Systems and methods for locating cellular phones and security measures for the same

ABSTRACT

Systems and methods for locating a cellular phone are provided. More particularly, systems and methods for providing the location of a requested user&#39;s cellular phone from a requesting user&#39;s device (e.g., a second cellular phone) based on access rights defined by the requested user. Location descriptions may be provided at a multitude of levels. For example, if a cellular phone, or an identity associated to (e.g., logged into) a cellular phone, has been given access rights to a cell phone&#39;s exact location for an indefinite amount of time, that cell phone can receive, on command, the exact location of the approved cell phone. Other levels of location information that can be granted include, for example, proximities, states, and countries.

BACKGROUND OF THE INVENTION

This invention relates to systems and methods for determining a device'slocation. More particularly, this invention relates to systems andmethods for remotely determining a device's location.

The Global Positioning System (GPS) has been developed in which aground-based system can receive GPS signals from satellites anddetermine its location based on the time that it takes the GPS signalsto reach the ground-based system. Generally, three satellite signals areneeded to determine where in the world a receiver is located (i.e.,position triangulation).

GPS systems have been integrated into cellular phones. However, thesesystems are deficient because the location of a device that isdetermined by these GPS signals are only minimally utilized. It istherefore desirable to provide systems and methods which better utilizethe information about a device's location.

SUMMARY OF THE INVENTION

In accordance with the present invention, systems and methods areprovided for locating cellular phones. More particularly, the presentinvention provides systems and methods for allowing a user of a cellularphone (e.g., a requesting user or a requester) to locate the position ofa different user's cellular phone (e.g., a requested user) based uponrequestor-assigned access rights.

One object of the present invention is to provide a security featurewhich allows a user to limit and/or deny location access to a particularuser. In preferred embodiments, only the users that have been grantedaccess to the location of a user's cellular phone can actually locatethat user's cellular phone. Furthermore, different types of accesslevels may be provided that allow a user to filter location informationto a different user. In this manner, a cell phone user may give access,through his or her cell phone, to a friend so that the friend can locatehim or her dependent on the level of access that is granted to thatfriend.

For example, suppose that Phil tells Bill that he will be shopping inManhattan and that Bill should locate him when Bill gets to Manhattanthrough their cell phones. In such an example, Phil may grant Billaccess the exact location of his cell phone for a specific period oftime (e.g., the next two hours). As a result, when Bill tries to accessPhil's location, Bill will be told exactly where in Manhattan Phil'scell phone is located. Thus, Bill does not have to contact Phil directlyto see where he is and, therefore, Phil does not have to spend any timegiving Bill verbal directions; Bill can simply see what store Phil iscurrently in and go to it.

As mentioned previously, levels in the scope of access may be controlledby a user such that, for example, only a user's exact location,approximate location, city, state, or country can be accessed by aparticular user.

Location alerts and monitoring features are also provided. For example,Phil may give Jen, a resident of Pittsburgh, city access so that whenPhil travels into Pittsburgh, Jen will be alerted of Phil's presence.Such an alert may take the form of, for example, a display on Jen's cellphone that communicates to Jen “Phil is in Pittsburgh.”

Locating a cellular phone may be accomplished in several ways. Forexample, satellite positioning systems such as the Global PositionalSystem and the soon to be deployed Galileo system may be used to locatea user's cell phone.

User positions and security settings may be regularly or manuallytransmitted to a remote system, such a remote database so thatrequesting users can locate a requested user's position even if therequested user turns his/her cell phone OFF. Placing the securitymeasures on a remote system (e.g., remote database, computer, or server)provides an information brokering scheme such that the system is stilloperable even when cell phones are added, removed, or modified from thesystem.

Additionally, the present invention may be configured to provideadditional information about the location of a user. Such additionalinformation may be, for example, a map, a location marker on a map, amap that changes as the user moves, a compass, coordinates of thelocated cell phone, directions to the located cell phone, where a useris in relation to another user, and information about the location thelocated user is currently positioned in or nearby locations such aslandmarks. Such information may be provided by a remote informationprovider (e.g., a remote map information provider) and accessed by aninformation broker through a communications network.

