Selected restriction of wireless communication services

ABSTRACT

Wireless communications services on a wireless communications device are selectively restricted in accordance with a location of the wireless device and specific permission and/or restrictions assigned to the wireless device while within/at the location. Services can be selectively blocked (denied), selectively modified, or selectively allowed on a wireless device based on lists indicating permissibility for specific services for specific devices at/within specific locations. A location can be a zone of coverage of a cellular tower, micro/pico/Femto cell or wireless access point, a sector of a zone of coverage, a geographic region within a zone of coverage, or any appropriate combination thereof.

CROSS REFERENCE TO RELATED APPLICATIONS

The instant application is a continuation of, and claims priority toU.S. patent application Ser. No. 14/754,036, filed Jun. 29, 2015, whichis a continuation of U.S. patent application Ser. No. 14/271,906, filedMay 7, 2014, now U.S. Pat. No. 9,219,977 issued Dec. 22, 2015, which isa continuation of U.S. patent application Ser. No. 12/832,676, filedJul. 8, 2010, now U.S. Pat. No. 8,744,480 issued Jun. 3, 2014. Thecontents of each of the above-referenced patent applications and patentsare incorporated by reference herein in their entirety.

TECHNICAL FIELD

The technical field generally relates to communications systems and morespecifically relates to selected restriction of wireless communicationsservices.

BACKGROUND

At times, it may be desirable to prevent the use of wireless devices(e.g., cell phones). For example, in a police facility, prison, or jail,a law enforcement agency may find it desirable, or necessary, to preventunauthorized use of wireless devices in order to protect the safety ofagency personnel and/or the public. Typically, use of a wireless devicescan be prevented by jamming (e.g., rf jammers) signals from the devicesor blocking signals (e.g., if absorbing, blocking paint, shielding,etc.) from the devices. However, these techniques do not provideselective prevention of use.

SUMMARY

The permissibility of wireless communications services on a wirelesscommunications device is determined in accordance with a location of awireless device and specific permission and/or restrictions assigned tothe wireless device while within/at the location. In an exampleembodiment, services are selectively blocked (denied), modified, orallowed on a wireless device within a geographic region based on listsindicating allowed services and restricted services.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 depicts example locations.

FIG. 2 is a diagram illustrating an example depiction of indicatingpermissibility of wireless communications services for wirelesscommunications devices at/within specific locations.

FIG. 3 is a diagram illustrating another example depiction of indicatingpermissibility of wireless communications services for wirelesscommunications devices at/within regions of specific locations.

FIG. 4 is a flow diagram of an example process for implementing selectedrestriction of a wireless communications services.

FIG. 5 is a block diagram of an example wireless communications deviceconfigured to accommodate selected restrictions of wirelesscommunications services.

FIG. 6 is a block diagram of an example communications network entityconfigured to implement selected restrictions of wireless communicationsservices, as described above.

FIG. 7 depicts an overall block diagram of an exemplary packet-basedmobile cellular network environment, such as a GPRS network, in whichselected restrictions of wireless communications services can beimplemented.

FIG. 8 illustrates an example architecture of a typical GPRS network inwhich selected restrictions of wireless communications services can beimplemented.

FIG. 9 illustrates an exemplary block diagram view of a GSM/GPRS/IPmultimedia network architecture within which selected restrictions ofwireless communications services can be implemented.

DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS

The permissibility of wireless communications services on a wirelesscommunications device is determined in accordance with a location of awireless device and specific permission and/or restrictions assigned tothe wireless device while within/at the location. Permissibilityindicates if a service is allowed, denied, or partially allowed for awireless communications device at or within a location. In an exampleembodiment, services are selectively blocked (denied), selectivelymodified, or selectively allowed on a wireless device based on listsindicating permissibility for specific services for specific devicesat/within specific locations. A location can be a zone of coverage of acellular tower, a sector of a zone of coverage, a geographic regionwithin a zone of coverage, a micro cell, a pico cell, a Femto cell, awireless access point, or any appropriate combination thereof.

FIG. 1 is an illustration of example locations. In an exampleembodiment, cellular tower 12 has a zone of coverage 14. FIG. 1 depictsvarious locations with various shapes, however, it is to be understoodthat the shapes are for the sake of example only, and no location shouldbe limited to a shape depicted in FIG. 1. The zone of coverage 14 cancomprise sectors of coverage. The sectors of coverage are depicted inFIG. 1 as sectors 16 a, 16 b, 16 c, 16 d, and 16 e. The number ofsectors depicted in FIG. 1 is exemplary. Thus, a zone of coverage cancomprise any appropriate number of sectors (including no sectors).

A zone of coverage can comprise one or more regions. As depicted in FIG.1, the zone of coverage 14 comprises regions 18, 20, 22, and 24. Theregions 18 and 20 are within sector 16 c, the region 22 is within sector16 e, and the region 24 is in sectors 16 e and 16 d. In an exampleembodiment, a region comprises a geographic region. For example, aregion could be a fixed location, for example, a jail, police station,courthouse, military facility, government facility, or the like. Or, aregion could be a moving, dynamically defined, region such as a regionassociated with an emergency (e.g., terrorist alert, earthquake,tornado), a region associated with a moving vehicle, or the like. Aregion can be determined via any appropriate means. For example, any ofthe following techniques, individually or in any combination can be usedto determine a region: the location of a cellular site in which acommunications device resides, Global Positioning System (GPS), AssistedGPS (A-GPS), triangulation, time difference of arrival (TDOA), directionof arrival, angle of arrival (AOA), time of arrival (TOA), or absolutetiming. Zones, sectors, and regions can comprise any shape and anynumber of dimensions. Thus, zones, sectors, and/or regions can beone-dimensional (e.g., a line), two-dimensional (e.g., area),three-dimensional (e.g., volume), four-dimensional (e.g., time), etc.

In an example embodiment, an authorized agency establishes thepermissibilities for wireless communications devices for variouslocations. An authorized agency can be any appropriate agency authorizedto establish permissibility of services. Example authorized agencies caninclude public safety (police, fire), emergency management, FBI, SecretService, U.S. Marshals, Correctional Facility management (prison warden,prison guards), or the like.

A permissibility can indicate if a service is allowed, denied, orpartially allowed (restricted in part) for a wireless communicationsdevice at or within a location. For example, a permissibility canindicate that a service is denied wherein no calls are allowed to bereceived by a wireless communications device while the wirelesscommunications device is within a specific location. As another example,a permissibility can indicate that a service is allowed by indicatingthat all calls can be received by a wireless communications devicewithout any restrictions while the wireless communications device iswithin a specific location. As yet another example, permissibility canindicate that a service is partially allowed (restricting a service inpart) by indicating the calls are allowed by a wireless communicationsdevice during limited times while the wireless communications device iswithin a location or to specific numbers only (e.g., 9-1-1). It is to beunderstood that permissibility of a service should not be limited to theherein described examples, but rather is applicable to any serviceavailable to a wireless communications device, and is applicable to anyappropriate form of restriction.

