Identity blocking service from a wireless service provider
First Claim
1. A non-transitory computer-readable medium comprising instructions that, when executed by a processor, cause the processor to at least:
- obtain an identity of a user associated with a wireless communication device, the identity including a name of the user;
obtain first information about a location of the wireless communication device; and
transfer the first information about the location of the wireless communication device to a third party without disclosing the identity of the user, including the name of the user, to the third party, if second information is received from the user, the second information indicating user authorization for the location to be shared with the third party.
7 Assignments
0 Petitions
Accused Products
Abstract
Location-blocking and identity-blocking services that can be commercially offered by a service promoter, e.g., a cellular service provider or a web advertiser. In the identity-blocking service, the service promoter may disclose the current physical location of a mobile subscriber (i.e., a cellular phone operator) to a third party (e.g., a web advertiser) subscribing to the identity-blocking service. However, the service promoter may not send any identity information for the mobile subscriber to the third party. On the other hand, in the location-blocking service, the service promoter may disclose the mobile subscriber'"'"'s identity information to the third party, but not the current physical location of the mobile subscriber. Blocking of the mobile subscriber'"'"'s identity or location information may be desirable for privacy reasons, to comply with a government regulation, or to implement a telecommunication service option selected by the mobile subscriber. However, in the case of the mobile subscriber requesting emergency help, the service promoter may not block identity and/or location information. Instead, the service promoter may send all such information to the emergency service provider (e.g., the police or a hospital).
129 Citations
20 Claims
-
1. A non-transitory computer-readable medium comprising instructions that, when executed by a processor, cause the processor to at least:
-
obtain an identity of a user associated with a wireless communication device, the identity including a name of the user; obtain first information about a location of the wireless communication device; and transfer the first information about the location of the wireless communication device to a third party without disclosing the identity of the user, including the name of the user, to the third party, if second information is received from the user, the second information indicating user authorization for the location to be shared with the third party. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A network device, for providing a feature blocking service, comprising:
-
a processor; and a memory unit storing computer-readable instructions executable by the processor to cause the processor to; obtain an identity of a user associated with a wireless communication device, the identity including a name of the user; obtain first information about a location of the wireless communication device; and transfer the first information about the location of the wireless communication device to a third party without disclosing the identity of the user, including the name of the user, to the third party, if second information is received from the user, the second information indicating user authorization for the location to be shared with the third party. - View Dependent Claims (18)
-
-
19. A non-transitory computer-readable medium comprising instructions that, when executed by a processor, cause the processor to at least:
-
obtain an identity of a user associated with a wireless communication device, the identity including a name of the user; obtain first information about a location of the wireless communication device; transfer the first information about the location of the wireless communication device to a third party without disclosing the identity of the user, including the name of the user, to the third party, if second information is received from the user; and charge a user fee for blocking the identity of the user from being disclosed to the third party. - View Dependent Claims (20)
-
Specification