jun 1998 A
5790953 Wang et al. Aug 1998 A
5794210 Goldhaber et al. Aug 1998 A
5812763 Teng Sep 1998 A
5819155 Worthy et al. Oct 1998 A
5825283 Camhi Oct 1998 A
5825775 Chin et al. Oct 1998 A
5835907 Newman Nov 1998 A
5838774 Weisser, Jr. Nov 1998 A
5848131 Shaffer et al. Dec 1998 A
5852775 Hidary Dec 1998 A
5875401 Rochkind Feb 1999 A
5889953 Thebaut et al. Mar 1999 A
5903636 Malik May 1999 A
5924016 Fuller et al. Jul 1999 A
5949865 Fusinato Sep 1999 A
5949867 Sonnenberg Sep 1999 A
5959577 Fan et al. Sep 1999 A
5961593 Gabber et al. Oct 1999 A
5963866 Palamara et al. Oct 1999 A
5968176 Nessett et al. Oct 1999 A
6011975 Emery et al. Jan 2000 A
6021126 White et al. Feb 2000 A
6028921 Malik et al. Feb 2000 A
6047327 Tso et al. Apr 2000 A
6055637 Hudson et al. Apr 2000 A
6060993 Cohen May 2000 A
6072768 Wiedeman et al. Jun 2000 A
6076080 Morscheck et al. Jun 2000 A
6085086 La Porta et al. Jul 2000 A
6091956 Hollenberg Jul 2000 A
6101381 Tajima et al. Aug 2000 A
6112186 Bergh et al. Aug 2000 A
6119000 Stephenson et al. Sep 2000 A
6122520 Want et al. Sep 2000 A
6133853 Obradovich et al. Oct 2000 A
6138003 Kingdon et al. Oct 2000 A
6138119 Hall et al. Oct 2000 A
6157829 Grube et al. Dec 2000 A
6182226 Reid et al. Jan 2001 B1
6183003 Matsuhashi et al. Feb 2001 B1
6184829 Stilp Feb 2001 B1
6185426 Alperovich et al. Feb 2001 B1
6201950 Fuller et al. Mar 2001 B1
6208854 Roberts et al. Mar 2001 B1
6208857 Agre et al. Mar 2001 B1
6208866 Rouhollahzadeh et al. Mar 2001 B1
RE37141 O'Sullivan Apr 2001 E
6229477 Chang et al. May 2001 B1
6230188 Marcus May 2001 B1
6233329 Urban et al. May 2001 B1
6233463 Wiedeman et al. May 2001 B1
6243581 Jawanda Jun 2001 B1
6249577 Baldwin Jun 2001 B1
6259405 Stewart et al. Jul 2001 B1
6311069 Havinis et al. Oct 2001 B1
6317718 Fano Nov 2001 B1
6321092 Fitch et al. Nov 2001 B1
6324349 Nakano et al. Nov 2001 B2
6324396 Vasa et al. Nov 2001 B1
6332127 Bandera et al. Dec 2001 B1
6340935 Hall Jan 2002 B1
6353664 Cannon et al. Mar 2002 B1
6363419 Martin et al. Mar 2002 B1
6369754 Levanon Apr 2002 B1
6374246 Matsuo Apr 2002 B1
6377810 Geiger et al. Apr 2002 B1
6381465 Chern et al. Apr 2002 B1
6385591 Mankoff May 2002 B1
6404876 Smith et al. Jun 2002 B1
6411899 Dussell et al. Jun 2002 B2
6414635 Stewart et al. Jul 2002 B1
6418308 Heinonen et al. Jul 2002 B1
6421411 Hsieh Jul 2002 B1
6421441 Dzuban Jul 2002 B1
6427073 Kortesalmi et al. Jul 2002 B1
6442391 Johansson et al. Aug 2002 B1
6442687 Savage Aug 2002 B1
6449497 Kirbas et al. Sep 2002 B1
6463533 Calamera et al. Oct 2002 B1
6466862 DeKock et al. Oct 2002 B1
6470378 Tracton et al. Oct 2002 B1
6470447 Lambert et al. Oct 2002 B1
6473626 Nevoux et al. Oct 2002 B1
6477382 Mansfield et al. Nov 2002 B1
6484148 Boyd Nov 2002 B1
6491217 Catan Dec 2002 B2
6496931 Rajchel et al. Dec 2002 B1
6505046 Baker Jan 2003 B1
6505048 Moles et al. Jan 2003 B1
6505049 Dorenbosch Jan 2003 B1
6505163 Zhang et al. Jan 2003 B1
6516203 Enzmann et al. Feb 2003 B1
