Second party control over mobile device usage

ABSTRACT

A mechanism is provided whereby a parent, or other second party, can monitor and/or control a child&#39;s or other first party&#39;s wireless device usage. An interface can allow the parent to set rules for the child&#39;s usage, and can specify that the parent should receive messages when a call is made to or from the child&#39;s wireless device. In addition to call information, the message may prompt the parent for approval of the call connection. Thus, a parent can decide whether a call that is incoming from or outgoing to a third party should be permitted.

CROSS-REFERENCE TO RELATED APPLICATIONS

The instant application is a continuation of copending U.S. patentapplication Ser. No. 13/285,063, filed on Oct. 31, 2011, which in turnis a continuation of U.S. application Ser. No. 11/610,329, filed on Dec.13, 2006, and issued as U.S. Pat. No. 8,068,825 on Nov. 29, 2011. Eachof the foregoing is hereby incorporated by reference in its entirety.

BACKGROUND

One reason parents may not allow a child to have a mobile device, suchas a cellular telephone, is that the parent has little control over thechild's usage of the device. For example, the parent cannot prevent achild from placing or receiving calls while at school, and cannotprevent the child from calling or being called by a particular party. Inaddition, a parent has no ability to know when a child is using thedevice or the types of conversations the child is having. As a result,some parents do not allow their children to have a mobile device, orresign themselves to not being able to control their child's use of thedevice.

There is a need in the industry to provide a practical solution thatallows providing a mobile device to a first party by a second partywhile retaining some control by the second party over the first party'sdevice usage.

SUMMARY

Such issues can be addressed by providing a mechanism that enables aparent, or other second party, to monitor and even control, in realtime, a child's or other first party's mobile device usage. An interfacecan allow the parent to set rules for the child's usage, and can specifythat the parent should receive messages when a communication is madeinvolving the child's mobile device. In addition to providinginformation describing a communication, the message may prompt theparent for approval of the communication connection. Thus, a parent candecide whether a communication that is incoming from or outgoing to athird party should be permitted. Other advantages and features of theinvention are described below.

BRIEF DESCRIPTION OF THE DRAWINGS

The systems, methods, and computer readable media associated with secondparty control over wireless device usage are further described withreference to the accompanying drawings in which:

FIG. 1 illustrates a network 120 as may transmit communications betweena first party mobile device 122 and a third party device 127. Suchcommunications may be prohibited, screened, copied, and/or permitted bya verification server 130 according to rules established via a web site140 that is supported by settings server 100. If a communication isscreened, an approval request may be sent to a second party mobiledevice 125 prior to allowing or terminating the communication between122 and 127.

FIG. 2 illustrates methods for prohibiting, screening, copying, orpermitting a communication in accordance with second party rules.

FIG. 3 illustrates an exemplary web site for establishing second partyrules.

FIG. 4 illustrates an exemplary web site for establishing a variety ofsettings associated with second party rules.

FIG. 5 illustrates a general operating environment for a mobile device.

DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS

Certain specific details are set forth in the following description andfigures to provide a thorough understanding of various embodiments ofthe invention. Certain well-known details often associated withcomputing and software technology are not set forth in the followingdisclosure, however, to avoid unnecessarily obscuring the variousembodiments of the invention. Further, those of ordinary skill in therelevant art will understand that they can practice other embodiments ofthe invention without one or more of the details described below.Finally, while various methods are described with reference to steps andsequences in the following disclosure, the description as such is forproviding a clear implementation of embodiments of the invention, andthe steps and sequences of steps should not be taken as required topractice this invention.

FIG. 1 illustrates a network 120 as may transmit communications betweena first party mobile device 122 and a third party device 127. Suchcommunications may be prohibited, screened, copied, or permitted by averification server 130 according to rules established via a web site140 that is supported by settings server 100. If a communication isscreened, an approval request may be sent to a second party mobiledevice 125 prior to allowing or terminating the communication between122 and 127.

