The inventive arrangements relate generally to cellular phones and more particularly to the remote control of the operation of cellular phones with automatic location identification capabilities.
In June 1996, the Federal Communications Commission (FCC) set in place a two-phase plan for implementing wireless 911 in the United States. Phase I, which was originally to have been implemented by April 1998, required callback numbers and cell site sector information about each incoming wireless 911 call. Cell phones that met the Phase I requirements provided a general indication of the caller's location, although the area may be as large as 100 square miles.
Phase II, which was originally scheduled to have been implemented by October 2001, required wireless carriers to provide automatic location identification (ALI) for each wireless 911 call. The plan included a requirement to provide wireless location accuracy for 95% of the callers within a radius of 150 meters or better. The Phase II portion of the plan was intended to enable improved emergency response in connection with 911 calls. The ALI technology necessary to implement Phase II has been delayed in many instances, but is now being deployed in various locations with the expected improvement in emergency response.
There are two basic methods by which wireless position information can be determined. One approach determines a cell phone position by measuring angle of arrival (AOA) and time of arrival (TOA) of cell phone signals at multiple fixed base stations. This approach is essentially a network-based solution. Still, there are a number of problems associated with such network-based solutions. These problems are mainly related to the vagaries of signal propagation, base station availability and infrastructure costs. An alternative approach makes use of the existing global positioning system (GPS) infrastructure. The GPS based approach incorporates a GPS system into each cell phone and relies upon the phone to determine its location for itself. GPS based systems have their own set of problems that mainly relate to GPS satellite acquisition and cold start delays.
The most advanced ALI systems are those that rely on a combination of both the network based and GPS based solutions. Such systems collect GPS measurements and network measurements and send the measurement data to the position determination entity. The position determination entity then processes the measurements to produce the most accurate location information based on available data.
Currently, ALI technology is commercially available from a number of different technology developers. For example, Qualcomm, Inc. of San Diego, Calif. and SnapTrack, Inc. of Campbell, Calif. offer commercially proven GPS-based positioning solutions for third generation wireless (3G). These systems are available for a variety of different air interfaces including CDMA and GSM. Further, they offer commercially available chipsets that can be integrated in cell phones. Also, rather than requiring modification of each base station, a database is constructed at a position determination entity that contains the precise location of each base station.
Aside from the obvious benefits ALI offers with regard to improving emergency responsiveness, the new technology has also created many opportunities for new and interesting applications that make use of the ALI data. These applications offer revenue-generating products and services that are of potential interest to a range of markets including entertainment, fleet management, and security.
The present invention relates to a method for providing security features for a cellular phone. The method includes the step of authorizing administrator changes to location identification settings associated with the cellular phone. Location identification options then can be received from the administrator for the cellular phone and at least one location identification rule can be defined that is based upon the received location identification option selections. Finally, at least one security feature can be provided to prevent an unauthorized user from changing the location identification settings. The defined location identification rules can be stored in the cellular phone or in a server.
In one arrangement, control of the location identification settings can be asserted from a centralized location remote from the cellular phone, such as a company home office. The location identification settings can be downloaded to the cellular phones over a network, for instance a wireless network. Accordingly, the administrator can conveniently control the location identification settings for cellular phones associated with an entire pool of employee cellular phones. Moreover, security features can be provided so that the cellular phones can be resistant to tampering by unauthorized persons. In particular, a desired control relates to privacy; denying an entity the ability to track a cellular phone, selectable privacy options for establishing location identification rules can be presented to a user or an administrator of a particular cellular phone. Rules can be established which are applicable to all attempts that are made to track the cellular phone and/or rules can be established which are applicable to certain entities attempting to track the cellular phone. The entities can be individual, groups or certain location identification systems.