6519530 Crockett et al. Feb 2003 B2
6522876 Weiland et al. Feb 2003 B1
6526275 Calvert Feb 2003 B1
6526506 Lewis Feb 2003 B1
6529159 Fan et al. Mar 2003 B1
6545596 Moon Apr 2003 B1
6546257 Stewart Apr 2003 B1
RE38127 O'Sullivan May 2003 E
6559769 Anthony et al. May 2003 B2
6560442 Yost et al. May 2003 B1
6560448 Baldwin et al. May 2003 B1
6560461 Fomukong et al. May 2003 B1
6571279 Herz et al. May 2003 B1
6574548 DeKock et al. Jun 2003 B2
6590885 Jorgensen Jul 2003 B1
6594482 Findikli et al. Jul 2003 B1
6594483 Nykanen et al. Jul 2003 B2
6614781 Elliott et al. Sep 2003 B1
6615186 Kolls Sep 2003 B1
6618474 Reese Sep 2003 B1
6618593 Drutman et al. Sep 2003 B1
6622016 Sladek et al. Sep 2003 B1
6625457 Raith Sep 2003 B1
6628928 Crosby et al. Sep 2003 B1
6628938 Rachabathuni et al. Sep 2003 B1
6640184 Rabe Oct 2003 B1
6647257 Owensby Nov 2003 B2
6647269 Hendrey et al. Nov 2003 B2
6650901 Schuster et al. Nov 2003 B1
6654607 Shobatake et al. Nov 2003 B1
6662014 Walsh Dec 2003 B1
6675017 Zellner et al. Jan 2004 B1
6677894 Sheynblat et al. Jan 2004 B2
6678265 Kung et al. Jan 2004 B1
6700964 Schmid Mar 2004 B2
6701160 Pinder et al. Mar 2004 B1
6711474 Treyz et al. Mar 2004 B1
6716101 Meadows et al. Apr 2004 B1
6725048 Mao et al. Apr 2004 B2
6731238 Johnson May 2004 B2
6732101 Cook May 2004 B1
6735291 Schmid May 2004 B1
6738808 Zellner et al. May 2004 B1
6748217 Hunzinger et al. Jun 2004 B1
6754504 Reed Jun 2004 B1
6779020 Henrick Aug 2004 B1
6782259 Bamburak et al. Aug 2004 B2
6799049 Zellner et al. Sep 2004 B1
RE38645 O'Sullivan Nov 2004 E
6816720 Hussain et al. Nov 2004 B2
6819929 Antonucci et al. Nov 2004 B2
6826414 Reynolds et al. Nov 2004 B1
6829475 Lee et al. Dec 2004 B1
6834050 Madour et al. Dec 2004 B1
6834341 Bahl et al. Dec 2004 B1
6850758 Paul et al. Feb 2005 B1
6867733 Sandhu et al. Mar 2005 B2
6868074 Hanson Mar 2005 B1
6874011 Spielman Mar 2005 B1
6876858 Duvall et al. Apr 2005 B1
6879584 Thro et al. Apr 2005 B2
6882641 Gallick et al. Apr 2005 B1
6898433 Rajaniemi et al. May 2005 B1
6934558 Sainton et al. Aug 2005 B1
6937869 Rayburn Aug 2005 B1
6940950 Dickinson et al. Sep 2005 B2
6954147 Cromer et al. Oct 2005 B1
6954526 Glenn et al. Oct 2005 B1
6954649 Kotzin Oct 2005 B2
6961583 Moles et al. Nov 2005 B2
6961584 Leedom, Jr. Nov 2005 B2
6963557 Knox Nov 2005 B2
6975874 Bates et al. Dec 2005 B1
6978023 Dacosta Dec 2005 B2
6996211 Reynolds et al. Feb 2006 B2
6999779 Hashimoto Feb 2006 B1
7005985 Steeves Feb 2006 B1
7023995 Olsson Apr 2006 B2
7039431 Mukherjee May 2006 B2
7043231 Bhatia et al. May 2006 B2
7051196 Angelo et al. May 2006 B2
7069319 Zellner et al. Jun 2006 B2
7079627 Crago et al. Jul 2006 B2
7085555 Zellner et al. Aug 2006 B2
7085578 Barclay et al. Aug 2006 B2
7093286 King Aug 2006 B1
7103368 Teshima Sep 2006 B2
7103460 Breed Sep 2006 B1
7106843 Gainsboro et al. Sep 2006 B1
7110749 Zellner et al. Sep 2006 B2
7116977 Moton et al. Oct 2006 B1
7123693 Nelson et al. Oct 2006 B2