Mobile devices 122 and 125 may be any of a wide variety of such devices,such as cell phones, Personal Digital Assistant (PDA) type devices, andthe like. In one embodiment, mobile devices 122 and 125 are bothsupported by a same network provider and associated with a same customeraccount. First party mobile device 122 may be, for example a child'smobile device under a same billing plan as a parent's mobile device 125.

The child and parent are referred to herein as “first party” and “secondparty,” respectively, to emphasize that a parent/child relationship isnot required by the invention. The parent/child relationship is onesituation in which a second party is responsible for managing a customerrelationship with a network provider, and wherein the customerrelationship encompasses a plurality of mobile devices. This arrangementprovides a convenient setting in which to implement the invention,because a customer managing an account presumably has authority tocontrol communications involving mobile devices serviced under hisaccount, and because the network provider knows of, and can controlcommunications to, all of the various mobile devices under the customeraccount.

The second party can be given access to website 140 while others inpossession of mobile devices under the same account may not necessarilyknow about or have access to the website 140. The second party ispresumably entitled to control communications by the various devices inhis account, and is likewise entitled to information regardingcommunications made by such devices. In fact, situations may arise inwhich a single party has multiple devices for personal use and wishes tomanage communications to one or more such devices. In situationsinvolving multiple parties, however, some care may be required to complywith relevant law protecting the privacy of the various parties.

Third party device 127 may be any device capable of sendingcommunications to first device 122 via network 120. For example, thirdparty device 127 may be a landline telephone operated by a friend of thechild associated with first party device 122. In this situation, thirdparty device 127 may initially send communications across acircuit-switched network. Such communications are subsequently deliveredto cellular network 120, which manages delivery of the communication tofirst party device 122. Third party device 127 may also be a cell phoneassociated with a network provider that operates network 120, or a cellphone associated with another network provider as will be appreciated.

The verification server 130 may comprise a wide variety of electroniccomponents as may be used in various embodiments of the invention.Verification server 130 may be coupled to network 120 in a wide varietyof possible configurations. Verification server 130 may use any secondparty rules for determining whether a communication should beprohibited, screened, copied, or permitted. For example, a rule maystate that a call initiated from an identified third party isprohibited. Verification server 130 detects that a call from a thirdparty device 127 is prohibited, and terminates the call prior toconnecting it to first party device 127.

The settings server 100 may similarly comprise a wide variety ofelectronic components as will be appreciated, and may be coupled to theinternet 110 as well as verification server 130 in a wide variety ofpossible configurations. The settings server 100 may act as an interfacebetween the web site 140 accessible by the second party, and theverification server 130. Embodiments in which verification server 130and settings server 100 are the same server are also possible. Thesettings server 100 provides an interface—illustrated above as a website 140, but it may be a dial-in service, or other human interface—thatenables the second party to set, modify and delete rules that may beused to determine whether a particular communication involving the firstparty device 122 will be prohibited, screened, copied, or permitted.

If a rule states that a particular communication is to be screened, thenan approval request may be sent to the second party mobile device 125when such communication is attempted. For example, if a text message isattempted from third party device 127 to first party device 122, and arule established via website requires screening of such communications,then an approval request can be sent to second party device 125. Thesecond party may allow or deny the communication by responding to theapproval request.

For example, if the request is denied, a response may be sent back toverification server 130. The verification server 130 may then terminatethe communication, e.g., by not sending the text message to first partydevice. If a rule states that a particular communication is to bepermitted, then the communication can be allowed without requestingapproval from the second party device 125.

FIG. 2 illustrates a method comprising receiving second party rules fora device via a website 200, and subsequently applying such rules. First,a communication to or from a mobile device can be detected 201. The term“communication” is used herein to refer to any of a wide variety ofcommunication types that may be used on today's mobile devices.Prevalent examples are telephone calls, emails, instant messages, andtext messages.

In one embodiment, a communication may be detected 201 by maintaining,by a network provider, a list of devices that are subject to secondparty rules. All calls on the network can be checked against the list todetermine whether they are subject to second party rules. In anotherembodiment, data may be stored on a device-by-device basis thatidentifies a particular device as subject to second-party rules. If aparticular device is indicated as subject to rules, communications tosuch a device may be checked by a verifications server for rulescompliance prior to allowing them.

