GB2375011A - Provision of location data to mobile computing or communications device - Google Patents

Provision of location data to mobile computing or communications device Download PDF

Info

Publication number
GB2375011A
GB2375011A GB0110079A GB0110079A GB2375011A GB 2375011 A GB2375011 A GB 2375011A GB 0110079 A GB0110079 A GB 0110079A GB 0110079 A GB0110079 A GB 0110079A GB 2375011 A GB2375011 A GB 2375011A
Authority
GB
United Kingdom
Prior art keywords
location
mapping
server
intermediate server
information representing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB0110079A
Other versions
GB0110079D0 (en
Inventor
Stephen A Loughran
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HP Inc
Original Assignee
Hewlett Packard Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hewlett Packard Co filed Critical Hewlett Packard Co
Priority to GB0110079A priority Critical patent/GB2375011A/en
Publication of GB0110079D0 publication Critical patent/GB0110079D0/en
Publication of GB2375011A publication Critical patent/GB2375011A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/35Network arrangements, protocols or services for addressing or naming involving non-standard use of addresses for implementing network functionalities, e.g. coding subscription information within the address or functional addressing, i.e. assigning an address to a function
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/04Protocols specially adapted for terminals or networks with limited capabilities; specially adapted for terminal portability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
    • H04L69/322Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
    • H04L69/329Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/08Mobility data transfer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/08Mobility data transfer
    • H04W8/10Mobility data transfer between location register and external networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/08Mobility data transfer
    • H04W8/16Mobility data transfer selectively restricting mobility data tracking

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

Providing a mapping between an exact location and an approximate location of a computing or communication device. The device sends a composite message to an intermediate server, which message comprises the return address of the device and the encrypted exact location of the device. The intermediate server associates the return address of the device with a disguised identity known only to the intermediate server and sends a composite message to a mapping server, which message comprises the disguised identity associated with the device and the encrypted exact location of the device. The mapping service decrypts the exact location of the device, maps the exact location of the device to an approximate location of the device, encrypts the approximate location of the device and sends a composite message to the intermediate server, which message comprises the encrypted approximate location of the device and the disguised identity of the device. The intermediate server associates the disguised identity with the return address of the device and sends a message to the device which message comprises the encrypted approximate location of the device and the device decrypts the approximate location of the device.