Many other features are also employed that realizes advantageouslocating functionality. As per an example, suppose that a wife wants tosee if her husband has left work yet. She can locate her husband,without having to talk to him, and realize that he is driving home on ahighway. Thus, a travel time option may be provided to the user. Thisoption would compute the distance between the wife's location andhusband's location by taking multiple location readings of the husband'slocation to see how fast the husband is traveling. Alternatively,because the husband's position will map to a highway, the system mayassume that the user is driving and may provide the wife with anestimate on the husband's arrival time based on an assumed route. Inthis manner, the present invention may determine how much time it willtake the husband to reach the wife and display this information to thewife.

As per other examples, a “see my friends” option may also be providedthat brings up a map of a desired area. Dots or symbols may be presenton the map to signify the location of all user's from which therequesting user has location information for. Similarly, a “find closestfriend” option may be employed which finds the closest user with whichthe requesting user has location access to.

A cell phone location may by accessed by a variety of other devices.Alternatively, a cell phone may be used to access the location of avariety of other devices. For example, if the wife was at home, thatwife may connect to the internet and access a remote database to eitherprovide the most recent location information about the husband's cellphone to her or request a location update from the husband's cell phone.The wife's location may be already stored in such a database byassociating the location to the IP address of the computer or by amanual input of the wife's location. The wife's identity may bedetermined by, for example, a login and password on a website. Thus, theabove-identified security measures are not limited to device-to-devicelocating rather user to user locating; the wife may only access thehusband's location if the husband has granted access for the wife to doso. If, by accident, the wife's cell phone breaks, she may login on afriend's cell phone and determine the husband's location according tothe device that the husband is logged into.

Security is preferably taken into account in the present invention and,therefore, location rights for a specific user may be given to adifferent user only by that specific user. However, a user may requestlocation access rights from a different user. For example, a user may beprovided with a request location screen on his cell phone and that user(e.g., user “X”) may enter in the cell phone number of the cell phonewhose location is desired. The user associated to the entered cell phonenumber may then receive an alert that says “user X has requested accessto your location.” Location access may then be given or denied onmultiple levels and the requesting user notified of the decision.

The location feature of the present invention may be turned ON or OFF atany time. Users may be added, individually or in groups, to a list ofusers with location access rights to a specific user by that specificuser. A specific user may, at any time, modify, delete, or add usersallowed to access his or her location. Login and password informationmay be included to increase security or to create a user profile,allowing a specific user to log into any cell phone and be recognize bythe present invention (and thereby be located with that cell phone orlocatable device).

BRIEF DESCRIPTION OF THE DRAWINGS

The principles and advantages of the present invention can be moreclearly understood from the following detailed description considered inconjunction with the following drawings, in which the same referencenumerals denote the same structural elements throughout, and in which:

FIG. 1 is a network topology of a cell phone locating network inaccordance with the principles of the present invention;

FIG. 2 is a flow chart of the locating feature in accordance with theprinciples of the present invention;

FIG. 3 is an illustration of a cell phone in accordance with theprinciples of the present invention;

FIG. 4 is a display screen for a locate feature in accordance with theprinciples of the present invention;

FIG. 5 is a display screen for a retrieving location status feature inaccordance with the principles of the present invention;

FIG. 6 is a display screen for a displaying location feature inaccordance with the principles of the present invention;

FIG. 7 is a display screen listing options for a locate feature inaccordance with the principles of the present invention;

FIG. 8 is a display screen of a failed locate feature due toinsufficient rights in accordance with the principles of the presentinvention;

FIG. 9 is a display screen of adding and modifying locate rights andoptions to a user in accordance with the principles of the presentinvention;

FIG. 10 is a display screen of assigning location rights to a user inaccordance with the principles of the present invention;

FIG. 11 is a display screen of alert options in accordance with theprinciples of the present invention;

FIG. 12 is a display screen of an alert feature in accordance with theprinciples of the present invention;

FIG. 13 is a display screen of a login feature in accordance with theprinciples of the present invention;

FIG. 14 is a display screen of a login feature in accordance with theprinciples of the present invention;

FIG. 15 is a wireless device in accordance with the principles of thepresent invention;

FIG. 16 is an embodiment of a network topology in accordance with theprinciples of the present invention;

FIG. 17 is an embodiment of a locating feature in accordance with theprinciples of the present invention; and

FIG. 18 is an embodiment of a communications signal in accordance withthe principles of the present invention.