7124101 Mikurak Oct 2006 B1
7130630 Enzmann et al. Oct 2006 B1
RE39427 O'Sullivan Dec 2006 E
7181017 Nagel et al. Feb 2007 B1
7181225 Moton et al. Feb 2007 B1
7181529 Bhatia et al. Feb 2007 B2
7190960 Wilson et al. Mar 2007 B2
7203502 Wilson et al. Apr 2007 B2
7212829 Lau et al. May 2007 B1
7224978 Zellner et al. May 2007 B2
7224987 Bhela et al. May 2007 B1
7231027 Schmid Jun 2007 B2
7236799 Wilson et al. Jun 2007 B2
7245925 Zellner Jul 2007 B2
7260186 Zhu et al. Aug 2007 B2
7260378 Holland et al. Aug 2007 B2
7284232 Bates et al. Oct 2007 B1
7299034 Kates Nov 2007 B2
7305350 Bruecken Dec 2007 B1
7330464 Brouwer et al. Feb 2008 B2
7366522 Thomas Apr 2008 B2
7383052 Moton et al. Jun 2008 B2
7412234 Zellner Aug 2008 B2
7418503 Zellner et al. Aug 2008 B2
7428411 Zellner Sep 2008 B2
7433673 Everson et al. Oct 2008 B1
7509133 Zellner et al. Mar 2009 B2
7529359 Gallant et al. May 2009 B2
7552467 Lindsay Jun 2009 B2
7593712 Moton et al. Sep 2009 B2
7603110 Zellner Oct 2009 B2
7606938 Roese et al. Oct 2009 B2
7636575 Enzmann et al. Dec 2009 B2
7664488 Zellner et al. Feb 2010 B2
7664509 Zellner et al. Feb 2010 B2
7668537 De Vries Feb 2010 B2
7680590 Sanqunetti Mar 2010 B2
7685629 White et al. Mar 2010 B1
7796998 Zellner et al. Sep 2010 B1
7844284 Enzmann et al. Nov 2010 B2
7853268 Karaoguz Dec 2010 B2
7873369 Zellner et al. Jan 2011 B2
7894801 Zellner et al. Feb 2011 B2
7941130 Moton et al. May 2011 B2
7966026 Zellner et al. Jun 2011 B2
8010126 Moton et al. Aug 2011 B2
8041817 Zellner et al. Oct 2011 B2
8064930 Enzmann et al. Nov 2011 B2
8086224 Zellner et al. Dec 2011 B2
8165568 Zellner et al. Apr 2012 B2
8185130 Zellner et al. May 2012 B2
8832789 Gossweiler, III Sep 2014 B1
8972589 Roese et al. Mar 2015 B2
20010021646 Antonucci et al. Sep 2001 A1
20010034709 Stoifo et al. Oct 2001 A1
20020035605 McDowell et al. Mar 2002 A1
20020035699 Crosbie Mar 2002 A1
20020037709 Bhatia et al. Mar 2002 A1
20020037722 Hussain et al. Mar 2002 A1
20020037731 Mao et al. Mar 2002 A1
20020037744 Bhatia et al. Mar 2002 A1
20020037750 Hussain et al. Mar 2002 A1
20020038362 Bhatia et al. Mar 2002 A1
20020038386 Bhatia et al. Mar 2002 A1
20020052781 Aufricht et al. May 2002 A1
20020070879 Gazit et al. Jun 2002 A1
20020077083 Zellner et al. Jun 2002 A1
20020077084 Zellner et al. Jun 2002 A1
20020077118 Zellner et al. Jun 2002 A1
20020077130 Owensby et al. Jun 2002 A1
20020077897 Zellner et al. Jun 2002 A1
20020077987 Hasegawa et al. Jun 2002 A1
20020090932 Bhatia et al. Jul 2002 A1
20020095312 Wheat Jul 2002 A1
20020102993 Hendrey et al. Aug 2002 A1
20020107027 O'Neil Aug 2002 A1
20020173317 Nykanen et al. Nov 2002 A1
20030046405 O'Neill et al. Mar 2003 A1
20030109245 McCalmont et al. Jun 2003 A1
20030134648 Reed et al. Jul 2003 A1
20030195698 Jones Oct 2003 A1
20030216143 Roese et al. Nov 2003 A1
20030216144 Roese et al. Nov 2003 A1
20030229592 Florance et al. Dec 2003 A1
20040097243 Zellner et al. May 2004 A1
