CN100551116C - Be used to have system, the method and apparatus of the positioning service privacy management of travelling carriage - Google Patents

Be used to have system, the method and apparatus of the positioning service privacy management of travelling carriage Download PDF

Info

Publication number
CN100551116C
CN100551116C CNB2004800079094A CN200480007909A CN100551116C CN 100551116 C CN100551116 C CN 100551116C CN B2004800079094 A CNB2004800079094 A CN B2004800079094A CN 200480007909 A CN200480007909 A CN 200480007909A CN 100551116 C CN100551116 C CN 100551116C
Authority
CN
China
Prior art keywords
privacy
rule
location request
location
travelling carriage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CNB2004800079094A
Other languages
Chinese (zh)
Other versions
CN1765143A (en
Inventor
苏珊娜·阿西斯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qualcomm Inc
Original Assignee
Qualcomm Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qualcomm Inc filed Critical Qualcomm Inc
Publication of CN1765143A publication Critical patent/CN1765143A/en
Application granted granted Critical
Publication of CN100551116C publication Critical patent/CN100551116C/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Abstract

A kind of method and apparatus, the user's control that is used to strengthen to position of mobile equipment information.This method and device provide the user's control to privacy policy in travelling carriage, the privacy policy supervision is to the response of location information requests.In an exemplary execution mode, travelling carriage comprises privacy engine, position determination module and user interface.Privacy engine is a software module, and its control travelling carriage is to the response of Location Request.Preferably, privacy engine comprises privacy policy, and it can perhaps be changed such as the mode of the local connection device of personal computer, personal digital assistant or laptop computer by user of mobile station by wireless downloading, user interface.Advantageously, privacy engine or privacy policy can be downloaded to travelling carriage by radio data network or such as other data ways of connecting such as bluetooth, infrared connection, USBs.