In an example embodiment, services are selectively restricted and/orselectively allowed on a wireless device based on lists indicatingpermissibility for specific services for specific devices at/withinspecific locations.

FIG. 2 is a diagram illustrating an example depiction of indicatingpermissibility of wireless communications services for wirelesscommunications devices at/within specific locations. In accordance withFIG. 2 (26), a location can be a zone of coverage by a cellular tower, asector of a zone of coverage, or any appropriate combination thereof. Asdepicted in FIG. 2 (26), the location is represented by a cell ID. Thecell ID can be any appropriate indication of a cellular tower, a zone ofcoverage of the cellular tower, a sector of a cellular tower, a zone ofcoverage of a sector, or any appropriate combination thereof. In anexample embodiment, the cell ID comprises an identifier (e.g., a number)used to identify a base transceiver station, a sector of a basetransceiver station, or the like. The cell ID can include information asappropriate to provide an indication of a location, such as, forexample, a location area code.

Each cell ID can have associated therewith an identification of awireless communications device. An identification of a wirelesscommunications device can comprise any appropriate identification. Forexample, as depicted in FIG. 2 (28), the identification of the wirelesscommunications device can comprise an International Mobile EquipmentIdentity (IMEI) of the wireless communications device, an MSIDN (e.g.,Mobile Subscriber Integrated Services Digital Network Number) of thewireless communications device, an International Mobile SubscriberIdentity (IMSI) of the wireless communications device, a combinationthereof, or the like. An IMEI is a number that identifies a wirelesscommunications device. Typically, the IMEI of a wireless communicationsdevice can be found printed inside a battery compartment of the wirelesscommunications device. The MSISDN of a device identifies a subscriptionof a device in a network. For example, the MSISDN of a device can be thetelephone number of the device. Or, more specifically, the MSISDN can bethe telephone number of the SIM (Subscriber Identity Module) in thedevice. The IMSI of a device is a number associated with the device thatcan be used to determine what network the IMSI belongs to and can beused when the device interconnects with multiple networks.

As depicted in FIG. 2 (30), each wireless communications deviceat/within a location can have a service, or services, associatedtherewith having respective permissibilities. Permissibilities canindicate whether a service is allowed without restriction at or within alocation, whether a service is denied at or within a location, if aservice is restricted in part at or within a location, or a combinationthereof. Thus, an authorized agency can establish a mechanism, such asdepicted in FIG. 2, to indicate the permissibility of a service for aspecific wireless communications device at/within a specific location.If the mobile device information is not contained on a list (28), e.g.,the IMEI, IMSI or MSISDN does not match, a default servicepermissibility may be established.

FIG. 3 is a diagram illustrating another example depiction of indicatingpermissibility of wireless communications services for wirelesscommunications devices at/within regions of specific locations. Inaccordance with FIG. 3 (32), a location can be a zone of coverage by acellular tower, a sector of a zone of coverage, or any appropriatecombination thereof. As depicted in FIG. 3 (32), the location isrepresented by a cell ID. The cell ID can be any appropriate indicationof a cellular tower, a zone of coverage of the cellular tower, a sectorof a cellular tower, a zone of coverage of a sector, or any appropriatecombination thereof. In an example embodiment, the cell ID comprises anidentifier (e.g., a number) used to identify a base transceiver station,a sector of a base transceiver station, or the like. The cell ID caninclude information as appropriate to provide an indication of alocation, such as, for example, a location area code.

As depicted in FIG. 3 (34) a location can be further resolved to aregion. As described above, a region can comprise a geographic regiondefine by geographic coordinates or the like. A region can comprise acellular zone of coverage, a sector, a combination of sectors, ageographic region defined by coordinates, a building, a moving region,or the like. For example, a region could be a fixed location, forexample, a jail, police station, courthouse, military facility,government facility, or the like, or, a region could be a moving,dynamically defined, region such as a region associated with anemergency (e.g., terrorist alert, earthquake, tornado), a regionassociated with a moving vehicle, or the like. A region can bedetermined via any appropriate means such as, for example, the locationof a cellular site in which a wireless communications device resides,GPS, A-GPS, triangulation, time difference of arrival (TDOA), directionof arrival, angle of arrival (AOA), time of arrival (TOA), absolutetiming, or any appropriate combination thereof. Although not depicted inthe Figures, a region can encompass a zone of coverage. For example, aregion could encompass a greater area or volume than a cellular zone ofcoverage.

Each cell ID can have associated therewith an identification of awireless communications device. An identification of a wirelesscommunications device can comprise any appropriate identification. Forexample, as depicted in FIG. 3 (36), the identification of the wirelesscommunications device can comprise an International Mobile EquipmentIdentity (IMEI) of the wireless communications device, an MSIDN (e.g.,Mobile Subscriber Integrated Services Digital Network Number) of thewireless communications device, an International Mobile SubscriberIdentity (IMSI) of the wireless communications device, a combinationthereof, or the like. An IMEI is a number that identifies a wirelesscommunications device. Typically, the IMEI of a wireless communicationsdevice can be found printed inside a battery compartment of the wirelesscommunications device. The MSISDN of a device identifies a subscriptionof a device in a network. For example, the MSISDN of a device can be thetelephone number of the device. Or, more specifically, the MSISDN can bethe telephone number of the SIM (Subscriber Identity Module) in thedevice. The IMSI of a device is a number associated with the device thatcan be used to determine what network the IMSI belongs to and can beused when the device interconnects with multiple networks.

As depicted in FIG. 3 (38), each wireless communications deviceat/within a location can have a service, or services, associatedtherewith having respective permissibilities. Permissibilities canindicate whether a service is allowed without restriction at or within alocation, whether a service is denied at or within a location, if aservice is restricted in part at or within a location, or a combinationthereof. Thus, an authorized agency can establish a mechanism, such asdepicted in FIG. 3, to indicate the permissibility of a service for aspecific wireless communications device at/within a specific location.If the mobile device information is not contained on a list (38), e.g.,the IMEI, IMSI or MSISDN does not match, a default servicepermissibility may be established.