Second party rules are consulted to determine if the communication isprohibited, screened, copied, or permitted 202. Embodiments mayimplement one or more of prohibiting, screening, copying, andpermitting—it is not required that rules be extant that fall into eachcategory. For example, only one rule that prohibits certain calls may beset. In another embodiment, the one rule prohibiting calls may beoverridden, e.g., during certain times of day, by another rulepermitting calls. In a still further embodiment, calls may be generallyprohibited, but permitted during one part of the day and screened duringanother part of the day. It should be appreciated that rules forprohibiting, screening, copying, and permitting may be mixed and matchedin a wide variety of configurations.

A communication may be terminated if it is prohibited under the secondparty rules 203. In this case, as in all cases where a communication isterminated, the party attempting the communication, i.e., either thefirst party or the third party, may be notified that the communicationwas terminated 204 as a courtesy. It may be beneficial to also provideadditional information, such as suggestions regarding a time of day whensuch communications may be allowed.

Conversely, a communication may be immediately allowed 205A if thesecond party rules indicated that it is allowed. If the communication isallowed but subject to being copied, then a communication recordingcomponent may copy the communication 205B as it occurs. For example, inthe case of a call, a voice recording may be made and stored, along withcall information such as originating telephone number, time of day andso forth, for review by the second party. In the case of a text message,the text to be copied along with affiliated metadata. Those involved inthe communication may be notified of the copying 205C so as to complywith relevant law and custom as necessary.

If second party rules indicate a communication is subject to beingscreened, then in one embodiment the initiator of the communication maybe notified of the screening 206. For example, a message may play askingthe initiator to please wait while approval is requested. Screening maytake additional time and therefore notification is advantageous.Alternatively, the initiator may simply hear additional “rings” or holdmusic or the like while waiting for approval.

In a further embodiment, screening may be accomplished by terminating ordelaying a communication, then notifying the initiator when approval isreceived. In the case of a call, the initiator may simply redial, or theapproval can automatically cause both first party and third partydevices to ring. In the case of a text message, the message may bedelayed indefinitely pending approval, then sent when approval isreceived.

To screen a call, an approval request is send to a second party mobiledevice 207. The approval request may be an IM-type message, a textmessage, or a script that enables the parent to respond in at least ayes/no manner.

Any type of information may be sent to the second party mobile device toaid in the determination of whether the communication should bepermitted. For example, caller identification (caller ID) informationregarding the third party may be sent along with the approval request.Address book information (if present) from the first party wirelessdevice for the third party can also be leveraged. For example, a child'scell phone may identify a name of a third party involved in thecommunication, which can be helpful for the parent to make an approvaldetermination. The address book information may be retrieved from thechild's wireless device as needed, or may be mirrored in a networklocation. In another embodiment, a voice or name recording may beforwarded to the second party mobile device.

If the second party approves a communication, an approval is sent to theverification server by the second party mobile device. When the approvalis received at the verification server 210, the communication may besubsequently allowed.

If the second party denies a communication, a denial is sent to theverification server by the second party mobile device. When the denialis received at the verification server 208, the communication may besubsequently terminated, and the initiator of the communication—eitherthe first party or the third party—may be notified 209.

A default rule may also be utilized in situations where immediateapproval or denial is not available for a communication subject toapproval. The default rule may specify, for example, that if an approvalor a denial is not received within 15 seconds of sending the approvalrequest, then the communication should be allowed 214.

Conversely, the default rule may specify that if an approval or a denialis not received within 15 seconds of sending the approval request, thenthe communication should be terminated. The communication is terminated212 and the initiator is notified as necessary 213.

Finally, a notification step 215 is provided in FIG. 2 which may beperformed independently of the various other steps in the exemplarymethod. In addition to receiving any approval requests for screenedcalls as specified in one or more second party rules, a second party mayelect to receive notifications of communications made to the first partymobile device. This way the second party, e.g., a parent, knows when andwith whom communications are made by the first party, withoutinterfering by approving or denying communications. Alternatively, thesecond party may elect to periodically receive a summary notificationthat summarizes first party usage. A notification may conveniently be inthe form of an IM type message or a text message.