The present invention relates to a method for implementing security features for a telephone automatic location identification (ALI) system. Such security features can be applied to one or more cellular phones, for example cellular phones in a workforce environment. In particular, an administrator can define and implement location identification rules that are applicable to one or more cellular phones. The location identification rules can be programmed directly into the cellular phones by the administrator, programmed into a location identification system server, or entered via a user terminal and downloaded to the one or more cellular phones. Regardless of where and how the location identification rules are stored, security features can be provided to prevent rule additions, changes or deletions by anyone other than an authorized administrator. Accordingly, authorized administrators can maintain control over the location identification features of the one or more cellular phones. In one arrangement, the control can be asserted from a centralized location remote from the cellular phone, such as a home office or an administrator's cellular phone. Accordingly, the administrator can conveniently control the location identification settings for cellular phones associated with an entire pool of employees. Moreover, security features can be provided so that the cellular phones can be resistant to tampering by unauthorized persons.
A preferred setting is the establishment of privacy rules, which are applicable to location identification of a cellular phone. In particular, privacy rules can be established for determining how location identification functions of an automatic location identification (ALI) system are applied to cellular phones. More particularly, selectable privacy options for establishing location identification rules can be presented to a user or an administrator of a particular cellular phone. For example, rules can be established which are applicable to all attempts that are made to identify a location of the cellular phone and/or rules can be established which are applicable to certain entities attempting to identify the location of the cellular phone. The entities can be individuals, groups or certain location identification systems.
More particularly,
The server 108 can communicate with the base stations 106-1, 106-n using any suitable means. For example, a conventional telephone network, high-speed data line, wireless link, or a combination of the foregoing can be used. Base stations 106-1, 106-n can provide a data link between the cellular phone 102 and the server 108. The server 108 can be controlled by a workstation 110 or similar user interface device.
Due to the vagaries of signal propagation, base station availability and other infrastructure limitations, the physical location determined using the network-based solution can be inaccurate in certain instances. In order to improve overall accuracy, the network-based approach can also generate location information for the cellular phone 102 using an alternative approach. For example, the cellular phone can include an onboard global positioning system (GPS) and associated processing circuitry/software. The GPS system can be incorporated into each cellular phone 102 and such system can use signals from a plurality of GPS satellites 104-1, 104-n to independently determine the physical location of the device. The GPS based location information thus obtained can be forwarded to the server 108 through the one or more base stations 106-1, 106-n. Likewise, server 108 can communicate location information to an emergency or 911 services operator. The ALI data provided by the server can be highly accurate data regarding the location of the cellular phone 102 based on a combination of the network data and GPS data.
For the purposes of the present invention, the precise manner by which ALI information is determined is not critical. The system can rely primarily on GPS, network measurements or a combination of the two. Accordingly, the foregoing description represents merely one possible method by which such ALI can be determined. Other methods are also possible and are also intended to be within the scope of the invention.
The process in
Step 202 can be better understood with reference to
Security features can be incorporated into the cellular phone 102 and/or workstation to prevent unauthorized changes to the location identification settings of the cellular phone. For example, after the icon 318 is selected, a display screen 402 can be presented which prompts the administrator to enter a pass code, as shown in
In another arrangement, the workstation 110 or 114 that is used to enter location identification parameters can be a secured workstation. For instance, the workstation 114 can be pass code protected or protected by any other type of security system. For instance, an optical scanner or finger print identifier can be used to verify the identity of an administrator prior to allowing the administrator access to the location identification setting menus.
In yet another arrangement, an application specific processing device (not shown) can be used to update location identification settings in the cellular phone 102 or the server 108 or 112. In such an instance, a communication interface can be provided to enable communication between the application specific processing device 102 and the cellular phone 120 or server 112. For example, a communications port can be provided. Communications ports are known to the skilled artisan.
