US20070287428A1 - Lawful intercept service - Google Patents

Lawful intercept service Download PDF

Info

Publication number
US20070287428A1
US20070287428A1 US11/746,232 US74623207A US2007287428A1 US 20070287428 A1 US20070287428 A1 US 20070287428A1 US 74623207 A US74623207 A US 74623207A US 2007287428 A1 US2007287428 A1 US 2007287428A1
Authority
US
United States
Prior art keywords
location information
location
interest
wireless unit
wireless
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/746,232
Inventor
Athanassios Diacakis
Ioannis Pavlidis
Paul Hebert
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Great Elm Group Inc
Original Assignee
Openwave Systems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Openwave Systems Inc filed Critical Openwave Systems Inc
Priority to US11/746,232 priority Critical patent/US20070287428A1/en
Assigned to OPENWAVE SYSTEMS, INC. reassignment OPENWAVE SYSTEMS, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: DIACAKIS, ATHANASSIOS, HEBERT, PAUL JOSEPH, PAVLIDIS, IOANNIS
Publication of US20070287428A1 publication Critical patent/US20070287428A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/306Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting packet switched data communications, e.g. Web, Internet or IMS communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/80Arrangements enabling lawful interception [LI]

Definitions

  • the present invention relates in general to location monitoring of wireless communication devices. More specifically, the present invention relates to location monitoring of a wireless communications device irrespective of privacy settings associated with the device and/or without notification of the device. Such functionality may have applications, for example, for law enforcement and homeland security purposes.
  • Wireless communications networks generally allow for voice and/or data communications between wireless units, e.g., wireless telephones (analog, digital, cellular, and PCS), pagers, or data terminals that communicate using RF signals.
  • wireless units e.g., wireless telephones (analog, digital, cellular, and PCS), pagers, or data terminals that communicate using RF signals.
  • location-finding technologies have been developed that allow for determining the location of such wireless units. These location-finding technologies may utilize any of various location information sources and/or location-finding equipment (LFE) associated with the wireless network.
  • LFE location-finding equipment
  • location information for wireless devices is often provided on an application-by-application basis for subscribers of a particular network service application.
  • different wireless networks e.g., CDMA, TDMA, GSM, and iDEN
  • AOA angle of arrival
  • TDOA time difference of arrival
  • GPS handset global positioning system
  • cell/sector network architecture
  • gateway systems have been developed to alleviate some of the difficulties encountered in positioning wireless units in various network environments.
  • these gateways may provide location information in a format that is independent of the source of the location information, and may provide a standardized interface for requesting and obtaining location information.
  • applications can be developed substantially independent of the particular network environment of a serviced subscriber. Accordingly, the location of many wireless units may be obtained from such gateway systems utilizing one or more of the above-listed technologies.
  • wireless units may request that no location information be provided to location-based service providers or other entities attempting to obtain the location of the wireless unit. Additionally, systems have been developed to allow wireless units to be notified when location information for that wireless unit is requested. Such privacy settings have increased consumer acceptance of a variety of location-based service applications.
  • the ability to monitor the location of a wireless unit free of any privacy settings associated with the wireless unit and/or utilizing one or more location finding technologies across one or more networks may in some instances be desirable. For example, in emergency situations it may be desirable to locate wireless units irrespective of any location-finding preferences of the wireless units and independent of the particular network environments of those units. Likewise, owners of wireless units may desire to monitor the activities of those wireless units independent of preferences of the user of the wireless unit. Moreover, in some instances, law enforcement agencies may be authorized to monitor persons utilizing wireless units.
  • an authorized entity may be able to effectively locate and/or monitor the activities of wireless units associated with targeted individuals. Furthermore, if proper authorization exists, such monitoring may be done surreptitiously without the wireless unit user's knowledge and/or consent.
  • a method for interfacing a requesting entity with one or more applications operable to provide location information for an identified wireless unit, wherever the location information can be accessed independent of location finding preferences of the user.
  • the method entails establishing an interface for communications between a system operative to procure location information from at least one location information source associated with a wireless network for a wireless unit of interest.
  • the interface defines a standardized form for requesting and providing information.
  • the interface may control communications between the requesting entity and the location provisioning platform, between the platform and a location-based services platform, and/or between the location-based services application and the subscriber wireless units.
  • the interface may act as an application program interface that supplies messages to a location information source or gateway application in a standardized form such that a user requesting location information does not have to supply a source-specific location information request. That is, a requestor may provide information in a standardized location request that may be utilized with any of a variety of differently configured location information sources and network environments.
  • a requestor may provide information in a standardized location request that may be utilized with any of a variety of differently configured location information sources and network environments.