When a wireless communications device registers with a network, in anexample embodiment, signaling information can be sent between the cellsite from which the wireless communications device is registering, andthe wireless operator's home location register (HLR), or the like. Viathe exchange of signaling information, authorization and authenticationof the wireless communications device can be accomplished, andpermissibility of services can be determined. When the registrationsignaling information is sent from the cell site/sector (cellular zoneof coverage/sector) to the HLR, the HLR receives the cell ID from whichthe wireless communications device is attempting to access service. Ifthis cell ID is in a “restricted” area (at least one service isrestricted, at least in part, at or within the cell zone ofcoverage/sector), the HLR can perform a further check to determine ifthe specific wireless device is either on an approved list (in whichcase authorization will be granted) or a disapproved list (in which caseservice will be denied, at least in part). As described above, it ispossible that a service for all wireless communications devices in alocation is restricted, at least in part.

In another example embodiment, when the “registration” signalinginformation is received by the HLR, the HLR determines that the cell IDis within a “restricted area” and requests the location service platformwithin the operators network to obtain the specific region of the mobilecommunications device attempting to access service. As described above,the region information can be GPS, A-GPS, triangulation, time differenceof arrival (TDOA), direction of arrival, angle of arrival (AOA), time ofarrival (TOA), absolute timing, or any appropriate combination thereof.If the region of the mobile communications device is considered“restricted”, the service for the wireless communications device ischecked against an approved list and/or disapproved list, in order todetermine the permissibility of the service for the wirelesscommunications device at/within the region. Accordingly, the service canbe allowed, restricted, or restricted in part for the mobilecommunications device at/within the region.

FIG. 4 is a flow diagram of an example process for implementing selectedrestriction of a wireless communications services. At step 40, a mobilewireless communications device registers with a network. As describedpreviously, information provided can include a cell ID, an IMEI, anMSISDN, an IMSI, or any appropriate combination thereof. At step 42 azone of coverage is determined. In various example embodiments, asdescribed above, a zone of coverage can comprise a zone of coverage of acellular tower, a sector of coverage of a zone of coverage, or anyappropriate combination thereof. It is determined, at step 44, if thezone of coverage is restricted. In an example embodiment, at step 44, itis determined if any service is restricted in the zone of coverage,regardless of the specific wireless communications device. In anotherexample embodiment, at step 44, it is determined if a service for thespecific wireless communications device is restricted in the zone ofcoverage. If it is determined, at step 44, that there are notrestrictions, the authorized service is allowed at step 46.

If, at step 44, it is determined that a service is restricted, it isdetermined, at step 48, if a specific region is to be determined. If, atstep 44, no specific region is to be determined, the permissibility ofthe service (or services) for the device at/within the zone of coverageis determined at step 50, and the service (or services) is allowed,restricted, and/or restricted in part accordingly at step 52. If, atstep 44, a specific region is to be determined, the specific region inwhich the wireless communications device is located is determined atstep 54. As described a specific region can be determined in accordancewith GPS, A-GPS, triangulation, time difference of arrival (TDOA),direction of arrival, angle of arrival (AOA), time of arrival (TOA),absolute timing, or any appropriate combination thereof. Thepermissibility of the service (or services) is determined at step 56 forthe wireless communications device at/within the region, and the service(or services) is allowed, restricted, and/or restricted in partaccordingly at step 52.

FIG. 5 is a block diagram of an example wireless communications device58 configured to accommodate selected restrictions of wirelesscommunications services. In an example configuration, wirelesscommunications device 58 is a mobile wireless device. The wirelesscommunications device 58 can comprise any appropriate device, examplesof which include a portable computing device, such as a laptop, apersonal digital assistant (“PDA”), a portable phone (e.g., a cell phoneor the like, a smart phone, a video phone), a portable email device, aportable gaming device, a TV, a DVD player, portable media player,(e.g., a portable music player, such as an MP3 player, a Walkman, etc.),a portable navigation device (e.g., GPS compatible device, A-GPScompatible device, etc.), or a combination thereof. The wirelesscommunications device 58 can include devices that are not typicallythought of as portable, such as, for example, a public computing device,a navigation device installed in-vehicle, a set top box, or the like.The wireless communications device 58 can include non-conventionalcomputing devices, such as, for example, a kitchen appliance, a motorvehicle control (e.g., steering wheel), etc., or the like. As evidentfrom the herein description, a communications device comprising portionsis not to be construed as software per se.

The wireless communications device 58 can include any appropriatedevice, mechanism, software, and/or hardware to accommodate selectedrestrictions of wireless communications services as described herein. Inan example embodiment, the ability to accommodate selected restrictionsof wireless communications services is a feature of the wirelesscommunications device 58 that can be turned on and off. Thus, an ownerand/or administrator of the wireless communications device 58, underspecific conditions, and under proper authorization can opt-in oropt-out of this capability.

In an example configuration, the wireless communications device 58comprises a processing portion 60, a memory portion 62, an input/outputportion 64, and a user interface (UI) portion 66. It is emphasized thatthe block diagram depiction of wireless communications device 58 isexemplary and not intended to imply a specific implementation and/orconfiguration. For example, in an example configuration, the wirelesscommunications device 58 comprises a cellular phone and the processingportion 60 and/or the memory portion 62 are implemented, in part or intotal, on a subscriber identity module (SIM) of the mobile wirelesscommunications device 58. The processing function may perform othertasks, for example, such as location determination or the like. Inanother example configuration, the wireless communications device 58comprises a laptop computer. The laptop computer can include a SIM, andvarious portions of the processing portion 60 and/or the memory portion62 can be implemented on the SIM, on the laptop other than the SIM, orany combination thereof.

The processing portion 60, memory portion 62, input/output portion 64,and UI portion 66 are coupled together to allow communicationstherebetween. In various embodiments, the input/output portion 64comprises a receiver of the wireless communications device 58, atransmitter of the wireless communications device 58, or a combinationthereof. The input/output portion 64 is capable of receiving and/orproviding information pertaining to selected restrictions of wirelesscommunications services as described above. For example, theinput/output portion 64 is capable of receiving and/or sendingregistration information, a cell ID, an IMEI, an MSISDN, an IMSI,information pertaining to a location, information pertaining to aspecific region, or the like, or any appropriate combination thereof, asdescribed herein. In an example embodiment, the input/output portion 64is capable of receiving and/or sending information to determine alocation of the wireless communications device 58. In an exampleconfiguration, the input\output portion 64 comprises a GPS receiver. Invarious configurations, the input/output portion 64 can receive and/orprovide information via any appropriate means, such as, for example,optical means (e.g., infrared), electromagnetic means (e.g., RF, WI-FI,BLUETOOTH, ZIGBEE, etc.), acoustic means (e.g., speaker, microphone,ultrasonic receiver, ultrasonic transmitter), or a combination thereof.