Description

Be used to have system, the method and apparatus of the positioning service privacy management of travelling carriage
The cross reference of related application
The application requires unsettled U.S. Provisional Application No.60/447,563 and U.S. Provisional Application No.60/490,765 priority, pass through with reference to introducing it whole at this, U.S. Provisional Application No.60/447 wherein, the 563rd, submit " Enhanced User Privacy forMobile Station Location Services " by name on February 14th, 2003, U.S. Provisional Application No.60/490, the 765th, submit on July 28th, 2003.
Technical field
The present invention relates to the positioning of mobile equipment service field, relate in particular to enhanced user control the privacy policy of Location Request response.
Background technology
For radio communication provider, the positioning service of mobile phone and radio digital communication equipment (being collectively referred to as travelling carriage hereinafter) (" LoCation Service " is abbreviated as LCS) is a kind of more and more important commercial field.This importance is reflected in the foundation of LCS standard and functional specification.Three exemplary LCS lists of references are: professional and system aspects LCS function phases 2 (SA2) the description version 6 (3GPP TS 23.271V6.0.0) in third generation partner program (3GPP) technical specification group (TSG) of in June, 2002 issue; Technical documentation (TD) S2-022360 of the 3GPP TSG-SA2 #26 meeting that 19-23 day in August, 2002 holds in Toronto, and at third generation partner program (3GPP) technical specification group (TSG) service and system aspects LCS function phases 2 (SA2) the description version 6 (3GPP TS 23.271 V6.3.0) of in March, 2003 issue.Hereinafter, respectively these references are called 3GPP-R1,3GPP-R2 and 3GPP-R3.
Describe the functional mode of whole LCS system with reference to 3GPP-R1 and 3GPP-R3, comprised the part that relates to privacy of user.With reference to 3GPP-R2 the network element that is called privacy profile Register (PPR) has been described, its maintenance customer's LCS privacy information, and help corresponding privacy function.The list of references of these introducings provides relating to LCS and the state-of-the-art technology of relevant LCS privacy operations and the general introduction of standard.Provide the several different methods of LCS and device to be understood by communications field those skilled in the art according to these lists of references to the user.
A kind of known being used for determines that at wireless communication system the favorable method of mobile position estimation has utilized global positioning system (GPS).Comprise that in travelling carriage GPS equipment (perhaps more usually, comprising position determination module, perhaps " PDM ") provides point-device location determination capabilities.When PDM provided in as travelling carriage the main device of precise location information to use, service provider network must be got in touch travelling carriage when receiving pinpoint request.Be used for using PDM to realize that the method and apparatus of location service function is known by the wireless communication field those skilled in the art such as GPS at travelling carriage.Use GPS to realize that the handheld device of LCS function is available at present.M.Moeglein and N.F.Krasner are at the Institute of Navigation (ION) of 15-18 day in September, 1998 GPS 1998 Proceedings, the article that the 333-344 page or leaf is delivered " An Introduction to SnapTrack TMServer-Aided GPS Technology " in a kind of exemplary gps system that is used for travelling carriage has been described.The nearest patent application of having described the gps system that is applicable to travelling carriage is that L.Sheynblat and N.F.Krasner submit the U.S. Patent application 20020050944 of " Method andApparatus for Measurement Processing of Satellite Positioning System (SPS) Signals " by name on May 2nd, 2002.
Disadvantageously, in existing LCS privacy methods, privacy of user is by the network management that service is provided, and it is very limited and inflexible using existing LCS privacy methods that privacy policy information is carried out user's control.For example, in some exemplary prior art LCS privacy methods, the service provider defines various requestor client's grades, when the user initiates to serve, sets up the privacy of user configuration based on these grades, for example above-mentioned PPR.According to these LCS privacy methods, privacy profile is specified the particular requester grade of the location of limited accass user not, and the requestor classes that is restricted of other visit.For example, this restriction can comprise the LCS information that is denied to specific restricted classes automatically.These restrictions can comprise that also requirement notifies user and (alternatively) user to permit LCS access request from the requestor of specified restricted classes.In these exemplary prior art systems, only may realize change by the service agreement between change provider and the user to privacy profile.If it mainly is that PDM by residing in the travelling carriage determines that the user locatees, then by PDM not being worked realize the change option that adds.Though this option can stop fetching of accurate positional information to strengthen privacy by making the user, the validity of this method is very limited, and this is because it has stoped the accurate location retrieval of all requestor classes, until PDM task again.
The disclosure relates to a kind of method and apparatus that is used for carrying out the LCS privacy management in travelling carriage.The disclosure can make things convenient for user of mobile station and LCS control flexibly.
Summary of the invention
The disclosure relates to a kind of method and apparatus, is used to provide the geo-location of radio mobile station, relates in particular to several different methods and device, is used to provide the enhanced user control to privacy policy, and wherein the privacy policy supervision is to the response of location information requests.Hereinafter, these requests are called Location Request, perhaps are called position requests equivalently.
In an exemplary execution mode, the privacy control system that is used for travelling carriage comprises privacy engine, position determination module (PDM) and user interface.Privacy engine is a software module, and its control travelling carriage is to the response of Location Request.
Privacy engine further comprises privacy policy.Privacy policy comprises privacy classes, is used for location requestors and the Location Request that is associated thereof are classified, and comprises privacy rule, is used for determining the response to the Location Request of each privacy classes.
Privacy classes is by the tabulation of location requestors and application definition.Can be based on identification information, for example URL, Internet territory or other data that can be provided by position requests are specified separately position requestor and application, perhaps are grouped into different classifications or type.According to location requestors Location Request is classified.Therefore, can distribute privacy classes for the location request based on information with Location Request.The example of privacy classes includes, but are not limited to: for default privacy class the unknown or unstated location request application and requestor's identity that specifically is not included in any other grade; For specifically not being included in the credible location request application in any other grade and the default privacy class of requestor's identity; And user's given level, comprise position requests application and requestor's identity that maybe can have other recognition data sign of position data request by URL.
Each privacy classes has one group of privacy rule that is associated, and is used for determining the response of privacy engine to Location Request.Example includes, but are not limited to: specify the not rule of limited accass; Rule to visit acquiescence refusal; Access rule based on the user notification and the allowance that requires; Have user notification but do not have the access rule of permitting of requiring; The rule of access reject during the user-selected time period; Near rule that only defined location, conducts interviews or the like.Privacy policy, privacy classes and privacy rule determine that privacy engine is how in response to each and all Location Requests.
Use enhanced user privacy method and apparatus of the present invention, the user can be advantageously via the user interface control of travelling carriage or change privacy policy for specific travelling carriage.In an exemplary execution mode, user interface comprises the user interface that has such as suitable input unit such as pin type, pointing device or keypad.In another execution mode of notion of the present invention, privacy policy is to control via the network application that is connected to travelling carriage by radio data network.In another execution mode of the inventive method, privacy policy can be by the application controls that resides in the local device, and local device is laptop computer or personal digital assistant for example, and wherein this equipment can link to each other with travelling carriage.
Advantageously, comprise the privacy engine of the travelling carriage of initial privacy policy, can receive (that is, downloading) via radio data network by travelling carriage.
Description of drawings
Fig. 1 is the block diagram of an exemplary communication system, comprises the travelling carriage with the privacy engine that is applicable to notion of the present invention.
Fig. 2 A to 2D represents a kind of flow chart of illustrative methods, and being used for provides enhanced user privacy in the location services application of travelling carriage and the use of other Wireless Telecom Equipment.
Reference number and title same in each accompanying drawing are indicated same element.
Embodiment
Run through this description, purposes and implementation for notion of the present invention is described are described each execution mode and distortion thereof.Illustrative description should be interpreted as the performance example of notion of the present invention, rather than to the restriction of concept and range disclosed herein.
