Location privacy manager for a wireless communication device and method therefor

ABSTRACT

Rules of communication are established between a wireless communication device ( 102 ) and a remote source ( 108 ). Communications between the wireless communication device ( 102 ) and the remote source ( 108 ) are managed to prohibit at least one of an identity and a location of the wireless communication device ( 102 ) from being known to the remote source ( 108 ) responsive to the established rules of communication. The steps of establishing and managing may be implemented in a wireless communication device ( 102 ), a wireless communication network ( 104 ), and/or a location privacy manager ( 106 ). The rules of communication preferably include a password generated by the remote source ( 108 ), an identity of the remote source ( 108 ), an identity of a location privacy manager ( 106 ), and/or masking of the identity of the wireless communication device ( 102 ). The wireless communication device ( 102 ) is preferably a cellular telephone device. The remote source ( 108 ) is preferably a location-enabled service, such as, for example, a map service, a people finder service, or a remote party.

REFERENCE TO A RELATED APPLICATION

The present patent application is a continuation of U.S. applicationSer. No. 09/497,955, filed Feb. 4, 2000 now U.S. Pat. No. 6,662,014.That application is assigned to the assignee of the present applicationand is hereby incorporated by reference. Also, the present patentapplication is related to U.S. Pat. No. 6,603,977, filed on Feb. 4, 2000and assigned to the assignee of the present invention.

FIELD OF THE INVENTION

The present invention relates generally to location information systems,and more particularly to a location privacy manager for a wirelesscommunication device and a method therefor.

BACKGROUND OF THE INVENTION

In the United States of America, the Federal Communications Commission(FCC) regulates wireless telecommunications companies that providewireless telecommunications services. Wireless telecommunications is agroup of telecommunications services under the heading of commercialmobile radio service (CMRS), as defined by the FCC. CMRS includescellular, personal communications services (PCS), mobile satelliteservices (MSS) and enhanced specialized mobile radio (ESMR). Presently,CMRS does not include other forms of “wireless” communications such aspaging and traditional dispatch. The FCC's authority over the wirelessindustry includes licensing, certain technical aspects of wirelessservice, timeframes in which service must be made available in givenareas, and the provision of the 911 emergency answering service (i.e.,911 service), including basic 911 and enhanced 911 (i.e., E911).

The Department of Revenue of Washington State, USA provides an excellentsummary of wireline and wireless 911 service in their document entitled:“Enhanced 911 Funding Study.” This study is presently located at theinternet web site: http://dor.wa.gov/index.asp?/pub/e911. The mostrelevant sections, including the executive summary, the introduction,chapter 1, chapter 2 text and drawings, and chapter 3 text and chart,have been printed out and provided with an information disclosurestatement for the present patent application as a permanent reference tothe present patent application. This entire study, including, but notlimited to chapters 1, 2 and 3 along with the referenced drawings andcharts, is herein incorporated into the present patent application byreference not only as a description for the background of the presentinvention, but also as a description for the detailed description of thepresent invention. Further, anything disclosed in this study, such asany term, concept, feature, service, drawing, chart, method, apparatus,system, etc. or portion thereof, may be used in combination withanything disclosed in the present patent application for support of anyclaims in the present or related patent applications.

The FCC requires that cellular telephones implementing E911 phase twomust provide automatic location identification (ALI) to a public safetyanswering point (PSAP). To meet the ALI requirement a cellularnetwork-based solution, a handset-based solution and a combination of acellular-based solution and a handset-based solution have been proposed.Examples of cellular network-based solutions are disclosed in U.S. Pat.Nos. 5,890,068, 5,963,866, 5,987,329, 5,945,948, 5,930,717, 5,873,040,and 5,736,964. Examples of the handset-based solutions are disclosed inU.S. Pats. Nos. 5,479,482 and 5,388,147. An example of a combinationsolution is disclosed in U.S. Pat. No. 5,724,660.

