Mobile object location-based privacy protection
First Claim
Patent Images
1. A method comprising:
- establishing a boundary of a privacy zone in relation to a location of a mobile object, wherein the boundary of the privacy zone varies in relation to the location of the mobile object;
establishing a function configuration for a mobile communication device while the mobile communication device is located in the privacy zone;
determining that at least one mobile communication device is proximate to the boundary of the privacy zone and not within the privacy zone;
tracking the at least one mobile communications device from proximate to the boundary of the privacy zone to entry into the privacy zone;
upon a determination that a mobile communications device of the at least one mobile communications device being tracked is within the privacy zone, retrieving the function configuration for the privacy zone;
generating a program signal to program the mobile communication device within the privacy zone according to the retrieved function configuration; and
transmitting the program signal to the mobile communication device within the privacy zone.
5 Assignments
0 Petitions
Accused Products
Abstract
A system, method and apparatus for creating and implementing a privacy zone around a mobile object are described herein. A privacy zone is a geographic location proximate to a mobile object in which mobile device functionality is reduced when a mobile device is inside the boundaries of the privacy zone. A locator subsystem tracks the location of the mobile object to update the location of the privacy zone. Further, the locator subsystem monitors for mobile devices that may interface with the privacy zone. Once a mobile device is found to be within a privacy zone, the pre-determined mobile device features will preferably be disabled.
16 Citations
28 Claims
-
1. A method comprising:
-
establishing a boundary of a privacy zone in relation to a location of a mobile object, wherein the boundary of the privacy zone varies in relation to the location of the mobile object; establishing a function configuration for a mobile communication device while the mobile communication device is located in the privacy zone; determining that at least one mobile communication device is proximate to the boundary of the privacy zone and not within the privacy zone; tracking the at least one mobile communications device from proximate to the boundary of the privacy zone to entry into the privacy zone; upon a determination that a mobile communications device of the at least one mobile communications device being tracked is within the privacy zone, retrieving the function configuration for the privacy zone; generating a program signal to program the mobile communication device within the privacy zone according to the retrieved function configuration; and transmitting the program signal to the mobile communication device within the privacy zone. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method comprising:
-
establishing parameters of a privacy zone by; establishing boundaries of a privacy zone in relation to a location of a mobile object, wherein the boundaries of the privacy zone vary in relation to a location of the mobile object; and establishing a function configuration for a mobile communication device while the mobile communication device is located in the privacy zone; generating a request to activate the privacy zone according to the established parameters; transmitting the request to activate; determining a current location of the mobile object; determining that a mobile communication device is proximate to the boundary of the privacy zone and not within the privacy zone; tracking the mobile communications device from proximate to the boundary of the privacy zone to entry into the privacy zone; and upon a determination that the mobile communications device being tracked is within the privacy zone, configuring the mobile communication device according to the function configuration. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
-
25. A server configured to:
-
establish a boundary of a privacy zone in relation to a location of a mobile object, wherein the boundary of the privacy zone varies in relation to the location of the mobile object; establish a function configuration for a mobile communication device while the mobile communication device is located in the privacy zone; determine a current location of the mobile object; determine a location of a mobile communication device; determine that at least one mobile communication device is proximate to the boundary of the privacy zone and not within the privacy zone; track the at least one mobile communications device from proximate to the boundary of the privacy zone to entry into the privacy zone; upon a determination that a mobile communications device of the at least one mobile communications device being tracked, retrieve the function configuration for the privacy zone; generate a program signal to program the mobile communication device within the privacy zone according to the retrieved function configuration; and transmit the program signal to the mobile communication device within the privacy zone.
-
-
26. A system comprising:
-
a storage unit configured to store a boundary of a privacy zone in relation to a mobile object and to store mobile communication device function configuration for a mobile communication device while the mobile communication device is located within the privacy zone, wherein the boundary of the privacy zone varies in relation to the location of the mobile object; an input module in communication with the storage unit, wherein the input module comprises an interface for establishing the boundary of the privacy zone and mobile communication device function configuration for a mobile communication device while the mobile communication device is located within the privacy zone; a mobile object locator subsystem, wherein the mobile object locator subsystem is configured to track a location of the mobile object; a mobile communication device locator subsystem, wherein the mobile communication device locator subsystem is configured to track a mobile communication device from proximate to the boundary of the privacy zone to entry into the privacy zone and output a location of the mobile communication device; a processor in communication with the mobile object locator subsystem and the mobile communication device locator subsystem, wherein the processor is configured to produce a detection signal upon a determination that the mobile communication device is within the privacy zone; and a server configured to; receive the detection signal; retrieve from the storage unit the mobile communication device function configuration for the privacy zone; generate a program signal to program the mobile communication device according to the retrieved mobile communication device function configuration; and a transmitter configured to transmit the program signal to the mobile communication device.
-
-
27. A computer-readable storage medium that is not a transient signal, the computer-readable storage medium having stored thereon computer-executable instructions that when executed cause the performance of:
-
establishing a boundary of a privacy zone in relation to a location of a mobile object, wherein the boundary of the privacy zone varies in relation to the location of the mobile object; establishing a function configuration for a mobile communication device while the mobile communication device is located in the privacy zone; determining that at least one mobile communication device is proximate to the boundary of the privacy zone and not within the privacy zone; tracking the at least one mobile communications device from proximate to the boundary of the privacy zone to entry into the privacy zone; upon a determination that a mobile communications device of the at least one mobile communications device being tracked is within the privacy zone, retrieving the function configuration for the privacy zone; generating a program signal to program the mobile communication device within the privacy zone according to the retrieved function configuration; and transmitting the program signal to the mobile communication device within the privacy zone.
-
-
28. A computer-readable storage medium that is not a transient signal, the computer-readable storage medium having stored thereon computer-executable instructions that when executed cause the performance of:
-
establishing parameters of a privacy zone by; establishing boundaries of a privacy zone in relation to a location of a mobile object, wherein the boundaries of the privacy zone vary in relation to a location of the mobile object; and establishing a function configuration for a mobile communication device while the mobile communication device is located in the privacy zone; generating a request to activate the privacy zone according to the established parameters; transmitting the request to activate; determining a current location of the mobile object; determining that a mobile communication device is proximate to the boundary of the privacy zone and not within the privacy zone; tracking the mobile communications device; and upon a determination that the mobile communications device being tracked is within the privacy zone, configuring the mobile communication device according to the function configuration.
-
Specification