Area-limited software utility

ABSTRACT

Computers and networks are configured to operate according to alternative protocols for using software applications, depending on geographic location. In one approach each computer incorporates a GPS receiver using GPS satellite signals to generate the computer&#39;s current location. The location is compared with permitted use region information stored in the computer or network, e.g. based on a boundary defining a permitted use region. In another approach, E-911 compliant transceivers use signals from E-911 towers in the same manner In a further approach, each computer incorporates a WiFi adaptor, RFID reader or RFID tag, and the territory is defined by the distance from a center point. In all cases, the computer either operates under a relatively open protocol relative to using a given software application, or operates under a relatively restricted protocol, depending on whether it is inside or outside of the permitted use region.

This application claims the benefit of priority based on provisionalapplication No. 60/841,470 entitled “Area-Limited Software Utility,”filed Aug. 31, 2006.

BACKGROUND OF THE INVENTION

The present invention relates to devices and methods for restrictingaccess to and use of computer programs, and more particularly topreventing or limiting the use of computer programs based on processorlocation.

As techniques for storing and transmitting digital information continueto improve, it becomes increasingly convenient to generate and transmitcomplex computer programs and other large collections of digital data.This has enabled computer program developers and vendors to engage inhigh volume marketing of computer software through distribution of datastorage media such as magnetic and optical discs, and electronically viathe internet by allowing customers to download programs to their owncomputers.

This convenience, however, has increased the risk of unauthorized usageand theft of computer programs and related data. A variety of schemeshave been developed to discourage or prevent unauthorized use ofcomputer software. For example, U.S. Pat. No. 5,761,651 (Hasebe et al.)discloses a software charging system capable of controlling access tosoftware based on time and date, credit balance of a user, and adigitally stored key that must be matched by the prospective user. InU.S. Pat. No. 6,044,469 (Horstmann), publishers of electronicallydistributed software can select software protection measures from amongseveral software-based and hardware-based options.

The selected options are written to a license file attached to thesoftware. When a user attempts to run the software, a protector modulereads the license file and executes a code for each software protectionoption selected.

U.S. Pat. No. 7,035,626 (Luciano, Jr.) is directed to remote gaming andlottery systems accessible using cellular phones. The phones areconfigured to provide location information, equipped either to use theE-911 location system or GPS data. The caller's location is used todetermine his or her jurisdiction, and thus ensure that the gamingactivity complies with the gambling laws of that jurisdiction.

While these systems and others like them may are suitable for theirintended purposes, there are a variety of applications that are not wellserved by these systems. For example, licensing and distributorshipagreements governing or involving computer programs frequently includeterritorial restrictions on the use or sale of the computer programs. Itwould be advantageous to incorporate into the software a “selfgoverning” feature to prevent or limit usage consistent with theterritorial restriction. On a smaller scale, where computer programs aredeveloped or tailored to the needs of a specific facility, e.g. acollege campus or particular building, there may be contractual andsafety reasons for limiting use of the programs to the particularfacility. On a smaller scale yet, it may be decided to limit the usageand operability of particular software to a “territory” defined by aparticular computer, or to the vicinity of one or more permitted users,in which case the “territory” may be movable.

SUMMARY OF THE INVENTION

The present invention has several aspects, each directed to one or moreof the foregoing needs. In general, a computer adapted to use a givencomputer program is further adapted to incorporate a positionidentifying feature capable of generating a signal to identify thecomputer's location. The given computer program incorporates a module orthread that seeks the position indicating signal. In some embodiments,detection of the position indicating signal is sufficient to allow fullusage of the software. In other versions, detection of the signal isfollowed by comparison of the position-indicating signal with apreviously stored definition of a territory in which full usage of thesoftware is permitted. Failure to detect the position indicating signal,or failure of the detection signal to match the defined territory,either prevents access to the particular computer program, or confinesusage to a portion of the program's functionality or value.