The processing portion 60 is capable of performing functions pertainingto selected restrictions of wireless communications services asdescribed above. For example, the processing portion 60 is capable ofprocessing registration information, a cell ID, an IMEI, an MSISDN, anIMSI, information pertaining to a location, information pertaining to aspecific region, any combination thereof, determining a zone ofcoverage, determining if a zone of coverage is restricted, determining aspecific region, determining if a specific region is restricted,generating an indication of permissibility of a service at/within alocation, generating an indication of permissibility of a serviceat/within a region, generating an indication of permissibility of aservice at/within a location for a specific wireless communicationsdevice, generating an indication of permissibility of a serviceat/within a region for a specific wireless communications device, or thelike, as described above. In various embodiments, the procession portion60 is configured to determine a location of the wireless communicationsdevice 58.

In a basic configuration, the wireless communications device 58 caninclude at least one memory portion 62. The memory portion 62 can storeany information utilized in conjunction with selected restrictions ofwireless communications services as described above. For example, thememory portion 62 is capable of storing information related orpertaining to registration information, a cell ID, an IMEI, an MSISDN,an IMSI, a location, a specific region, permissibility of a service,functionality of a service, or a combination thereof, as describedabove. Depending upon the exact configuration and type of processor, thememory portion 62 can be volatile (such as some types of RAM),non-volatile (such as ROM, flash memory, etc.), or a combinationthereof. The mobile wireless communications device 58 can includeadditional storage (e.g., removable storage and/or non-removablestorage) including, tangible storage media such as tape, flash memory,smart cards, CD-ROM, digital versatile disks (DVD) or other opticalstorage, magnetic cassettes, magnetic tape, magnetic disk storage orother magnetic storage devices, universal serial bus (USB) compatiblememory, or any other medium which can be used to store information andwhich can be accessed by the mobile wireless communications device 58. Atangible storage medium is a medium having a tangible physicalstructure.

The wireless communications device 58 also can contain a UI portion 66allowing a user to communicate with the wireless communications device58. The UI portion 66 is capable of rendering any information utilizedin conjunction with selected restriction of a wireless communicationsservice as described above. For example, the UI portion 66 can render amessage, or the like, as described above. The UI portion 66 can providethe ability to control the wireless communications device 58, via, forexample, buttons, soft keys, voice actuated controls, a touch screen,movement of the mobile wireless communications device 58, visual cues(e.g., moving a hand in front of a camera on the mobile wirelesscommunications device 58), or the like. The UI portion 66 can providevisual information (e.g., via a display), audio information (e.g., viaspeaker), mechanically (e.g., via a vibrating mechanism), or acombination thereof. In various configurations, the UI portion 66 cancomprise a display, a touch screen, a keyboard, an accelerometer, amotion detector, a speaker, a microphone, a camera, a tilt sensor, orany combination thereof. The UI portion 66 can comprise means forinputting biometric information, such as, for example, fingerprintinformation, retinal information, voice information, and/or facialcharacteristic information.

FIG. 6 is a block diagram of an example communications network entity 68configured to implement selected restrictions of wireless communicationsservices, as described above. The network entity 68 can represent anyappropriate device, examples of which include a processor, a computer, aserver, a portable computing device, such as a laptop, a personaldigital assistant (“PDA”), a portable phone (e.g., a cell phone or thelike, a smart phone, a video phone), or any combination thereof. Thenetwork entity 68 can represent any appropriate network entity, such asa processor, for example, a server, a gateway, a BSC, a BTS, an accesspoint, an SGSN, a GGSN, a GPRS, an MSC, an SCP, an AuC, an HLR, a DNS, afirewall, a VLR, a GMSC, an EIR, an SMSC, a PPF, a SMPP, an SLF, alocation server, an HSS, an AS, an I-CSCF, a P-CSCF, an S-CSCF, an MGCF,an MGW, an IMS, or the like, or any combination thereof.

It is emphasized that the block diagram depicted in FIG. 6 is exemplaryand not intended to imply a specific implementation or configuration.Thus, the network entity 68 can be implemented in a single processor ormultiple processors (e.g., single server or multiple servers, singlegateway or multiple gateways, single network entity or multiple networkentities). The network entity 68 can be distributed, centrally located,and/or integrated. Multiple components of the network entity 68 cancommunicate wirelessly, via hard wire, or a combination thereof.

In an example configuration, the network entity 48 comprises aprocessing portion 70, a memory portion 72, and an input/output portion74. The processing portion 70, memory portion 72, and input/outputportion 74 are coupled together (coupling not shown in FIG. 6) to allowcommunications therebetween. The input/output portion 74 is capable ofreceiving and/or providing information pertaining to selectedrestrictions of wireless communications services as described above. Forexample, the input/output portion 64 is capable of receiving and/orsending registration information, a cell ID, an IMEI, an MSISDN, anIMSI, information pertaining to a location, information pertaining to aspecific region, or the like, or any appropriate combination thereof, asdescribed herein. In an example embodiment, the input/output portion 74is capable of receiving and/or sending information to determine alocation of the wireless communications device 58. In an exampleconfiguration, the input\output portion 74 comprises a GPS receiver. Invarious configurations, the input/output portion 74 can receive and/orprovide information via any appropriate means, such as, for example,optical means (e.g., infrared), electromagnetic means (e.g., RF, WI-FI,BLUETOOTH, ZIGBEE, etc.), acoustic means (e.g., speaker, microphone,ultrasonic receiver, ultrasonic transmitter), or a combination thereof.

The processing portion 70 is capable of performing functions pertainingto selected restrictions of wireless communications services asdescribed above. For example, the processing portion 70 is capable ofprocessing registration information, a cell ID, an IMEI, an MSISDN, anIMSI, information pertaining to a location, information pertaining to aspecific region, any combination thereof, determining a zone ofcoverage, determining if a zone of coverage is restricted, determining aspecific region, determining if a specific region is restricted,generating an indication of permissibility of a service at/within alocation, generating an indication of permissibility of a serviceat/within a region, generating an indication of permissibility of aservice at/within a location for a specific wireless communicationsdevice, generating an indication of permissibility of a serviceat/within a region for a specific wireless communications device, or thelike, as described above. In various embodiments, the procession portion60 is configured to determine a location of the wireless communicationsdevice 58.