  • the interface may comprise any platform or processor operative to receive a location information request (e.g., in the standardized format) and access location information from any one or more of a number of wireless location information sources or location gateways associated with the wireless network.
  • the interface may be accessed via any suitable user interface such as a graphical user interface, telephonic interface (e.g., utilizing voice activated software and/or computerized prompts), or other input mechanism.
  • the interface may be configured in a manner that allows a requesting entity to supply one or more fields of information that are subsequently supplied to one or more location information sources.
  • the interface will typically include fields that allow a requesting entity to identify themselves, a recipient of the location information (e.g., if different than the requesting party) as well as a wireless unit of interest.
  • identification may comprise, for example, a mobile identification number (MIN).
  • the interface may also allow a requesting entity to specify one or more triggering events that will prompt the procurement of location information from one of the sources.
  • Such triggers may be based on wireless unit actions, or, may be independent of wireless units actions or a combination thereof.
  • wireless unit actions that trigger procurement of location information may include, inter alia, sending and/or receiving wireless communications as well as movements of the wireless unit relative to one or more predetermined boundaries or zones.
  • Independent triggers may include procuring location information upon receiving a location request (i.e., ad-hoc), on a periodic basis, or upon a predetermined schedule.
  • zones boundary or point of interest
  • zones may include addresses, a point and radius, another wireless unit, as well as geographic boundaries such as, but not limited to, cities, counties, states, and/or legal jurisdictions.
  • the interface may be operable to prompt information that enables a requesting entity to define one or more zones.
  • the interface may also allow for the requesting entity to supply additional information the may be utilized for procuring the location information.
  • the requesting entity may provide authorization information indicating the authority of the requesting entity to receive location information for the mobile unit of interest.
  • authorization information may allow, inter alia, overriding privacy functions associated with the wireless unit of interest that would otherwise prevent the provision of location information to a requesting entity.
  • authorization may allow a requesting entity to request location information without the wireless unit of interest being notified of the location request and/or procurement of location information.
  • a requesting entity may surreptitiously obtain location information and/or monitor the movements of the wireless unit of interest.
  • Such authorization may be in the form of a code, such as an owner's code, wherein an owner of a wireless unit may retain the authority to identify the location of that wireless unit while the unit is utilized by a third party. This may be applicable in employer-employee applications (e.g., for fleet tracking purposes) in parent-child relationships, as well as for the recovery of lost or stolen wireless units (e.g., tracking stolen vehicles).
  • Such authorization may alternately be legal authorization wherein a requesting person or entity other than an owner of the wireless unit has obtained legal authority (e.g., a court order) to obtain location information for a wireless unit of interest.
  • authorization may entail accessing an official database and/or verifying court documents.
  • a legally authorized entity may provide an interface service provider or an official database with appropriate documentation prior to requesting location information.
  • Such legally authorized entities may include law enforcement agencies (LEA) such as local police, probation, and/or federal authorities (e.g., FBI).
  • a method for monitoring the location of a wireless unit a wireless network free of any location-finding preferences of the wireless unit and irrespective of that wireless unit passing from a first carrier network to a second carrier network. That is, the method provides a system for aggregating information from separate carrier networks such that monitoring may be effectuated over an enhanced area with improved inclusiveness of subscribers of different carriers, and/or with an enhanced accuracy.
  • the method includes providing a system in communication with a first wireless carrier network having a first subscriber set and a second carrier network having a second subscriber set, wherein the system is operative to provide location information for each of the carrier networks.
  • a location information inquiry for a wireless unit of interest may be received and location information may then be procured irrespective of the carrier network currently servicing the wireless unit and provided to a location associated with the request.
  • the location request may include, in addition to wireless unit of interest information, specifications regarding the desired location information, for example, indicating how recent or how accurate the information should be.
  • the first and second carrier networks may employ different location finding technologies, e.g., GPS, AOA, TDOA, and cell/sector technologies.
  • a location request from the requesting entity may result in prompting one or more different location information sources to obtain the location information.
  • the method may include receiving a first location input from a first location information source and receiving a second location input from a second location information source. Furthermore, this first and second information may be combined to provide combined location information having an enhanced accuracy.
  • a method for obtaining location information of a wireless unit free of any location finding preferences wherein a requesting entity may define one or more events that will trigger the procurement of such location information.
  • the method includes the steps of accessing a system operative to provide location information for wireless units within a wireless network.
  • a requesting entity may then identify a wireless unit and define at least one event that will result in the providing of location information for a wireless unit of interest wherein the location information is provided independent of any location finding preferences of the wireless unit of interest.
  • location information of the wireless unit of interest may be received.
  • the present aspect allows a requesting entity to be updated with regard to the location of a wireless unit of interest.
  • the location updates may be provided based on trigger events that are wireless unit initiated (e.g., wireless communications to an from the wireless unit) as well as trigger events that are free of wireless unit actions (e.g., scheduled location updates).