Once the E911, phase two system is deployed, there will be a demand forlocation-based services and applications beyond the E911 service.However, it may not be safe or private to have the location of acellular telephone known to strangers or third parties. For example, amother would like to be able to locate her child using the locationidentification capability of the child's cellular telephone, but wouldnot want other people to locate her child without her permissionespecially if her child is lost.

Accordingly, there is a need for a location privacy manager for acellular telephone with location identification capability to providesafety and privacy for a user of the cellular telephone on adiscretionary basis.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a block diagram of a communication system, includinga wireless communication device, a wireless communication network, alocation privacy manager, and a remote source in accordance with apreferred embodiment of the present invention.

FIG. 2 illustrates a block diagram of the wireless communication deviceillustrated in FIG. 1 in accordance with a preferred embodiment of thepresent invention.

FIG. 3 illustrates a block diagram of the wireless communication networkillustrated in FIG. 1 in accordance with a preferred embodiment of thepresent invention.

FIG. 4 illustrates a block diagram of the privacy location managerillustrated in FIG. 1 in accordance with a preferred embodiment of thepresent invention.

FIG. 5 illustrates a flowchart describing a method for providing privacymanagement for a wireless communication device performed by at least oneof the wireless communication device illustrated in FIG. 2, the wirelesscommunication network illustrated in FIG. 3 and the location privacymanager illustrated in FIG. 4 in accordance with a preferred embodimentof the present invention.

FIG. 6 illustrates a flowchart describing a method performed by thewireless communication device illustrated in FIG. 2 in accordance with apreferred embodiment of the present invention.

FIG. 7 illustrates a flowchart describing a method performed by thewireless communication network illustrated in FIG. 3 in accordance witha preferred embodiment of the present invention.

FIG. 8 illustrates a flowchart describing a method performed by theprivacy location manager illustrated in FIG. 4 in accordance with apreferred embodiment of the present invention.

DETAILED DESCRIPTION OF A PREFERRED EMBODIMENT

Generally, to meet the forgoing need, rules of communication areestablished between a wireless communication device 102 and a remotesource 108. Communications between the wireless communication device 102and the remote source 108 are managed to prohibit at least one of anidentity and a location of the wireless communication device 102 frombeing known to the remote source 108 responsive to the established rulesof communication. The steps of establishing and managing may beimplemented in a wireless communication device 102, a wirelesscommunication network 104, and/or a location privacy manager 106. Therules of communication preferably include a password generated by theremote source 108, an identity of the remote source 108, an identity ofa location privacy manager 106, and/or masking of the identity of thewireless communication device 102. The wireless communication device 102is preferably a cellular telephone device. The remote source 108 ispreferably a location-enabled service, such as, for example, a mapservice, a people finder service, or a remote party. Hence, a user ofthe wireless communication device 102 advantageously receives increasedprivacy and security during the operation of the wireless communicationdevice 102. Further features and advantages are described in the presentdetailed description of the preferred embodiment with reference to thedrawings, as follows.

FIG. 1 illustrates a block diagram of a communication system 100,including a wireless communication device 102, a wireless communicationnetwork 104, a location privacy manager 106, and a remote source 108 inaccordance with a preferred embodiment of the present invention.Location information is communicated between the blocks of FIG. 1 onpaths 110, 114, 118, and 128. Service information is communicatedbetween the blocks of FIG. 1 on paths 112, 116, 120 and 130. Pairs ofpaths 122, 124, 126 and 132 between adjacent blocks of FIG. 1 representcommunication channels between the adjacent blocks.

In operation, the wireless communication device 102 communicates withthe wireless communication network 104 over the communication channel122. The wireless communication network 104 communicates with thelocation privacy manager over the communication channel 124. Thelocation privacy manager 106 communicates with the remote source 108over the communication channel 126. Alternatively, the remote source 108communicates with the wireless communication network 104 over thecommunication channel 132.

The wireless communication device 102 is preferably a cellular telephonedevice. Alternatively, the wireless communication device 102 mayinclude, without limitation, cordless telephones,personal digitalassistants, pagers, personal notebooks, portable computers, two-wayradios.

