Location Blocking Service From a Wireless Service Provider
First Claim
Patent Images
1. A method, comprising:
- identifying, by a system comprising a processor, subscriber authorization information associated with a wireless communication device;
determining, based upon the subscriber authorization information, if the identity of a subscriber associated with the wireless communication device is authorized to be shared without sharing information that identifies a location of the wireless communication device; and
obtaining, by the system, the identity of a subscriber associated with the wireless communication device without obtaining information that identifies the location of the wireless communication device.
8 Assignments
0 Petitions
Accused Products
Abstract
Subscriber authorization information from a wireless communication device is identified. The subscriber authorization information indicates that an identity of a subscriber associated with the wireless communication device is authorized to be shared without sharing information that identifies a location of the wireless communication device. Subsequent to the subscriber authorization information being identified, the identity of the subscriber associated with the wireless communication device is received or retrieved without information that identifies the location of the wireless communication device.
3 Citations
20 Claims
-
1. A method, comprising:
-
identifying, by a system comprising a processor, subscriber authorization information associated with a wireless communication device; determining, based upon the subscriber authorization information, if the identity of a subscriber associated with the wireless communication device is authorized to be shared without sharing information that identifies a location of the wireless communication device; and obtaining, by the system, the identity of a subscriber associated with the wireless communication device without obtaining information that identifies the location of the wireless communication device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system, comprising:
-
a processor; and a memory that stores computer-executable instructions that, when executed by the processor, cause the processor to perform operations comprising identifying subscriber authorization information associated with a wireless communication device, determining, based upon the subscriber authorization information, if an identity of a subscriber associated with the wireless communication device is authorized to be shared without sharing information that identifies a location of the wireless communication device, and obtaining, subsequent to the subscriber authorization information being identified, the identity of the subscriber associated with the wireless communication device without obtaining information that identifies the location of the wireless communication device. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A non-transitory computer readable medium comprising instructions that, when executed by a processor, cause the processor to perform operations comprising:
-
identifying subscriber authorization information associated with a wireless communication device; determining, based upon the subscriber authorization information, if an identity of a subscriber associated with the wireless communication device is authorized to be shared without sharing information that identifies a location of the wireless communication device; and obtaining, subsequent to the subscriber authorization information being identified, the identity of the subscriber associated with the wireless communication device without obtaining information that identifies the location of the wireless communication device. - View Dependent Claims (17, 18, 19, 20)
-
Specification