One aspect of the present invention is a process for governing use of aninformation processing application by an information processing device.The process includes: (a) comparing a current location of an informationprocessing device with a selected region encompassing permittedlocations, to determine whether the information processing deviceresides at a permitted location; (b) in response to determining that theinformation processing device resides at a permitted location, enablingthe information processing device to function according to a firstprotocol governing access to and use of an information processingapplication; and (c) alternatively, in response to determining that theinformation processing device does not reside at a permitted location,causing the information processing device to function according to asecond protocol governing use of the information processing application.The second protocol is more restrictive than the first protocol.

The second protocol can be more restrictive than the first in one ormore of several aspects. For example, as compared to a first protocolallowing access and unlimited use of a given software program orcollection of data, the second protocol may entail limited usage, accessbut no usage, or denial of access altogether.

The step of comparing the current location with the selected region maycomprise designating a plurality of discrete boundary points toestablish a boundary surrounding the selected region, and thendetermining whether the current location is inside the boundary.Alternatively, the comparing step may entail designating a center point,and determining whether the processing device is within a predetermineddistance of the center point. In one approach, a signal generator suchas a WiFi transmitter or RFID transponder is disposed at the centerpoint. The amplitude of the signal received from the source varies withthe distance from the source, thus to indicate whether the processingdevice is within the territory. In another approach, several externalsignal sources, e.g. E-911 compliant towers, can be used to define acollection of center points with circular or spherical boundaries thatoverlap one another to define a selected territory.

Another aspect of the invention is a system for governing use of aninformation processing application by an information processing device.The system includes a position detector for generating positioninformation describing a current location of an information processingdevice. A first storage area is adapted to contain the positioninformation. A second storage area is adapted to contain territorialinformation describing a selected region encompassing permittedlocations. A comparator, associated with the first storage area and thesecond storage area, is adapted to compare the position information withthe territorial information and generate comparator signals indicatingwhether an information processing device resides at a permittedlocation. A control component is associated with the comparator toreceive the comparator signals and, alternatively: (i) to enable theinformation processing device to function according to a first protocolgoverning use of an information processing application in response to acomparator signal indicating that the information processing deviceresides at a permitted location; and (ii) to cause the informationprocessing device to function according to a second protocol governinguse of the information processing application in response to acomparator signal indicating that the information processing device doesnot reside at a permitted location. The second protocol is morerestrictive than the first protocol with respect to using theinformation processing application.

Preferably the position detector, the storage areas, the comparator andthe control component reside within the information processing device.In one version of the system, the control component resides within theinformation processing application as part of a computer program. Inturn, the program resides within the processing device. In anotherversion, the control component resides within the processing device,independently of the information processing application. In this case,the information processing application is configured to acquire thecontrol component before it can be used by the processing device.

A further aspect of the invention is an information processing systemadapted to operate according to alternative protocols for usinginformation processing applications. The processing system includes aninformation processing network including an information processingdevice. A position sensor inside the information processing device isadapted to generate position information indicating a current locationof the processing device. A location testing function inside theprocessing device is adapted to generate alternative testing functionsignals indicating, respectively, that a current location indicated bythe position information (i) resides within a selected territorycomprised of permitted locations, and (ii) resides outside of theselected territory. A control function is operatively associated withthe testing function to receive the testing function signals, andalternatively: (i) enable the processing device to function according toa first protocol governing use of an information processing applicationin response to a testing function signal indicating that the currentlocation resides within the selected territory; and (ii) cause theprocessing device to function according to a second protocol governinguse of the information processing application in response to a testingfunction signal indicating that the current location resides outside ofthe selected territory.

In one preferred approach, the testing function signals depend on theamplitude of a signal received from a signal generating source outsideof the information processing device. Advantageously, a thresholdamplitude for indicating that the current location resides within theselected territory is adjustable, to controllably alter the size of theselected territory.

In another preferred approach, the location testing function is adaptedto generate a border to define the selected territory. The currentlocation is compared to the territory, and the resulting testingfunction signals depend on whether the current location is surrounded bythe boundary.