Fig. 1 represents applicable to the Wireless Telecom Equipment of notion of the present invention and the block diagram of wireless communication system.As shown in Figure 1, an exemplary execution mode comprises travelling carriage 102, and it comprises user interface 106, wireless network communication module 112, application block 114, local communication module 118, privacy engine 120, position determination module 122 and other module 124.
As shown in Figure 1, in an execution mode of notion of the present invention, wireless network communication module 112 provides the wireless data between travelling carriage 102 and the outer data network 110 to connect.Outer data network 110 can comprise variety of network systems.For example, in one embodiment, outer data network can comprise the wireless service provider network.As another example, outer data network may be an ISP, and it provides connection, to receive and to send data between travelling carriage and Internet.Usually, outer data network 110 comprises any data system that can use radio communication to send data and receive data from travelling carriage to travelling carriage.As shown in Figure 1, wireless network communication module 112 also can be connected with privacy engine 120 with application block 114.Wireless communication module 112 receives and sends data from application block 114 and privacy engine 120.
In one embodiment, application block 114 comprises the position application that may require location of mobile station to estimate.These position application may reside among the MS, and it does not need the interaction with network, perhaps may relate to network in location-server (for example, module 108) interaction, and thus as location client.Exemplary hereto execution mode, application block 114 also comprise other application of the network data communication that relates to travelling carriage and other function.The example of this application includes, but are not limited to: email client, web browser, ftp client, and be used to receive or data download, data file and software instruction to other software application of travelling carriage 102.Application block 114 links to each other with wireless communication module 112, with reception and transmission data, and therefore communicates with outer data network 110.Application block 114 also can link to each other with user interface 106, with receive and send be used for user's operation and with the data of various application communications.Application block 114 also can link to each other with privacy engine 120, to receive and to send data.These data can comprise Location Request and response data.This data also can comprise receive or downloaded software instruction, with create, change and realize the function and the ability of privacy engine 120.Alternatively, create, change or realize that the data of privacy engine function can be directly to receive from wireless communication module 112, wireless communication module 112 also can link to each other with privacy engine 120, to receive and the transmission data.As alternative dispensing means, the data of establishment, change or realization privacy engine function may be to be received and carried out by the travelling carriage assembly that is not shown among Fig. 1.This assembly is known by communications field those skilled in the art, for example, can comprise application-specific integrated circuit (ASIC) (ASIC), API (API), random-access memory (ram), read-only memory (ROM) or the like.Being used for downloading and carry out the illustrative methods and the system that use via wireless network at travelling carriage is described by " Safe Application Distribution and Execution ina Wireless Environment " U.S. Patent Application Publication No.US 2002/0183056 A1 by name that on December 5th, 2002, people such as disclosed Lundblade applied for.
Local communication module 118 provides a kind of device, is used for receiving between travelling carriage 102 and outside local application module 116 and sending alternatively data.In one embodiment, outside local application module 116 resides in locally-attached equipment, for example, and personal computer, laptop computer or personal digital assistant.Module 118 is provided to the connection of locally-attached equipment.Local communication module 118 also links to each other with privacy engine 120 alternatively, to receive and to send data.This data can comprise software instruction, and it creates, changes and realize the function and the ability of privacy engine 120.In addition, these data can comprise the input and output data for position application (requiring the application of locator data), wherein, position application runs on such as laptop computer etc. via infrared, bluetooth, USB cable or in other device of connecting of the network that is different from wireless communication module 112 and provides and the autonomous device that MS links to each other.These locator datas are routed to the privacy management that privacy engine 120 helps this locality is used Location Request, as mentioned below.
As mentioned above, privacy engine 120 and element 112,114 link to each other with 118, to receive and to send data.Privacy engine 120 also links to each other with user interface 106, position determination module 122 and other module 124, to receive and to send data.The function of privacy engine 120 is described with operating in hereinafter.
User interface 106 provides a kind of device to user of mobile station, with from application block 114 and privacy engine 120 reception information, provide instruction and running package to be contained in application and function application block 114 and the privacy engine 120 to application block 114 and privacy engine 120.For example, user interface 106 can comprise graphic user interface and suitable input unit, for example touch-screen, pointing device or keypad.User interface 106 also can comprise any other device that sends and receive the device of sound, voice command or be used for providing from the software module, application and the digital device reception information that link to each other with travelling carriage 102, to the software module, application and the digital device that link to each other with travelling carriage 102 software module, application and digital device that instruction and operation link to each other with travelling carriage 102.
Position determination module (PDM) 122 generates the data of representing travelling carriage 102 location.Suitably the well known example of PDM is used global positioning system (GPS) equipment or method.But current approach comprises the utilization of any PDM of position or locator data can be provided to travelling carriage 102.For example, PDM can use the localization method of knowing, for example, assistant GPS (AGPS), AFLT (AFLT), the time of advent (TOA), enhancement mode observed time difference (E-OTD), based on location (based on the location of sub-district) of the identification wireless communication cell that MS moved or the like.These methods are known by communications field those skilled in the art, need not be described at this.
Other module frame 124 representatives are used to realize or increase the software module and the nextport hardware component NextPort of travelling carriage function.For example, these software modules and nextport hardware component NextPort can comprise application-specific integrated circuit (ASIC) (ASIC), application programming interfaces (API), random-access memory (ram), read-only memory (ROM), subscriber identification module (SIM) or USIM (USIM), camera or the like.Be not shown in Fig. 1 though be used for the connection of other module frame 124, the person skilled in the art can understand, and how the module in other module frame 124 links to each other in travelling carriage according to function is required with assembly.
Still with reference to Fig. 1, in an exemplary execution mode, privacy management server 104 comprises software application, and it links to each other with outer data network 110, to receive and to send data.Privacy management server 104 links to each other with outer data network 110, with wireless network communication module 112 swap datas.Privacy management server 104 communicates with privacy engine 120 via outer data network 110 and wireless network communication module 112.Privacy management server 104 can receive data and send data to it from network applications block 114 via outer data network 110 and wireless network communication module 112.The data that transmit between privacy management server 104, network applications block 114 and privacy engine 120 can comprise establishment, change and realize the software instruction of privacy engine 120 functions or ability.Similarly, the data that transmit via communication module 112 between privacy management server 104 and privacy engine 120 can comprise the software instruction of establishment, change and realization privacy engine 120 functions and ability.Usually, privacy management server 104 and comprise the data that transmit between the element of travelling carriage 102 be used in the travelling carriage 102 create, change or realize helping or relating to the software module of LCS and privacy management.
Location request application piece 108 representatives of Fig. 1 link to each other with travelling carriage 102 to receive and to send the location request application of data via outer data network 110.Location request application 108 links to each other with privacy engine 120 with wireless network communication module 112 via outer data network 110, to receive and to send data.Position requests between location request application piece 108 and the privacy engine 120 and position are replied the transmission of data and are received in hereinafter and be described.
Exemplary privacy policy
In an exemplary execution mode, privacy engine 120 is software modules, and it carries out various operations, with the response of control travelling carriage to location information requests.At this, these requests are called Location Request, perhaps be called position requests equivalently.
