Location Blocking Service From a Wireless Service Provider
7 Assignments
0 Petitions
Accused Products
Abstract
Subscriber authorization information from a wireless communication device is identified. The subscriber authorization information indicates that an identity of a subscriber associated with the wireless communication device is authorized to be shared without sharing information that identifies a location of the wireless communication device. Subsequent to the subscriber authorization information being identified, the identity of the subscriber associated with the wireless communication device is received or retrieved without information that identifies the location of the wireless communication device.
-
Citations
21 Claims
-
1. (canceled)
-
2. A method, comprising:
-
identifying, by a system comprising at least one processor, subscriber authorization information from a wireless communication device, the subscriber authorization information indicating that an identity of a subscriber associated with the wireless communication device is authorized to be shared without sharing information that identifies a location of the wireless communication device; and retrieving or receiving, by the system, subsequent to the subscriber authorization information being identified, the identity of the subscriber associated with the wireless communication device without information that identifies the location of the wireless communication device. - View Dependent Claims (3, 4, 5, 6, 7, 8)
-
-
9. A system, comprising:
-
at least one processor; and at least one memory in communication with the at least one processor that stores computer-executable instructions, which, when executed by the at least one processor cause the at least one processor to; identify subscriber authorization information from a wireless communication device, the subscriber authorization information indicating that an identify of a subscriber associated with the wireless communication device is authorized to be shared without sharing information that identifies a location of the wireless communication device; and retrieve or receive, subsequent to the subscriber authorization information being identified, the identity of the subscriber associated with the wireless communication device without information that identifies the location of the wireless communication device. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 18, 19, 20, 21)
-
-
17. A non-transitory computer program product including computer readable medium comprising instructions that, when executed by a computer, cause the computer to:
-
receive subscriber authorization information indicating that an identity of a subscriber associated with a wireless communication device is authorized to be shared with a third party without sharing information that identifies a location of with the wireless communication device; transmit, to a service provider, at least an indication associated with the subscriber authorization information, wherein the indication facilitates the delivery of the identity of the subscriber associated with the wireless communication device to the third party without sharing information that identifies the location of the wireless communication device.
-
Specification