Description

<Desc/Clms Page number 1>
Provision of Location Data to Mobile Computing or Communications Device The present invention relates to the provision of location information regarding computing or communications devices without an invasion of privacy of the users of such devices.
There exist computing and communications devices, in particular mobile devices, which can provide enhanced services to their users if their location is provided to content or service providers, in particular World Wide Web based content or service providers. More information about location dependent mobile web services can be found at
http ://www. cooltown. hp. com. Recently, much interest has been shown in'location based','location aware'or'location dependent'services for mobile users, these being services that take account of the current location of the user. A basic form of this service is an emergency location service whereby a user in trouble can press a panic button on their mobile phone to send an emergency request-for-assistance message with their location data appended. Another well known location based service is the provision of traffic and route-guiding information to vehicle drivers based on their current position. A further known service is a'yellow pages'service where a user can find out about amenities, for example, shops, restaurants, theatres, etc. , in the vicinity of their current location. In addition there is much interest in location dependent advertising.
Where the computing or communications devices are fixed, for example a personal computing device fixed in a user's home or office, their location may still be of use in the provision of services, but the location can be entered manually, or determined through the caller identification
<Desc/Clms Page number 2>
of a telephone line, through which the computing device communicates, coupled with the location of a telephone exchange.
Where the computing or communications devices are mobile, for example lap top or palm top computing devices or mobile telephones carried around with a user, there exists a variety of technologies that can determine the location of the devices. These technologies include : inertial positioning systems which determine the displacement of a mobile device from an initial reference position; a network of fixed position beacons that continually transmit their location, which location can be picked up by a mobile device in the vicinity of the beacon to determine its position; GPS receivers; deriving location from the cell in a cellular radio infrastructure within which a mobile device operating using the infrastructure is located ; or triangulation techniques using multiple base stations in, for example, a cellular radio infrastructure.
Some of these methods result in mobile devices knowing their own locations, thereby enabling them to transmit their location to a location dependent service that they wish to use, whilst others of the methods result in the user's location becoming known to a network entity from where it can be supplied directly or via the mobile device to a location dependent service.
<Desc/Clms Page number 3>
Alternatively, for mobile devices, the user of the device could manually input location information.
Location dependent services all require user location as an input parameter and the device's return address, for example the device's network address or telephone number. Where a device who knows its own location or a network entity who know a device's location communicate the current location and return address of the device to location dependent services, then the device user's privacy can be significantly eroded in circumstances where the identity of the device and its user can be derived from the return address. A location dependent service could log a device's changing location over a period of time, then use this information for their own purposes or sell it on to any interested party.
Many location dependent services, such as the'yellow pages'type service described above, require only approximate location information, for example, part of the postal or zip code or the town or city associated with the location. To protect the privacy of the user, location dependent web sites can be provided with only the bare minimum of information they need to provide their service. Thus, a mapping is required from the user's exact location to that of the user's approximate location, eg. post code or city. Such a system is described on http : //www. cooltown. hp. com in a paper entitled'Semantic Location'in which a trusted mapping service translates a mobile device's exact location to a URL, which URL represents the'Semantic'or approximate location of the device, in order among other things to provide privacy. The mobile device sets up a secure link to the mapping service, using an encrypted channel, to pass up its exact location and return address and receives back (to its return address) its approximate location, for example the whole or part of a postal or zip code or a town or city.
<Desc/Clms Page number 4>
However, this requires a mapping service to be entrusted with a device's location and its return address.
The mapping service may thus repeatedly be entrusted with the location and return address of a device. The return address may be a telephone number or a network address, and if the identity of the device can be derived from the return address then misuse of this information can undermine the privacy of the user of the device.
Other known methods of protecting privacy include reducing the accuracy of an exact position by rounding off the last few digits or by adding a random offset to an exact position. These methods have the disadvantage of generating an approximate location that is not related to physical things such as town and city districts and so may require further processing before being meaningful to the location dependent service.
According to a first aspect of the present invention there is provided a method of providing a mobile computing or communication device with information representing its approximate location using a mapping server which mapping server derives information representing the approximate location of the device from information representing the exact location of the device, the method comprising the steps of: the device and mapping server communicating encrypted location information to each other via an intermediate server which intermediate server cannot decrypt the encrypted information ; and the intermediate server disguising the return address of the device from the mapping server.
Preferably the method further comprising the steps of the intermediate server receiving from the device a request for approximate location information and establishing a mapping between the device's return
<Desc/Clms Page number 5>
address and a temporary identification and forwarding the request to the mapping service using the temporary identification to identify the device.
According to a preferred embodiment of the first aspect of the present invention there is provided a method of providing a mobile computing or communication device with information representing its approximate location comprising the steps of: the device sending a message to an intermediate server, which message comprises the return address of the device and encrypted information representing the exact location of the device; the intermediate server associating the return address of the device with a temporary identity known only to the intermediate server and sending a message to a mapping server, which message comprises the temporary identity associated with the device and the encrypted information representing the exact location of the device; the mapping service decrypting the information representing the exact location of the device, mapping the information representing the exact location of the device to information representing an approximate location of the device, encrypting the information representing the approximate location of the device and sending a message to the intermediate server, which message comprises the encrypted information representing the approximate location of the device and the temporary identity of the device; the intermediate server associating the temporary identity with the return address of the device and sending a message to the device, which message comprises the encrypted information representing the approximate location of the device; and the device decrypting the information representing the approximate location of the device.
<Desc/Clms Page number 6>
Preferably, a key for the encryption and decryption of the location information is known to the device and to the mapping server, but not to the intermediate server.
According to. this method, the intermediate server knows the return address of the device but does not know its location and the mapping server knows the location of the device but not its return address. Accordingly, neither of the servers have to be entrusted with the location and the network address of the device, from which return address the identity of the device and its owner may be derived.