FIGS. 3 and 4 illustrate a view of a browser 330 interface as may bedisplayed on a display surface 329 coupled to a client computer that isappropriately configured to communicate with a settings server. Thebrowser 330 may point to one or more web pages, e.g. 300 and 400, whichallow a second party to set second party rules and settings.

Referring to FIG. 3, a rules webpage 300 may identify a first partydevice by a telephone number 311, and may identify a second party deviceby a telephone number 312. A variety of rules 313-321 may be selectedfor use by the second party, if desired. Rules may be to the secondparty in a wide variety of ways, and the specific approach illustratedin FIG. 3 should be considered exemplary only.

A rule 313 may be supplied that allows the second party to prohibitcommunications involving the first party device during a specified timeof day. A variety of selectable aspects 313 a-313 d may be provided toallow custom tailoring of the rule 313. A first customizable aspect 313a may allow the second party to select whether communications will beprohibited from the first party device, to the first party device, or toand from the first party device. By clicking on 313 a the second partyis presented with a list comprising “to,” “from,” and “to and from.”

Further customizable aspects may comprise a component 313 b to select orenter a start time, a box 313 c to select or enter an end time, and acomponent 313 d to select or enter days of the week to which the ruleapplies, for example, “Monday,” “All Days,” “Weekdays,” or “Weekends.”

Another rule 314 may be supplied that allows the second party to screencommunications involving the first party device during a specified timeof day. A variety of selectable aspects 314 a-314 d may be provided toallow custom tailoring of the rule 314, with similar options asdescribed above.

Another rule 315 may be supplied that allows the second party to permitcalls anytime if they involve a pre-approved third party telephonenumber. A component 315 a may indicate the involvement properties of thepre-approved number(s). Another component 315 b may allow the secondparty to enter one or more pre-approved telephone numbers.

Another rule 316 may be supplied that allows the second party toprohibit calls anytime if they involve a banned third party telephonenumber. A component 316 a may indicate the involvement properties of thebanned number(s). Another component 316 b may allow the second party toenter one or more banned telephone numbers.

Another rule 317 may be supplied that allows the second party to screencalls anytime if they involve a screened third party telephone number. Acomponent 317 a may indicate the involvement properties of the screenednumber(s). Another component 317 b may allow the second party to enterone or more banned telephone numbers.

Another rule 318 may be supplied that allows the second party to screen(and/or prohibit, if desired) calls if they will incur additionalcharges. A component 318 a may indicate the involvement properties ofthe screened number(s). Components 318 b, 318 c, and 318 d may indicatewhat types of charges should be screened. For example, any calls inexcess of a predetermined usage time entered into component 318 b may besubject to screening. International calls, long distance calls, out ofnetwork calls, daytime calls, extra toll calls, any call incurringcharges, and the like may be screened via components such as 318 c and318 d.

Rules may be applied to particular communication types via rules such as319. For example, text messages may be universally allowed, universallyprohibited, universally screened and so forth. Text messages may besimply treated the same as calls. Any number of special rules that applyto only certain communication types may be advantageous.

A rule regarding notifications may be set, e.g. 321. Furthernotification rules may allow a second party to elect to receive acommunications summary rather than real-time communicationnotifications.

A default rule 321 may allow the second party to prohibit or permitcommunications when no approval is available, for example if the secondparty device is turned off, not in communication with the network, or ifa predetermined amount of time passes without receiving any response.The choice to prohibit or permit in this situation may be selected via acomponent such as 321 a.

Referring to FIG. 4, a number of additional rules may be set by thesecond party via a webpage 400. The rules on webpage 400 may becategorized as settings or preferences. For example, a second party mayelect whether to notify the initiator when a communication is screened413. A second party may elect the type of information they prefer toreceive in notifications and approval requests 414, for example byselecting “caller ID,” “address book,” “voice ID” or the like from acomponent 414 configured to present such options.