Thus in accordance with the present invention, computer programs areadapted to be “self-enforcing” as to territorial restrictions governingtheir usage, whether the territory involved is the size of a country,state, city block or room, and regardless of whether the territory ismovable or fixed. If desired, these restrictions may be implemented inconjunction with restrictions dependent on other factors, e.g. financial(payment) information or time.

IN THE DRAWINGS

For a further understanding of the foregoing features and advantages,reference is made to the following detailed description and to thedrawings, in which:

FIG. 1 is a schematic view of an information processor configured inaccordance with the present invention;

FIG. 2 is a diagram schematically illustrating a boundary defining apermitted use region or territory;

FIG. 3 is a diagram illustrating an alternative approach to defining apermitted use region;

FIG. 4 is a schematic view of an information processing networkconfigured according to the invention;

FIG. 5 is a flow chart illustrating the operation of software andhardware components according to the invention;

FIG. 6 schematically illustrates an alternative embodiment processorconfigured to use E-911 data; and

FIGS. 7 and 8 schematically illustrate further alternative processorsthat utilize RFID information to determine regions of permitted use.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

Turning now to the drawings, FIG. 1 shows a processor 16 which can be,for example, a desktop computer or personal computer (PC). While notnecessarily fixed in location, processor 16 is expected to remain withina given facility, e.g. within a building for oversight of environmental(HVAC) control, or within a shopping center or on a college campus toprovide a similar oversight function. It is to be recognized that thisis an exemplary embodiment, in that the present invention can bepracticed in conjunction with a wide variety of computer programs thatmay or may not relate to environmental control.

Processor 16 incorporates registers for storing data and for storingcomputer programs operable on the data to perform various functions onthe data, or in response to changes in the data. For example, relativelypermanent storage areas include a register 18 containing environmentalcondition information such as acceptable ranges for temperature andhumidity. A register 20 contains information defining the territory orarea of permitted use. A register 22 contains chronological information,such as the time over a period which use is permitted.

A global positioning system (GPS) receiver 24 is mounted to processor16. The GPS receiver, based on radio frequency signals from at leastfour satellites of the GPS “constellation,” generates time and position(latitude, longitude, altitude) information, and provides thatinformation to a GPS register 26 having a time sector 28 and a positionsector 30.

More volatile memory includes a register 32 for storing currentconditions, for example as provided by condition (e.g. temperature andhumidity) sensors, one of which is shown at 34. GPS register 26 storesthe position and time information.

Software in processor 16 includes a comparator function 36 adapted tocompare current readings with information previously stored, moreparticularly: the current environmental condition information inregister 32 relative to the desired condition information in register18; the current GPS position information in register sector 30 withrespect to the territory defined in register 20, and the GPS currenttime information in register sector 28 with respect to the chronologicalinformation in register 22.

A computer program 38, conveniently thought of as an informationprocessing application, is stored in processor 16, or in networkversions may be downloaded from another processor. Based on input fromcondition sensors 34, computer program 38 is operable to adjustconditions within the facility, or within each one of severalenvironmental control zones throughout the facility. More particularly,program 38 periodically causes comparator function 36 to compare thecurrent temperature or other condition in the facility or zone with adesired temperature range or condition. Upon finding a current readingoutside of the range, program 38 activates or adjusts the heating,cooling and ventilating system as necessary to bring the currentcondition back into the permitted range.

Computer program 38 may be subject to a license that restricts its useto the facility. In addition, or alternatively, the program may beadapted to perform certain functions such as tests on the facilitycooling and heating system, that are best performed while facilityoccupancy is likely to be at a minimum. The program may be soparticularized to the facility that convenience or safety considerationsdictate that the program should be used only in conjunction with thatfacility. To this end, computer program 38 incorporates a controlsegment 40 operable to prevent full use of the program outside of theterritory defined in register 20. Control segment 40 can be provided asa module activated whenever the user attempts to open computer program38. Alternatively, segment 40 may operate as a thread, independently ofother functions performed by program 38, to periodically determinecompliance with the territorial limitation. In either event, segment 40causes comparator function 36 to compare the contents of registers 20and 26 (specifically, sector 30) in search of a match. The manner ofcomparing register contents can vary with the method defining thepermitted territory.

