METHOD AND APPARATUS FOR SECURE REVOCABLE LOCATION SHARING
First Claim
1. A method comprising:
- determining a first identifier for a subscriber at a first service;
determining an access key stored at a second service in association with a second identifier for the subscriber;
determining at least one ciphered location based on the access key and at least one location associated with the subscriber; and
determining to send the at least one ciphered location to the first service in association with the first identifier.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques for a secure revocable location sharing network service include determining a first identifier for a subscriber at a first service. A location access key stored at a second service in association with a second identifier for the subscriber is determined. At least one ciphered location is determined based on the location access key and at least one location associated with the subscriber. It is determined to send the at least one ciphered location to the first service in association with the first identifier. In some embodiments, the first identifier and second identifier are identical. Another technique includes associating a subscriber with an access key and an identifier at a first service for contacts. However, the access key is not associated with the subscriber at the first service.
-
Citations
21 Claims
-
1. A method comprising:
-
determining a first identifier for a subscriber at a first service; determining an access key stored at a second service in association with a second identifier for the subscriber; determining at least one ciphered location based on the access key and at least one location associated with the subscriber; and determining to send the at least one ciphered location to the first service in association with the first identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method comprising:
-
determining to associate a first identifier for a subscriber with an access key and at least one second identifier at a network service for a contact of the subscriber, wherein the access key is not associated with the first identifier at the network service. - View Dependent Claims (14)
-
-
15. An apparatus comprising:
-
at least one processor; and at least one memory including computer program code for one or more programs, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following, determine a first identifier for a subscriber at a first service; determine a location access key stored at a second service in association with a second identifier for the subscriber; determine at least one ciphered location based on the location access key and at least one location associated with the subscriber; and determining to send the at least one ciphered location to the first service in association with the first identifier. - View Dependent Claims (16, 17, 18, 19)
-
-
20. An apparatus comprising:
-
at least one processor; and at least one memory including computer program code for one or more programs, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following, determine to associate a first identifier for a subscriber with an access key and at least one second identifier at a first service for a contact of the subscriber, wherein the access key is not associated with the first identifier at the first service.
-
-
21-54. -54. (canceled)
Specification