20040203900 Cedervall et al. Oct 2004 A1
20040203901 Wilson et al. Oct 2004 A1
20040203903 Wilson et al. Oct 2004 A1
20040205198 Zellner et al. Oct 2004 A1
20040218742 Schmid Nov 2004 A1
20040252051 Johnson Dec 2004 A1
20050272445 Zellner Dec 2005 A1
20060030335 Zellner et al. Feb 2006 A1
20060030339 Zhovnirovsky et al. Feb 2006 A1
20060089134 Moton et al. Apr 2006 A1
20060094447 Zellner May 2006 A1
20060099966 Moton et al. May 2006 A1
20060105784 Zellner et al. May 2006 A1
20060166679 Karaoguz Jul 2006 A1
20060167986 Trzyna et al. Jul 2006 A1
20060189327 Zellner et al. Aug 2006 A1
20060195570 Zellner et al. Aug 2006 A1
20070005188 Johnson Jan 2007 A1
20070010260 Zellner Jan 2007 A1
20070015495 Winter et al. Jan 2007 A1
20070027621 Operowsky et al. Feb 2007 A1
20070042789 Moton et al. Feb 2007 A1
20070047523 Jiang Mar 2007 A1
20070063875 Hoffberg Mar 2007 A1
20070105565 Enzmann et al. May 2007 A1
20070124721 Cowing et al. May 2007 A1
20070136603 Kuecuekyan Jun 2007 A1
20070142060 Moton et al. Jun 2007 A1
20070250920 Lindsay Oct 2007 A1
20080096529 Zellner Apr 2008 A1
20080132252 Altman et al. Jun 2008 A1
20080261571 Zellner et al. Oct 2008 A1
20080261624 Moton et al. Oct 2008 A1
20080299957 Zellner et al. Dec 2008 A1
20090047937 Zellner et al. Feb 2009 A1
20090259588 Lindsay Oct 2009 A1
20090325551 Zellner et al. Dec 2009 A1
20100035636 Enzmann et al. Feb 2010 A1
20100105417 Zellner et al. Apr 2010 A1
20100131584 Johnson May 2010 A1
20100151815 Zellner et al. Jun 2010 A1
20100296510 Zellner Nov 2010 A1
20110047179 Enzmann et al. Feb 2011 A1
20110053559 Klein Mar 2011 A1
20110143708 Zellner et al. Jun 2011 A1
20110312341 Moton et al. Dec 2011 A1
20120034930 Zellner et al. Feb 2012 A1
20120052843 Enzmann et al. Mar 2012 A1
20120123869 Zellner et al. May 2012 A1
20120196572 Zellner et al. Aug 2012 A1
20120264452 Zellner et al. Oct 2012 A1
20120276873 Zellner et al. Nov 2012 A1
20120289251 Moton et al. Nov 2012 A1
20120309416 Whelan Dec 2012 A1
20140222493 Mohan Aug 2014 A1
20150017967 Cao Jan 2015 A1
Foreign Referenced Citations (13)
Number Date Country
000964542 Dec 1999 EP
1-194628 Aug 1989 JP
3-126540 May 1991 JP
3-128540 May 1991 JP
7-234789 Sep 1995 JP
7-288514 Oct 1995 JP
7-319706 Dec 1995 JP
8-44568 Feb 1996 JP
8-87296 Apr 1996 JP
WO 9819484 Jul 1998 WO
WO 9927716 Mar 1999 WO
PCTUS0122295 Jul 2001 WO
WO 0211407 Feb 2002 WO
Non-Patent Literature Citations (173)
Entry
“Wireless Application Protocol,” Oct. 1999, Wireless Internet Today, pp. 1-20.
Mark Moeglein et al., “An Introduction to Snap Track Server-Aided GPS Technology,” available at http://www.snaptrack.com/atwork.html, 1998.
“Signal Soft Wireless Location Services,” available at http..www.signalsoftcorp.com/products/location—manager.html, 1999.
Microsoft Mobility Developer Conference 2003.
3rd Generation Partnership Project: Technical Specification Group Services and System Aspects; Functional Stage 2 Description of Location Services in UMTS, 1999.