DETAILED DESCRIPTION OF THE INVENTION

FIG. 1 depicts a network topology of device location network 100incorporating principles of the present invention. Network 100 includesone or more positioning satellites 110, 112, and 114 that can locate theposition of one or more cell phones 120, 122, 126, and 124 (and otherlocatable devices) on Earth 101. Positioning satellites 110, 112, and114 may be, for example, the Global Positioning System (GPS) or theupcoming Galileo satellite network.

Preferably, any cell phone in network 100 may locate a different cellphone, as long as access to location information is allowed, through theutilization of positioning satellites 110, 112, and 114. Persons skilledin the art will appreciate that other positioning systems and methodsmay be used in locating the position of a user on a cell phone ofnetwork 100.

To route information to and from a cell phone of network 100 additionalfacilities and communication paths may be included. For example, a mainfacility (not shown in FIG. 1) containing user location access rightsmay be included in network 100. Such a main facility may retrievelocation information directly from a positioning system or a cellularphone and then route this information to a cellular phone or positioningsystem.

Persons skilled in the art will appreciate that if the GlobalPositioning System (GPS) is used as the positioning system then GPSreceivers will be incorporated into cellular phones of the presentinvention. Persons skilled in the art will also appreciate that devicesother than cellular phones may include positioning features. Forexample, watches, clothing, laptop computers, personal digitalassistants (PDAs), may all contain location systems (e.g., GPS) andutilize the security principles of the present invention to allowdifferent user's to access these locations.

FIG. 2 shows flow chart 200 of a simplified locating feature constructedin accordance with the principles of the present invention. Step 202initiates when a user requests the location of another user's cellphone. Step 206 evaluates if the user initiating the location requesthas the rights to access the location of the desired user. If no accessrights for the requesting user have been granted then step 204 willpreferably inform the requesting user that he/she has not been givenaccess to the requested location. In this manner, every user may assignrights (e.g. govern the security) to whom may or may not locate him/her.In preferred embodiments, these rights will be stored in, orfunctionality executed from, a remote facility and accessed and utilizedby a user's cell phone or other requesting device (e.g., a watch orPDA).

If access has been given by a particular user that allows for therequesting user to locate that particular user, step 208 is initiatedand the allowed location information is provided to the user in step210. Step 208 may optionally filter the location information such thatonly a portion information is passed to the requesting user. Therequested user may have, for example, defined that the requesting useronly can obtain the city, state, or country of his/her location. Personsskilled in the art will appreciate that only the location of the desireduser needs to have a cell phone or a positioning system. The requestinguser may user other means (e.g., the internet) to request the locationof the desired user.

Persons skilled in the art will appreciate that the location of a user'scell phone may be retrieved, in step 208, from a remote database,facility, distribution center, or any other system. More particularly, aremote database may periodically request the location of a cell phoneuser with a positioning system and store this information. This databasemay also keep a record of those people allowed to access that user'slocation, the extent to which access is allowed, and the extent to whicha user has requested a user's location. A user may update, add,manipulate, or remove access at any time by doing so at this database.Thus, a requesting user only has to contact the remote database, havehis/her identity recognized, have his/her access rights for therequested user location determined, and, if the requesting user has thecorrect access rights, be provided with the requested user's location.

Instead of a remote database periodically obtaining location informationfor a user, the database can obtain a user's locations when a request ismade for that user's location, providing the requesting user has accessto the requested user's location. However, persons skilled in the artwill recognize that a remote database is utilized in the above examplesthat contains the locations, in most circumstances, of a multitude ofusers. Thus, to increase security even more, a requesting user's cellphone may directly request a user's location from the requested user'scell phone without the need for a database. In such an example a useradds, manipulates, or removes access rights locally on his/her cellphone and does not have to worry about security issues that surroundplacing his location on a remote database. Furthermore, in such anembodiment a user's location does not have to be saved anywhere, apositioning system can just be “read” by a requesting user with theappropriate access rights.

However, by recording a user's location on a device, e.g., a cellphone's memory or in a remote database, novel applications may beutilized. For example, whenever a user makes a credit card purchase, acredit card authorization system can record the location of a cell phoneassociated to the purchasing user. In this manner, a new system andmethod of fraud protection is introduced. The credit card authorizationsystem may, for example, reject a purchase if the purchaser's cell phone(or watch, clothing, PDA, or other positioning enabled device) is not inthe vicinity of the purchase. Alternatively, the credit cardauthorization system may request a second form of identification if thepurchaser's cell phone location does not correlate to the location ofthe purchase. Additionally, the credit card authorization system maycall the purchaser's cell phone and request authorization for the creditcard purchase. However, such features would preferably first involve theuser/purchaser giving the credit card authorization system access to thelocation of his/her cell phone.

