Third party location query for wireless networks
First Claim
Patent Images
1. A method, for providing, to a first user, location-based information concerning a second user, comprising:
- determining by a processor, a present location of a first wireless device associated with the first user;
identifying, by the processor, a predetermined location distinct from the present location of the first wireless device;
determining, by the processor, whether a second wireless device associated with the second user is within a certain proximity of the predetermined location;
communicating, by the processor to the first wireless device, in response to determining that the second wireless device is within the certain proximity of the predetermined location, an identity of the second user;
receiving, in response to communicating the identify of the second user, from the first user, from the first wireless device, a query seeking location information for the second user;
determining whether the first user is authorized to receive the location information related to the second user, including accessing a second-user-specified access list indicating which requestors are allowed to obtain location information of the second user;
providing, if it is determined that the first user is authorized to receive the location information related to the second user, to the first wireless device, the location information; and
if it is determined that the first user is not authorized to receive the location information related to the second user;
determining whether the second user accepts location requests from unauthorized requestors, including accessing a second-user-specified user preference dictating whether the second user will entertain requests to release the location information of the second user from unauthorized requesters; and
sending to the second user, in response to determining that the second user accepts location requests from unauthorized users, a location request for obtaining authorization to provide the location information to user of the first wireless device.
8 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method provides, to a first user, location-based information concerning a second user, and a system and computer-readable storage medium include computer-readable instructions for performing the same. The method includes determining that the second user is within a certain geographic area and communicating to the first user, by way of a wireless communication device of the first user, an identity of the second user.
-
Citations
13 Claims
-
1. A method, for providing, to a first user, location-based information concerning a second user, comprising:
-
determining by a processor, a present location of a first wireless device associated with the first user; identifying, by the processor, a predetermined location distinct from the present location of the first wireless device; determining, by the processor, whether a second wireless device associated with the second user is within a certain proximity of the predetermined location; communicating, by the processor to the first wireless device, in response to determining that the second wireless device is within the certain proximity of the predetermined location, an identity of the second user; receiving, in response to communicating the identify of the second user, from the first user, from the first wireless device, a query seeking location information for the second user; determining whether the first user is authorized to receive the location information related to the second user, including accessing a second-user-specified access list indicating which requestors are allowed to obtain location information of the second user; providing, if it is determined that the first user is authorized to receive the location information related to the second user, to the first wireless device, the location information; and if it is determined that the first user is not authorized to receive the location information related to the second user; determining whether the second user accepts location requests from unauthorized requestors, including accessing a second-user-specified user preference dictating whether the second user will entertain requests to release the location information of the second user from unauthorized requesters; and sending to the second user, in response to determining that the second user accepts location requests from unauthorized users, a location request for obtaining authorization to provide the location information to user of the first wireless device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A tangible computer-readable storage medium, for providing, to a first user, location-based information concerning a second user, comprising computer-executable instructions that, when executed by a processor, cause the processor to perform operations comprising:
-
determining a present location of a first wireless device associated with the first user; identifying a predetermined location distinct from the present location of the first wireless device; determining whether a second wireless device associated with the second user is within a certain proximity of the predetermined location; and communicating, by the processor, to the first wireless device, in response to determining that the second wireless device is within the certain proximity of the predetermined location, an identity of the second user; receiving, in response to communicating the identity of the second user, from the first user, from the first wireless device, a query seeking location information for the second user; determining whether the first user is authorized to receive location information related to the second user, including accessing a second-user-specified access list indicating which requestors are allowed to obtain location information of the second user; providing, if it is determined that the first user is authorized to receive the location information related to the second user, to the first wireless device, the location information; and if it is determined that the first user is not authorized to receive the location information related to the second user; determining whether the second user accepts location requests from unauthorized requestors, including accessing a second-user-specified user preference dictating whether the second user will entertain requests to release the location information of the second user from unauthorized requestors; and sending to the second user, in response to determining that the second user accepts location requests from unauthorized users, a location request for obtaining authorization to provide the location information to user of the first wireless device. - View Dependent Claims (9, 10, 11)
-
-
12. A system, for providing, to a first user, location-based information concerning a second user, comprising:
-
a processor; and a tangible computer-readable storage medium having computer-executable instructions that, when executed by the processor, cause the processor to perform operations comprising; determining a present location of a first wireless device associated with the first user; identifying a predetermined location distinct from the present location of the first wireless device; determining whether a second wireless device associated with the second user is within a certain proximity of the predetermined location; and communicating, by the processor, to the first wireless device, in response to determining that the second wireless device is within the certain proximity of the predetermined location, an identity of the second user; receiving, in response to communicating the identify of the second user, from the first user, from the first wireless device, a query seeking location information for the second user; determining whether the first user is authorized to receive location information related to the second user, including accessing a second-user-specified access list indicating which requestors are allowed to obtain location information of the second user; providing, if it is determined that the first user is authorized to receive the location information related to the second user, to the first wireless device, the location information; and if it is determined that the first user is not authorized to receive the location information related to the second user; determining whether the second user accepts location requests from unauthorized requestors, including accessing a second-user-specified user preference dictating whether the second user will entertain requests to release the location information of the second user from unauthorized requestors; and sending to the second user, in response to determining that the second user accepts location requests from unauthorized users, a location request for obtaining authorization to provide the location information to user of the first wireless device. - View Dependent Claims (13)
-
Specification