In one embodiment, a second party may elect to keep a communication log415 that summarizes all communications involving the first party device.The communication log may be accessible via the web. The second partymay also elect to receive a periodic communication log 416, and torecord communications involving the first party device 417. Selectiverecording of particular communication types or communications involvingparticular third parties, or communications during certain specifiedtimes of day may also be implemented. An involvement property forcommunications to record can be set via component 417 a, as can specificthird party numbers 417 b that the second party may desire to monitor.As illustrated, an “all numbers” option may also be made available.

A rule may require retaining text of text messages 418. Once again, aninvolvement property may be set via a component such as 418 a andtargeted third party numbers may be entered via 418 b.

Some calls may be permitted at all times, regardless of the second partypreference. For example, even if a parent desires to screen all calls, achild's mobile device could permit a direct, unscreened connection for a911 call.

Embodiments of rules selections such as 313-321 and 413-418 may allowseparate sets of rules for incoming as opposed to outgoing calls, or therules for both types of calls may be the same.

FIG. 5 is directed to the general operating environment of a mobiledevice as provided herein. Terms such as “cellular communications”should be generally understood by those of skill in the art, and shouldbe distinguished from other forms of wireless communications such asthose based on the 802.11 protocols. FIG. 5 generally illustrates acellular communications operating environment. The invention and theterm cellular communications are not limited to any specific aspects ofFIG. 5, but should rather be understood to operate in and refer to(respectively) operating environments such as the general type ofoperating environment illustrated in FIG. 5.

The global system for mobile communication (“GSM”) is one of the mostwidely utilized cellular communications systems in today's fast growingtelecommunication systems. GSM provides circuit-switched data servicesto subscribers, such as mobile telephone or computer users. GeneralPacket Radio Service (“GPRS”), which is an extension to GSM technology,introduces packet switching to GSM networks. GPRS uses a packet-basedwireless communication technology to transfer high and low speed dataand signaling in an efficient manner. GPRS optimizes the use of networkand radio resources, thus enabling the cost effective and efficient useof GSM network resources for packet mode applications.

As one of ordinary skill in the art can appreciate, the exemplaryGSM/GPRS environment and services described herein can also be extendedto 3G services, such as Universal Mobile Telephone System (“UMTS”),Frequency Division Duplexing (“FDD”) and Time Division Duplexing(“TDD”), High-Speed Downlink Packet Access (“HSDPA”), High-Speed UplinkPacket Access (“HSUPA”), cdma2000 1× Evolution Data Optimized (“EVDO”),Code Division Multiple Access-2000 (“cdma2000 3×”), Time DivisionSynchronous Code Division Multiple Access (“TD-SCDMA”), Wideband CodeDivision Multiple Access (“WCDMA”), Enhanced Data GSM Environment(“EDGE”), International Mobile Telecommunications-2000 (“IMT-2000”),Digital Enhanced Cordless Telecommunications (“DECT”), etc., as well asto other network services that shall become available in time. In thisregard, the techniques of the invention may be applied independently ofthe method of data transport, and does not depend on any particularnetwork architecture, or underlying protocols.

FIG. 5 shows another exemplary block diagram view of a GSM/GPRS/IPmultimedia network architecture 500 in which the apparatus and methodsfor service delivery based on priority level and/or revenue impact ofthe present invention may be incorporated. As illustrated, architecture500 of FIG. 5 includes a GSM core network 501, a GPRS network 530 and anIP multimedia network 538. The GSM core network 501 includes a MobileStation (MS) 502, at least one Base Transceiver Station (BTS) 504 and aBase Station Controller (BSC) 506. The MS 502 is physical equipment orMobile Equipment (ME), such as a mobile phone or a laptop computer thatis used by mobile subscribers, with a Subscriber identity Module (SIM).The SIM includes an International Mobile Subscriber Identity (IMSI),which is a unique identifier of a subscriber. The BTS 504 is physicalequipment, such as a radio tower, that enables a radio interface tocommunicate with the MS. Each BTS may serve more than one MS. The BSC506 manages radio resources, including the BTS. The BSC may be connectedto several BTSs. The BSC and BTS components, in combination, aregenerally referred to as a base station (BSS) or radio access network(RAN) 503.