Privacy engine further comprises privacy policy.Privacy policy is an assembly of privacy engine, and it comprises privacy classes, is used for location requestors and the Location Request that is associated thereof are classified, and privacy rule, is used for determining the response to each privacy classes Location Request.
Privacy classes is by location requestors and list of application definition.Can be based on identification information, for example, URL, Internet territory or other data that can be provided by position requests are specified individually location requestors and application, perhaps are grouped into different classifications or type.According to location requestors Location Request is classified.Therefore, can distribute privacy classes for the location request based on information with Location Request.The example of privacy classes includes, but are not limited to: for the default privacy class that specifically is not included in unknown or unstated location request application and requestor's identity in any other grade; For specifically not being included in the believable location request application in any other grade and the default privacy class of requestor's identity; And user's given level, comprise position requests application and requestor's identity that maybe can have other recognition data sign of position data request by URL.
Each privacy classes has one group of relevant privacy rule, is used for determining the response of privacy engine to Location Request.Example includes, but are not limited to: specify the not rule of limited accass; Specify the rule of visit acquiescence refusal; Based on user notification and desired allowance and specify the rule of visit; Utilize user notification but do not utilize require to permit specifying the rule of visit; Specify in the rule of user-selected time durations denied access; Specify near the rule of only defined location, visiting; Or the like.Privacy policy, included privacy classes and included privacy rule have determined that privacy engine is how in response to each and all Location Requests.
Exemplary initialization and Oftware updating method
In an illustrative embodiments of notion of the present invention, the travelling carriage that does not have privacy of user control can be provided with software module at first, with by receiving or data download from the webserver, realizes the enhanced user privacy to travelling carriage LCS.Be used for installing and being used for realizing the software data and the instruction of privacy engine 120 (Fig. 1), it comprises initial privacy policy, can be from the webserver (for example via wireless communication module 112, privacy management server 104 among Fig. 1, or unshowned other webserver) receive or download to travelling carriage 102.Receive and install receive or data downloaded can be carried out by other assembly in browser or the network application module 114 or by the assembly that is included in other module 124.Being used for will using the method that receives or be downloaded to travelling carriage with software module via the wireless network connection is known by the wireless communication field those skilled in the art.As indicated above, be used for downloading and carry out the illustrative methods used and system at travelling carriage and be described by the list of references of Lundblade via wireless network.In one embodiment, travelling carriage comprises a software platform, to help application is connected to travelling carriage, for example is positioned at California by general headquarters, the exploitation of the QUALCOMM company in Santiago be used for Wireless TMBinary running environment (BREW) software.
The software upgrading of privacy engine 120 (still with reference to figure 1) and change, privacy policy and other mobile station software module and assembly also can receive or download from the webserver, as mentioned above.Particularly, user's (or obtaining other entities that allowance can be done like this) can use wireless network to connect the renewal privacy policy.Alternatively, the user also can use user interface 106 to upgrade privacy policy.In another alternative execution mode, the user can upgrade privacy policy by using the outside local that connects via local communication module 118 to use (shown in outside local application block 116) input data.In another alternative execution mode, the user can use removable data memory device (not being shown among Fig. 1) input user to specify privacy policy data.The user specifies privacy policy data to comprise privacy classes and the privacy rule that can select, change or create according to the requirement or the preference of user of mobile station.In a favourable execution mode of notion of the present invention, travelling carriage 102 is provided by manufacturer or service provider, and it has the initial or default privacy engine that comprises general privacy policy.Afterwards, general privacy policy by one or more customization the in the following method, is specified privacy classes and privacy rule to comprise the user: 1) specify privacy policy data from the network download user by the user; 2) use user interface input user to specify privacy policy; 3) use the outside local in the local connection device to use, specify privacy policy data with the input user; Perhaps, 4) use the removable data memory device, the user who stores in advance with input specifies privacy policy data.An exemplary implementation such as the removable data memory device of subscriber identification module, USIM or removable identification module is described hereinafter.
The illustrative methods of enhanced user privacy control operation
Fig. 2 (a)-2 (d) illustrates the unified flow chart of the illustrative methods of the enhancing privacy of user that uses in travelling carriage LCS.Flow process between Fig. 2 (a) and Fig. 2 (b) connects by unit 214,220,230 and 232 representatives.Similarly, the flow process between Fig. 2 (a) and Fig. 2 (c) connects by unit 202,208 and 223 representatives.Flow process between Fig. 2 (b) and Fig. 2 (c) connects by unit 258 representatives.Flow process between Fig. 2 (b) and Fig. 2 (d) connects by unit 214 and 246 representatives.Flow process between Fig. 2 (c) and Fig. 2 (d) connects by unit 246 representatives.
A kind of state of unit 202 representatives among Fig. 2 (a), during this state, privacy engine 120 (Fig. 1) is waited for the request (position requests just) that receives locator data information.In step 204, privacy engine 120 connects the receiving position request via the data of above describing with reference to Fig. 1.About this exemplary implementation, position data request can comprise any one in the following message: the 1) type of the network address and position requests application; 2) requestor's classification (for example, emergency services, business service, individual); 3) requestor's identity (if available); 4) be used for the code word or the digital certificate of requestor's authentication; 5) requested service quality (QoS).Communications field those skilled in the art obviously can understand, the scope of the present invention's instruction comprises the use to other type position data request, for example, geographical area information, user profile, applicant information, coordinate system etc. are as can be required in realizing other execution mode.
Referring again to Fig. 2 (a), in step 206, position request counter is initialized as null value.The null value representative receives only the situation of a position requests.If when handling the primary importance request, receive position requests subsequently, then position request counter adds up and successively decreases, and is as mentioned below.The purpose of position request counter is, carries out the management of a plurality of concurrent position requests.
Unit's 208 representatives connect from the flow process of Fig. 2 (c).As described below, need only the position requests that receives when handling the previous position request subsequently, just connect 208, by the step process position data request of the inventive method after the step 286 of Fig. 2 (c) via flow process.
In step 210, privacy engine 120 (Fig. 1) calls selected privacy policy, and it has distributed privacy classes for the position requests that (or via unit 208) receives during step 204.As mentioned above, privacy policy comprises a tabulation, be used for distributing privacy classes to position requests, and privacy rule, it is used for making a strategic decision based on the privacy classes of being distributed.
Referring again to Fig. 1, privacy engine 120 can call application module 114, other module 124 or travelling carriage module and assembly not shown in the drawings selectively, to carry out the classification to position data request.For example, can call network application, with the checking digital certificate data.
Referring again to Fig. 2 (a), in step 212, the estimated position request msg is to determine whether position requests is emergency service request.According to common legal requirements, emergency service request should have precedence over privacy policy, and should try one's best promptly to requestor's home position data.For emergency service request, this method connects 214 via flow process and enters step 256 (Fig. 2 (b)), skipping privacy policy, and booster response.For non-emergency request, this method enters step 216.
In step 216, the estimated position request msg is to determine whether to exist other requirement that must have precedence over privacy policy.For example, some country may require to give from law enforcement or the request of other government organs with preferentially.If require preferentially, then this method enters step 256 via flow process connection 214, to quicken processing.If do not require preferentially, then this method enters step 218.
