Location Blocking Service From a Wireless Service Provider
First Claim
Patent Images
1. A method, comprising:
- identifying, by a system comprising a processor, authorization information associated with a user of a wireless communication device;
determining, by the system and based upon the authorization information, if sharing of information that identifies a location of the wireless communication device is to be blocked by the system; and
in response to determining that the information that identifies the location of the wireless communication device is to be blocked, obtaining, by the system, an identity of the user associated with the wireless communication device without obtaining the information that identifies the location of the wireless communication device.
8 Assignments
0 Petitions
Accused Products
Abstract
Subscriber authorization information from a wireless communication device is identified. The subscriber authorization information indicates that an identity of a subscriber associated with the wireless communication device is authorized to be shared without sharing information that identifies a location of the wireless communication device. Subsequent to the subscriber authorization information being identified, the identity of the subscriber associated with the wireless communication device is received or retrieved without information that identifies the location of the wireless communication device.
2 Citations
20 Claims
-
1. A method, comprising:
-
identifying, by a system comprising a processor, authorization information associated with a user of a wireless communication device; determining, by the system and based upon the authorization information, if sharing of information that identifies a location of the wireless communication device is to be blocked by the system; and in response to determining that the information that identifies the location of the wireless communication device is to be blocked, obtaining, by the system, an identity of the user associated with the wireless communication device without obtaining the information that identifies the location of the wireless communication device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method, comprising:
-
identifying, by a system comprising a processor, authorization information associated with a user of a wireless communication device; determining, by the system and based upon the authorization information, if sharing of information that identifies a location of the wireless communication device is to be blocked by the system; and in response to determining that the information that identifies the location of the wireless communication device is to be blocked, sending, by the system, an identity of the user associated with the wireless communication device to a third party without sending the information that identifies the location of the wireless communication device. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A non-transitory computer readable medium having stored thereon instructions that, when executed by a processor, cause the processor to perform operations comprising:
-
identifying authorization information associated with a user of a wireless communication device; determining, based upon the authorization information, if sharing of information that identifies a location of the wireless communication device is to be blocked; and in response to determining that the information that identifies the location of the wireless communication device is to be blocked, sending an identity of the user associated with the wireless communication device to a third party without sending the information that identifies the location of the wireless communication device. - View Dependent Claims (17, 18, 19, 20)
-
Specification