In a basic configuration, the network entity 48 can include at least onememory portion 72. The memory portion 72 can store any informationutilized in conjunction with selected restrictions of wirelesscommunications services as described above. For example, the memoryportion 72 is capable of storing information related or pertaining toregistration information, a cell ID, an IMEI, an MSISDN, an IMSI, alocation, a specific region, permissibility of a service, functionalityof a service, or a combination thereof, as described above. Dependingupon the exact configuration and type of processor, the memory portion72 can be volatile (such as some types of RAM), non-volatile (such asROM, flash memory, etc.), or a combination thereof. The network entity68 can include additional storage (e.g., removable storage and/ornon-removable storage) including, tangible storage media such as tape,flash memory, smart cards, CD-ROM, digital versatile disks (DVD) orother optical storage, magnetic cassettes, magnetic tape, magnetic diskstorage or other magnetic storage devices, universal serial bus (USB)compatible memory, or any other medium which can be used to storeinformation and which can be accessed by the network entity 68. Atangible storage medium is a medium having a tangible physicalstructure.

Depending upon the exact configuration and type of network entity 48,the memory portion 72 can include computer readable storage media thatis volatile 76 (such as some types of RAM), non-volatile 78 (such asROM, flash memory, etc.), or a combination thereof. The network entity48 can include additional storage, in the form of computer readablestorage media (e.g., removable storage 80 and/or non-removable storage82) including, but not limited to, RAM, ROM, EEPROM, tape, flash memory,smart cards, CD-ROM, digital versatile disks (DVD) or other opticalstorage, magnetic cassettes, magnetic tape, magnetic disk storage orother magnetic storage devices, universal serial bus (USB) compatiblememory, a subscriber identity module (SIM) of the mobile communicationsdevice, or any other medium which can be used to store information andwhich can be accessed by the network entity 48. A tangible storagemedium is a medium having a tangible physical structure.

The network entity 48 also can contain communications connection(s) 88that allow the network entity 48 to communicate with other devices,network entities, terminations, or the like. A communicationsconnection(s) can comprise communication media. Communication mediatypically embody computer readable instructions, data structures,program modules or other data in a modulated data signal such as acarrier wave or other transport mechanism and includes any informationdelivery media. The term “modulated data signal” means a signal that hasone or more of its characteristics set or changed in such a manner as toencode information in the signal. By way of example, and not limitation,communication media includes wired media such as a wired network ordirect-wired connection, and wireless media such as acoustic, RF,infrared, and other wireless media. The term computer readable media asused herein includes both storage media and can include communicationmedia. The system also can have input device(s) 86 such as keyboard,mouse, pen, voice input device, touch input device, etc. Outputdevice(s) 84 such as a display, speakers, printer, etc. also can beincluded.

The network entity 48 also can contain a UI portion allowing a user tocommunicate with the network entity 48. The UI portion is capable ofrendering any information utilized in conjunction with selectedrestriction of wireless communications services as described above. Forexample, the UI portion can provide means for requesting/initiating aservice, rendering text, rendering images, rendering multimedia,rendering sound, rendering video, or the like, as described above. TheUI portion can provide the ability to control the network entity 48,via, for example, buttons, soft keys, voice actuated controls, a touchscreen, movement of the mobile network entity 48, visual cues (e.g.,moving a hand in front of a camera on the network entity 48), or thelike. The UI portion can provide visual information (e.g., via adisplay), audio information (e.g., via speaker), mechanically (e.g., viaa vibrating mechanism), or a combination thereof. In variousconfigurations, the UI portion 40 can comprise a display, a touchscreen, a keyboard, an accelerometer, a motion detector, a speaker, amicrophone, a camera, a tilt sensor, or any combination thereof. The UIportion can comprise means for inputting biometric information, such as,for example, fingerprint information, retinal information, voiceinformation, and/or facial characteristic information. As evident fromthe herein description, a network entity comprising portions is not tobe construed as software per se.

The processor 68 and/or the wireless communications device 58 can bepart of and/or in communication with various wireless communicationsnetworks. Some of which are described below.

FIG. 7 depicts an overall block diagram of an exemplary packet-basedmobile cellular network environment, such as a GPRS network, in whichselected restriction of wireless communications services can beimplemented. In the exemplary packet-based mobile cellular networkenvironment shown in FIG. 7, there are a plurality of Base StationSubsystems (“BSS”) 700 (only one is shown), each of which comprises aBase Station Controller (“BSC”) 702 serving a plurality of BaseTransceiver Stations (“BTS”) such as BTSs 704, 706, and 708. BTSs 704,706, 708, etc. are the access points where users of packet-based mobiledevices become connected to the wireless network. In exemplary fashion,the packet traffic originating from user devices is transported via anover-the-air interface to a BTS 708, and from the BTS 708 to the BSC702. Base station subsystems, such as BSS 700, are a part of internalframe relay network 710 that can include Service GPRS Support Nodes(“SGSN”) such as SGSN 712 and 714. Each SGSN is connected to an internalpacket network 720 through which a SGSN 712, 714, etc. can route datapackets to and from a plurality of gateway GPRS support nodes (GGSN)722, 724, 726, etc. As illustrated, SGSN 714 and GGSNs 722, 724, and 726are part of internal packet network 720. Gateway GPRS serving nodes 722,724 and 726 mainly provide an interface to external Internet Protocol(“IP”) networks such as Public Land Mobile Network (“PLMN”) 750,corporate intranets 740, or Fixed-End System (“FES”) or the publicInternet 730. As illustrated, subscriber corporate network 740 may beconnected to GGSN 724 via firewall 732; and PLMN 750 is connected toGGSN 724 via boarder gateway router 734. The Remote AuthenticationDial-In User Service (“RADIUS”) server 742 may be used for callerauthentication when a user of a mobile cellular device calls corporatenetwork 740.

Generally, there can be a several cell sizes in a GSM network, referredto as macro, micro, pico, femto and umbrella cells. The coverage area ofeach cell is different in different environments. Macro cells can beregarded as cells in which the base station antenna is installed in amast or a building above average roof top level. Micro cells are cellswhose antenna height is under average roof top level. Micro-cells aretypically used in urban areas. Pico cells are small cells having adiameter of a few dozen meters. Pico cells are used mainly indoors.Femto cells have the same size as pico cells, but a smaller transportcapacity. Femto cells are used indoors, in residential, or smallbusiness environments. On the other hand, umbrella cells are used tocover shadowed regions of smaller cells and fill in gaps in coveragebetween those cells.