The wireless communication network 104 is preferably a cellulartelephone network providing coverage over a relatively wide area, suchas a city. Alternatively, the wireless communication network 104 mayinclude, without limitation, wireless public branch exchange (PBX)communication networks, cordless telephone communication networks,small-cell or pico-cell communication networks, in-buildingcommunication networks, global satellite communication networks, pagingcommunication networks and two-way radio networks.

The location privacy manager 106 preferably acts as a middleman or proxyserver to monitor and manage communications between the wirelesscommunication network 104 and the remote source 108. The locationprivacy manager 106 is preferably operated by a third party specializingin protecting the security and privacy of at least one of the identityand the location of the wireless communication device 102 when thewireless communication device 102 communicates with the remote source108. Alternatively, the location privacy manager 106 may be an integralpart of the wireless communication network 104.

The remote source 108 represents a third party person or service that iscommunicating with the wireless communication device 102. The remotesource 108 preferably represents a location-enabled service adapted toprovide location-based services to the wireless communication device102. Such location-based services include, without limitation, a mapservice, a people finder service, a place finder service, to name a few.The remote source 108 is preferably operated by a third party, but mayalso be integrated with the location privacy manager 106 or the wirelesscommunication network 104.

The communication channel 122 between the wireless communication device102 and the wireless communication network 104 is preferably a radiofrequency communication channel operating at cellular frequencies.Alternatively, the communication channel 122 operate at any other radiofrequency in accordance with the design of the wireless communicationdevice 102 and the wireless communication network 104. Alternatively,the communication channel 122 may include, without limitation, aninfrared communication channel.

The communication channel 124 between the wireless communication network104 and the location privacy manager 106 is preferably a wirelinecommunication channel carried by a public switch telephone network(PSTN). Alternatively, the communication channel 124 may be a radiofrequency communication channel or an infrared communication channel.

The communication channel 126 between the location privacy manager 106and the remote source 108 is preferably a wireline communication channelcarried by the PSTN. Alternatively, the communication channel 126 may bea radio frequency communication channel or an infrared communicationchannel.

The communication channel 132 between the remote source 108 and thewireless communication network 104 is preferably a wirelinecommunication channel carried by the PSTN. Alternatively, thecommunication channel 132 may be a radio frequency communication channelor an infrared communication channel.

FIG. 2 illustrates a block diagram of the wireless communication device102 illustrated in FIG. 1 in accordance with a preferred embodiment ofthe present invention. The wireless communication device 102 generallyincludes an antenna 200, a receiver 202, a transmitter 204, a memorydevice 212, a controller 210, and a user interface 214.

The antenna 200 communicates radio frequency signals over a radiofrequency communication channel 122 between the wireless communicationdevice 102 and a remote source 108. The receiver 202, coupled to theantenna 200, receives the radio frequency signals from the remote source108. The transmitter 204, coupled to the antenna 200, transmits theradio frequency signals to the remote source 108. The memory device 212,coupled to the controller 210, stores rules of communication between thewireless communication device 102 and remote source 108, and stores anidentity and a location of the wireless communication device 102. Thecontroller 210, coupled to the receiver 202 and the transmitter 204,manages communications between the wireless communication device 102 andthe remote source 108 to prohibit at least one of the identity and thelocation of the wireless communication device 102 from being known tothe remote source 108 responsive to the rules of communication. The userinterface 214, coupled to the controller 210, communicates userinterface signals between a user of the wireless communication device102 and the controller 210.

The general arrangement of the blocks in the wireless communicationdevice 102 and the general functionality of the wireless communicationdevice 102 are well known in the art, with exception of the method ofFIG. 5 implemented in the controller 210 and the information stored inthe memory device 212, as discussed further hereinbelow.

FIG. 3 illustrates a block diagram of the wireless communication network104 illustrated in FIG. 1 in accordance with a preferred embodiment ofthe present invention. The wireless communication network 104 generallyincludes a base station 300, a communication switch or router 302, amemory device 306, a location privacy manager interface 308 and acontroller 304. The base station 300 further includes an antenna 310, areceiver 314 and a transmitter 316.