The GSM core network 501 also includes a Mobile Switching Center (MSC)508, a Gateway Mobile Switching Center (GMSC) 510, a Home LocationRegister (HLR) 512, Visitor Location Register (VLR) 514, anAuthentication Center (AuC) 518, and an Equipment Identity Register(EIR) 516. The MSC 508 performs a switching function for the network.The MSC also performs other functions, such as registration,authentication, location updating, handovers, and call routing. The GMSC510 provides a gateway between the GSM network and other networks, suchas an Integrated Services Digital Network (ISDN) or Public SwitchedTelephone Networks (PSTNs) 520. In other words, the GMSC 510 providesinterconnecting functionality with external networks.

The HLR 512 is a database that contains administrative informationregarding each subscriber registered in a corresponding GSM network. TheHLR 512 also contains the current location of each MS. The VLR 514 is adatabase that contains selected administrative information from the HLR512. The VLR contains information necessary for call control andprovision of subscribed services for each MS currently located in ageographical area controlled by the VLR. The HLR 512 and the VLR 514,together with the MSC 508, provide the call routing and roamingcapabilities of GSM. The AuC 516 provides the parameters needed forauthentication and encryption functions. Such parameters allowverification of a subscriber's identity. The EIR 518 storessecurity-sensitive information about the mobile equipment.

A Short Message Service Center (SMSC) 509 allows one-to-one ShortMessage Service (SMS) messages to be sent to/from the MS 502. A PushProxy Gateway (PPG) 511 is used to “push” (i.e., send without asynchronous request) content to the MS 502. The PPG 511 acts as a proxybetween wired and wireless networks to facilitate pushing of data to theMS 502. A Short Message Peer to Peer (SMPP) protocol router 513 isprovided to convert SMS-based SMPP messages to cell broadcast messages.SMPP is a protocol for exchanging SMS messages between SMS peer entitiessuch as short message service centers. It is often used to allow thirdparties, e.g., content suppliers such as news organizations, to submitbulk messages.

To gain access to GSM services, such as speech, data, and short messageservice (SMS), the MS first registers with the network to indicate itscurrent location by performing a location update and IMSI attachprocedure. The MS 502 sends a location update including its currentlocation information to the MSC/VLR, via the BTS 504 and the BSC 506.The location information is then sent to the MS's HLR. The HLR isupdated with the location information received from the MSC/VLR. Thelocation update also is performed when the MS moves to a new locationarea. Typically, the location update is periodically performed to updatethe database as location updating events occur.

The GPRS network 530 is logically implemented on the GSM core networkarchitecture by introducing two packet-switching network nodes, aserving GPRS support node (SGSN) 532, a cell broadcast and a GatewayGPRS support node (GGSN) 534. The SGSN 532 is at the same hierarchicallevel as the MSC 508 in the GSM network. The SGSN controls theconnection between the GPRS network and the MS 502. The SGSN also keepstrack of individual MS's locations and security functions and accesscontrols.

A Cell Broadcast Center (CBC) 533 communicates cell broadcast messagesthat are typically delivered to multiple users in a specified area. CellBroadcast is one-to-many geographically focused service. It enablesmessages to be communicated to multiple mobile phone customers who arelocated within a given part of its network coverage area at the time themessage is broadcast.

The GGSN 534 provides a gateway between the GPRS network and a publicpacket network (PDN) or other IP networks 536. That is, the GGSNprovides interconnecting functionality with external networks, and setsup a logical link to the MS through the SGSN. When packet-switched dataleaves the GPRS network, it is transferred to an external TCP-IP network536, such as an X.25 network or the Internet. In order to access GPRSservices, the MS first attaches itself to the GPRS network by performingan attach procedure. The MS then activates a packet data protocol (PDP)context, thus activating a packet communication session between the MS,the SGSN, and the GGSN.

In a GSM/GPRS network, GPRS services and GSM services can be used inparallel. The MS can operate in one three classes: class A, class B, andclass C. A class A MS can attach to the network for both GPRS servicesand GSM services simultaneously. A class A MS also supports simultaneousoperation of GPRS services and GSM services. For example, class Amobiles can receive GSM voice/data/SMS calls and GPRS data calls at thesame time.