Referring to
Proceeding to step 204, the administrator can select a location identification option from the location identification settings menu. For example, again making reference to
Another available option in one embodiment can be an option 504-3 as seen in
Continuing at step 206, the administrator then can enter location identification option parameters. Step 206 can be better understood by making reference to
If the “Allow at Select Times” option 706-3 is selected, a display screen 802, shown in
Once the location identification parameters have been entered, the location identification parameters can be saved, as shown in step 208 of
Referring to
Proceeding to step 904, server 112, utilizing data either at its own database or data stored from either cellular phone 120, can verify whether the request is authorized. For example, server 112 can determine (1) whether the location identification attempts by the administrator requestor are allowed or blocked, (2) whether there are limitations on the location identification attempts by the requestor, such as times when location identification is not allowed, or (3) any other limitations that may be applicable to the requestor as discussed above by comparing the entered identifier and the stored preferences. Continuing at step 906, if authorization is denied, a message can be propagated to the requester, either at a requestor cellular phone 102 or a requestor workstation 114 informing the requestor that the location information is not available, as shown in step 908.
If authorization has not been denied, the process can proceed to step 910. If a confirmation is not required from the cellular phone 102 to be tracked, the location of the cellular phone 120 can be determined by server 108 and the location information can be sent to the requestor at server 112 or cell phone 102, as shown in steps 912 and 914. However, if a confirmation is required, server 112 can process the location identification request once a positive confirmation is received, as shown in step 916 and steps 912 and 914. If a negative response is received from the cellular phone 120, or no confirmation is received within a predetermined time after the request, a message can be sent by server 112 informing the requestor that the location information is not available, as shown in step 908.
Referring to
The location identification options can be applied when an attempt is made to identify the location of the cellular phone 120. In the case that the location identification parameters are added or edited using either cellular phone 102 or 120, the parameters can be saved directly by the cellular phones 102, 120, or uploaded to the server 112 or another suitable device. In the case the parameters are added or edited by the workstation 114, the parameters can be stored on the server 112 or downloaded to the cellular phones 102, 120, via the communications link. Advantageously, location identification parameters can be created or edited and downloaded to multiple cellular phones simultaneously. Accordingly, cellular phones 120 carried by an entire pool of employees can be conveniently updated.
When the parameters are stored on the cellular phone 120, the location identification rules with which the parameters are associated can be applied by the cellular phone 120 as operated upon by server 112. Importantly, the location identification rules can be secured within the cellular phone 120 to prevent tampering or rule changes by an unauthorized person, such as a user of the cellular phone. The location identification rules can also be downloaded to the cellular phone 120 via a workstation 114, server 112, or other suitable application specific device. Such devices can incorporate security features to prevent unauthorized changes in the location identification rules. Moreover, when a workstation, server, or other suitable application specific device is used to download location identification rules to the cellular phone 120, the location identification settings menu can be disabled on the cellular phone 120 to block unauthorized rule changes. In another arrangement, the cellular phone 120 can be provided without the location identification settings menu.
When the parameters are stored to the server 112, the location identification rules associated with the parameters can be applied to the server 112 and/or applied by the server 112. Still, the invention is not limited in this regard and the location identification rules can be applied by any other suitable device. Again, the location identification settings menu can be disabled on the cellular phone or not provided at all. Further, the server 112 can include security features to prevent location identification rule changes by unauthorized entities.
The above embodiment was described in connection with a first server 108 forming part of the network for determining the location of the cellular phone 120, preferably a cellular phone and a second server 112 for performing the application. It should realized that it is well within the scope of the invention for a single server to perform both functions.
While the preferred embodiments of the invention have been illustrated and described, it will be clear that the invention is not so limited. Numerous modifications, changes, variations, substitutions and equivalents will occur to those skilled in the art without departing from the spirit and scope of the present invention as described in the claims.
This Application is a Non-Provisional of Provisional (35 USC 119(e)) application 60/553,227 filed on Mar. 15, 2004 and Provisional (35 USC 119(e)) application 60/553,226 filed on Mar. 15, 2004.
Number | Date | Country | |
---|---|---|---|
60553227 | Mar 2004 | US | |
60553226 | Mar 2004 | US |