The, antenna 310 communicates radio frequency signals over a radiofrequency communication channel 122 between the wireless communicationnetwork 104 and a wireless communication device 102. The receiver 314,coupled to the antenna 310, receives the radio frequency signals fromthe wireless communication device 102. The transmitter 316, coupled tothe antenna 310, transmits the radio frequency signals to the wirelesscommunication device 102. The communication switch 302, coupled to thetransmitter 316 and the receiver 314, routes information communicatedover radio frequency communication channel 122. The memory device 306stores rules of communication between the wireless communication device102 and a remote source 108. The location privacy manager interface 308,coupled to the remote source 108, communicates signals between thewireless communication network 104 and the remote source 108. Thecontroller 304, coupled to the communication switch 302, the memorydevice 306 and the location privacy manager interface 308, managescommunications between the wireless communication device 102 and theremote source 108 to prohibit at least one of the identity and thelocation of the wireless communication device 102 from being known tothe remote source 108 responsive to the rules of communication.

The location information of the wireless communication device 102 istransmitted over the paths 318, 322, 326, 330 and 114. The serviceinformation from the remote source 108 is transmitted over the paths320, 324, 328 and 116.

The general arrangement of the blocks in the wireless communicationnetwork 104 and the general functionality of the wireless communicationnetwork 104 are well known in the art, with exception of the method ofFIG. 6 implemented in the controller 304, the information stored in thememory device 306, and the location privacy manager interface 308, asdiscussed further hereinbelow.

FIG. 4 illustrates a block diagram of the privacy location manager 106illustrated in FIG. 1 in accordance with a preferred embodiment of thepresent invention. The location privacy manager 106 generally includes awireless communication network interface 400, a remote source interface406, a memory device 404 and a controller 402.

The wireless communication network interface 400 communicates signalsbetween the location privacy manager 106 and a wireless communicationnetwork 104. The remote source interface 406 communicates signalsbetween the location privacy manager 106 and a remote source 108. Thememory device 404 stores rules of communication between a wirelesscommunication device 102 and a remote source 108. The controller 402,coupled to the wireless communication network interface 400, the remotesource interface 406, and the memory device 404, for managingcommunications between the wireless communication device 102 and theremote source 108 to prohibit at least one of an identity and a locationof a wireless communication device 102, communicating with the wirelesscommunication network 104, from being known to the remote source 108responsive to the rules of communication. Each of the blocks in FIG. 4and the contents thereof present features and advantages for thepreferred embodiment of the present invention, as described furtherhereinbelow.

FIG. 5 illustrates a flowchart 500 describing a method for providingprivacy management for a wireless communication device 102 performed byat least one of the wireless communication device 102 illustrated inFIG. 2, the wireless communication network 104 illustrated in FIG. 3 andthe location privacy manager 106 illustrated in FIG. 4 in accordancewith a preferred embodiment of the present invention.

At step 502, the method starts.

At step 504, the method establishes rules of communication between thewireless communication device and a remote source. The rules ofcommunication may include any rule, but preferably include, withoutlimitation, a password generated by the remote source 108, an identityof the remote source 108, an identity of a location privacy manager 106,and/or masking of the identity of the wireless communication device 102.

At step 506, the method manages communications between the wirelesscommunication device 102 and the remote source 108 to prohibit at leastone of an identity and a location of the wireless communication device102 from being known to the remote source 108 responsive to the step 504of establishing the rules of communication. Hence, a user of thewireless communication device 102 advantageously receives increasedprivacy and security during the operation of the wireless communicationdevice 102 when communicating with the remote source 108.

At step 508, the method ends.

Step 510, indicated by dashed lines, represents a combination of steps504 and 506. Step 510 identifies general language in the method offlowchart 500 that is expanded upon in the flowcharts of FIGS. 6, 7 and8.

