Providing geographic locations of a user&#39;s wireless device

ABSTRACT

A method, system, and medium are provided for determining the identity of a user associated with a wireless device located near a geographic location at a specific time. In response to the occurrence of an event at a geographic location, a request can be issued by a wireless provider to users of wireless devices to provide the geographic locations of their respective devices and their identities to one or more entities. Upon receiving an affirmative response to the request, the wireless provider communicates information to the entities allowing the entities to contact the users to solicit information regarding the occurrence of the event. A wireless provider may send a request for authorization to users of wireless devices to provide geographic locations when the wireless device enters a predefined geographic area.

PRIORITY

This application is a divisional of U.S. patent application Ser. No.12/142,655, entitled “Providing Geographic Location of a User's WirelessDevice,” filed 19 Jun. 2008, which is hereby incorporated by referencein its entirety.

BACKGROUND

Wireless devices are often able to provide geographic locations to thirdparties. To generate geographic locations, a variety of methods can beemployed, both by the wireless device and a wireless service provider.Common to all of them is the ability to provide the geographic locationof a wireless device with some degree of accuracy. These geographiclocations can be employed by third parties to provide services such asadvertisements to a user of the wireless device.

SUMMARY

The invention is defined by the claims below. A high-level overview ofembodiments of the invention are provided here for that reason, toprovide an overview of the disclosure.

In a first embodiment, a method for determining the identity of a userassociated with a wireless device located near a geographic location ata specific time is provided. The method comprises receiving anauthorization from users to have geographic locations associated withtheir wireless devices made available to entities. In response to theoccurrence of an event at a specific location, a request is receivedfrom the entities for the identity of users of wireless devices. A listof users of wireless devices located within a predefined distance from aspecific location within a period of time is generated. This listincludes identifying information for each of the users.

In a second embodiment, a method is provided in a computer system forproviding geographic locations of a wireless device associated with auser to entities. The method comprises communicating a request forauthorization to provide geographic locations of the wireless device inresponse to the occurrence of an event. A response is received to therequest for authorization from a user of the wireless device. When anaffirmative response is received to the request for authorization,geographic locations is provided to entities.

In a third embodiment, computer-readable media with computer executableinstructions are provided for performing a method for disclosing toentities the identity of users of associated wireless devices locatedwithin a geographic boundary. In response to the occurrence of an eventat a geographic location, a request is received from entities for theidentity of users of associated wireless devices located within ageographic boundary, wherein the geographic boundary includes thegeographic location of the occurrence of the event. The request isreceived by a wireless service provider. The identity of wirelessdevices located within the geographic boundary is determined by thewireless service provider. The identity of the wireless devices andassociated users is disclosed to entities by the wireless serviceprovider when the associated users have previously consented to thedisclosure of geographic locations.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

Illustrative embodiments of the invention are described in detail belowwith reference to the attached drawing figures, which are incorporatedby reference herein and wherein:

FIG. 1 depicts a wireless network system, in accordance with anembodiment of the invention;

FIG. 2A depicts a map of the position of wireless devices, according toone embodiment of the invention;

FIG. 2B depicts a map of a geographic radius from the occurrence of anevent, according to an embodiment of the invention;

FIG. 2C depicts a map of a geographic boundary and the position ofwireless devices, in accordance with an embodiment of the invention;

FIG. 3 depicts an exemplary screen shot of a user interface on awireless device, in accordance with an embodiment of the invention;

FIG. 4 depicts a flow diagram for a method of determining the identityof a user associated with a wireless device, according to one embodimentof the invention;

FIG. 5 depicts a flow diagram for a method for providing geographiclocations of a wireless device associated with a user, in accordancewith an embodiment of the invention; and

FIG. 6 depicts a flow diagram for a method for disclosing the identityof users of associated wireless devices located within a predefinedgeographic boundary, according to an embodiment of the invention.

DETAILED DESCRIPTION

Embodiments of the invention provide methods for determining theidentity of a user associated with a wireless device located near ageographic location at a specific time. Other embodiments of theinvention provide systems for providing geographic locations of awireless device associated with a user. Alternative embodiments of theinvention provide computer-readable media for performing a method fordisclosing the identity of users of associated wireless devices locatedwithin a predefined geographic boundary.