Preferably, the intermediate server receives messages from many devices for forwarding to the mapping server, so that when the mapping server receives an exact location to be mapped to an approximate location it cannot determine which device is associated with the exact location. The intermediate server knows that the device with a given return address, such as a network address or phone number, made a request for a mapping from an exact location, but cannot determine what that exact location is.
According to a second aspect of the present invention there is provided an intermediate server for receiving a request for approximate location information from a mobile computing or communications device (which request includes encrypted information representing the exact location of the device), for disguising the return address of the device and for forwarding the encrypted information to a mapping server. The intermediate server preferably disguises the return address of the device by establishing a mapping between the device's return address and a temporary identification and forwards the encrypted information to a mapping server using the temporary identification to identify the device.
<Desc/Clms Page number 7>
When the intermediate server receives a reply from the mapping server, which reply includes the temporary identification and encrypted information representing the approximate location of the device it forwards the encrypted information to the return address mapped with the temporary identification.
The intermediate server can receive encrypted requests from many devices for forwarding to the mapping server.
In order that the present invention is more fully understood and to show how the same may be carried into effect, reference shall now be made, by way of example only, to the accompanying figures, wherein: Figure 1 shows schematically part of a communication network for providing approximate location information to mobile computing or communications devices according to the present invention; and Figure 2 is a flow chart of the steps incorporated in the method of providing approximate location information to mobile computing or communications devices according to the present invention.
The communications network shown in Figure 1 includes part of a conventional cellular wireless communications network comprising a first base station (2) for providing network coverage to a first geographical area or cell and a second base station (4) for providing network coverage to a second geographical area or cell. The cellular wireless communications network would comprise a plurality of such base stations (2,4) each providing coverage within a designated geographical area or cell and the base stations will be controlled by at least one network controller (not shown). In the network shown in Figure 1 the
<Desc/Clms Page number 8>
base stations (2,4) are each connected to a network (7). The network (7) may be the Public Internet or an intranet or other network. Thus, a mobile phone (6) located within the first cell can send messages over the network (6) via the base station (2) and a mobile computing device (8) located within the second cell can send messages over the network (7) via the base station (2).
Where the network (7) is the Public Internet, the mobile devices (6,8) may wish to access a location dependent web service (10), which may, for example, provide information about local restaurants. To do this the devices (6,8) must supply the web service (10) with information about their location. In response to the location information, the web service (10) can supply the devices with details of restaurants within their locality. However, the users of the devices, wishing to keep their location and movements throughout the day private prefer to send the web service (10) only their approximate location, for example, a part of a postal or zip code, which identifies that they are located in a particular postal district. The identity of the postal district within which a device (6, 8) is located is sufficient for the web service (10) to provide information about restaurants located within the district.
Considering first the mobile phone (6). Firstly, the phone (6) requests its exact location from the cellular radio network, for example from a network controller, via the base station (2). The network does this by knowing the cell within which the phone (6) is located and by triangulation using the base station (2) in the cell within which the phone is located and at least two further base stations which cover neighbouring cells. By measuring the time it takes for a radio signal to propagate between each of the base stations and the phone (6), the exact location of the phone can be determined. The exact location would then be forwarded to the phone (6), for example as a latitude, longitude pair.
<Desc/Clms Page number 9>
The phone (6) then requests an approximate location (which approximate location can then be provided to the web service (10) ) from a mapping service (14), via an intermediate server (12).
To do this the phone (6) encrypts its exact location (Step I in Figure 2) using a session key and then encrypts the session key with the public key of the mapping server (14). The phone then compiles a composite message including its own return address and the encrypted exact location (Step II in Figure 2). The composite message, shown in Figure 2 is then sent by the phone (6) to the intermediate server (12) via the base station (2) and network (7) (Step 11/in Figure 2).
When the intermediate server (12) receives the message it associates a temporary or disguised identification with the return address of the phone (6) from which the message was received (Step IV in Figure 2). It then compiles a composite message including the temporary identification it has associated with the phone (6) and the encrypted exact location received from the phone (6) (Step V in Figure 2). The intermediate server does not have the public key to decrypt the exact location of the phone (6). The intermediate server, replaces the return address of the phone (6) with a disguised identification to form a new composite message and then forwards this composite message to the mapping service (14) (Step VI in Figure 2).
On receiving the composite message from the intermediate server (12) the mapping service (14), knowing the public key can decrypt the session key and so can decrypt the exact location of the phone (6) (Step VII in Figure 2) and performs a mapping from the exact location to an associated approximate location (Step VIII in Figure 2). For example, the mapping service (14) may include a look up table of latitude longitude pairs, which associates an approximate location, for example
<Desc/Clms Page number 10>
a postal district with sets of latitude longitude pairs. Using such a look up table, the mapping service (14), knowing the exact location of the phone (6) can determine the approximate location of the phone (6) in terms, for example of a postal district within which the phone (6) is located. However, the mapping service does not know the return address of the phone (6) and so is. unable to determine the identity of the phone (6) or its user at the location because this information is kept from the mapping service by the use of the intermediate server (12).
The approximate location determined by the mapping service for the phone (6) is then encrypted using the same session key as was used to encrypt the exact location of the phone (6) (Step (IX) in Figure 2). The mapping service (14) then compiles a composite message including the encrypted approximate location and the temporary identification (Step (X) in Figure 2) that it received from the intermediate server (12) in relation to the encrypted exact location of the phone (6). The mapping service (14) then sends this composite message to the intermediate server (12) (Step XI in Figure 2).
The intermediate server (12) examines the temporary identification for the message received from the mapping service (14) and determines the return address of the phone (6) to which the encrypted approximate location from the mapping service (14) should be forwarded (Step X) ! in Figure 2). The intermediate server (12) then compiles a composite message including the encrypted approximate location of the phone (6) (Step Xill in Figure 2) and then forwards the message to the return address of the phone (6) (Step XIV in Figure 2).
The phone, on receiving the message from the intermediate server (12) uses the session key to decrypt the approximate location (step XV in Figure 2). A user of the phone (6) can then use the approximate location to communicate with the web service (10) to find a local restaurant at which to lunch without disclosing his/her exact location.
<Desc/Clms Page number 11>
The computing device (8) can also request an approximate location, from a mapping service (14), via an intermediate server (12) in the same way as described above in relation to the phone (6).