FIG. 6 illustrates a flowchart describing a method performed by thewireless communication device 102 illustrated in FIG. 2 in accordancewith a preferred embodiment of the present invention.

At step 601 the wireless communication device 102 starts the method.

At step 602, the wireless communication device receives a request forlocation information associated with the wireless communication device.

At step 603, the wireless communication device determines whether therequest is received from a location privacy manager 106 or alocation-enabled service 108.

At step 604, the wireless communication device determines whether or notthe wireless communication device 102 is registered to operate with thelocation privacy manager 106 responsive to the step of determining thatthe request is received from the location privacy manager 106.

At step 606, the wireless communication device 102 sends the locationinformation to the location privacy manager 106 responsive to the stepof determining that the wireless communication device 102 is registeredto operate with the location privacy manager 106.

At step 608, the wireless communication device 102 rejects the requestfrom the location privacy manager 106 responsive to the step ofdetermining that that the wireless communication device 102 is notregistered to operate with the location privacy manager 106.

At step 610, the wireless communication device 102 determines whether ornot an identity of the location-enabled service 108 is acceptable to thewireless communication device 102 responsive to the step of determiningthat the request is received from the location-enabled service 108.

At step 612, the wireless communication device 102 sends the locationinformation to the location-enabled service 108 responsive to the stepof determining that the identity of the location-enabled service 108 isacceptable to the wireless communication device 102.

At step 614, the wireless communication device 102 rejects the requestfrom the location-enabled service 108 responsive to the step ofdetermining that that the identity of the location-enabled service 108is not acceptable to the wireless communication device 102.

At step 616, the wireless communication device 102 ends the method.

Note that the dashed lines around steps 604, 606 and 608 and representedby reference number 510 represent that the language in steps 604, 606and 608 is a narrowing of the language in the steps represented by 510in FIG. 5. Similarly, the dashed lines around steps 610, 612 and 614 andalso represented by reference number 510 represent that the language insteps 610, 612 and 614 is a narrowing of the language in the stepsrepresented by 510 in FIG. 5.

FIG. 7 illustrates a flowchart 700 describing a method performed by thewireless communication network 104 illustrated in FIG. 3 in accordancewith a preferred embodiment of the present invention.

At step 701, the wireless communication network 104 starts the method.

At step 702, the wireless communication network 104 receives a requestfor location information associated with the wireless communicationdevice 102.

At step 703, the wireless communication network 104 determines whetherthe request is received from a location privacy manager 106 or alocation-enabled service 108.

At step 709, the wireless communication network 104 determines whetheror not the wireless communication device 102 is registered to operatewith the location privacy manager 106 responsive to determining that therequest is received from the location privacy manager 106.

At step 710, the wireless communication network 104 sends a request forthe location information to the wireless communication device 102responsive to determining that the wireless communication device 102 isregistered to operate with the location privacy manager 106.

At step 712, the wireless communication network 104 receives thelocation information from the wireless communication device 102responsive to the step 710 of sending the request.

At step 714, the wireless communication network 104 sends the locationinformation to the location privacy manager 106 responsive to the step712 of receiving the location information.

At step 716, the wireless communication network 104 rejects the requestfrom the location privacy manager 106 responsive to determining thatthat the wireless communication device 102 is not registered to operatewith the location privacy manager 106.

At step 704, the wireless communication network 104 determines whetheror not an identity of the location-enabled service 108 is acceptable tothe wireless communication device 102 responsive to determining that therequest is received from the location-enabled service 108.

At step 705, the wireless communication network 104 sends a request forthe location information to the wireless communication device 102responsive to determining that the identity of the location-enabledservice 108 is acceptable to the wireless communication device 102.

At step 706, the wireless communication network 104 receives thelocation information from the wireless communication device 102responsive to the step 705,of sending the request.

At step 707, the wireless communication network 104 sends the locationinformation to the location-enabled service 108 responsive to the step706 of receiving the location information.

At step 708, the wireless communication network 104 rejects the requestfrom the location-enabled service 108 responsive to determining thatthat the identity of the location-enabled service 108 is not acceptableto the wireless communication device 102.