Embodiments of the invention may include, among other things: a method,system, or computer-program product. Accordingly, the embodimentsinclude a hardware embodiment, a software embodiment, or a combinationof software and hardware. In one embodiment, the invention takes theform of a computer-program product that includes computer-useableinstructions executed or stored on computer-readable media.

Computer-readable media include both volatile and nonvolatile media,removable and nonremovable media, and contemplates media readable by adatabase, a switch, and various other network devices. By way ofexample, and not limitation, computer-readable media comprise mediaimplemented in any method or technology for storing information.Examples of stored information include computer-useable instructions,data structures, program modules, and other data representations. Mediaexamples include, but are not limited to, information-delivery media,RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM,digital versatile discs (DVD), holographic media or other optical discstorage, magnetic cassettes, magnetic tape, magnetic disk storage, andother magnetic storage devices. These technologies can store datamomentarily, temporarily, or permanently.

Turning now to FIG. 1, a depiction of a wireless network system 100 ispresented, in accordance with an embodiment of the invention. Thewireless network system 100 includes network 102, which may be any typeof network known in the art, such as, but not limited to, the Internet,an intranet, a local area network (LAN), or a wide area network (WAN).As such networks are well known in the art, no further description willbe provided. Base stations 104 and 106 are communicatively connected tothe wireless provider 108 and provide for the communication between thewireless devices 110 and 112 and the wireless provider 108 and, in turn,the network 102. Wireless provider 108 can be any wireless serviceprovider that provides wireless communication services to users ofwireless devices 110 and 112. Wireless devices 110 and 112 may bedefined as cell phones, smart phones, PDAs, or any other computingdevice that is capable of wireless communication. This definitionincludes laptop computers that have wireless communication capabilities.

While only two base stations 104 and 106 and two wireless devices 110and 112 are depicted, it should be understood that a multitude of basestations 104 and 106 and wireless devices 110 and 112 may be utilizedaccording to embodiments of the invention. The simplified depiction inFIG. 1 is provided to aide in the understanding of the concepts ofembodiments of the invention and is not intended to limit the wirelessnetwork system 100.

Wireless device 112 includes an input component 118, an output component120, a processor component 122, a wireless input/output (I/O) component124, and a storage component 126. Wireless device 110 contains the sameor similar components. Input component 118 provides for the input ofinformation in the wireless device 112. Input component 118 may be akeypad, keyboard, microphone, selection device, mouse, track ball, orany other device that provides for the input of information into thewireless device. While two wireless devices 110 and 112 are depicted inFIG. 1, further description will only reference wireless device 112 forthe sake of clarity.

Output component 120 provides for the output of information from thewireless device 112. The output component 120 is for the output ofvisual, audible, vibratory, or other forms of information. Visual formsof the output component 120 can take the form of an LCD display, plasmadisplay, or any other display method that provides for the presentationof visual information to a user of the wireless device 112.

Processor component 122 provides computer processing functionality forthe wireless device 112. Processor component 122 serves to control thefunctioning of the wireless device 112 and the functioning of thecomponents of wireless device 112.

Storage component 126 provides for the storage of information on thewireless device 112. Storage component 126 can be a hard disk drive,differing types of computer memory, or any other suitable computerstorage media. Common to all types of storage components 126 is theability to store computer executable instructions.

Wireless I/O component 124 provides for the communication of wirelessdevice 112 with the wireless provider 108 through base stations 104 and106, and, in turn, the network 102. Wireless I/O component 124 can takemany forms, such as a receiver and transmitting module for the receptionof radio frequency waves and generation of the same. Common to all formsof wireless I/O components 124 is the ability to send and receivecommunications wirelessly.

Turning now to FIG. 2, a depiction of a map showing the position ofwireless devices is provided. Generally, FIG. 2 provides a typicalstreet map overlaid with the position of wireless devices 204 and 206,each denoted by an “X” symbol.

The “X” symbol 202 represents the specific geographic location of anoccurrence of an event. This event can be any number of events,including, for example, the commission of a crime, an accident, childabduction, an alleged crime, a prank, or any other type of event. Thegeographic boundary 205 represents a geographic boundary surrounding thespecific location. The geographic boundary 205 is useful in defining aboundary, inside of which lie wireless devices that were located in thevicinity of an event. The users of the wireless devices and byassociation the users' wireless devices 204 and 206, located in thevicinity of an event may have been a witness to the event and may beable to provide useful information to entities, such as law enforcementorganizations (LEOs). Different types of events can warrant differingsizes of a geographic boundary 205. For instance, a relatively minorautomobile collision may only warrant the creation of a geographicboundary 205 of a few blocks in size.