“Open Wave Announces Availability to End-to-End Set of Location Services for Wireless Internet,” http://www.openwave.com/us/.news—room/press—release/2001/20010320.
Petronis, Scott, “Mapping Technology: The Common Thread,” Wireless Review, vol. 17, No. 3, pp. 10-14, Feb. 1, 2000, ISSN: 1099-9248.
U.S. Office Action dated Feb. 12, 2003 in U.S. Appl. No. 09/630,134.
U.S. Office Action dated Jul. 10, 2003 in U.S. Appl. No. 09/630,134.
U.S. Office Action dated Jun. 7, 2004 in U.S. Appl. No. 09/630,134.
U.S. Office Action dated Jan. 13, 2005 in U.S. Appl. No. 09/630,134.
U.S. Office Action dated Jun. 7, 2005 in U.S. Appl. No. 09/630,134.
U.S. Office Action dated Feb. 24, 2006 in U.S. Appl. No. 09/630,134.
U.S. Office Action dated Sep. 6, 2006 in U.S. Appl. No. 09/630,134.
U.S. Office Action dated Apr. 2, 2007 in U.S. Appl. No. 09/630,134.
U.S. Office Action dated Oct. 16, 2007 in U.S. Appl. No. 09/630,134.
U.S. Office Action dated Apr. 29, 2008 in U.S. Appl. No. 09/630,134.
U.S. Office Action dated Nov. 13, 2008 in U.S. Appl. No. 09/630,134.
U.S. Office Action dated May 12, 2009 in U.S. Appl. No. 09/630,134.
U.S. Office Action dated Sep. 29, 2009 in U.S. Appl. No. 09/630,134.
U.S. Notice of Allowance dated May 27, 2010 in U.S. Appl. No. 09/630,134.
U.S. Office Action dated Jun. 21, 2004 in U.S. Appl. No. 09/739,315.
U.S. Office Action dated Feb. 9, 2005 in U.S. Appl. No. 09/739,315.
U.S. Office Action dated Feb. 3, 2006 in U.S. Appl. No. 09/739,315.
U.S. Notice of Allowance dated Aug. 30, 2006 in U.S. Appl. No. 09/739,315.
U.S. Office Action dated Mar. 12, 2004 in U.S. Appl. No. 09/739,340.
U.S. Office Action dated Dec. 10, 2004 in U.S. Appl. No. 09/739,340.
U.S. Office Action dated Apr. 22, 2005 in U.S. Appl. No. 09/739,340.
U.S. Notice of Allowance dated Apr. 10, 2006 in U.S. Appl. No. 09/739,340.
U.S. Office Action dated May 16, 2003 in U.S. Appl. No. 09/740,372.
U.S. Office Action dated Oct. 30, 2003 in U.S. Appl. No. 09/740,372.
U.S. Office Action dated Apr. 15, 2004 in U.S. Appl. No. 09/740,372.
U.S. Office Action dated Nov. 2, 2004 in U.S. Appl. No. 09/740,372.
U.S. Office Action dated Dec. 13, 2005 in U.S. Appl. No. 09/740,372.
U.S. Notice of Allowance dated Jun. 24, 2005 in U.S. Appl. No. 09/740,372.
U.S. Notice of Allowance dated Jan. 27, 2006 in U.S. Appl. No. 09/740,372.
U.S. Office Action dated May 7, 2003 in U.S. Appl. No. 09/740,373.
U.S. Office Action dated Oct. 21, 2003 in U.S. Appl. No. 09/740,373.
U.S. Office Action dated Jan. 26, 2004 in U.S. Appl. No. 09/740,373.
U.S. Office Action dated Apr. 28, 2005 in U.S. Appl. No. 09/740,373.
U.S. Notice of Allowance dated Sep. 13, 2005 in U.S. Appl. No. 09/740,373.
U.S. Office Action dated Mar. 1, 2004 in U.S. Appl. No. 09/740,375.
U.S. Office Action dated Sep. 24, 2004 in U.S. Appl. No. 09/740,375.
U.S. Office Action dated Feb. 28, 2005 in U.S. Appl. No. 09/740,375.
U.S. Office Action dated Jul. 26, 2005 in U.S. Appl. No. 09/740,375.
U.S. Office Action dated Dec. 19, 2005 in U.S. Appl. No. 09/740,375.
U.S. Office Action dated Feb. 6, 2006 in U.S. Appl. No. 09/740,375.
U.S. Office Action dated May 19, 2006 in U.S. Appl. No. 09/740,375.