Referring again to Fig. 2 (a), in step 218, privacy engine 120 (Fig. 1) invoking privacy strategy with based on the rule that is associated with the privacy classes of distributing to this request, determines whether refuse this position requests.Can be based on the definite refusal of a plurality of criterions to request position information.In first example, refusing this request may be commercial entities because of the requestor, and distributes to the automatic refusal of privacy classes appointment of commercial entities.In second example, refusing this request may be because requestor's identity is a private personal, and it has been in to have specifies the privacy classes of the rule of refusal automatically.In the 3rd example, refusing this request may be because position data request does not comprise the digital certificate or the password of authorization request person's identity, and the default privacy class of classification comprises the rule of specifying automatic refusal hereto.In the 4th example, the user may select to specify all position requests outside those position requests that relate to emergency services to be in a privacy classes, refusal automatically in this privacy classes specifies in during the special time.The wireless communication field those skilled in the art obviously can understand, and comprise many other examples in the scope of the present invention's instruction.
If refuse this position requests in the decision-making that step 218 is carried out, then calculating location not, and this method enters step 222, there, sends service-denial message to location request application.As described below, with reference to the description of figure 2 (b) flow chart, also can after the step 238 or 242 of Fig. 2 (b), connect 220 implementation steps 222 in more detail via flow process.After step 222, the inventive method connects 223 steps 282 that enter Fig. 2 (c) via process flow.As what will describe in detail hereinafter, this method was checked position request counter in step 282 before turning back to idle condition treatment step 202 or carrying out the step of further handling, waiting in line to determine whether extra position requests.
Return Fig. 2 (a), if determine should not refuse this request in steps in decision-making 218, invoking privacy strategy in step 224 then is to determine whether to require user notification.If determine not require user notification in step 224, then the inventive method connects 230 steps 250 that enter Fig. 2 (b) via flow process, to be further processed.This is described in detail in description about Fig. 2 (b) below.
If determine to require user notification in step 224, then in step 226, (Fig. 1) transmits notice to the user via user interface 106.User interface 106 can utilize sound, image, vibration or other device to remind subscriber location request to be allowed, and may use figure, text or audio frequency to show or other expression way transmits the information that relates to position requests, for example requestor's classification, requestor's identity and/or the QoS that asked.
In step 228, privacy engine 120 invoking privacy strategies are to determine whether position requests requires the user to respond except that user notification.If not, then the inventive method connects 230 steps 250 that enter Fig. 2 (b) via flow process, to be further processed.If require the user to respond, then in step 232, start the timing of user's response is waited for.
Fig. 2 (b) is the continuation of unified flow chart Fig. 2 (a)-Fig. 2 (c), from step 232 (timing to user's response is waited for).Step 234,236 and 238 representatives may stop regularly waiting in the step 232 the possible incident of period.Step 240 representative may occur in the incident of regularly waiting in the step 232 in the period.
If it is that user's incident that accepts request by representative in the step 234 stops that the timing of the user in the step 232 response is waited for, then position data request is sent to step 250, to be further processed.
If responding, the user in the step 232 regularly waits for it being that overtime incident by step 236 representative stops, and do not have the user to respond that then position data request is sent to step 242, this method enters step 242, to be further processed.Step 242 invoking privacy strategy is to determine whether lack user's response requires refusal.Respond the requirement refusal if lack the user, then the inventive method enters step 222 (being shown in Fig. 2 (a)) via flow process connection 220.Do not require refusal if lack user's response, then this method enters step 250, to be further processed.
Regularly wait for it being that incident (user refuses request) by step 238 representative stops if the user in the step 232 responds, then the inventive method connects 220 via flow process and enters step 222, and it is shown among Fig. 2 (a).
Shown in Fig. 2 (b), if the timing waiting time in step 232 receives new position request, just, the incident of step 240 representative (may have new position request to arrive at waiting time) betides the user and responds before the regularly wait termination, then transmit the new position request data that privacy engine 120 (Fig. 1) receives, and this method enters step 244.
Still with reference to Fig. 2 (b), in step 244, estimate new position request, to determine whether this request is emergency service request.For emergency service request, this method connects 246 via flow process and enters step 288 (Fig. 2 (d)).In step 288, position request counter adds up, and this method enters step 290.In step 290, suspend the previous position processing of request, and be placed in the formation, wait for processing subsequently, as will be explained hereinafter.(not shown) in another embodiment, this method may change termination into to the previous position processing of request in step 290.(not shown) in another execution mode, generator make PD module 122 (Fig. 1) can handle a plurality of simultaneous requests.After step 290, this method connects 214 via flow process and enters step 256 (Fig. 2 (b)), to quicken the processing to emergency service request.If new request is not flash request, then this method directly enters step 248 (figure (2b)) from step 244.
In step 248, position request counter adds up.This method enters step 260 then, and new position request data is sent to formation.In step 260, this method places data queue with new position request data.After the completing steps 260, the inventive method is returned step 232, and waits for the response from the user.In alternative execution mode, can before step 248, insert and realize additional step, whether should refuse new position request, rather than rank with decision-making.In these execution modes, if the step that increases can cause comprehensive improvement of efficient, then the not received request of refusal is favourable.In one example, the request of the unacceptable QoS of refusal regulation immediately, rather than be placed in the formation.
Shown in Fig. 2 (b), can from step 234,242 or (connecting 230) step 228 (Fig. 2 (a)) via flow process enter step 250.In step 250, will specify the position data request of QoS to compare with the privacy rule that is applied to the current location request.In order to describe exemplary implementation, QoS may represent the accuracy of the position data that will return to location request application.Position data can comprise the latitude and longitude coordinate data, together with the QoS data of representing the location estimation accuracy.If consistent by the restriction that the QoS of position data request appointment and the privacy rule that is applied to the current location request are specified, then this method enters step 256.If the QoS of position data request appointment and the restriction of privacy policy are inconsistent, before then further handling in step 256, change QoS data in step 252 are so that its unanimity.The purpose and the further specifying in the exemplary application part that will be described below of purposes of illustrating the QoS standard provide.
In step 256, this method activates PD module 122 (Fig. 1), to fetch position data according to position data request and current privacy policy standard.As indicated above, when receiving urgent or during other privacy override requests, this method can connect 214 performing steps 256 via flow process in step 212,216 (Fig. 2 (a)) or step 290 (Fig. 2 (d)) afterwards.Then, this method enters step 258.In step 258, this method is carried out the timing of PDM 122 responses is waited for.
Fig. 2 (c) is the continuation of unified flow chart Fig. 2, waits for (timing to the PDM response is waited for) from the timing of step 258 (Fig. 2 (b)).Step 262 and step 264 representative may stop regularly waiting in the step 258 incident of period.Step 266 is also represented the incident that may occur in during regularly waiting for the period in the step 258.These steps are described hereinafter in more detail.
Shown in Fig. 2 (c), if in the step 258 timing of PDM response is waited for that the incident by step 262 representative stops, just, if PDM 122 in response to privacy engine 120 (Fig. 1), then this method enters steps in decision-making 270 from step 262.If " overtime " waited in the timing of step 258, just, its incident by step 264 representative (overtime) stops, and then this method enters step 272 from step 264, and sends error message to location request application.(not shown) in alternative execution mode can send the positional information of storage in advance, replaces error message.After step 272, this method enters step 282, to check unsettled position requests in the new position request formation.
Shown in Fig. 2 (c), if new position request takes place during step 258, then this method enters step 266 (may have new position request to arrive at waiting time).In step 266, privacy engine 120 (Fig. 1) receives new position request data.In following step 268, estimate new position request, to determine whether this request is emergency service request.For emergency service request, this method connects 246 via flow process and enters step 288 (Fig. 2 (d)), carrying out treatment step subsequently, as mentioned above.If new request is not flash request, then this method directly enters step 274 from step 268.
In step 274, this method adds up to position request counter.In following step 278, this method places data queue with new position request.After the completing steps 278, this method is returned step 258, waits for the timing that continues to carry out the PDM response.