Wireless device 204 is within the geographic boundary 205, whilewireless devices 206 are outside. The determination of the geographiclocations of the wireless devices 204 and 206 can be accomplishedthrough numerous methods, such as the use of GPS or assisted GPS. Inaddition, triangulation methods can be used when a wireless device 204or 206 is able to receive signals from two or more base stations 104 and106.

With reference now to FIG. 2B, a depiction is provided of a map showinga geographic radius from the occurrence of an event, according to anembodiment of the invention. The specific location 202 represents thegeographic location of an occurrence of an event. This event can be anynumber of events, including, for example, the commission of a crime. Thegeographic boundary 208 represents a geographic boundary surrounding thespecific location 202. The geographic boundary 208 is similar in conceptto that of the geographic boundary 205, as presented in FIG. 2A.However, the geographic boundary 208 is much larger than the geographicboundary 205. A geographic boundary 208 of this size can be generated inresponse to an event of greater seriousness, such as the commission of aviolent crime.

Wireless device 204 is within this boundary, while wireless device 206is outside of geographic boundary 208. Neither of the wireless devices204 or 206 are depicted for the sake of clarity in FIG. 3. It should beunderstood that any number of wireless devices 204 may be located withinthe geographic boundary 208, and a multitude of wireless devices 206 canbe located outside the boundary 208. The determination of the geographiclocations of the wireless devices 204 and 206 can be accomplishedthrough numerous methods, such as the use of GPS or assisted GPS. Inaddition, a triangulation method can be used when a wireless device 204or 206 is able to receive signals from two or more base stations 104 and106.

Turning now to FIG. 2C, a depiction is provided of a map showing ageographic boundary and the position of wireless devices, according toan embodiment of the invention. The geographic boundary 212 serves toencompass a geographic area around a particular location 210, in thisinstance a school. Wireless devices 204 are located within thegeographic boundary 212, and wireless devices 206 are located outsidethe geographic boundary 212. Determining the location of the wirelessdevice 204 and 206 may be accomplished according to GPS, assisted GPS,triangulation, or any other appropriate method.

The geographic boundary 212 can be implemented to determine when torequest an authorization from the user of the wireless devices 204 and206 to report their geographic location to LEOs. For instance, a usercan be provided with an alert to their respective wireless device inaccordance with the embodiment of the invention discussed in relation toFIG. 3. However, the alert can differ, and instead of being generated inresponse to the occurrence of an event, be generated to prevent theoccurrence of an event. One example would be the generation of an alertto request authorization to provide the geographic locations of theuser's respective wireless device 204 or 206 when in the vicinity of aschool, such as school 210. The user can be given the opportunity toconsent or not consent. The geographic boundary 212 would define thearea in the vicinity of the school 210. Therefore, when the wirelessdevice of the user entered the geographic boundary 212, the geographiclocations would be made available to LEOs. This could be particularlyuseful in cases of child abduction, or other crimes that often occurnear schools.

While specific mention has been made to schools, all types of locationscould be included in the center of geographic boundaries. For instance,sporting fields, high-crime areas, or any other location could serve asthe center of a geographic boundary, according to alternativeembodiments of the invention.

With reference now to FIG. 3, a depiction is presented of an exemplaryscreen shot of a user interface on a wireless device, in accordance withan embodiment of the invention. The wireless device display 302 containsa window 304, along with affirmative response button 306 and negativeresponse button 308. As depicted in window 304, an alert is provided fordisplay on the wireless device display 302. The text alert can containinformation detailing the occurrence of an event, such as a commissionof a crime. This alert can be sent to wireless devices located withinthe geographic boundary. The alert informs the user of the occurrence ofan event and asks the user if they will be able to provide informationto aid in the investigation of the crime. The user can consent to therelease of location information for their respective wireless device toLEOs. The user can indicate an affirmative response by selecting theaffirmative response button 306, or a negative response by selecting thenegative response button 308. The text represented in the affirmativeresponse button 306 and the negative response button 308 can vary fromthat depicted in FIG. 3. Additionally, while specific examples have beenprovided for text-based alerts, other forms are contemplated, such asaudio or visual alerts.