FIG. 8 illustrates an architecture of a typical GPRS network in whichselected restrictions of wireless communications services can beimplemented. The architecture depicted in FIG. 8 is segmented into fourgroups: users 850, radio access network 860, core network 870, andinterconnect network 880. Users 850 comprise a plurality of end users.Note, device 855 is referred to as a mobile subscriber in thedescription of network shown in FIG. 8. In an example embodiment, thedevice depicted as mobile subscriber 855 comprises a communicationsdevice (e.g., wireless communications device 58). Radio access network860 comprises a plurality of base station subsystems such as BSSs 862,which include BTSs 864 and BSCs 866. Core network 870 comprises a hostof various network elements. As illustrated in FIG. 8, core network 870may comprise Mobile Switching Center (“MSC”) 871, Service Control Point(“SCP”) 872, gateway MSC 873, SGSN 876, Home Location Register (“HLR”)874, Authentication Center (“AuC”) 875, Domain Name Server (“DNS”) 877,and GGSN 878. Interconnect network 880 also comprises a host of variousnetworks and other network elements. As illustrated in FIG. 8,interconnect network 880 comprises Public Switched Telephone Network(“PSTN”) 882, Fixed-End System (“FES”) or Internet 884, firewall 888,and Corporate Network 889.

A mobile switching center can be connected to a large number of basestation controllers. At MSC 871, for instance, depending on the type oftraffic, the traffic may be separated in that voice may be sent toPublic Switched Telephone Network (“PSTN”) 882 through Gateway MSC(“GMSC”) 873, and/or data may be sent to SGSN 876, which then sends thedata traffic to GGSN 878 for further forwarding.

When MSC 871 receives call traffic, for example, from BSC 866, it sendsa query to a database hosted by SCP 872. The SCP 872 processes therequest and issues a response to MSC 871 so that it may continue callprocessing as appropriate.

The HLR 874 is a centralized database for users to register to the GPRSnetwork. HLR 874 stores static information about the subscribers such asthe International Mobile Subscriber Identity (“IMSI”), subscribedservices, and a key for authenticating the subscriber. HLR 874 alsostores dynamic subscriber information such as the current location ofthe mobile subscriber. Associated with HLR 874 is AuC 875. AuC 875 is adatabase that contains the algorithms for authenticating subscribers andincludes the associated keys for encryption to safeguard the user inputfor authentication.

In the following, depending on context, the term “mobile subscriber”sometimes refers to the end user and sometimes to the actual portabledevice, such as a mobile device, used by an end user of the mobilecellular service. When a mobile subscriber turns on his or her mobiledevice, the mobile device goes through an attach process by which themobile device attaches to an SGSN of the GPRS network. In FIG. 8, whenmobile subscriber 855 initiates the attach process by turning on thenetwork capabilities of the mobile device, an attach request is sent bymobile subscriber 855 to SGSN 876. The SGSN 876 queries another SGSN, towhich mobile subscriber 855 was attached before, for the identity ofmobile subscriber 855. Upon receiving the identity of mobile subscriber855 from the other SGSN, SGSN 876 requests more information from mobilesubscriber 855. This information is used to authenticate mobilesubscriber 855 to SGSN 876 by HLR 874. Once verified, SGSN 876 sends alocation update to HLR 874 indicating the change of location to a newSGSN, in this case SGSN 876. HLR 874 notifies the old SGSN, to whichmobile subscriber 855 was attached before, to cancel the locationprocess for mobile subscriber 855. HLR 874 then notifies SGSN 876 thatthe location update has been performed. At this time, SGSN 876 sends anAttach Accept message to mobile subscriber 855, which in turn sends anAttach Complete message to SGSN 876.

After attaching itself with the network, mobile subscriber 855 then goesthrough the authentication process. In the authentication process, SGSN876 sends the authentication information to HLR 874, which sendsinformation back to SGSN 876 based on the user profile that was part ofthe user's initial setup. The SGSN 876 then sends a request forauthentication and ciphering to mobile subscriber 855. The mobilesubscriber 855 uses an algorithm to send the user identification (ID)and password to SGSN 876. The SGSN 876 uses the same algorithm andcompares the result. If a match occurs, SGSN 876 authenticates mobilesubscriber 855.

Next, the mobile subscriber 855 establishes a user session with thedestination network, corporate network 889, by going through a PacketData Protocol (“PDP”) activation process. Briefly, in the process,mobile subscriber 855 requests access to the Access Point Name (“APN”),for example, UPS.com, and SGSN 876 receives the activation request frommobile subscriber 855. SGSN 876 then initiates a Domain Name Service(“DNS”) query to learn which GGSN node has access to the UPS.com APN.The DNS query is sent to the DNS server within the core network 870,such as DNS 877, which is provisioned to map to one or more GGSN nodesin the core network 870. Based on the APN, the mapped GGSN 878 canaccess the requested corporate network 889. The SGSN 876 then sends toGGSN 878 a Create Packet Data Protocol (“PDP”) Context Request messagethat contains necessary information. The GGSN 878 sends a Create PDPContext Response message to SGSN 876, which then sends an Activate PDPContext Accept message to mobile subscriber 855.

Once activated, data packets of the call made by mobile subscriber 855can then go through radio access network 860, core network 870, andinterconnect network 880, in a particular fixed-end system or Internet884 and firewall 888, to reach corporate network 889.

FIG. 9 illustrates an exemplary block diagram view of a GSM/GPRS/IPmultimedia network architecture within which selected restrictions ofwireless communications services can be implemented. As illustrated, thearchitecture of FIG. 9 includes a GSM core network 901, a GPRS network930 and an IP multimedia network 938. The GSM core network 901 includesa Mobile Station (MS) 902, at least one Base Transceiver Station (BTS)904 and a Base Station Controller (BSC) 906. The MS 902 is physicalequipment or Mobile Equipment (ME), such as a mobile phone or a laptopcomputer that is used by mobile subscribers, with a Subscriber identityModule (SIM) or a Universal Integrated Circuit Card (UICC). The SIM orUICC includes an International Mobile Subscriber Identity (IMSI), whichis a unique identifier of a subscriber. The BTS 904 is physicalequipment, such as a radio tower, that enables a radio interface tocommunicate with the MS. Each BTS may serve more than one MS. The BSC906 manages radio resources, including the BTS. The BSC may be connectedto several BTSs. The BSC and BTS components, in combination, aregenerally referred to as a base station (BSS) or radio access network(RAN) 903.

The GSM core network 901 also includes a Mobile Switching Center (MSC)908, a Gateway Mobile Switching Center (GMSC) 910, a Home LocationRegister (HLR) 912, Visitor Location Register (VLR) 914, anAuthentication Center (AuC) 918, and an Equipment Identity Register(EIR) 916. The MSC 908 performs a switching function for the network.The MSC also performs other functions, such as registration,authentication, location updating, handovers, and call routing. The GMSC910 provides a gateway between the GSM network and other networks, suchas an Integrated Services Digital Network (ISDN) or Public SwitchedTelephone Networks (PSTNs) 920. Thus, the GMSC 910 provides interworkingfunctionality with external networks.