As per another application, a unique dating/matching service could beembodied. For example, a user may store a number of preferences in amatching profile. These preferences may describe what type of person heis interested in meeting. Additionally, a user may store, preferablylocally (for the dating/matching feature) but alternatively at a remotelocation, his/her own profile that has data describing similarattributes for what he/she is looking for. For example, an entry in auser's profile may be “male” and an entry in “looking for” profile maybe “female.” When a user comes within a certain distance of a user(determined by comparing locations of a user) that fits his/her “lookingfor” profile, the user may be alerted of the proximity of a matchinguser. Preferably, the particular user is only alerted if the “lookingfor” user has entered in attributes similar to the particular user'sattributes and is also alerted of the particular user. The next stagesof such an application could include, for example, requesting access toa form of communication. Such a form of communication could be forexample, talking on the phone, instant messaging, or delivering an emailaddress. Persons skilled in the art will therefore appreciate that manyuseful applications may be constructed using the principles of thepresent invention.

FIG. 3 depicts cell phone 300 constructed in accordance with theprinciples of the present invention. Cell Phone 300 preferably includesspeaker 330, antenna 310, display screen 320, control keys 360,alpha-numeric keys 350, and microphone 340. Cell phone 300 alsopreferably may include, for example, a communications transmitter (notshown), communications receiver (not shown), memory (not shown),positioning device (not shown), and a microprocessor (not shown).

Cell phone 300 may also include locate button 380. Cell phone 300 may beconfigured such that if locate button 380 is pressed, a locate featureis initiated (e.g., display screen 400 of FIG. 4 is initiated).Alternatively, cell phone 300 may be configured such that if locatebutton 380 is pressed, a location signal is sent to a remote storagearea (e.g., a remote database), thus manually updating the user'slocation. This latter functionality may be useful when a user does notwant his/her location accessed. As in another alternative embodiment,cell phone 380 may be configured such that if locate button 380 ispressed, the locating features of cell phone 300 are toggled between ONand OFF. Person skilled in the art will appreciate that locate button380 may be configured to produce a variety of useful functionalities.

FIG. 4 depicts display screen 400 that is displaying a locate featureconstructed in accordance with the principles of the present invention.The locate feature of display screen 400 may be included, for example,in cell phone 300 of FIG. 3 and displayed to the user of cell phone 300of FIG. 3 when that user requests the location of a different user ofthe present invention. The programming for the feature may, for example,be stored in the memory of the cell phone and executed by the processorat a user's request. Locate Feature 400 includes identifier list 410 ofalpha-numeric identifiers for users stored in the memory on cell phone300 (FIG. 3) or at a remote location. More particularly the user ofdisplay 410 may locate a user contained in identifier list 410 byselecting an appropriate user identifier 420.

The user identifiers (e.g., “Susan Pracht”) in identifier list 410 areselectable and may be selected by control keys 360 of FIG. 3. Highlightwindow 410 may be used to prompt the user what identifier from list 410is currently selected any may be controlled, for example, by the inputkeys of the cell phone (e.g., keys 350 and 360 of FIG. 3). Identifiersmay be associated to, for example, cellular telephone number, userprofiles, or any other identifier that may be associated to a locatabledevice or user interacting with a locatable device.

Persons skilled in the art will appreciate that display screen 400 maybe provided to a user of devices other than wireless devices. Forexample, display screen 410 may be provided to a user of a personalcomputer with no positioning system. Preferably, however, the securitymeasures in accordance with the principles of the present invention arestill abided to (e.g., access has been granted to the identifierassociated to the requesting user). In this manner, a user can controlwho can access his/her wireless device (e.g., cell phone).

Persons skilled in the art will appreciate that identifier list 410 maybe configured, for example, to contain only those users in which theuser of cell phone 300 (FIG. 3) has locate access rights to or any userstored in cell phone 300. Persons skilled in the art will alsoappreciate that devices other than cell phone 300 may be used toincorporate the features of the present invention. Such devices couldinclude, for example, personal digital assistants (PDAs), laptop, GPSpagers, GPS watches, car positioning devices, or any other devices thatcan be located. One advantage of the present invention is that it allowsa mobile device with a positioning system to locate a different mobiledevice with a positioning system while still retaining a high level oflocation security and privacy.