At step 718, the wireless communication network 104 ends the method.

Note that the dashed lines around steps 709, 710, 712 and 714 andrepresented by reference number 510 represent that the language in steps709, 710, 712 and 714 is a narrowing of the language in the stepsrepresented by 510 in FIG. 5. Similarly, the dashed lines around steps704, 705, 706, 707 and 708 and also represented by reference number 510represent that the language in steps 704, 705, 706, 707 and 708 is anarrowing of the language in the steps represented by 510 in FIG. 5.

FIG. 8 illustrates a flowchart 800 describing a method performed by theprivacy location manager 106 illustrated in FIG. 4 in accordance with apreferred embodiment of the present invention.

At step 801, the location privacy manager 106 starts the method.

At step 802, the location privacy manager 106 determines whether alocation-enabled service 108 is pulled by a wireless communicationdevice 102 or pushed to the wireless communication device 102 by thelocation-enabled service 108.

At step 803, the location privacy manager 106 receives a request fromthe wireless communication device 102 for the location-enabled service108 responsive to the step 802 of determining that the location-enabledservice 108 is pulled by a wireless communication device 102.

At step 804, the location privacy manager 106 masks an identity of thewireless communication device 102 from the location-enabled service 108responsive to the step 803 of receiving.

At step 805, the location privacy manager 106 requests locationinformation from the wireless communication device 102 responsive to thestep 804 of masking the identity.

At step 806, the location privacy manager 106 receives the locationinformation from the wireless communication device 102 responsive to thestep 805 of requesting the location information.

At step 807, the location privacy manager 106 sends the locationinformation to the location-enabled service 108 without the identity ofthe wireless communication device 102 responsive to the step 806 ofreceiving the location information.

At step 808, the location privacy manager 106 receives a response fromthe location-enabled service 108 responsive to the step 807 of sendingthe location information.

At step 809, the location privacy manager 106 matches the response fromthe location-enabled service 108 to the identity of the wirelesscommunication device 102 responsive to the step 808 of receiving.

At step 810, the location privacy manager 106 forwards the response fromthe location-enabled service to the wireless communication device 102responsive to the step 809 of matching, without the location-enabledservice 108 knowing the identity of the wireless communication device102.

At step 811, the location privacy manager 106 receives a request forlocation information associated with the wireless communication device102 from the location-enabled service responsive to the step 802 ofdetermining that the location-enabled service 108 is pushed to thewireless communication device 102 by the location-enabled service 108.

At step 812, the location privacy manager 106 determines whether or notan identity of the location-enabled service 108 is acceptable to thewireless communication device 102 responsive to the step 811 ofdetermining that the request is received from the location-enabledservice 108.

At step 813, the location privacy manager 106 sends a request for thelocation information to the wireless communication device 102 responsiveto determining that the identity of the location-enabled service 108 isacceptable to the wireless communication device 102.

At step 814, the location privacy manager 106 receives the locationinformation from the wireless communication device 102 responsive to thestep 813 of sending the request.

At step 815, the location privacy manager 106 sends the locationinformation to the location-enabled service 108 responsive to the step814 of receiving the location information.

At step 816, the location privacy manager 106 rejects the request fromthe location-enabled service 108 responsive to determining that that theidentity of the location-enabled service 108 is not acceptable to thewireless communication device 102.

At step 817, the location privacy manager 106 ends the method.

Note that the dashed lines around steps 803-810 and represented byreference number 510 represent that the language in steps 803-810 is anarrowing of the language in the steps represented by 510 in FIG. 5.Similarly, the dashed lines around steps 811-816 and also represented byreference number 510 represent that the language in steps 811-816 is anarrowing of the language in the steps represented by 510 in FIG. 5.