  • location updates may be procured for a wireless unit of interest on a periodic schedule for a predetermined portion of the day (working hours) to verify, for example, that the user of the wireless unit (e.g., an employee) is located within a predetermined area.
  • a method for obtaining location information for a wireless unit of interest based on the location of that wireless unit relative to one or more zones includes identifying a wireless unit of interest and establishing at least one zone of interest associated with that wireless unit.
  • Location information for the wireless unit is obtained from at least one location information source associated with the wireless network. This may be performed on a period basis or on another schedule based on the location of the wireless unit of interest relative to the zone of interest. In any case, the location information is utilized to monitor a location of the wireless unit relative to the zone of interest.
  • a third party may be notified.
  • a second monitoring schedule may be implemented: For instance, the rate and/or accuracy of the location monitoring may be increased.
  • the present aspect has numerous law enforcement and/or homeland security applications.
  • one or more locations of interest such as, for instance, airports may be defined.
  • zones of interest may be global zones of interest applicable to a wide number of wireless units of interest.
  • all wireless units associated with a list of suspects e.g., suspected terrorists
  • a third party may be notified of the encroachment. For example, a law enforcement agent closest to the encroaching wireless unit may be notified.
  • FIG. 1 is a schematic diagram of a network implementing the present invention
  • FIG. 2 is a graphical user interface that may be utilized with the present invention
  • FIG. 3 is a user profile that may be utilized with the present invention.
  • FIGS. 4 a and 4 b provide a process flow sheet of one embodiment of the present invention.
  • a wireless unit may be monitored or tracked relative to one or more predetermined zones or boundaries. This may allow for, inter alia, improved enforcement of restraining orders, terrorist suspect tracking, and otherwise monitoring the position or movement of assets of interest.
  • the surreptitious monitoring may require official authorization (e.g., court order) due to privacy issues.
  • the system described herein is not limited to law enforcement activities. For example, certain aspects may be applicable to monitoring employees and/or parental monitoring of minor children (e.g., situations where consent or implied consent is present).
  • FIG. 1 illustrates a wireless network 100 implementing the present invention.
  • a wireless unit of interest 102 communicates with cell site equipment 104 via an RF interface 105 .
  • the wireless unit 102 is shown as being a wireless telephone. It will be appreciated, however, that any suitable wireless unit can be utilized including, for example, personal digital assistants, data terminals having a wireless modem, etc.
  • the cell site equipment 104 may be, for example, a cell sector antenna or the like.
  • the cell site equipment 104 is interconnected to a switch 106 . Although only one piece of cell site equipment 104 is illustrated, it will be appreciated that switch 106 may service multiple cells.
  • the switch 106 may include, for example, a home location register (HLR) for a wireless unit of interest 102 , a mobile switching center (MSC), Service Control Point (SCP) or any other structure for routing communications between a calling unit and a called unit.
  • HLR home location register
  • MSC mobile switching center
  • SCP Service Control Point
  • the switch 106 is operative for routing calls between the wireless network 100 and a wireline network 107 (e.g. an SS7 and/or PSTN network) for communications between the wireless unit 102 and another mobile unit, a wireline unit or a data network node.
  • a wireline network 107 e.g. an SS7 and/or PSTN network
  • FIG. 1 also shows a location manager or gateway 108 , illustrated in connection with the switch 106 .
  • a gateway 108 may be associated with one or more (typically numerous) switches. Moreover, different gateways may service different subscribers, carriers, applications, equipment, network areas, etc.
  • the gateway 108 may be, for example, a computer platform for executing a variety wireless network applications.
  • the gateway 108 may be physically located proximate to the switch 106 or may be remotely located and interconnected to the switch 106 by a local area network, wide area network or other communications pathway.
  • the illustrated gateway 108 includes a processor 110 for running source selection and location provisioning applications.
  • the gateway 108 communicates with an intercept server 200 , as will be more fully discussed below.
  • applications running on processor 110 at the gateway 108 are operative to obtain location information from multiple sources 126 - 129 associated with the network 100 .
  • these sources may be connected to the gateway 108 via the switch or independent of the switch.
  • These sources may employ any of a variety of location finding technologies including AOA, TDOA such as GPS and cell/sector technologies. It will be appreciated that the nature of the data obtained from the sources 126 - 129 as well as the path by which the data is transmitted varies depending on the type of source and that the ability to accommodate a variety of sources is an important aspect of the present invention. Some types of sources include equipment in the handset.
  • Examples include certain GPS and other TDOA systems.
  • location information may be encoded into signals transmitted from the handset to a cell site or other receiver, and the information may then be transferred to the gateway 108 via the switch 106 or otherwise.