When the user provides an affirmative response, the geographic locationof their wireless device and their identity will be made available toentities, such as LEOs. The affirmative response can be communicated bythe wireless I/O component of the wireless device to the base stations,and then through the wireless provider to the network.

The time frame for which the information is provided to the entities canbe restricted. For instance, if the event in question occurred at 3:00PM on May 19, 2008, the entities may only be provided with thegeographic locations of the wireless device from 2:30 PM to 3:30 PM onMay 19, 2008. The alert can notify users that only a limited portion oftheir geographic locations would be made available if they issue anaffirmative response to the request.

Upon reception of an affirmative response to the request, the identitiesof the users who issued the affirmative response can be forwarded toentities by the wireless provider. Included with the identity can begeographic locations for the wireless device, as well as otherinformation identifying the user or the wireless device. This forwardingcan be effectuated over the network, or any other suitable method forcommunicating the information. The entities can then contact the userand solicit information from the user. The information solicited fromthe user can include descriptions as to what the user may havewitnessed.

The alert can be generated by a wireless provider in response to arequest from entities. These entities can be LEOs, according to anembodiment of the invention. The LEOs can request the identity of userswho were in the vicinity of the occurrence of the event. The wirelessprovider can implement various methods to verify the authenticity of therequest, such as the requirement that the request take a form similar tothat of subpoena issued by a court. The wireless provider can alsoimplement other methods to verify the veracity of the request.

When defining the geographic radius that will define the boundaries ofwhich wireless devices will receive the request, the LEOs can providethe geographic radius, or the wireless provider 108 can define thegeographic radius. As discussed above, different types of events canwarrant different sizes of geographic radii. In addition, the area neednot be defined by a geographic radius and could instead be defined byany number of geographic boundaries. Examples include politicalsubdivision boundaries, geographic areas bounded by streets or roads, orgeographic areas defined by latitude and longitude coordinates.

Upon receiving information describing the geographic radius, thewireless provider can determine the wireless devices that were locatedwithin a geographic boundary defined by the geographic area or radius.The wireless provider can then send an alert. The wireless provider cancommunicate the alert to the base stations, which will in turncommunicate the text alert to the wireless devices in the geographicradius.

With reference now to FIG. 4, a flow diagram is depicted for a method ofdetermining the identity of a user associated with a wireless device,according to an embodiment of the invention. In block 410 anauthorization is received at the wireless provider from users to havegeographic locations associated with their wireless device be madeavailable to entities. According to this embodiment of the invention, arequest for authorization can be generated prior to the occurrence of anevent and therefore be preventive in nature. The request forauthorization can include geographic locations for which the user isconsenting to having their geographic locations associated with theirwireless made available to entities when the wireless device is in thevicinity of the geographic boundary.

Additionally, a user could consent to blanket authorization, where thegeographic locations of their respective wireless device could be madeavailable to the entities upon their request. This blanket authorizationcan require the entities execute a formal process before being permittedto receive the geographic locations. This process could be supervised bythe judicial branch, and be similar in function to issuance of asubpoena. Therefore, in exchange for the blanket authorization, theentities would have to surmount judicial “hurdles” before beingpermitted to lawfully receive the geographic locations.

Furthermore, a user could authorize the release of the geographiclocations of their respective wireless devices only in response to arequest stemming from the occurrence of a particular type of event. Thetype of event can be, for example, child abduction events. Other typesof events, such as automobile collisions, could trigger the release ofthe geographic locations. This can be subject to a proper request by theentities to the wireless provider.

In block 420, a request is received for the identity of wireless devicesin response to an occurrence of an event. The request can be received bythe wireless provider from the entities. The request can also include ageographic boundary surrounding the location of the occurrence of anevent.

As discussed above, the occurrence of an event can be the commission ofa crime or other event, such as child abduction or automobile collision.Any event which would warrant the identification of surrounding usersfor questioning or other needs could classify as an event. For instance,if a hazardous substance was discharged, either intentionally oraccidentally, users in the vicinity of the discharge may otherwise notbe immediately aware of their possible exposure to the hazardoussubstance. This is but one example of a plethora of events that couldwarrant the identification of wireless devices, and their respectiveusers, located in the vicinity of an event.