U.S. Office Action dated Apr. 11, 2013 in U.S. Appl. No. 09/740,375.
U.S. Office Action dated Nov. 10, 2003 in U.S. Appl. No. 09/739,162.
U.S. Office Action dated Mar. 9, 2004 in U.S. Appl. No. 09/739,162.
U.S. Office Action dated Sep. 9, 2004 in U.S. Appl. No. 09/739,162.
U.S. Office Action dated Apr. 8, 2005 in U.S. Appl. No. 09/739,162.
U.S. Notice of Allowance dated Nov. 7, 2005 in U.S. Appl. No. 09/739,162.
U.S. Office Action dated Nov. 10, 2003 in U.S. Appl. No. 09/740,414.
U.S. Office Action dated Apr. 21, 2004 in U.S. Appl. No. 09/740,414.
U.S. Office Action dated Dec. 5, 2004 in U.S. Appl. No. 09/740,414.
U.S. Office Action dated Jul. 26, 2005 in U.S. Appl. No. 09/740,414.
U.S. Office Action dated Nov. 21, 2005 in U.S. Appl. No. 09/740,414.
U.S. Notice of Allowance dated Mar. 7, 2006 in U.S. Appl. No. 09/740,414.
U.S. Office Action dated Aug. 30, 2005 in U.S. Appl. No. 10/704,775.
U.S. Office Action dated Jan. 9, 2006 in U.S. Appl. No. 10/704,775.
U.S. Office Action dated May 29, 2009 in U.S. Appl. No. 10/704,775.
U.S. Notice of Allowance dated Oct. 16, 2009 in U.S. Appl. No. 10/704,775.
U.S. Office Action dated Oct. 4, 2005 in U.S. Appl. No. 10/819,940.
U.S. Notice of Allowance dated Feb. 10, 2006 in U.S. Appl. No. 10/819,940.
U.S. Office Action dated Jan. 16, 2007 in U.S. Appl. No. 11/187,347.
U.S. Notice of Allowance dated Jun. 13, 2007 in U.S. Appl. No. 11/187,347.
U.S. Notice of Allowance dated Oct. 5, 2007 in U.S. Appl. No. 11/187,347.
U.S. Notice of Allowance dated May 6, 2008 in U.S. Appl. No. 11/187,347.
U.S. Office Action dated Mar. 10, 2006 in U.S. Appl. No. 11/252,039.
U.S. Office Action dated Feb. 6, 2007 in U.S. Appl. No. 11/252,039.
U.S. Office Action dated Sep. 13, 2007 in U.S. Appl. No. 11/252,039.
U.S. Office Action dated Mar. 18, 2008 in U.S. Appl. No. 11/252,039.
U.S. Notice of Allowance dated Jun. 15, 2009 in U.S. Appl. No. 11/252,039.
U.S. Office Action dated Oct. 5, 2006 in U.S. Appl. No. 11/298,149.
U.S. Office Action dated Jul. 19, 2007 in U.S. Appl. No. 11/298,149.
U.S. Notice of Allowance dated Dec. 26, 2007 in U.S. Appl. No. 11/298,149.
U.S. Office Action dated Apr. 6, 2007 in U.S. Appl. No. 11/298,419.
U.S. Office Action dated Nov. 15, 2007 in U.S. Appl. No. 11/298,419.
U.S. Office Action dated May 13, 2008 in U.S. Appl. No. 11/298,419.
U.S. Office Action dated Nov. 14, 2008 in U.S. Appl. No. 11/298,419.
U.S. Notice of Allowance dated May 26, 2009 in U.S. Appl. No. 11/298,419.
U.S. Notice of Allowance dated Feb. 23, 2007 in U.S. Appl. No. 11/300,694.
U.S. Office Action dated Apr. 21, 2006 in U.S. Appl. No. 11/322,531.
U.S. Office Action dated Jan. 11, 2007 in U.S. Appl. No. 11/322,531.
U.S. Office Action dated Mar. 27, 2007 in U.S. Appl. No. 11/322,531.
U.S. Office Action dated Dec. 4, 2007 in U.S. Appl. No. 11/322,531.
U.S. Office Action dated Jul. 23, 2008 in U.S. Appl. No. 11/322,531.
U.S. Office Action dated Jan. 21, 2009 in U.S. Appl. No. 11/322,531.
U.S. Office Action dated Jun. 22, 2009 in U.S. Appl. No. 11/322,531.
U.S. Notice of Allowance dated Dec. 15, 2009 in U.S. Appl. No. 11/322,531.