Claims (9)

  1. CLAIMS 1. A method of providing a mobile computing or communication device with information representing its approximate location using a mapping server which mapping server derives information representing the approximate location of the device from information representing the exact location of the device, the method comprising the steps of: the device and mapping server communicating encrypted location information to each other via an intermediate server which intermediate server cannot decrypt the encrypted information; and the intermediate server disguising the return address of the device from the mapping server.
  2. 2. A method according to claim 1 further comprising the steps of the intermediate server receiving from the device a request for approximate location information and establishing a mapping between the device's return address and a temporary identification and forwarding the request to the mapping service using the temporary identification to identify the device.
  3. 3. A method of providing a mobile computing or communication device with information representing its approximate location comprising the steps of: the device sending a message to an intermediate server, which message comprises the return address of the device and encrypted information representing the exact location of the device ; the intermediate server associating the return address of the device with a temporary identity known only to the intermediate server and sending a message to a mapping server, which message comprises the temporary identity associated with the
    <Desc/Clms Page number 13>
    device and the encrypted information representing the exact location of the device; the mapping service decrypting the information representing the exact location of the device, mapping the information representing the exact location of the device to information representing an approximate location of the device, encrypting the information representing the approximate location of the device and sending a message to the intermediate server, which message comprises the encrypted information representing the approximate location of the device and the temporary identity of the device; the intermediate server associating the temporary identity with the return address of the device and sending a message to the device, which message comprises the encrypted information representing the approximate location of the device; and the device decrypting the information representing the approximate location of the device.
  4. 4. A method according to claim 3 wherein a key for the encryption and decryption of the location information is known to the device and to the mapping server, but not to the intermediate server.
  5. 5. A method according to any one of the preceding claims wherein the intermediate server receives messages from many devices for forwarding to the mapping server.
  6. 6. An intermediate server for receiving a request for approximate location information from a mobile computing or communications device (which request includes encrypted information representing the exact location of the device), for disguising the return address of the device and for forwarding the encrypted information to a mapping server.
    <Desc/Clms Page number 14>
  7. 7. An intermediate server according to claim 6 wherein the intermediate server disguises the return address of the device by establishing a mapping between the device's return address and a temporary identification and forwards the encrypted information to a mapping server using the temporary identification to identify the device.
  8. 8. An intermediate server according to claim 7 wherein the server receives a reply from a mapping server, which reply includes the temporary identification and encrypted information representing the approximate location of the device and forwards the encrypted information to the return address mapped with the temporary identification.
  9. 9. An intermediate server according to any one of claims 6 to 8 which receives encrypted requests from many devices for forwarding to the mapping server.
GB0110079A 2001-04-25 2001-04-25 Provision of location data to mobile computing or communications device Withdrawn GB2375011A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0110079A GB2375011A (en) 2001-04-25 2001-04-25 Provision of location data to mobile computing or communications device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0110079A GB2375011A (en) 2001-04-25 2001-04-25 Provision of location data to mobile computing or communications device