FIG. 5 is display screen 500 for retrieving location status feature inaccordance with the principles of the present invention. The selectedidentifier may be incorporated into display screen 500 through locationstatus display 510 to inform the user of the status of the locationretrieval. For example, display screen 500 may display “locating user”while a request is being processed by a remote facility or database.

FIG. 6 shoes display screen 600 for a display location featureconstructed in accordance with the principles of the present invention.When a location is retrieved for the requested user, the location may bedisplayed on Display Screen 600 through primary location information610. Depending on what scope the requesting user has access to primarylocation information 610 may include, for example, the country, state,city, exact location, or any combination thereof of location informationto the user. For example, if the user requesting the location of adesired user has been given unlimited location access by the desireduser, primary information 610 may include the exact location of theuser.

Secondary location information 620 may be included to supplement therequested users exact location so that the requesting user may have moreof an idea of where the requested user is located. For example, if thedesired user is located in a mall, primary location information 610 maybe the address of the mall. In such an example, secondary locationinformation 620 may be included and display, to the requesting user, thename of the mall.

Directional information 630 may also be included on display 600 or anyother display of the present invention. Directional information 630 mayinclude a digital compass 632 so that the user of cell phone 300 (FIG.3) knows what direction he or she is facing in. Digital compass 632 maybe connected to a direction sensitive device (e.g, mechanical compass)in order to gather directional information. Directional arrow 633 mayalso be included in Display 600 to indicate where the requested user'slocation is relative to the location and direction of cell phone 300(FIG. 3) (e.g, the requesting user). Persons skilled in the art willappreciate that for some directional information 630 the location of therequesting user must be obtained. This information may be obtainedeither from cell phone 300, a remote facility, or by any other suitablemeans. If the information is gathered from a location gathering deviceother than the requesting user's device (e.g, cell phone 300 (FIG. 3)),then the user's device may communicate from this other locationgathering device. Once both the locations of the requesting andrequested/desired users are known, this information may be utilized in anumber of features incorporating the principles of the presentinvention.

Distance information 634 is one such feature that displays the distancebetween the locations of the requested and requesting users (e.g.,distance between the locations of the requested and requesting devices).Directional information 630 may contain many other elements to enhancethe utility of the present invention. For example, a map (not shown inFIG. 6) may be included in display 600. This map may be of the areasurrounding either the requested, the requesting user's location orboth. Information may be included on the map to show the shortest pathbetween the location as well as information about the surrounding area(e.g, area names, store names, etc.). Other information may include, forexample, time to reach the destination according to specific types oftravel (e.g, subway, walking, running, driving) and the direction therequested user is traveling in.

Many uses for this information may be utilized by a user. For example,if Jane calls Bill and Bill says “I am roaming midtown manhattanshopping why don't you join me”, no other call to Bill is needed. Billsimply has to give Jane access to his location and Bill can continueshopping without having to worry about meeting up with Jane at aspecific location.

In some instances, it may be beneficial to find the speed and directionof a requested user. For example, if a wife wants to see how long beforeher husband arrives home, the wife can use this feature of the presentinvention. This feature may find the husbands location multiple times ina determined amount of time. Through this information the feature maydetermine the speed and direction that the user is traveling. Using thisspeed, for example, this feature may display to the wife that thehusband “is 10 minutes away” in directional information 630. In doingso, the need for a call to the husband to determine his location iseliminated.

Persons skilled in the art that the location of multiple users may bedisplayed on display screen 600. For example, suppose Jeff, Susan, andChrissy are at a concert. If all three of these users have unlimitedaccess to the other users, principles of the present invention wouldallow for a map to be displayed on each of the three locating deviceswith locator designations for each of the users. Using such map, thegroup may be able to find themselves in relative location to one anotherand decide, if need be, on the easiest location for them to meet. Thusmap 660 may be included on display screen 600 and display the locationsof multiple users (e.g., user's 621 and 622).

More region 640 designates that more options or information may beretrieved or performed using principles of the present invention. A usermay use control keys 340 (FIG. 3) on cell phone 300 (FIG. 3) to performthe functionality associated with more region 640.

