MOBILE OBJECT LOCATION-BASED PRIVACY PROTECTION
First Claim
Patent Images
1. An apparatus comprising:
- a processor; and
memory coupled to the processor, the memory comprising executable instructions that when executed by the processor cause the process to effectuate operation comprising;
determining that a mobile communication device is proximate to a boundary of a privacy zone and not within the privacy zone, wherein;
the boundary of a privacy zone is in relation to a location of a mobile object; and
the boundary of the privacy zone varies in relation to the location of the mobile object;
tracking the mobile communications device while the mobile communications device is proximate to the boundary of the privacy zone and not within the privacy zone;
upon a determination that the mobile communications device being tracked is within the privacy zone, retrieving a function configuration for the mobile communications device; and
programming the mobile communication device within the privacy zone according to the retrieved function configuration.
5 Assignments
0 Petitions
Accused Products
Abstract
A system, method and apparatus for creating and implementing a privacy zone around a mobile object are described herein. A privacy zone is a geographic location proximate to a mobile object in which mobile device functionality is reduced when a mobile device is inside the boundaries of the privacy zone. A locator subsystem tracks the location of the mobile object to update the location of the privacy zone. Further, the locator subsystem monitors for mobile devices that may interface with the privacy zone. Once a mobile device is found to be within a privacy zone, the pre-determined mobile device features will preferably be disabled.
-
Citations
20 Claims
-
1. An apparatus comprising:
-
a processor; and memory coupled to the processor, the memory comprising executable instructions that when executed by the processor cause the process to effectuate operation comprising; determining that a mobile communication device is proximate to a boundary of a privacy zone and not within the privacy zone, wherein; the boundary of a privacy zone is in relation to a location of a mobile object; and the boundary of the privacy zone varies in relation to the location of the mobile object; tracking the mobile communications device while the mobile communications device is proximate to the boundary of the privacy zone and not within the privacy zone; upon a determination that the mobile communications device being tracked is within the privacy zone, retrieving a function configuration for the mobile communications device; and programming the mobile communication device within the privacy zone according to the retrieved function configuration. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An apparatus comprising:
-
a processor; and memory coupled to the processor, the memory comprising executable instructions that when executed by the processor cause the process to effectuate operation comprising; generating a request to activate a privacy zone according to established parameters, wherein; boundaries of the privacy zone are in relation to a location of a mobile object; and the boundaries of the privacy zone vary in relation to a location of the mobile object; transmitting the request; determining a current location of the mobile object; determining that a mobile communication device is proximate to the boundary of the privacy zone and not within the privacy zone; tracking the mobile communication device while the mobile communication device is proximate to the boundary of the privacy zone and not within the privacy zone; and upon a determination that the mobile communications device being tracked is within the privacy zone, configuring the mobile communication device according to a function configuration. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. An apparatus comprising:
-
a processor; and memory coupled to the processor, the memory comprising executable instructions that when executed by the processor cause the process to effectuate operation comprising; determining a current location of a mobile object; determining a location of a mobile communication device; determining that the mobile communication device is proximate to a boundary of a privacy zone and not within the privacy zone, wherein; the boundary of a privacy zone is in relation to a location of a mobile object; and the boundary of the privacy zone varies in relation to the location of the mobile object; tracking the mobile communication device while the mobile communication device is proximate to the boundary of the privacy zone and not within the privacy zone; upon a determination that the mobile communications device is being tracked, retrieving a function configuration for the privacy zone; generating a program signal to program the mobile communication device within the privacy zone according to the retrieved function configuration; and providing the program signal to the mobile communication device within the privacy zone.
-
Specification