The HLR 912 is a database that contains administrative informationregarding each subscriber registered in a corresponding GSM network. TheHLR 912 also contains the current location of each MS. The VLR 914 is adatabase that contains selected administrative information from the HLR912. The VLR contains information necessary for call control andprovision of subscribed services for each MS currently located in ageographical area controlled by the VLR. The HLR 912 and the VLR 914,together with the MSC 908, provide the call routing and roamingcapabilities of GSM. The AuC 916 provides the parameters needed forauthentication and encryption functions. Such parameters allowverification of a subscriber's identity. The EIR 918 storessecurity-sensitive information about the mobile equipment.

A Short Message Service Center (SMSC) 909 allows one-to-one ShortMessage Service (SMS) messages to be sent to/from the MS 902. A PushProxy Gateway (PPG) 911 is used to “push” (i.e., send without asynchronous request) content to the MS 902. The PPG 911 acts as a proxybetween wired and wireless networks to facilitate pushing of data to theMS 902. A Short Message Peer to Peer (SMPP) protocol router 913 isprovided to convert SMS-based SMPP messages to cell broadcast messages.SMPP is a protocol for exchanging SMS messages between SMS peer entitiessuch as short message service centers. The SMPP protocol is often usedto allow third parties, e.g., content suppliers such as newsorganizations, to submit bulk messages.

To gain access to GSM services, such as speech, data, and short messageservice (SMS), the MS first registers with the network to indicate itscurrent location by performing a location update and IMSI attachprocedure. The MS 902 sends a location update including its currentlocation information to the MSC/VLR, via the BTS 904 and the BSC 906.The location information is then sent to the MS's HLR. The HLR isupdated with the location information received from the MSC/VLR. Thelocation update also is performed when the MS moves to a new locationarea. Typically, the location update is periodically performed to updatethe database as location updating events occur.

The GPRS network 930 is logically implemented on the GSM core networkarchitecture by introducing two packet-switching network nodes, aserving GPRS support node (SGSN) 932, a cell broadcast and a GatewayGPRS support node (GGSN) 934. The SGSN 932 is at the same hierarchicallevel as the MSC 908 in the GSM network. The SGSN controls theconnection between the GPRS network and the MS 902. The SGSN also keepstrack of individual MS's locations and security functions and accesscontrols.

A Cell Broadcast Center (CBC) 933 communicates cell broadcast messagesthat are typically delivered to multiple users in a specified area, suchas a cell site or group of cell sites. Cell Broadcast is one-to-manyunacknowledged geographically focused service. It enables messages to becommunicated to multiple mobile phone customers who are located within agiven part of its network coverage area at the time the message isbroadcast.

The GGSN 934 provides a gateway between the GPRS network and a publicpacket network (PDN) or other IP networks 936. That is, the GGSNprovides interworking functionality with external networks, and sets upa logical link to the MS through the SGSN. When packet-switched dataleaves the GPRS network, it is transferred to an external TCP-IP network936, such as an X.25 network or the Internet. In order to access GPRSservices, the MS first attaches itself to the GPRS network by performingan attach procedure. The MS then activates a packet data protocol (PDP)context, thus activating a packet communication session between the MS,the SGSN, and the GGSN.

In a GSM/GPRS network, GPRS services and GSM services can be used inparallel. The MS can operate in one of three classes: class A, class B,and class C. A class A MS can attach to the network for both GPRSservices and GSM services simultaneously. A class A MS also supportssimultaneous operation of GPRS services and GSM services. For example,class A mobiles can receive GSM voice/data/SMS calls and GPRS data callsat the same time.

A class B MS can attach to the network for both GPRS services and GSMservices simultaneously. However, a class B MS does not supportsimultaneous operation of the GPRS services and GSM services. That is, aclass B MS can only use one of the two services at a given time.

A class C MS can attach for only one of the GPRS services and GSMservices at a time. Simultaneous attachment and operation of GPRSservices and GSM services is not possible with a class C MS.

A GPRS network 930 can be designed to operate in three network operationmodes (NOM1, NOM2 and NOM3). A network operation mode of a GPRS networkis indicated by a parameter in system information messages transmittedwithin a cell. The system information messages dictates a MS where tolisten for paging messages and how to signal towards the network. Thenetwork operation mode represents the capabilities of the GPRS network.In a NOM1 network, a MS can receive pages from a circuit switched domain(voice call) when engaged in a data call. The MS can suspend the datacall or take both simultaneously, depending on the ability of the MS. Ina NOM2 network, a MS may not receive pages from a circuit switcheddomain when engaged in a data call, since the MS is receiving data andis not listening to a paging channel. In a NOM3 network, a MS canmonitor pages for a circuit switched network while received data andvice versa.

The IP multimedia network 938 was introduced with 3GPP Release 5, andincludes an IP multimedia subsystem (IMS) 940 to provide rich multimediaservices to end users. A representative set of the network entitieswithin the IMS 940 are a call/session control function (CSCF), a mediagateway control function (MGCF) 946, a media gateway (MGW) 948, and amaster subscriber database, called a home subscriber server (HSS) 950.The HSS 950 may be common to the GSM network 901, the GPRS network 930as well as the IP multimedia network 938.

The IP multimedia system 940 is built around the call/session controlfunction, of which there are three types: an interrogating CSCF (I-CSCF)943, a proxy CSCF (P-CSCF) 942, and a serving CSCF (S-CSCF) 944. TheP-CSCF 942 is the MS's first point of contact with the IMS 940. TheP-CSCF 942 forwards session initiation protocol (SIP) messages receivedfrom the MS to an SIP server in a home network (and vice versa) of theMS. The P-CSCF 942 may also modify an outgoing request according to aset of rules defined by the network operator (for example, addressanalysis and potential modification).

The I-CSCF 943, forms an entrance to a home network and hides the innertopology of the home network from other networks and providesflexibility for selecting an S-CSCF. The I-CSCF 943 may contact asubscriber location function (SLF) 945 to determine which HSS 950 to usefor the particular subscriber, if multiple HSS's 950 are present. TheS-CSCF 944 performs the session control services for the MS 902. Thisincludes routing originating sessions to external networks and routingterminating sessions to visited networks. The S-CSCF 944 also decideswhether an application server (AS) 952 is required to receiveinformation on an incoming SIP session request to ensure appropriateservice handling. This decision is based on information received fromthe HSS 950 (or other sources, such as an application server 952). TheAS 952 also communicates to a location server 956 (e.g., a GatewayMobile Location Center (GMLC)) that provides a position (e.g.,latitude/longitude coordinates) of the MS 902.