At block 430, a list is generated of users of wireless devices locatedwithin a predefined distance from a specific location within a period oftime, wherein the list includes identifying information for each of theusers. The identifying information can include the name of the users,and other identifying information for the wireless device. Many types ofinformation can satisfy this requirement, as long as they provide amethod to identify the user of the wireless device.

Turning now to FIG. 5, a flow diagram depicting a method for providinggeographic locations of a wireless device associated with a user isprovided, according to an embodiment of the invention.

In block 510 the wireless provider communicates a request forauthorization to provide geographic locations of the wireless device inresponse to the occurrence of an event. An alert can be presented to auser of a wireless device. The alert can be generated at the request ofentities and can include information detailing the occurrence of anevent. As discussed above, the entities can be LEOs. This informationcan further include the date and time of the occurrence of the event,and other details about the event. For instance, the alert could tellthe user that a young child has been kidnapped from a specific location,at a given time and date. Additionally, the alert could provide an imageof the kidnapped child. The request could also detail the time periodfor which their wireless device geographic locations would be releasedto the entities pending an affirmative response to the request.

In block 520, a response is received by the wireless provider to therequest for authorization. The response can take the form of a userselection of an element on the user interface of their respectivewireless device. For instance, a user can select an affirmative consentbutton to indicate their consent to the release of geographic locationsfor their wireless device to the entities. Alternatively, a user canselect the negative response button to indicate that they do not consentto the release of the geographic locations of their respective wirelessdevice.

At block 530, the geographic locations are provided by the wirelessprovider to the entities when an affirmative response is received to therequest for authorization. When the user provides an affirmativeresponse to the request, the geographic locations for the user'swireless device is made available by the wireless provider to entities,along with information identifying the user. This information can bemade available to the entities through a variety of methods, such aselectronically over the network.

With reference now to FIG. 6, a flow diagram is provided for a methodfor disclosing the identity of users of associated wireless deviceslocated within a predefined geographic boundary, according to anembodiment of the invention.

In block 610, a request is received by the wireless provider for theidentity of users of associated wireless devices located within ageographic boundary. The request can be generated by entities, such asLEOs, in response to the occurrence of an event at a geographiclocation. The geographic boundary can include the geographic location ofthe occurrence of the event. Further, the geographic boundaryinformation included in the request can serve to filter the wirelessdevices for which a request is generated, so that requests are onlygenerated for those devices located within a geographic radius of theoccurrence of the event.

In block 620, the identity of wireless devices located within thegeographic boundary is determined by the wireless provider. This can beaccomplished by analyzing information describing the geographic locationof all wireless devices of a wireless provider, and then filtering thatinformation so that it only includes the identities of wireless deviceslocated within the geographic boundary over a set period of time. Thisfiltering could be carried out by the wireless provider, or by athird-party server, not shown in the figures.

At block 630, the identity of the wireless devices and associated usersis disclosed by the wireless provider to entities when the associatedusers have consented to the disclosure. As discussed in relation to FIG.5, above, a request can be generated and communicated to users ofwireless devices requesting their authorization to release geographiclocations associated with their respective wireless device to entities.In addition, the users of wireless devices can provide their consent tothe release of geographic locations for their respective wirelessdevices upon a request generated in response to the occurrence ofspecific type of event. The request can be generated by the wirelessprovider at the behest of the entities.

Additionally, if users of wireless devices located with the geographicboundary have not previously consented to the release of theirgeographic locations in response to an occurrence of an event, the userscan be presented with a request for authorization from the wirelessprovider to release this information to the entities.

Many different arrangements of the various components depicted, as wellas components not shown, are possible without departing from the spiritand scope of the invention. Embodiments of the invention have beendescribed with the intent to be illustrative rather than restrictive.Alternative embodiments will become apparent to those skilled in the artthat do not depart from its scope. A skilled artisan may developalternative means of implementing the aforementioned improvementswithout departing from the scope of the invention.

It will be understood that certain features and subcombinations are ofutility and may be employed without reference to other features andsubcombinations and are contemplated within the scope of the claims. Notall steps listed in the various figures need be carried out in thespecific order described.