Also note that the concept indicated initially by reference number 510in FIG. 5 and then expanded upon in each of FIGS. 6, 7 and 8 ispreferably implemented in one of FIGS. 6, 7 and 8. When privacy managermethod represented by the steps of 510 are implemented in FIG. 6, thisrepresents a wireless communication device-based solution. When privacymanager method represented by the steps of 510 are implemented in FIG.7, this represents a wireless communication network-based solution. Whenprivacy manager method represented by the steps of 510 are implementedin FIG. 8, this represents a location privacy manager-based solution.Each solution has its own inherent advantages depending upon where it isdesirable to manage the communications between the wirelesscommunication device 102 and the remote source 108.

In the preferred embodiment of the present invention, any featuredescribed with reference to any drawing in the present application maybe combined with any other feature described with reference to the sameor any other drawing in the present application or the referencedco-pending application to provide multiple variations and combinationsthereof.

Hence, while the present invention has been described with reference tovarious illustrative embodiments thereof, the present invention is notintended that the invention be limited to these specific embodiments.Those skilled in the art will recognize that variations, modificationsand combinations can be made without departing from the spirit and scopeof the invention as set forth in the appended claims.

1. A method for providing privacy management for a wireless communication device, the method comprising the steps of: establishing rules of communication between the wireless communication device and a remote source; and managing communications between the wireless communication device and the remote source in response to establishing the rules of communication to: (a) allow the remote source to know either an identity or a location of the wireless communication device while prohibiting the remote source from knowing both the identity and location of the wireless communication device in response to determining the wireless device approves of the remote source; and (b) prohibit the location of the wireless communication device from being known to the remote source in response to determining the wireless device does not approve of the remote source.
 2. The method of claim 1 wherein the step of managing communications between the wireless communications device and the remote source comprises: receiving a request for location information associated with the wireless communication device from the remote source; determining whether the wireless communication device approves of the remote source in response to receiving the request for location information; sending the location information to the remote source in response to determining that the wireless communication device approves of the remote source; and rejecting the request from the remote source in response to determining that the wireless communication device does not approve of the remote source.
 3. The method of claim 2 wherein the remote source is a location privacy manager, the wireless communication device approves of the location privacy manager when the wireless communication device is registered to operate with the location privacy manager, and the wireless communication device does not approve of the location privacy manager when the wireless communication device is not registered to operate with the location privacy manager.
 4. The method of claim 2 wherein the remote source is a location-enabled service, the wireless communication device approves of the location-enabled service when the wireless communication device accepts an identity of the location-enabled service, and the wireless communication device does not approve of the location-enabled service when the wireless communication device does not accept the identity of the location-enabled service.
 5. The method of claim 2 wherein a wireless communication device manages communications between the wireless communications device and the remote source.
 6. The method of claim I wherein the step of managing communications between the wireless communications device and the remote source comprises: receiving a request for location information associated with the wireless communication device from the remote source; determining whether the wireless communication device approves of the remote source in response to receiving the request for location information; sending a request for the location information to the wireless communication device in response to determining that the wireless communication device approves of the remote source; receiving the location information from the wireless communication device in response to sending the request for the location information to the wireless communication device; sending the location information to the remote source in response to receiving the location information from the wireless communication device; and rejecting the request from the remote source in response to determining that the wireless communication device does not approve of the remote source.
 7. The method of claim 6 wherein the remote source is a location privacy manager, the wireless communication device approves of the location privacy manager when the wireless communication device is registered to operate with the location privacy manager, and the wireless communication device does not approve of the location privacy manager when the wireless communication device is not registered to operate with the location privacy manager.
 8. The method of claim 6 wherein the remote source is a location-enabled service, the wireless communication device approves of the location-enabled service when the wireless communication device accepts an identity of the location-enabled service, and the wireless communication device does not approve of the location-enabled service when the wireless communication device does not accept the identity of the location-enabled service.
 9. The method of claim 6 wherein at least a wireless communication network or a location privacy manager manages communications between the wireless communications device and the remote source.
 10. The method of claim 1 wherein the wireless communication device establishes the rules of communication and manages the communication between the wireless communications device and the remote source.