When being bide one's time in response to timing in privacy engine 120 (Fig. 1) interrupt step 258 etc. by PDM 122, this method enters step 262 from step 258, shown in Fig. 2 (c).In step 262, the PDM 122 from step 262 is sent to privacy engine 120 with the PDM data.The PDM data comprise position coordinate data and QoS data.In step 270, will specify the PDM data of QoS to compare with the privacy rule that relates to current location request privacy classes.In order to describe exemplary implementation, QoS may represent the accuracy of the estimation of the PDM position coordinate data that will return to location request application.For example, the PDM data can comprise latitude and longitude data, together with the QoS data of representing the location estimation accuracy.If the specified restriction of the QoS of PDM data and the privacy rule that relates to current location request privacy classes is consistent, then this method enters step 280, to be further processed.If the QoS of PDM data appointment is inconsistent with privacy policy limits at that time, then in step 276, change the QoS data, so that its unanimity.After step 276 pair location estimation was carried out reformatting, this method entered step 280.To provide in the exemplary application part below the purpose of QoS standard and the more detailed description of purposes.
In step 280, the PDM data are sent to location request application.Then, this method enters step 282, and there, the inquiring position request counter is unsettled to determine whether new position request.If the value of counter is confirmed as zero, indication does not have unsettled request at present, and then this method is returned wait state 202 (Fig. 2 (a)).If the value of counter is the integer greater than zero, then this method enters step 284.In step 284, from the new position request data formation, fetch new position request data.
Then, this method enters step 286, and there, position request counter is successively decreased.This method (connecting 208 via flow process) enters step 210 (Fig. 2 (a)) then, with further processing new position request data.
Exemplary application
In the typical case of the present invention instruction uses, can define the configurable privacy classes of a plurality of users and belong to its characteristic or rule.As described above with reference to Figure 1, can connect realization user configurability via the data that privacy engine 120 and user interface 106, privacy management server 104 (or other webserver not shown in the drawings) or outside local are used between 116.Wish only to allow privacy engine 120 and privacy policy to be configured and to change by security means.By the mode of example, security means can comprise the whole bag of tricks and device, is used to the digital communication, password use, digital certificate and other authentication of knowing and the method for authenticating that provide safe.
Privacy classes can include, but are not limited to following type:
1. for default privacy class the unknown or unstated (just incredible) location request application and requestor's identity that specifically is not included in any other grade;
2. for specifically not being included in the credible location request application in any other grade and the default privacy class of requestor's identity;
3. the user's given level that comprises location request application and requestor's identity.
Each privacy classes can include, but are not limited to following privacy rule:
1. Mo Ren acceptance or refusal or based on the standard of the acceptance of specified limit;
2. the standard that requires of user notification:
2.a the user notification that definitely requires or do not require, (for example, the user specifies, and requires notice for accuracy greater than the location estimation more than 10 meters based on the notice of requirement QoS.Therefore,, then will notify the user if the QoS that the position data request assigned address is estimated has 5 meters accuracy), and
2.b based on request is the notice that starts periodically or when needed;
2.c based on the notice of time of origin, for example some time in one day, certain day in the week, date or similarly time correlation restriction.
3. the display mode standard (for example, the ejection icon in the graphic user interface, tone, music or other sound notification, vibration informing etc.) that is used for user notification, and the information that will show (if any);
4. the standard that relates to the notice request of periodic request, for example, clearly notice requires for each periodic request, still just requires for first request in the periodic sequence;
QoS that will submit to or location estimation accuracy standard (for example, the privacy policy grade may only permit the postcode accuracy or only permit greater than the distance to a declared goal radius with interior accuracy);
6. the user is not in response to the default treatment standard under the notice situation (for example, when the user does not allow still not allow this request in response to when notice, for example, this notice may be a pop-up window that has or do not have " OK " button that disappears after several seconds automatically);
7. based on the multiple regular configuration specification of location of mobile station or time on date.(for example, the user can set up a kind of rule, changes or forbids from certain position or in the response of time specific date.)
In an execution mode of notion of the present invention, travelling carriage 102 (Fig. 1) can comprise subscriber identification module (SIM), USIM (USIM) or Removable User Identity Module (RUIM).SIM, USIM and RUIM equipment are the removable memory modules that is used for travelling carriage, and it can guarantee the safe storage to user-specific information.With reference to as described in Fig. 1, SIM, USIM or RUIM equipment can be included in other module frame 112 as the front.In this exemplary execution mode, user's specific privacy policy data is stored in SIM, USIM or the RUIM equipment.Equipment can link to each other (the not shown connection in Fig. 1) with privacy engine 120, and user's specific privacy policy data is sent to privacy engine 120, to be implemented in the operation of above described privacy engine 120.Also receive user's specific privacy policy data, to store from privacy engine.This is in the initial privacy policy data that receives, with by SIM, USIM and or during the RUIM device storage, and when changing or upgrading these data, take place.When SIM, USIM or RUIM were removed from travelling carriage 120, advantageously, user's specific privacy policy information then can deletion automatically from privacy engine 120.SIM, USIM or RUIM equipment are used for the removable storage of travelling carriage user particular data, and this is known by communications field those skilled in the art.Describe in third generation partner program (3GPP) technical specification (TS) the group terminal that the realization standard of SIM equipment was issued in June calendar year 2001, the list of references of the version 1999 in subscriber identification module API (SIMAPI) stage 1 (3GPP TS 02.19 V8.0.0).Therefore, pass through with reference to whole introducing the application, as relating to the instruction that SIM equipment is realized with it at this.For the person skilled in the art for it is evident that, this instruction comprises various execution modes, wherein, can comprise other movable memory equipment (for example smart card or memory stick) in travelling carriage, and it is used together with privacy engine, with storage user specific privacy policy data.
Each example that provides according to the above description, communications field those skilled in the art can recognize, this instruction here can be extensively and is applied to relate to the user's control and the management of the individual privacy information of LCS at large.
Communication and computer realm those skilled in the art also will recognize, can use the computer-readable medium of the method step of clearly realizing any this execution mode wherein according to this instruction.For example, top this method step of describing with reference to Fig. 2 (a)-Fig. 2 (c) can be embodied as series of computation machine executable instruction, be stored in the computer-readable medium.This medium can include, but not limited to RAM, ROM, EPROM, EEPROM, floppy disk, hard disk, CD-ROM etc.The disclosure comprises that also comprehensive is the method step of any aforementioned embodiments of the Digital Logic in the integrated circuit, wherein integrated circuit for example, field programmable gate array, or programmable logic array perhaps can construct or change to realize other integrated circuit of computer program instructions.
Travelling carriage 102 according to this instruction can include, but are not limited to: radio telephone, have wireless communication ability personal digital assistant, have the laptop computer of wireless communication ability and any other mobile digital equipment that carries out personal communication via wireless connections.
A plurality of execution modes to notion of the present invention are described.But, should understand, can under the prerequisite that does not depart from concept and range disclosed herein, carry out various changes.For example, can in the execution mode of software or hardware or combination of hardware, carry out this method.As another example, should understand, the function of describing as a module part can be implemented in another module usually equivalently.As another example, represent or the step described or action can realize with different orders usually with particular order, except those execution modes of in comprising the claim of particular order of steps, describing.
Therefore, can understand, notion of the present invention is not limit by the execution mode of certain illustrated, but is limited by the scope of appended claims.This description can provide the example of similar features, as described in the claims, still, should not be considered as that those features are equal in this similar feature and the claim, unless this sign is that to understand the scope institute of claim essential.In some instances, by using slightly different term, emphasize the difference of expecting between the feature of the feature of claim and description.