U.S. Office Action dated Jul. 13, 2009 in U.S. Appl. No. 11/637,369.
U.S. Office Action dated Mar. 21, 2011 in U.S. Appl. No. 11/637,369.
U.S. Notice of Allowance dated Apr. 29, 2011 in U.S. Appl. No. 11/637,369.
U.S. Office Action dated Nov. 27, 2007 in U.S. Appl. No. 11/375,849.
U.S. Notice of Allowance dated Apr. 22, 2008 in U.S. Appl. No. 11/375,849.
U.S. Office Action dated Jan. 9, 2007 in U.S. Appl. No. 11/406,881.
U.S. Office Action dated Sep. 12, 2007 in U.S. Appl. No. 11/406,881.
U.S. Notice of Allowance dated Feb. 13, 2008 in U.S. Appl. No. 11/406,881.
U.S. Office Action dated Dec. 15, 2006 in U.S. Appl. No. 11/522,239.
U.S. Office Action dated Sep. 10, 2007 in U.S. Appl. No. 11/522,239.
U.S. Notice of Allowance dated Mar. 20, 2008 in U.S. Appl. No. 11/522,239.
U.S. Office Action dated Dec. 31, 2007 in U.S. Appl. No. 11/528,782.
U.S. Office Action dated Oct. 8, 2008 in U.S. Appl. No. 11/528,782.
U.S. Office Action dated Jan. 12, 2009 in U.S. Appl. No. 11/528,782.
U.S. Office Action dated Jun. 3, 2009 in U.S. Appl. No. 11/528,782.
U.S. Office Action dated Nov. 19, 2009 in U.S. Appl. No. 11/528,782.
U.S. Office Action dated Jul. 9, 2010 in U.S. Appl. No. 11/528,782.
U.S. Notice of Allowance dated Jan. 13, 2011 in U.S. Appl. No. 11/528,782.
U.S. Office Action dated Sep. 25, 2007 in U.S. Appl. No. 11/589,688.
U.S. Office Action dated Apr. 3, 2008 in U.S. Appl. No. 11/589,688.
U.S. Office Action dated Apr. 29, 2009 in U.S. Appl. No. 11/589,688.
U.S. Notice of Allowance dated Oct. 6, 2009 in U.S. Appl. No. 11/589,688.
U.S. Office Action dated Nov. 23, 2010 in U.S. Appl. No. 11/847,278.
U.S. Office Action dated Mar. 2, 2011 in U.S. Appl. No. 11/847,278.
U.S. Office Action dated Mar. 30, 2011 in U.S. Appl. No. 11/959,283.
U.S. Office Action dated Aug. 25, 2011 in U.S. Appl. No. 11/959,283.
U.S. Office Action dated Mar. 22, 2012 in U.S. Appl. No. 11/959,283.
U.S. Notice of Allowance dated Aug. 6, 2012 in U.S. Appl. No. 11/959,283.
U.S. Office Action dated Oct. 27, 2010 in U.S. Appl. No. 12/132,104.
U.S. Office Action dated May 19, 2011 in U.S. Appl. No. 12/132,104.
U.S. Office Action dated Aug. 26, 2011 in U.S. Appl. No. 12/132,104.
U.S. Notice of Allowance dated Apr. 20, 2012 in U.S. Appl. No. 12/132,104.
U.S. Office Action dated Apr. 28, 2010 in U.S. Appl. No. 12/164,307.
U.S. Office Action dated Oct. 13, 2010 in U.S. Appl. No. 12/164,307.
U.S. Office Action dated Jun. 8. 2011, in U.S. Appl. No. 12/164,307.
U.S. Notice of Allowance dated Jan. 20, 2012 in U.S. Appl. No. 12/164,307.
U.S. Office Action dated Jan. 11, 2011 in U.S. Appl. No. 12/188,375.
U.S. Office Action dated Aug. 25, 2011 in U.S. Appl. No. 12/188,375.
U.S. Notice of Allowance dated Mar. 20, 2012 in U.S. Appl. No. 12/188,375.
U.S. Office Action dated May 15, 2013 in U.S. Appl. No. 12/188,375.
U.S. Office Action dated Oct. 25, 2010 in U.S. Appl. No. 12/198,346.
U.S. Office Action dated Mar. 16, 2011 in U.S. Appl. No. 12/198,346.
U.S. Notice of Allowance dated Jun. 6, 2011 in U.S. Appl. No. 12/198,346.