FIG. 7 shows display screen 700 for locate listing options in accordancewith the principles of the present invention. Display screen 700includes selectable options list 710 and highlight window 720 and may bedisplayed to the user, for example, through the activation offunctionality associated by more region 640 (FIG. 6). Options list 710may include any of the features of the present invention. For example,options list 710 may include options activating a display screen of amap of the requesting user's location, a map of the requested user'slocation, directions to the requested user's location from therequesting user's location, travel time for the requesting user, traveltime for the requested user, and options to set location alerts.

FIG. 8 shows display screen 800 of a failed locate feature due toinsufficient rights in accordance with the principles of the presentinvention. Display scree 800 may be displayed if a requesting userattempts to located a requested user but has not been given accessrights by the request user to his or her location. In such an instanceinsufficient rights message 801 may be prompted on display screen 800.

FIG. 9 shows display screen 900 of adding and modifying locate rightsand options to a user in accordance with the principles of the presentinvention. A user may give or modify access rights through display 900to a user identifier in selectable user identifier listing 910.Highlight window 920 may be included to enhance the selecting process.

FIG. 10 shows display screen 1000 of assigning location rights to a userin accordance with the principles of the present invention. Displayscreen 1000 may be displayed, for example, after a user has beenselected to be given location rights. Display screen 1000 containsselectable location rights listing 1010, in which the selecting processmay be enhanced by highlight window 1020. Possible location accessrights may be, for example, by country, state, city, exact location, orany other scope of location. Other rights may be assigned such asparticular times in the day or time periods at which locations may beaccessed.

FIG. 11 shows display screen 1100 of alert options in accordance withthe principles of the present invention. Display screen 1100 allows fora user to set up alerts depending on the location of specific users.Selectable alert listings 1110 are included and may be selectable withhighlight window 1120. Examples of alerts that may be included indisplay screen 1100 may occur, for example, if the requested user is ina specific city or the same city as the user of display 1100, is withina certain distance, or if a user located the user of display 1100.

The alerts of the present invention may realize useful functionality.For example, suppose Susan Pracht lives in Pittsburgh and rarely comesto the city of the user of display screen 1100 on cell phone 300 (FIG.3) which is New York City. The user of cell phone 300 (FIG. 3) may thenuse display screen 1100 and set an alert such that if Susan Pracht everenters New York City, he or she would be alerted of Susan Pracht'spresence.

FIG. 12 shows display screen 1200 of an alert feature in accordance withthe principles of the present invention. Display screen 1200 includes analert message and is displayed to a user when an event occurs that isdesignated by the user in display screen 1100 (FIG. 11). Continuing theexample from FIG. 11, if Susan Pracht enters New York City, alertmessage 1210 would prompt the user that this event has occurred.

FIG. 13 shows display screen 1300 of a login feature in accordance withthe principles of the present invention. In order for users to beidentified by other user's cell phones or locating devices a userprofile may need to be stored remotely from such devices. In suchinstances user profiles would be used as the locating identifier and thedevices into which these profiles are logged into (recognized by) wouldallow for the user to be located. Display screen 1300 allows for a userto log into a locating device of the present invention. Logging into adevice also adds a level of security to the present invention,especially when combined with a password. A user may use the controls ofthe device of the present invention to enter login 1310 of display 1300.

In this manner a user may use another user's location device (e.g., cellphone) to locate a user or may use, for example, the internet to locatea user. Additionally, in this manner, a user may change the device beinglocated. For example, a user may use his or her car GPS system or othersystems in accordance with the principles of the present invention to belocated instead of his or her cell phone. To further this example, auser may log into a web site on the internet and designate his or hercurrent location as home, or any other location, thus eliminating theneed for locatable device entirely.

FIG. 14 shows display screen 1400 of a login feature in accordance withthe principles of the present invention. Display screen 1400 may be usedby a user to enter a password associated to his profile, identity, orcell phone functionality access. A user may enter password 1410 usingthe controls of the device of display screen 1400 (e.g., cell phone 300of FIG. 3). By including a login/password scheme a user can beidentified by a remote facility (e.g., a remote database) so that theuser's location can be recorded/updated by multiple devices.Additionally, a login/password adds an extra level of security.

FIG. 15 shows cell phone 1500 that may be utilized to carry out thefunctionality in accordance with the principles of the presentinvention. Cell phone 1500 includes receiver/transmitter 1510,microprocessor 1520, positioning system 1530, and memory 1540.