Publications (2)

Publication Number Publication Date
GB0110079D0 GB0110079D0 (en) 2001-06-20
GB2375011A true GB2375011A (en) 2002-10-30

Family

ID=9913393

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0110079A Withdrawn GB2375011A (en) 2001-04-25 2001-04-25 Provision of location data to mobile computing or communications device

Country Status (1)

Country Link
GB (1) GB2375011A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1420550A2 (en) * 2002-11-12 2004-05-19 Nokia Corporation Method and system for providing location-based services
WO2012027131A1 (en) * 2010-08-26 2012-03-01 Apple Inc. Variable precision location sharing
US11463244B2 (en) * 2019-01-10 2022-10-04 Samsung Electronics Co., Ltd. Electronic apparatus, method of controlling the same, and network system thereof

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001028273A1 (en) * 1999-10-11 2001-04-19 Sonera Oyj A method and system for protecting a user identifier
GB2360671A (en) * 2000-03-25 2001-09-26 Hewlett Packard Co Providing location data about a mobile entity

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001028273A1 (en) * 1999-10-11 2001-04-19 Sonera Oyj A method and system for protecting a user identifier
GB2360671A (en) * 2000-03-25 2001-09-26 Hewlett Packard Co Providing location data about a mobile entity

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1420550A2 (en) * 2002-11-12 2004-05-19 Nokia Corporation Method and system for providing location-based services
EP1420550A3 (en) * 2002-11-12 2006-11-29 Nokia Corporation Method and system for providing location-based services
WO2012027131A1 (en) * 2010-08-26 2012-03-01 Apple Inc. Variable precision location sharing
GB2496348A (en) * 2010-08-26 2013-05-08 Apple Inc Variable precision location sharing
CN103202001A (en) * 2010-08-26 2013-07-10 苹果公司 Variable precision location sharing
JP2013541260A (en) * 2010-08-26 2013-11-07 アップル インコーポレイテッド Variable definition location sharing
US9116221B2 (en) 2010-08-26 2015-08-25 Apple Inc. Variable precision location sharing
AU2011293725B2 (en) * 2010-08-26 2015-08-27 Apple Inc. Variable precision location sharing
AU2011293725C1 (en) * 2010-08-26 2016-03-31 Apple Inc. Variable precision location sharing
CN103202001B (en) * 2010-08-26 2016-05-25 苹果公司 Share variable precision position
GB2496348B (en) * 2010-08-26 2017-11-22 Apple Inc Variable precision location sharing
US11463244B2 (en) * 2019-01-10 2022-10-04 Samsung Electronics Co., Ltd. Electronic apparatus, method of controlling the same, and network system thereof

Also Published As

Publication number Publication date
GB0110079D0 (en) 2001-06-20

Similar Documents

Publication Publication Date Title
EP1579725B1 (en) A method of distributing the location data of a mobile device
EP1340350B1 (en) Secure location-based services system and method
US9408079B2 (en) Apparatus and method for communication security in a nationwide wireless network using wireless routers
EP1221272B1 (en) A method and system for protecting a user identifier
US6662014B1 (en) Location privacy manager for a wireless communication device and method therefor
EP1905264B1 (en) Efficiently bounding the location of a mobile communications device
KR101175719B1 (en) location share system using wireless terminal and GPS device
KR950703236A (en) Efficient Real-Time Authentication and Encryption in a Communication System (Mtehod and Apparatus for Efficient Real-Time Authentication and Encryption in a Communication System)
US9572095B2 (en) Intelligent selection of message delivery mechanism
JPH08195741A (en) Identifier ciphering method in radio communication
TW200621058A (en) Geographical location information sharing among wireless devices
US20020152269A1 (en) Information providing system and privacy protection method
GB2375011A (en) Provision of location data to mobile computing or communications device
Jorns et al. Transaction pseudonyms in mobile environments
Dürr et al. Secure, privacy-preserving, and context-restricted information sharing for location-based social networks
JP4509970B2 (en) Divided transmission / reception communication system for mobile terminals using location information
JP2005051368A (en) Communication apparatus, base station apparatus and communication system
Baugh et al. Location privacy in mobile computing environments
McKiou et al. Location based service extensions for general communications and application enablement

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)