For example, FIG. 2 illustrates a relatively simple approach to usinglatitude and longitude to define a rectangular area in the NorthernHemisphere, west of the Greenwich Meridian and east of the InternationalDate Line. Horizontal lines A and B represent an upper latitude and alower latitude, respectively. Vertical lines C and D respectivelyrepresent maximum and minimum longitudes. Assuming the GPS positioninformation includes a latitude X and longitude Y, then a match is foundby satisfying the following two equations:

A≧X≧B; and   (1)

C≧Y≧D.   (2)

In a more complex approach, the territory can be defined by a series oflatitude/longitude points arranged to form a boundary around thepermitted territory, which could be a state or a metropolitan area.According to yet another alternative, latitude/longitude points arearranged in rows and columns to define overlapping circular areasegments cooperating to “fill” a permitted territory with a geometric orirregular boundary.

FIG. 3 illustrates the use of latitude/longitude points to form aboundary about the state of Michigan, including the Upper MichiganPeninsula. An additional five data points are used to define the Detroitmetropolitan area as distinguished from the rest of the state. The“include” and “exclude” inditia above the map indicate that theparticular customer is licensed for use throughout the state of Michiganexcept for the Detroit metropolitan area. The altitude ranges of0-19,999 meters effectively remove height as a limiting factor.

Also as shown above the map are the first four of the twelvelatitude/longitude coordinates used to determine the upper-peninsulaportion of the licensed territory. As indicated, the licensor can addfurther coordinates to define the boundary with more precision, ifdesired. Areas and area segments can be added or deleted. In thisexample where the territory defining software is used to implementlicensing restrictions, that software is maintained and controlledexclusively by the licensor.

In an alternative system 42 shown in FIG. 4, a central station or hub 44is part of a network shared by processors 46, 48 and 50. A computerprogram 52 having a control segment 53 resides in hub 44, and can bedownloaded to any one of the network processors. The processors havetheir own GPS receivers, as indicated at 54, 56 and 58, respectively.The processors further have their own respective registers andcomparator functions. As before, execution of computer program 52depends on a comparison of the GPS position information with the definedterritory to produce a match. The system can be configured to produceseveral alternative responses to the absence of a match, includingpreventing the processor from downloading program 52; permittingdownloading but preventing use of the program; and permittingdownloading but restricting the functionality of the software.

The altitude segment of the GPS position information can be ignored. Or,if desired, the altitude segment can be taken into account, e.g. to denyaccess to the computer program or preclude an otherwise availableoperation above a selected height. The parameters of the standardpositioning service (SPS) of the global positioning system, inparticular vertical accuracy in the hundred-meter range, can be used todifferentiate between ground level and aircraft in flight, althoughthere are practical limitations to distinguishing by height using thisapproach. Techniques such as measuring barometric pressure, andtriangulation with radio transmitters, can be employed to enhance theaccuracy of vertical data.

Another limitation is that certain locations, e.g. the lower floors ofoffice towers and other high buildings, are not conducive to highquality reception of GPS signals. In such cases, computer program 52 (orprogram 38) can incorporate a timing function 60 that acts as anoverride feature to permit the usage for a predetermined time after thesensing of a GPS signal and a successful match based on the GPS positioninformation. Further in such cases, each of processors 46-50 (orprocessor 16) is equipped with a motion sensor 62 to prevent theoverride feature from operating in the event that the processor is movedto a location outside of the permitted territory. The motion sensorpreferably is configured with a motion sensing threshold to allow thelimited motion commensurate with moving the processor to another office,or to another floor of the facility.