Persons skilled in the art will appreciate that receiver/transmitter1510 may directly communicate with memory 1540 if receiver/transmitter1510 does not have its own memory (e.g., if receiver/transmitter 1510are configured to utilize a buffer for capturing incoming communicationsbursts before demodulation and decryptions).

Positioning system 1530 may be, for example, a GPS system or a similarpositioning system. Positioning system 1530 may include its own receiverfor receiving particular signals utilized in positioning cell phone1500.

FIG. 16 shows network topology 1600, in which all components of, or apart of the components of, may be utilized to carry out the features inaccordance with the principles of the present invention. In this manner,persons skilled in the art will appreciate that multiple systemconfigurations may be utilized. Topology 1600 introduces the diversityof systems that can be utilized to realize such configurations.

Generally, topology 1600 includes multiple mobile devices (e.g.,multiple instances of mobile device 1601), access control devices andlocation broker devices (e.g., database 1602 and cell phone base station1603), and non-mobile devices (e.g., grounded non-wireless device 1605).Persons skilled in the art will appreciate that other devices orfacilities may be included in topology 1600. For example, one or morepositioning systems 1601 may be included in topology 1600 in order tolocate particular devices. For example, a positioning receiver (e.g.,GPS receiver) may be included in wireless device 1601 with positingsystem 1601 being a positioning transmitter (e.g., GPS satellitenetwork).

One or more wireless devices 1601 may be included in topology 1600 andmay be, for example, watches, PDAs, cellular phones, radios, cars, orany other mobile device whose location can be determined.

As previously mentioned, access control and location broker devices maybe included in topology 1600. Such devices may be utilized, for example,to store user access rights for a particular user and may containfunctionality to request and route a device's location. These devicesmay be considered information broker's such that devices may be added,removed, or modified without creating the necessity of having to modifythe other devices of topology 1600.

Database 1602 is one such information broker. Database 1602 may, forexample, be located in cell phone base station 1603 if database 1602 isutilized to assist in cell phone locating. Database 1602 may beutilized, for example, to store a history a of a device's locations, auser's list of assigned access rights to other users, a log of a user'scall activity, a log of a location initiations, a user profile,login/password information, or any other sort of information. Manyfeatures may be provided that utilize such information, For example, napproximate location may be determined for a device that is turned OFF(e.g., by utilizing the device's location history). As per anotherexample, if a cell phone is lost and a new one replaced, informationsuch as, for example, phone books, activity logs, and assigned useraccess rights may be downloaded/flashed into the cell phone.

Database 1602 may be accessed either directly (e.g., manually by an userof the device) or indirectly (e.g., periodically) by a cell phone orother device. Alternatively, a device or cell phone may access database1602 directly (e.g., manually by an administrator of the database) orindirectly (e.g., periodically) by database 1602.

A credit card authorization system is an example of additional system1606 that may be added to topology 1600 to realize new features. Such acredit card authorization system, as described above, could utilize adevices location in order to decrease credit card fraud. System 1600 mayalso be, for example, systems needed to realize the described datingfunctionalities or another information provider (e.g., a map informationprovider).

Non-wireless devices 1605 (e.g., a personal computer) may be included intopology 1600. Such devices may have locations associated to them orcontain a positioning system. These locations may then be associated toa user that is recognized as using the device. For example, if aparticular user logs into a non-mobile personal computer, that user'slocation will be recognized as being the location associated to thepersonal computer.

The devices of topology 1600 communicate with each other throughcommunications network 1610. Communications network 1610 may include,for example, any type of communications, routing, amplification,encryption, decryption, parsing, modulation, or demodulationtechnologies. For example, positioning system 1601 may communicate withwireless device 1601 by sending multiple wireless positioning signals.At the same time, database 1602 may be providing non-wireless device1605 with a device's location over conventional telephone wires.

FIG. 17 shows locating feature 1700 in accordance with the principles ofthe present invention. Locating feature 1701 starts at step 1701 andwaits at step 1702 until a location is requested. As stated, a locationcan be requested in a number of instances and by a variety of differentmeans.

For example, a location may be requested by a user of a cell phone thatdesires to locate a friend by locating that friend's cell phone.Alternatively, a device may be triggered to request a location of amobile device when an event occurs. For example, a credit cardauthorization system may request the location of a user's cell phone andthe location of a store that just used a credit card associated to therequested user.