The HSS 950 contains a subscriber profile and keeps track of which corenetwork node is currently handling the subscriber. It also supportssubscriber authentication and authorization functions (AAA). In networkswith more than one HSS 950, a subscriber location function providesinformation on the HSS 950 that contains the profile of a givensubscriber.

The MGCF 946 provides interworking functionality between SIP sessioncontrol signaling from the IMS 940 and ISUP/BICC call control signalingfrom the external GSTN networks (not shown). It also controls the mediagateway (MGW) 948 that provides user-plane interworking functionality(e.g., converting between AMR- and PCM-coded voice). The MGW 948 alsocommunicates with other IP multimedia networks 954.

Push to Talk over Cellular (PoC) capable mobile phones register with thewireless network when the phones are in a predefined area (e.g., jobsite, etc.). When the mobile phones leave the area, they register withthe network in their new location as being outside the predefined area.This registration, however, does not indicate the actual physicallocation of the mobile phones outside the pre-defined area.

While example embodiments of selected restriction of wirelesscommunications services have been described in connection with variouscomputing devices/processor, the underlying concepts can be applied toany computing device, processor, or system capable of determiningpropagation time. The various techniques described herein can beimplemented in connection with hardware or software or, whereappropriate, with a combination of both. Thus, the methods andapparatuses for selected restriction of wireless communications servicescan be implemented, or certain aspects or portions thereof, can take theform of program code (i.e., instructions) embodied in tangible storagemedia having a tangible physical structure, such as floppy diskettes,CD-ROMs, hard drives, or any other machine-readable storage medium(computer-readable storage medium), wherein, when the program code isloaded into and executed by a machine, such as a computer, the machinebecomes an apparatus for determining propagation time. In the case ofprogram code execution on programmable computers, the computing devicewill generally include a processor, a storage medium readable by theprocessor (including volatile and non-volatile memory and/or storageelements), at least one input device, and at least one output device.The program(s) can be implemented in assembly or machine language, ifdesired. The language can be a compiled or interpreted language, andcombined with hardware implementations.

The methods and apparatuses for selected restriction of wirelesscommunications services also can be practiced via communicationsembodied in the form of program code that is transmitted over sometransmission medium, such as over electrical wiring or cabling, throughfiber optics, or via any other form of transmission, wherein, when theprogram code is received and loaded into and executed by a machine, suchas an EPROM, a gate array, a programmable logic device (PLD), a clientcomputer, or the like, the machine becomes an apparatus for selectedrestriction of wireless communications services. When implemented on ageneral-purpose processor, the program code combines with the processorto provide a unique apparatus that operates to invoke the functionalityof selected restriction of wireless communications services.Additionally, any storage techniques used in connection with selectedrestriction of wireless communications services can invariably be acombination of hardware and software.

While selected restriction of wireless communications services have beendescribed in connection with the various embodiments of the variousfigures, it is to be understood that other similar embodiments can beused or modifications and additions can be made to the describedembodiment for selected restriction of wireless communications serviceswithout deviating therefrom. For example, one skilled in the art willrecognize that selected restriction of wireless communications servicesas described in the present application may apply to any environment,whether wired or wireless, and may be applied to any number of devicesconnected via a communications network and interacting across thenetwork. Therefore, selected restriction of wireless communicationsservices should not be limited to any single embodiment, but rathershould be construed in breadth and scope in accordance with the appendedclaims.

What is claimed:
 1. A method comprising: determining whether a wirelesscommunication device is located within a zone of coverage comprising amoving, dynamically defined region; determining, a permissibility of aservice for the wireless communication device, wherein types of thepermissibility comprise a first permissibility and a secondpermissibility; and controlling the service for the wirelesscommunication device while the wireless communication device is withinthe zone of coverage based on the permissibility, wherein the firstpermissibility allows the service for the wireless communication device;and wherein the second permissibility restricts the service for thewireless communication device.
 2. The method of claim 1, wherein thezone of coverage further comprises at least one of a cell, a micro cell,a pico cell, a Femto cell, or a wireless access point.
 3. The method ofclaim 1, wherein the zone of coverage comprises a geographic boundary.4. The method of claim 1, wherein the zone of coverage comprises athree-dimensional boundary.
 5. The method of claim 1, wherein thepermissibility is further based on time.
 6. The method of claim 1,wherein the service comprises a telephone call service.
 7. The method ofclaim 1, wherein the permissibility comprises the second permissibilityand the controlling comprises limiting the telephone call service tocalls involving a predefined set of telephone numbers.
 8. A methodcomprising: determining whether a wireless communication device islocated within a zone of coverage comprising a moving, dynamicallydefined region; determining a permissibility of a service for thewireless communication device, wherein types of the permissibilitycomprise a first permissibility and a second permissibility; controllingthe service for the wireless communication device while the wirelesscommunication device is within the zone of coverage based on thepermissibility, wherein the first permissibility allows the service forthe wireless communication device, and wherein the second permissibilitydenies the service for the wireless communication device.
 9. The methodof claim 8, wherein the zone of coverage further comprises at least oneof a cell, a micro cell, a pico cell, a Femto cell, or a wireless accesspoint.
 10. The method of claim 8, wherein the zone of coverage comprisesa geographic boundary.
 11. The method of claim 8, wherein the zone ofcoverage comprises a three-dimensional boundary.
 12. The method of claim8, wherein the permissibility is further based on time.
 13. The methodof claim 8, wherein the permissibility is further based on an identityof the wireless communication device.
 14. The method of claim 8, whereinthe types of permissibility further comprise a third permissibility,wherein the third permissibility restricts the service for the wirelesscommunication device.
 15. A method comprising: determining whether alocation of a wireless communication device is within a zone of coveragecomprising a moving, dynamically defined region; determining apermissibility of a service for the wireless communication device; andcontrolling a provision of the service to the wireless communicationdevice based on the permissibility.
 16. The method of claim 15, whereincontrolling the provision of the service comprises: based on at leastthe permissibility being a first permissibility, allowing the servicefor the wireless communication device while within the zone of coverage.17. The method of claim 15, wherein controlling the provision of theservice comprises: based on at least the permissibility being a secondpermissibility, restricting the service for the wireless communicationdevice while within the zone of coverage.
 18. The method of claim 15,wherein controlling the provision of the service comprises: based on atleast the permissibility being a third permissibility, denying theservice for the wireless communication device while within the zone ofcoverage.
 19. The method of claim 15, wherein the permissibility isfurther based on an identity of the wireless communication device. 20.The method of claim 15, wherein the permissibility is further based ontime.