FIG. 5 is a flowchart illustrating the operation of processor 16 andassociated hardware components in conjunction with control segment 40.The process starts at 64 with a request for access to computer program38, which generates a search for current position information, in thiscase GPS receiver data in register 26, as indicated at 70. In aprocessor not equipped with a GPS receiver, or where a GPS receiver isnot generating GPS data, the lack of GPS data causes the program togenerate an inquiry at 71 as to whether a previous GPS detection and amatch have triggered the override feature. If not, an error message isgenerated at 68 and access is denied.

If GPS position information is detected, the information is compared at72 with the defined territory. If a match query at 73 fails to yield amatch, an error message is generated at 74 and access is denied.

Returning to 73, if the result is a match, the processor is determinedto be within the permitted territory, and computer program 38 is enabledas indicated at 76. Returning to 71, if an override is indicated, thecomputer program likewise is enabled.

In any given application, it may be necessary or desirable to monitorthe use of computer program 38 to ensure that the territorialrestriction is maintained. To this end, control segment 40 can beconfigured to periodically monitor processor 16 as to compliance withthe territorial restriction. The control segment at 78 first checks todetermine whether the override feature is effective. If so, the inquiryat 80 is whether the override time limit has been reached. If so, anerror message is generated at 82 and computer program 38 can no longerbe executed on processor 16.

If time remains, motion sensor 62 is queried at 83 to determine whetherthe motion threshold has been reached. If so, an error message isgenerated and use of the computer program is disabled. If not, operationof the program continues, as indicated at 84.

Returning to 78, if the override feature is inactive, GPS register 26 isqueried at 85 for the presence of GPS position information. If no suchinformation is present, an error message is generated and use ofcomputer program 38 is disabled. If GPS information is present, then acomparison function 86 is performed to determine whether the positioninformation in GPS register 26 matches the defined territory in register20. If so, use of the computer program continues. If not, an errormessage is generated, and use is disabled.

While processor 16 uses GPS receiver 24 to generate current positioninformation, other options may be used. FIG. 6 shows a processor 88configured for limiting software access for use based a territorialrestriction, without using GPS data to generate position information.The processor incorporates an E-911 compliant transceiver 90.Transceiver 90 is configured to interact with several (typically threeor more) towers or sites of a cellular network, to determine theposition of processor 88 based on differences in transmission among thecellular sites, e.g. differences in transmission times betweentransceiver 90 and the various sites and differences in the angle ordirection of arrival of signals from transceiver 90 to each of thesites.

The E-911 data, unlike the GPS data, does not incorporate chronologicalinformation. Accordingly, processor 88 incorporates an internal clock 92to generate current time information for a current time register 94. Inother respects, processor 88 can be substantially identical to processor16.

A primary advantage of using transceiver 90 and internal clock 92 inlieu of GPS receiver 24 is the capability to generate reliable positioninformation in locations where GPS reception is inadequate.

According to another embodiment of the invention (FIG. 7), a processor96 incorporates a transponder 98 in the form of an RFID (radio frequencyidentification) tag. Tag 98 preferably is an active tag, powered by theprocessor power supply. A computer program 100 residing in the processorincludes a control segment 102 used as before to grant or deny access tocomputer program 100 depending on whether processor 96 is located withina permitted territory.

When interrogated by a remote transceiver 104, preferably an RFIDreader, tag 98 generates information including a software I.D. codeunique to computer program 100, and provides the I.D. code to a softwareI.D. register 106. Control segment 102 includes the I.D. code, and isconfigured to provide the I.D. code to register 108 for comparison withthe contents of register 106 in search of a match. As an alternative,the control segments of several different computer programs can includethe same software I.D. code, in which case a match provides access toall of these programs.

Further, because transponders like tag 98 can be configured to generateI.D. codes unique to different computer programs, processor 96 canincorporate several different tags for controlling access to differentcomputer programs or groups of programs. For example, a second computerprogram 110 has a control segment 112 incorporating a second softwareI.D. code different than the I.D. code corresponding to computer program100. A second RFID tag 114, also responsive to reader 104, provides thesecond software I.D. code to register 106.