If a location is requested, access rights to the requested location forthe requesting device and/or user are obtained at step 1703. Step 1703may be employed for example, as a call to a database storing a list ofassigned access rights for the requested device/user and finding if anyaccess rights were assigned to the requestor's identity. As per anotherexample, step 1703 may be employed as a direct call to the requesteddevice/user.

Step 1704 determines if the requester has been assigned access rights toobtain the requested device/user's location. Persons skilled in the artwill appreciate that some devices may always have access to a user'slocation regardless if a user has assigned access rights to therequesting device. In this manner, a device may be set up to always leta user access a location. For example, a mother may purchase a cellphone for a minor and may configure the cell phone to always allow herlocation information.

If access rights do exist for the requesting device/user at step 1704then step 1705 may be initiated and location information may be providedto the requestor. Such location information may be filtered according tothe assigned access rights. For example, if a user has only beenassigned access rights to obtain the requested user's city location,only the city that the requested user/device is currently located in (orthe last city location available) may be obtained. The process thenfinishes at step 1707 after the assigned location information has beendelivered to the requester at step 1705. Persons skilled in the art willappreciate that steps may be added to, removed, or modified fromlocating feature 1700. For example, instead of finish step 1707, step1702 may be initiated after step 1706 has completed.

If a requester has not been assigned rights to access the requesteduser/device's location as determined by step 1704, then step 1712 may beinitiated. Step 1712 informs the requester that the requester does nothave access rights to obtain the location of a user/device. Step 1711may follow and provide an opportunity for the requester to obtain theaccess rights. More particularly, step 1711 asks the requester if therequester would like to request access rights. If the requester does notwant to request access rights, locating feature 1700 may, for example,return to step 1702. Else, access rights may be requested at step 1721.Step 1722 follows and if access rights were given then step 1705 may beinitiated. Else, step 1712 may, for example, be re-initiated.

FIG. 18 shows one embodiment of a cell phone burst that has beenconfigured to embed a device or user's location 1801 between controlsignals (e.g., synchronization signals) and data signals. Personsskilled in the art will appreciate that some cell phone burst standards(e.g., TDMA and CDMA) have signal portions that are reserved for futuretechnologies. In one embodiment, this reserved portion is utilized tohouse location information 1801. A cell phone tower or base informationmay then strip received signals 1800 of location information 1801, storelocation information 1801 into a database or other storage device, anddeliver the received signals to its desired location. In this manner, auser may refresh his/her location information every time that a cellphone base station receives or routes information for the user. Bystripping location information 1801 from signal 1800, the intendedreceiver does not have access to the location of the device transmittingsignal 1800. A signal similar to signal 1800 may be sent to a cell phonethat has requested, and has the appropriate location access rights, tolocation 1801. Location 1701 may also be stored in other portions ofsignal 1700 that are not reserved portions. For example, a receivedsignal 1800 may store location information in the data portions ofsignal 1800. In embodiments where additional information is sent aboutlocation 1801 (e.g., a map associated with location 1801) utilizing amain data portion of signal 1800 is preferred. Persons skilled in theart will appreciate that signal burst 1800 may actually be any type ofcommunication signal such as, for example, information returned from adatabase inquiry.

Persons skilled in the art will also appreciate that the systems andmethods of the present invention may be implemented using other locatingfeatures and configurations. For example, a user may be manuallyrequested to allow location access rights every time his/her location isrequested. As per another example, a user may organize his/her user listinto groups and assign access rights to that group (e.g., family memberuser group, close friend user group). All such modifications are withinthe scope of the present invention, which is limited only by the claimsthat follow.

1-2. (canceled)
 3. A method comprising: identifying a user by receivingat least a login from a first wireless device; recording the location ofsaid user based on the location of said first wireless device;identifying said user by receiving at least said login from a seconddevice; and recording the location of said user based on the location ofsaid second device.
 4. A method comprising: triggering the request by adevice of location information of a wireless telephonic device at theoccurrence of an event; obtaining access rights associated withaccessing said location information, wherein said access rights aredetermined by said wireless telephonic device; and determining whetherto provide and filter said location information to said device based onsaid access rights, wherein said location and said access rights arestored on a remote server.
 5. A wireless telephonic device comprising: adisplay screen; a speaker; a microphone; a plurality of keys forproviding alpha-numeric inputs; and a locate button, wherein said locatebutton is pressed and location information of said wireless telephonicdevice is provided to a remote storage device.