Claims (37)

1. privacy control system of in travelling carriage, using, wherein said travelling carriage and wireless communication system communicating, and described privacy control system provides the geo-localisation information that is associated with described travelling carriage, and described privacy control system comprises:
A) privacy engine, comprise privacy policy assembly with at least one privacy rule, wherein said privacy engine receives the Location Request that the location requestors by described travelling carriage outside relevant with the geo-location of described travelling carriage generates, and determines whether that part responds described Location Request based on described at least one privacy rule; And
B) position determination module PDM is coupled to described privacy engine and in response to this privacy engine, wherein said PDM provides the geo-location of described this travelling carriage to estimate to described privacy engine;
Wherein, described privacy engine receives described geo-location from described PDM to be estimated, and according to described privacy policy assembly by handling this location estimation and response message be provided, and respond described Location Request selectively.
2. privacy control system according to claim 1, wherein said PDM operates according to following one or more methods: global position system GPS, assistant GPS, AFLT, the time of advent, enhancement mode observed time difference and the location of wherein moving the wireless communication cell that travelling carriage is arranged based on identification.
3. privacy control system according to claim 1, further comprise the wireless network communication module that is coupled to described privacy engine and described wireless communication system, wherein said wireless network communication module is configured to receive described Location Request from described wireless communication system, and response message sent to described wireless communication system, described wireless network communication module also is configured to receive data and software instruction and send data and software instruction to described wireless communication system from described wireless communication system.
4. privacy control system according to claim 3, wherein said privacy engine comprise from described wireless communication system downloaded software.
5. privacy control system according to claim 3, wherein using upgrades from described wireless communication system downloaded software changes described privacy engine.
6. privacy control system according to claim 3, wherein said privacy policy comprise from described wireless communication system downloaded software.
7. privacy control system according to claim 3 is wherein used the described privacy policy of downloading from described wireless communication system of change of more newly arriving.
8. privacy control system according to claim 7, wherein said renewal comprises user's specific privacy policy data.
9. privacy control system according to claim 3, wherein said Location Request are to receive from the applications that is connected to described wireless communication system.
10. privacy control system according to claim 1, wherein said Location Request are that the local software of carrying out in described travelling carriage is used reception.
11. privacy control system according to claim 1, further comprise the local communication module that is coupled to described privacy engine and outside local application, wherein said local communication module is configured to use the described Location Request of reception from described outside local, and response message is sent to described outside local use, described local communication module also is configured to use to receive data and software instruction and use to described outside local from described outside local send data and software instruction.
12. comprising from outside local, privacy control system according to claim 11, wherein said privacy engine use downloaded software.
13. privacy control system according to claim 11 wherein utilizes software upgrading to change described privacy engine by use the downloaded software instruction from outside local.
14. comprising from outside local, privacy control system according to claim 11, wherein said privacy policy use downloaded software.
15. privacy control system according to claim 11 is wherein utilized from outside local and is used the described privacy policy of downloading of change of more newly arriving.
16. privacy control system according to claim 15, wherein said renewal comprises user's specific privacy policy data.
17. privacy control system according to claim 11, wherein said Location Request are used from outside local and are received.
18. privacy control system according to claim 1 comprises further and is coupled to the user interface of described privacy engine that wherein said user interface is configured to receive input from the user, and this user imports the utilization described privacy policy of change of more newly arriving.
19. privacy control system according to claim 18, wherein said renewal comprises user's specific privacy policy data.
20. privacy control system according to claim 18, wherein said user interface provides the Location Request notice according to described privacy policy to this user, and described user interface is configured to receive the response of notifying in response to described Location Request from this user.
21. privacy control system according to claim 20, wherein said privacy policy comprises a plurality of privacy classes, wherein said privacy classes is to being classified by the Location Request that described privacy engine received, and described privacy policy further comprises the privacy rule of determining the response of the Location Request of each privacy classes, and described privacy rule comprises one of following rule at least:
A) require Location Request is given tacit consent to the rule of accepting or refusing;
B) rule of user notification is carried out in requirement to Location Request;
C) carry out the rule of user notification based on institute's requested service quality requirement;
D) be the rule of initiating periodically or as required that requires to carry out user notification based on this Location Request;
E) require to carry out the rule of user notification based on the time of origin of this Location Request;
F) appointment is used for the rule of the display mode of user notification;
G) specify the rule of the accuracy scope of this location estimation that will provide;
H) if require the user not respond user notification, then response message is carried out the rule of default treatment; And
I) based on the rule of the current geo-location specified response Message Processing of this travelling carriage.
22. privacy control system according to claim 1, further comprise the removable data memory device, wherein said removable data memory device is coupled to described privacy engine, and described removable data memory device is configured to receive, stores and sends user's specific privacy policy data.
23. privacy control system according to claim 22, wherein said removable data memory device comprises subscriber identification module equipment.
24. privacy control system according to claim 22, wherein said removable data memory device comprises USIM equipment.
25. privacy control system according to claim 22, wherein said removable data memory device comprises Removable User Identity Module equipment.
26. the method for the privacy of the geo-localisation information that this travelling carriage is provided in travelling carriage control, wherein said travelling carriage and wireless communication system communicating, described travelling carriage comprises privacy engine, this privacy engine comprises software instruction, the software instruction of described privacy engine also comprises the privacy policy instruction, the position determination module PDM that the geo-location that wherein said travelling carriage further comprises can provide described travelling carriage is estimated, described method comprises the following steps:
A) reception is to the Location Request of the current geo-location of described travelling carriage;
B) handle described Location Request according to the software instruction of described privacy engine, the software instruction of described privacy engine comprises and determines whether that part responds the privacy rule of described Location Request based on the information in the described Location Request of being included in;
C) geo-location that obtains described travelling carriage is estimated;
D) handle this location estimation according to the software instruction and the described privacy rule of described Location Request, described privacy engine; And
E) provide the response message of the software instruction in response to described Location Request, described privacy engine, described location estimation and described privacy rule selectively.
27. privacy control method according to claim 26, the step b) of wherein handling described Location Request further comprises by skipping described privacy policy instruction to provide emergency response message to handle the step of urgent Location Request.
28. comprising, privacy control method according to claim 27, the step b) of wherein handling described Location Request handle a plurality of concurrent Location Requests.
29. privacy control method according to claim 28 wherein, when handling described urgent Location Request, suspends the processing to unsettled Location Request.
30. privacy control method according to claim 26 further comprises the step to the user notification Location Request.
31. privacy control method according to claim 30, the instruction of wherein said privacy policy comprises and is used for privacy classes that this Location Request that receives in this step a) is classified, the instruction of wherein said privacy policy further comprises the privacy rule that is used for determining to the response of the Location Request of each privacy classes, and described privacy rule comprises one of following rule at least:
A) require Location Request is given tacit consent to the rule of accepting or refusing;
B) rule of user notification is carried out in requirement to Location Request;
C) carry out the rule of user notification based on institute's requested service quality requirement;
D) be the rule of initiating periodically or as required that requires to carry out user notification based on this Location Request;
E) require to carry out the rule of user notification based on the time of origin of this Location Request;
F) appointment is used for the rule of the display mode of user notification;
G) specify the rule of the accuracy scope of this location estimation that will provide;
H) if require the user not respond user notification, then response message is carried out the rule of default treatment; And
I) based on the rule of the current geo-location specified response of this travelling carriage Message Processing.
32. one kind provides the device to the geo-localisation information privacy control of this travelling carriage in travelling carriage, wherein said travelling carriage and wireless communication system communicating, described travelling carriage comprises privacy engine, this privacy engine comprises software instruction, the software instruction of described privacy engine also comprises the privacy policy instruction, and, the position determination module PDM that the geo-location that wherein said travelling carriage further comprises can provide described travelling carriage is estimated, described device comprises:
A) be used to receive device to the Location Request of the current geo-location of described travelling carriage;
B) be used for handling according to the software instruction of described privacy engine the device of described Location Request, the software instruction of described privacy engine comprises and determines whether that part responds the privacy rule of described Location Request based on the information in the described Location Request of being included in;
C) be used to obtain the device that the geo-location of described travelling carriage is estimated;
D) be used for the device of handling this location estimation according to the software instruction and the described privacy rule of described Location Request, described privacy engine; And
E) be used for providing in response to the software instruction of described Location Request, described privacy engine, described location estimation and described privacy rule selectively the device of response message.
33. further comprising, privacy control device according to claim 32, the device that wherein is used to handle described Location Request be used to skip described privacy policy instruction to handle urgent Location Request and the device of emergency response message is provided.
34. privacy control device according to claim 33, the device that wherein is used to handle described Location Request further comprise the device that is used to handle a plurality of concurrent Location Requests.
35. privacy control device according to claim 34 wherein, when handling described urgent Location Request, suspends the processing to unsettled Location Request.
36. privacy control device according to claim 32 further comprises the device that is used for to the user notification Location Request.
37. privacy control device according to claim 36, wherein said privacy policy comprises and is used for privacy classes that the Location Request that receives in step a) is classified, and, wherein said privacy policy further comprises the privacy rule that is used for determining to the response of the Location Request of each privacy classes, and wherein said privacy rule comprises one of following at least rule:
A) require Location Request is given tacit consent to the rule of accepting or refusing;
B) rule of user notification is carried out in requirement to Location Request;
C) carry out the rule of user notification based on institute's requested service quality requirement;
D) be the rule of initiating periodically or as required that requires to carry out user notification based on this Location Request;
E) require to carry out the rule of user notification based on the time of origin of this Location Request;
F) appointment is used for the rule of the display mode of user notification;
G) specify the rule of the accuracy scope of this location estimation that will provide;
H) if require the user not respond user notification, then response message is carried out the rule of default treatment; And
I) based on the rule of the current geo-location specified response of this travelling carriage Message Processing.
CNB2004800079094A 2003-02-14 2004-02-17 Be used to have system, the method and apparatus of the positioning service privacy management of travelling carriage Expired - Lifetime CN100551116C (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US44756303P 2003-02-14 2003-02-14
US60/447,563 2003-02-14
US60/490,765 2003-07-28
US10/779,109 2004-02-13