In this version of the system, the permitted area is determined by thedistance between processor 96 and RFID reader 104, and by the strengthof the signals transmitted between the reader and the RFID tag or tags.In effect, the permitted use territory has a spherical (or typically ina more practical sense, circular) boundary about reader 104. When thedistance between the processor and reader is increased sufficiently toprevent the tags from sensing the signal from the reader, access to thecontrolled computer programs is denied. When active RFID tags areemployed, the maximum separation permitted is about 300 feet, forming acircular area about the reader with a 300 foot radius.

Further, because the signal strength diminishes as the processor/readerseparation distance increases, the permitted area can be reduced bysetting a signal strength threshold. For example, control segment 102may be configured to perform the I.D. code comparison step only uponreceipt of a signal from reader 104 indicating that the signal receivedfrom the associated tag was stronger then a predetermined threshold.Then, even though the reader and tag may be capable of exchangingsignals over distances of up to 300 feet, the threshold may effectivelyreduce the permitted distance to 150 feet or another value as desired.

Thus, while limited in size as compared to permitted use territoriesdefined using GPS and E-911 positioning techniques, the RFID techniquescan define permitted territories with greater accuracy, and areparticularly well suited for restricting permitted use to buildings orother facilities ranging in size up to a city block.

In an alternative RFID system shown in FIG. 8, a processor 116incorporates an RFID reader 117 powered by the processor's power supply.Computer programs 118, 120 with respective control segments 122, 124reside in the processor. A remote transponder 126 is provided in theform of a RFID tag. Tag 126, preferably a passive tag with no powersource, functions as a non-contact “smart card.” When held sufficientlyclose to processor 114, tag 126 picks up the interrogation signal fromreader 116 and returns a signal to the reader which includes a softwareI.D. code uniquely associated with a computer program 118 or program120. Alternatively, the returned signal can include several differentsoftware I.D. codes. As before, a match of each I.D. code generated andtransmitted to the processor by tag 126, with the I.D. code in one ofthe control segments, enables access to the associated computer program.

Because tag 126 is passive, the permitted territory is considerablyreduced, to a size defined by a processor/tag separation of at mostabout several meters. The area can be reduced further by setting apredetermined strength threshold with respect to the signal returned toreader 116 by the tag. Several different tags or smart cards can beemployed, either to permit several individuals to gain access toprotected software, or to uniquely protect different computer programsthrough different I.D. codes. In either event, each smart carddetermines a permitted use territory that is movable along with theindividual holding the card. A mobile permitted use territory can beparticularly convenient in cases where the processor itself is mobile,such as for laptop computers or onboard computers in automobiles orother vehicles. In such cases, the system can be configured to require amatch of software I.D. codes to enable log-on and prevent operation ofthe computer in the absence of a match, thus to function as a theftdeterrent.

In yet another alternative not illustrated, a single WiFi transmitter or“hot spot,” or a plurality of such transmitters are used in combinationwith a wireless adaptor in a processor to define a permitted use areafor the processor in terms of access to and use of certain programsconfigured either to incorporate control segments or gain access tocontrol segments as previously described.

Thus in accordance with the present invention, computer program modulescooperate with computer hardware to selectively enable access to andfull usage of the software only within permitted use areas. Restrictedcomputer programs incorporate control modules that interact withhardware disposed on or within the processor, to effectively maintainthe area restriction, even though the computer program may betransported on discs or other media, or transmitted via the internetfrom one processor to another.