The technology claimed is:
 1. One or more non-transitorycomputer-readable media containing computer-executable instructions forperforming a method for disclosing the identity of one or more users ofassociated wireless devices located within a predefined geographicboundary, the method comprising: in response to the occurrence of anevent at a geographic location, receiving a request for the identity ofone or more users of associated wireless devices located within ageographic boundary, wherein the geographic boundary includes thegeographic location of the occurrence of the event and a time period forthe event; generating a list of geographic locations within the timeperiod for each wireless device, wherein the list of geographiclocations include addresses inside and outside of the geographicboundary visited by the wireless device; and disclosing the identity ofthe one or more wireless devices and associated users to one or moreentities when the associated users have previously consented to thedisclosure of the list of geographic locations.
 2. The media of claim 1,wherein the event is a commission of a crime.
 3. The media of claim 1,wherein the request is received from one or more entities.
 4. The mediaof claim 3, wherein the one or more entities are law enforcementorganizations.
 5. The media of claim 1, wherein the geographic boundarycomprises a geographic area within a predefined radius of the occurrenceof the event.
 6. The media of claim 1, wherein the associated users ofthe one or more wireless devices have previously consented to disclosingtheir geographic locations to one or more entities in response to theoccurrence of an event.
 7. The media of claim 1, further comprising whenthe associated users of the one or more wireless devices have notpreviously consented to the providing of geographic locations inresponse to the occurrence of an event, soliciting an authorization fromthe associated users of the one or more wireless devices to disclose thegeographic track location information of their wireless device.
 8. Acomputer-implemented method for disclosing the identity of one or moreusers of associated wireless devices located within a predefinedgeographic boundary, the method comprising: in response to theoccurrence of an event at a geographic location, receiving a request forthe identity of one or more users of associated wireless devices locatedwithin a geographic boundary, wherein the geographic boundary includesthe geographic location of the occurrence of the event and a time periodfor the event; generating a list of geographic locations within the timeperiod for each wireless device, wherein the list of geographiclocations include addresses inside and outside of the geographicboundary visited by the wireless device; and disclosing the identity ofthe one or more wireless devices and associated users to one or moreentities when the associated users have previously consented to thedisclosure of the list of geographic locations.
 9. The method of claim8, wherein the event is a commission of a crime.
 10. The method of claim8, wherein the request is received from one or more entities.
 11. Themethod of claim 10, wherein the one or more entities are law enforcementorganizations.
 12. The method of claim 8, wherein the geographicboundary comprises a geographic area within a predefined radius of theoccurrence of the event.
 13. The method of claim 8, wherein theassociated users of the one or more wireless devices have previouslyconsented to disclosing their geographic locations to one or moreentities in response to the occurrence of an event.
 14. The method ofclaim 8, further comprising when the associated users of the one or morewireless devices have not previously consented to the providing ofgeographic locations in response to the occurrence of an event,soliciting an authorization from the associated users of the one or morewireless devices to disclose the geographic track location informationof their wireless device.
 15. A computer system for providing geographiclocations of a wireless device associated with a user, the computersystem comprising: at least one processor configured to perform thefollowing: in response to the occurrence of an event at a geographiclocation, receiving a request for the identity of one or more users ofassociated wireless devices located within a geographic boundary,wherein the geographic boundary includes the geographic location of theoccurrence of the event and a time period for the event; generating alist of geographic locations within the time period for each wirelessdevice, wherein the list of geographic locations include addressesinside and outside of the geographic boundary visited by the wirelessdevice; and disclosing the identity of the one or more wireless devicesand associated users to one or more entities when the associated usershave previously consented to the disclosure of the list of geographiclocations.
 16. The method of claim 15, wherein the event is a commissionof a crime and the request is received from one or more entities. 17.The method of claim 16, wherein the one or more entities are lawenforcement organizations.
 18. The method of claim 15, wherein thegeographic boundary comprises a geographic area within a predefinedradius of the occurrence of the event.
 19. The method of claim 15,wherein the associated users of the one or more wireless devices havepreviously consented to disclosing their geographic locations to one ormore entities in response to the occurrence of an event.
 20. The methodof claim 15, further comprising when the associated users of the one ormore wireless devices have not previously consented to the providing ofgeographic locations in response to the occurrence of an event,soliciting an authorization from the associated users of the one or morewireless devices to disclose the geographic track location informationof their wireless device.