A class B MS can attach to the network for both GPRS services and GSMservices simultaneously. However, a class B MS does not supportsimultaneous operation of the GPRS services and GSM services. That is, aclass B MS can only use one of the two services at a given time.

A class C MS can attach for only one of the GPRS services and GSMservices at a time. Simultaneous attachment and operation of GPRSservices and GSM services is not possible with a class C MS.

A GPRS network 530 can be designed to operate in three network operationmodes (NOM1, NOM2 and NOM3). A network operation mode of a GPRS networkis indicated by a parameter in system information messages transmittedwithin a cell. The system information messages dictates a MS where tolisten for paging messages and how signal towards the network. Thenetwork operation mode represents the capabilities of the GPRS network.In a NOM1 network, a MS can receive pages from a circuit switched domain(voice call) when engaged in a data call. The MS can suspend the datacall or take both simultaneously, depending on the ability of the MS. Ina NOM2 network, a MS may not receive pages from a circuit switcheddomain when engaged in a data call, since the MS is receiving data andis not listening to a paging channel In a NOM3 network, a MS can monitorpages for a circuit switched network while received data and vice versa.

The IP multimedia network 538 was introduced with 3GPP Release 5, andincludes an IP multimedia subsystem (IMS) 540 to provide rich multimediaservices to end users. A representative set of the network entitieswithin the IMS 540 are a call/session control function (CSCF), a mediagateway control function (MGCF) 546, a media gateway (MGW) 548, and amaster subscriber database, called a home subscriber server (HSS) 550.The HSS 550 may be common to the GSM network 501, the GPRS network 530as well as the IP multimedia network 538.

The IP multimedia system 540 is built around the call/session controlfunction, of which there are three types: an interrogating CSCF (I-CSCF)543, a proxy CSCF (P-CSCF) 542, and a serving CSCF (S-CSCF) 544. TheP-CSCF 542 is the MS's first point of contact with the IMS 540. TheP-CSCF 542 forwards session initiation protocol (SIP) messages receivedfrom the MS to an SIP server in a home network (and vice versa) of theMS. The P-CSCF 542 may also modify an outgoing request according to aset of rules defined by the network operator (for example, addressanalysis and potential modification).

The I-CSCF 543 forms an entrance to a home network and hides the innertopology of the home network from other networks and providesflexibility for selecting an S-CSCF. The I-CSCF 543 may contact asubscriber location function (SLF) 545 to determine which HSS 550 to usefor the particular subscriber, if multiple HSS's 550 are present. TheS-CSCF 544 performs the session control services for the MS 502. Thisincludes routing originating sessions to external networks and routingterminating sessions to visited networks. The S-CSCF 544 also decideswhether an application server (AS) 552 is required to receiveinformation on an incoming SIP session request to ensure appropriateservice handling. This decision is based on information received fromthe HSS 550 (or other sources, such as an application server 552). TheAS 552 also communicates to a location server 556 (e.g., a GatewayMobile Location Center (GMLC)) that provides a position (e.g.,latitude/longitude coordinates) of the MS 502.

The HSS 550 contains a subscriber profile and keeps track of which corenetwork node is currently handling the subscriber. It also supportssubscriber authentication and authorization functions (AAA). In networkswith more than one HSS 550, a subscriber location function providesinformation on the HSS 550 that contains the profile of a givensubscriber.

The MGCF 546 provides interworking functionality between SIP sessioncontrol signaling from the IMS 540 and ISUP/BICC call control signalingfrom the external GSTN networks (not shown). It also controls the mediagateway (MGW) 548 that provides user-plane interworking functionality(e.g., converting between AMR- and PCM-coded voice). The MGW 548 alsocommunicates with other IP multimedia networks 554.

Push to Talk over Cellular (PoC) capable mobile phones register with thewireless network when the phones are in a predefined area (e.g., jobsite, etc.). When the mobile phones leave the area, they register withthe network in their new location as being outside the predefined area.This registration, however, does not indicate the actual physicallocation of the mobile phones outside the pre-defined area.