1. (canceled)
 2. (canceled)
 3. (canceled)
 4. (canceled)
 6. (canceled) 7.(canceled)
 8. (canceled)
 9. (canceled)
 10. (canceled)
 11. (canceled) 12.(canceled)
 13. A system for governing use of an information processingapplication by an information processing device, including: a positiondetector for generating position information describing a currentlocation of an information processing device; a first storage areaadapted to contain the position information; a second storage areaadapted to contain territorial information describing a selected regionencompassing permitted locations; a comparator associated with the firststorage area and the second storage area, adapted to compare theposition information with the territorial information and generatecomparator signals indicating whether an information processing deviceresides at a permitted location; and a control component associated withthe comparator to receive the comparator signals and, alternatively: (i)enable the information processing device to function according to afirst protocol governing use of an information processing application inresponse to a comparator signal indicating that the informationprocessing device resides at a permitted location; and (ii) cause theinformation processing device to function according to a second protocolgoverning use of the information processing application in response to acomparator signal indicating that the information processing device doesnot reside at a permitted location; wherein the second protocol is morerestrictive than the first protocol with respect to using theinformation processing application.
 14. The system of claim 13 wherein:the position detector resides within the information processing device.15. The system of claim 13 wherein: the position detector is adapted touse signals received from a plurality of external sources selected fromthe group of sources consisting of: GPS satellites, E-911 sites, WiFitransmitters, and RFID transponders.
 16. The system of claim 13 wherein:the first storage area comprises a register in the informationprocessing device.
 17. The system of claim 13 wherein: the secondstorage area comprises a register in the information processing device.18. The system of claim 17 wherein: the register is adapted to store aplurality of boundary points cooperating to define a boundarysurrounding the selected region.
 19. The system of claim 17 wherein: theregister is adapted to store a plurality of center points.
 20. Thesystem of claim 13 wherein: the comparator resides within the processor.21. The system of claim 20 wherein: the comparator is adapted todetermine whether the current location is surrounded by a boundarydefining the selected region.
 22. The system of claim 20 wherein: thecomparator is adapted to determine whether the current location iswithin a predetermined distance from a center point.
 23. The system ofclaim 13 wherein: the control component resides within the informationprocessing application.
 24. The system of claim 13 wherein: the controlcomponent resides within the information processing device, and isindependent of and accessible to the information processing application.25. The system of claim 13 wherein: the comparator is adapted toperiodically compare the position information with the territorialinformation.
 26. The system of claim 25 further including: a timingfunction for initiating a time interval responsive to a given comparatorsignal indicating that the information processing device resides at apermitted location, wherein the control component is adapted to maintainthe first protocol for the duration of the time interval regardless ofwhether comparator signals following the given comparator signal fail toindicate that the information processing device resides at a permittedlocation.
 27. An information processing system adapted to operateaccording to alternative protocols for using information processingapplications, including: an information processing network including aninformation processing device; a position sensor inside the informationprocessing device adapted to generate position information indicating acurrent location of the processing device; a location testing functioninside the processing device, adapted to generate alternative testingfunction signals indicating, respectively, that a current locationindicated by the position information (i) resides within a selectedterritory comprised of permitted locations, and (ii) resides outside ofthe selected territory; and a control function operatively associatedwith the testing function to receive the testing function signals, andalternatively: (i) enable the processing device to function according toa first protocol governing use of an information processing applicationin response to a testing function signal indicating that the currentlocation resides within the selected territory; and (ii) cause theprocessing device to function according to a second protocol governinguse of the information processing application in response to a testingfunction signal indicating that the current location resides outside ofthe selected territory.
 28. The system of claim 27 wherein: the testingfunction is adapted to generate the testing function signals dependentupon an amplitude of a signal received from a source outside of theprocessing device.
 29. The system of claim 28 wherein: a size of theselected territory is alterable through adjustment of a thresholdamplitude at which the testing function generates a testing functionsignal indicating that the current location resides within the selectedterritory.
 30. The system of claim 27 wherein: the testing function isadapted to generate a boundary defining the selected territory, and togenerate the testing function signals dependent upon whether the currentlocation is surrounded by the boundary.
 31. The system of claim 27wherein: the information processing network includes a plurality ofinterconnected information processing devices, in which a selected oneof the information processing devices functions as a hub, and thecontrol function resides exclusively in the selected processing device.