U.S. Office Action dated Jul. 27, 2010 in U.S. Appl. No. 12/552,767.
U.S. Notice of Allowance dated Oct. 18, 2010 in U.S. Appl. No. 12/552,767.
U.S. Office Action dated Mar. 29, 2010 in U.S. Appl. No. 12/580,616.
U.S. Notice of Allowance dated Sep. 16, 2010 in U.S. Appl. No. 12/580,616.
U.S. Office Action dated Jun. 1, 2010 in U.S. Appl. No. 12/648,424.
U.S. Notice of Allowance dated Sep. 21, 2010 in U.S. Appl. No. 12/648,424.
U.S. Office Action dated Aug. 24, 2010 in U.S. Appl. No. 12/650,488.
U.S. Office Action dated Dec. 14, 2010 in U.S. Appl. No. 12/650,488.
U.S. Office Action dated Mar. 23, 2011 in U.S. Appl. No. 12/650,488.
U.S. Notice of Allowance dated Aug. 17, 2011 in U.S. Appl. No. 12/650,488.
U.S. Office Action dated Mar. 30, 2011 in U.S. Appl. No. 12/909,401.
U.S. Notice of Allowance dated Jul. 15, 2011 in U.S. Appl. No. 12/909,401.
U.S. Office Action dated Jul. 11, 2011 in U.S. Appl. No. 13/031,721.
U.S. Notice of Allowance dated Dec. 23, 2011 in U.S. Appl. No. 13/031,721.
U.S. Office Action dated Oct. 28, 2011 in U.S. Appl. No. 13/195,086.
U.S. Notice of Allowance dated Jun. 28, 2012 in U.S. Appl. No. 13/195,086.
U.S. Office Action dated Oct. 10, 2012 in U.S. Appl. No. 13/195,086.
U.S. Office Action dated Feb. 23, 2012 in U.S. Appl. No. 13/289,297.
U.S. Office Action dated Jun. 13, 2012 in U.S. Appl. No. 13/289,297.
U.S. Office Action dated Mar. 12, 2012 in U.S. Appl. No. 13/297,137.
U.S. Office Action dated Jun. 26, 2012 in U.S. Appl. No. 13/297,137.
U.S. Notice of Allowance dated Oct. 11, 2012 in U.S. Appl. No. 13/297,137.
U.S. Office Action dated Jul. 3, 2012 in U.S. Appl. No. 13/437,076.
U.S. Office Action dated Jul. 31, 2012 in U.S. Appl. No. 13/461,942.
U.S. Office Action dated Sep. 18, 2013 in U.S. Appl. No. 13/531,764.
U.S. Office Action dated Apr. 29, 2013 in U.S. Appl. No. 13/555,239.
U.S. Office Action dated Oct. 16, 2013 in U.S. Appl. No. 13/555,239.
U.S. Office Action dated Apr. 30, 2013 in U.S. Appl. No. 13/778,264.
U.S. Office Action dated Sep. 5, 2013 in U.S. Appl. No. 13/947,150.
International Search Report and Written Opinion dated Aug. 1, 2002 in International Application No. PCT/U01/22295.
U.S. Office Action mailed on Mar. 21, 2014 in U.S. Appl. No. 13/531,764.
U.S. Office Action dated Feb. 1, 2016 in U.S. Appl. No. 14/148,424.
U.S. Office Action dated Jan. 29, 2016 in U.S. Appl. No. 14/472,806.
U.S. Office Action dated Sep. 16, 2015 in U.S. Appl. No. 13/786,415.
U.S. Office Action dated Jun. 19, 2015 in U.S. Appl. No. 14/148,424.
U.S. Office Action dated Jun. 24, 2015 in U.S. Appl. No. 14/472,806.
U.S. Office Action mailed on Aug. 1, 2016 in U.S. Appl. No. 14/148,424.
U.S. Office Action dated Dec. 13, 2016 in U.S. Appl. No. 14/524,086.
Related Publications (1)
Number Date Country
20140099913 A1 Apr 2014 US
Continuations (6)
Number Date Country
Parent 13778264 Feb 2013 US
Child 14105544 US
Parent 13246193 Sep 2011 US
Child 13778264 US
Parent 12198346 Aug 2008 US
Child 13246193 US
Parent 11375849 Mar 2006 US
Child 12198346 US
Parent 10819940 Apr 2004 US
Child 11375849 US
Parent 09606535 Jun 2000 US
Child 10819940 US