While the present invention has been described in connection with thepreferred embodiments of the various Figures, it is to be understoodthat other similar embodiments may be used or modifications andadditions may be made to the described embodiment for performing thesame function of the present invention without deviating therefrom. Forexample, one skilled in the art will recognize that the presentinvention as described in the present application may apply to anynumber of devices connected via a communications network and interactingacross the network. Therefore, the present invention should not belimited to any single embodiment, but rather should be construed inbreadth and scope in accordance with the appended claims.

What is claimed is:
 1. A method comprising: detecting, on a firstdevice, an indication of a communication from a sender mobile device,the communication identifying a recipient mobile device as an intendedrecipient; transmitting, to the sender mobile device, a notificationindicating that the communication is subject to approval; prior to thecommunication being transmitted to the recipient mobile device,transmitting, to a second device, a request to approve transmission ofthe communication; and receiving a response to the request from thesecond device.
 2. The method of claim 1, further comprising: determiningthat the response indicates that the request has been denied; andterminating the communication between the sender mobile device and therecipient mobile device.
 3. The method of claim 2, further comprising:transmitting a notification that the communication is terminated to thesender mobile device.
 4. The method of claim 2, further comprising:transmitting a notification that the communication is terminated to thesecond device.
 5. The method of claim 1, further comprising: determiningthat the response indicates that the request has been approved; andcausing the communication to be transmitted to the recipient mobiledevice.
 6. The method of claim 1, further comprising: generating a copyof the communication, wherein the request to approve comprises the copy.7. The method of claim 1, wherein the request identifies the sendermobile device.
 8. A first device comprising: a processor; and memorystoring instructions that cause the processor to effectuate operations,the operations comprising: detecting a communication from a senderdevice, the communication identifying a recipient device as an intendedrecipient; transmitting, to the sender device, a notification indicatingthat the communication is subject to approval; prior to thecommunication being transmitted to the recipient device, transmitting,to a second device, a request to approve transmission of thecommunication; and receiving a response to the request from the seconddevice.
 9. The first device of claim 8, the operations furthercomprising: determining that the response indicates that the request hasbeen denied; and terminating the communication between the sender deviceand the recipient device.
 10. The first device of claim 8, theoperations further comprising determining that the communicating issubject to the approval based on a type of the communication.
 11. Thefirst device of claim 8, the operations further comprising determiningthat the communicating is subject to the approval based on an identityof the intended recipient.
 12. The first device of claim 8, theoperations further comprising determining that the communicating issubject to the approval based on time of day the communication wasdetected.
 13. The first device of claim 8, the operations furthercomprising determining that the communicating is subject to the approvalbased on additional charges associated with the communication.
 14. Anon-transitory computer-readable storage medium storing instructionsthat cause a processor to effectuate operations, the operationscomprising: detecting a communication from a sender device, thecommunication identifying a recipient device as an intended recipient;transmitting, to the sender device, a notification indicating that thecommunication is subject to approval; prior to the communication beingtransmitted to the recipient device, transmitting, to a second device, arequest to approve transmission of the communication; and receiving aresponse to the request from the second device.
 15. The non-transitorycomputer-readable storage medium of claim 14, the operations furthercomprising determining that the response indicates that the request hasbeen denied; and terminating the communication between the sender deviceand the recipient device.
 16. The non-transitory computer-readablestorage medium of claim 14, the operations further comprising:determining that the response indicates that the request has beendenied; and transmitting a notification based on the response to atleast one of the sender device or the second device.
 17. Thenon-transitory computer-readable storage medium of claim 14, theoperations further comprising: determining that the communicating issubject to the approval based on a type of the communication.
 18. Thenon-transitory computer-readable storage medium of claim 14, theoperations further comprising: determining that the communicating issubject to the approval based a time of day associated withcommunication.
 19. The non-transitory computer-readable storage mediumof claim 14, the operations further comprising: determining that thecommunicating is subject to the approval based on an identity of thesender device.
 20. The non-transitory computer-readable storage mediumof claim 14, the operations further comprising: determining that thecommunicating is subject to the approval based on the communicationbeing associated with additional charges.