Publications (2)

Publication Number Publication Date
CN1765143A CN1765143A (en) 2006-04-26
CN100551116C true CN100551116C (en) 2009-10-14

Family

ID=36748365

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2004800079094A Expired - Lifetime CN100551116C (en) 2003-02-14 2004-02-17 Be used to have system, the method and apparatus of the positioning service privacy management of travelling carriage

Country Status (1)

Country Link
CN (1) CN100551116C (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10049077B2 (en) 2006-06-30 2018-08-14 Intel Corporation Handheld device for elderly people
CN101272589B (en) * 2007-03-21 2012-05-23 展讯通信(上海)有限公司 Method for switch mobile phone device number and protecting user intimacy and mobile phone thereof
CN101304562B (en) * 2008-06-27 2011-11-30 中兴通讯股份有限公司 Method for protecting user privacy during locating process, mobile terminal and mobile locating center
CN101990177B (en) * 2009-08-05 2015-04-15 株式会社Ntt都科摩 Method and device for processing location service in mobile communication system
CN102835071B (en) * 2010-04-02 2015-09-02 交互数字专利控股公司 policy management method
EP2752041B1 (en) * 2011-08-31 2020-01-15 Nokia Technologies Oy Method and apparatus for privacy policy management
US9450984B2 (en) 2011-10-17 2016-09-20 Nokia Technologies Oy Automatic approach for the personalized privacy recommendation related to the location
CN103813264B (en) * 2012-11-12 2018-07-03 中国电信股份有限公司 Handle method, system and the mobile switch of Location Request
US20180367982A1 (en) * 2015-06-18 2018-12-20 Thomson Licensing User-controlled distribution and collection of tracked data
US20170280310A1 (en) * 2016-03-24 2017-09-28 Qualcomm Incorporated Methods and systems for controlling external access to a communcations port

Also Published As

Publication number Publication date
CN1765143A (en) 2006-04-26

Similar Documents

Publication Publication Date Title
EP1593286B1 (en) Enhanced user privacy for mobile station location services
RU2301506C2 (en) Method and system for selecting data elements for service requests
US8700022B1 (en) Mobile communication device provisioning and management
US7058385B2 (en) Emergency call system within a telecommunication network
RU2355025C2 (en) Bootable configuring application software for wireless device
CN101568104B (en) System and method for handshaking between wireless devices and servers
US8577334B1 (en) Restricted testing access for electronic device
EP3496373B1 (en) Method for serving location information access requests
US20090093236A1 (en) Delivery of a service
US20070204039A1 (en) System and method of downloading restricted applications to wireless devices
CN101675416A (en) Interactive control of access to services and capabilities of a mobile device
US20120135755A1 (en) Apparatus and method for providing contents services
WO2005029885A1 (en) System and method for providing differential location services
CN100551116C (en) Be used to have system, the method and apparatus of the positioning service privacy management of travelling carriage
US7110754B2 (en) Radio software acquisition system, radio software acquisition method and radio software acquisition program
US8805421B2 (en) Method and system for sending ring setting reminders to mobile devices within a predetermined area
KR100830303B1 (en) Portable terminal device, site access method using thereof and computer readable medium
US10616418B2 (en) Dynamically generated call triggers
CN102594801B (en) Method and system for managing media objects in mobile communication devices
EP2209339B1 (en) Mobile communication terminal device, qos control device, mobile communication system, and method of guaranteeing qos
CN101742705A (en) Communication method and system
KR100719142B1 (en) Mobile Communication Terminal with Location-Based Variable Password and Control Method Thereof, Location-Based Variable Password Setting System Therefor
KR20090047565A (en) Method and system of calling a taxi driver designated by a passenger
KR100591683B1 (en) System for service of broadcasting using mobile phone
US20090022113A1 (en) Subscriber information management system and method for mobile communication service system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1088165

Country of ref document: HK

C14 Grant of patent or utility model
GR01 Patent grant
REG Reference to a national code

Ref country code: HK

Ref legal event code: GR

Ref document number: 1088165

Country of ref document: HK

CX01 Expiry of patent term

Granted publication date: 20091014

CX01 Expiry of patent term