 11. The method of claim 1 wherein a wireless communication network establishes the rules of communication and manages the communication between the wireless communications device and the remote source.
 12. The method of claim 1 wherein a location privacy manager establishes the rules of communication and manages the communication between the wireless communications device and the remote source.
 13. A method, performed by a location privacy manager, comprising: establishing rules of communication between a wireless communication device and a location-enabled service; and managing communications between a wireless communication device and a location-enabled service in response to establishing the rules of communication to: (a) allow the location-enabled service to know either an identity or a location of the wireless communication device while prohibiting the location-enabled service from knowing both the identify and location of the wireless communication device in response to determining the wireless device approves of the location-enabled service; and (b) prohibit the location of the wireless communication device from being known to the location-enabled service in response to determining the wireless device does not approve of the remote source.
 14. A wireless communication network comprising: an antenna for communicating radio frequency signals over a radio frequency communication channel between the wireless communication network and a wireless communication device; a receiver, coupled to the antenna, for receiving the radio frequency signals from the wireless communication device; a transmitter, coupled to the antenna, for transmitting the radio frequency signals to the wireless communication device; a communication switch, coupled to the transmitter and the receiver, for routing information communicated over radio frequency communication channel; a memory device for storing rules of communication between the wireless communication device and a remote source; a location privacy manager interface, coupled to the remote source, for communicating signals between the wireless communication network and the remote source; and a controller, coupled to the communication switch, the memory device and the location privacy manager interface, for managing communications between the wireless communication device and the remote source in response to the rules of communication to: (a) allow the remote source to know either an identity or a location of the wireless communication device while prohibiting the remote source from knowing both the identify and location of the wireless communication device in response to determining the wireless communication device approves of the remote source; and (b) prohibit the location of the wireless communication device from being known to the remote source in response to determining the wireless communication device does not approve of the remote source.
 15. A method for providing privacy management for a wireless communication device, the method comprising the steps of: establishing rules of communication between the wireless communication device and a remote source; and managing communications between the wireless communication device and the remote source to prohibit the remote source from knowing both an identity and a location of the wireless communication device; wherein the rules of communication further comprise: a rule that the wireless communication device shall only communicate with the remote source having an acceptable identity, and wherein the step of managing the communications further comprises the steps of: receiving a request for location information associated with the wireless communication device from the remote source responsive to the remote source being pushed to the wireless communication device by the remote source; determining whether or not an identity of the remote source is acceptable to the wireless communication device responsive to the step of determining that the request is received from the remote source; sending a request for the location information to the wireless communication device responsive to determining that the identity of the remote source is acceptable to the wireless communication device; receiving the location information from the wireless communication device responsive to the step of sending the request; sending the location information to the remote source responsive to the step of receiving the location information; and rejecting the request from the remote source responsive to determining that the identity of the remote source is not acceptable to the wireless communication device.
 16. The method of claim 15 wherein at least a wireless communication network or a location privacy manager provides the privacy management for the wireless communications device.
 17. A method, performed by a location privacy manager, comprising the steps of: establishing rules of communication between a wireless communication device and a location-enabled service; and managing communications between a wireless communication device and a location-enabled service to prohibit the location-enabled service from knowing both an identity and a location of the wireless communication device; wherein the rules of communication further comprise: a rule that the wireless communication device shall only communicate with the location-enabled service having an acceptable identity, and wherein the step of managing the communications further comprises the steps of: receiving a request for location information associated with the wireless communication device from the location-enabled service responsive to the location-enabled service being pushed to the wireless communication device by the location-enabled service; determining whether or not an identity of the location-enabled service is acceptable to the wireless communication device responsive to the step of determining that the request is received from the location-enabled service; sending a request for the location information to the wireless communication device responsive to determining that the identity of the location-enabled service is acceptable to the wireless communication device; receiving the location information from the wireless communication device responsive to the step of sending the request; sending the location information to the location-enabled service responsive to the step of receiving the location information; and rejecting the request from the location-enabled service responsive to determining that the identity of the location-enabled service is not acceptable to the wireless communication device. 