Third party location query for wireless networks
First Claim
Patent Images
1. A non-transitory computer-readable storage device comprising instructions that, when executed by a processor, cause the processor to perform operations comprising:
- receiving, from a first device, a request for a location information associated with a second device,determining whether the first device is authorized to receive the location information, wherein the determining includes consulting an access list specific to the second device;
retrieving, when the first device is authorized, the location information from a location system communicatively coupled with the processor;
providing the retrieved location information to the first device;
determining, when the first device is not authorized, whether a preference is associated with the second device, the preference indicating the second device is configured to accept requests from unauthorized devices.
8 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method provides, to a first user, location-based information concerning a second user, and a system and computer-readable storage medium include computer-readable instructions for performing the same. The method includes determining that the second user is within a certain geographic area and communicating to the first user, by way of a wireless communication device of the first user, an identity of the second user.
-
Citations
20 Claims
-
1. A non-transitory computer-readable storage device comprising instructions that, when executed by a processor, cause the processor to perform operations comprising:
-
receiving, from a first device, a request for a location information associated with a second device, determining whether the first device is authorized to receive the location information, wherein the determining includes consulting an access list specific to the second device; retrieving, when the first device is authorized, the location information from a location system communicatively coupled with the processor; providing the retrieved location information to the first device; determining, when the first device is not authorized, whether a preference is associated with the second device, the preference indicating the second device is configured to accept requests from unauthorized devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A non-transitory computer-readable storage device comprising instructions that, when executed by a processor, cause the processor to perform operations comprising:
-
receiving, from a first instant-messaging device, a request for a location information associated with a second instant-messaging device; determining whether the first instant-messaging device is authorized to receive the location information; retrieving, when the first instant-messaging device is authorized, the location information from a database; providing the retrieved location information to the first instant-messaging device; and determining, when the first instant-messaging device is not authorized, whether a preference is associated with the second instant-messaging device, the preference indicating the second instant-messaging device is configured to accept requests from unauthorized devices. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
-
20. A non-transitory computer-readable storage device comprising instructions that, when executed by a processor, cause the processor to perform operations comprising:
-
receiving, from a first device, a query in the form of an audio message, the query including a request for a location information associated with a second device; determining whether the first device is authorized to receive the location information; retrieving, when the first device is authorized, the location information; providing the retrieved location information to the first device; determining, when the first device is not authorized, whether a preference is associated with the second device, the preference indicating the second device is configured to accept requests from unauthorized devices; and providing the location information to the first device, when the preference is associated with the second device and upon receiving a notification from the second device, the notification indicating the location information should be provided to the first device.
-
Specification