  • Other sources e.g., network-based systems, use equipment associated with individual cell sites such as specialized antennae to make location determinations such as by triangulation and, again, the resulting location information may be transferred to the gateway 108 via the switch 106 or otherwise.
  • Still other sources employ a network of dedicated source equipment that is overlaid relative to the wireless network 100 . Such systems may communicate location information to the gateway 108 independent of the switch 106 and network cell site equipment.
  • some source technologies can be implemented via equipment resident in the handset, in cell sites or other network locations and/or in dedicated sites such that the data pathway of the location information may vary even for a given source technology.
  • the sources may further include network-based AOA systems and network-based TDOA systems and external systems such as GPS.
  • the illustrated network based systems such as AOA and network TDOA systems determine the location of a wireless unit 102 based on communications between the wireless unit 102 and the cell site equipment of multiple cell sites. For example, such systems may receive information concerning a directional bearing of the wireless unit 102 or a distance of the wireless unit 102 relative to each of multiple cell sites.
  • the location of the unit 102 can be determined by triangulation or similar geometric/mathematic techniques.
  • External systems such as GPS systems, determine the wireless station location relative to an external system.
  • the wireless station 102 is typically provided with a GPS receiver for determining geographic position relative to the GPS satellite constellation or forwarding satellite based information to a network element that computes location.
  • various types of location information may be transmitted across an air interface to the network 100 .
  • certain GPS information may be combined with network information to compute the location of a wireless unit.
  • the gateway 108 receives location information from the various sources 126 - 129 . Generally, such information is processed by source selection and location provisioning applications supported by the gateway 108 to provide location outputs for use by authorized users of the lawful intercept server 200 . Location information may be stored in a cache 122 at the gateway 108 for subsequent retrieval. In this regard, the location cache 122 may include location information for wireless units at various times indexed, for example, to a mobile unit identifier such as a MIN/ESN.
  • the intercept server 200 may communicate with the gateway 108 over any appropriate communications link.
  • the intercept server 200 may be, for example, a computer platform for executing a variety of intercept-related functions. Such functions may include providing a secure platform that allows access only to authorized users.
  • the intercept server 200 may be physically located proximate to the gateway 108 or may be remotely located. Alternatively, the intercept server 200 may be incorporated onto the same platform as the gateway 108 . What is important is that the intercept server provides an interface for client applications 114 , 116 and 118 such as law enforcement agencies (LEAs) or otherwise authorized users, to access the location provisioning applications of the gateway 108 and obtain location information for a wireless unit of interest.
  • LEAs law enforcement agencies
  • the obtainment of location information for a wireless unit of interest 102 may be done without the knowledge or permission of the user of the mobile unit.
  • some sort of official authorization e.g., a court order
  • a court order may limit a law enforcement agency 114 - 118 to tracking a person of interest within a limited geographic boundary (e.g., a state, county, city).
  • an application running on processor 210 within the intercept server 200 allows for validating official authorization as well as defining tracking zones for a wireless unit of interest 102 in which an authorized requesting LEA 114 - 118 may obtain location information.
  • authorized areas or tracking zones for a wireless unit of interest 102 are stored at the intercept server 200 .
  • the tracking zone information 112 stores definitions of locations of interest for use by the LEA applications 114 , 116 and 118 .
  • the definitions of these locations of interest may be provided in any suitable form.
  • an application for identifying when a wireless unit 102 crosses restricted a boundary may define boundaries in terms of cell identifiers and/or cell sector identifiers.
  • the tracking zone information may be stored as a set of geographical coordinates or geographical boundaries that define a given zone.
  • such geographical information may be converted into current network topology, e.g., cell sector identifiers, at the time of a location comparison. It will be appreciated that other conventions may be utilized for storing a representation of a tracking zone area.
  • a GIS system 131 may be utilized for inputting and/or formatting the tracking zone information.
  • a service provider or other person defining a tracking zone may wish to input tracking zone boundaries relative to an address, streets, county lines, statelines, or other topological information.
  • a GIS application such as the MAPS application marketed by Openwave Systems, Inc. of Redwood City, Calif. may be utilized to receive such inputs and convert the associated tracking zone definitions into geographical information formatted for convenient handling by, for example, a boundary crossing application.
  • tracking zone definitions may be converted from one topological system, e.g., addresses or street boundaries, to another topological system, e.g., geographical coordinates or cell/cell sector identifiers.
  • the definition of the location of interest as well as the location of a mobile unit may be expressed in terms of a quadtree data structure as described in U.S. Pat. No. 6,212,392, entitled “Method for Determining if the Location of a Wireless Communication Device is Within a Specified Area,” which is incorporated herein by reference.
  • procured location information can be transmitted to different recipients via different pathways.
  • a notice of the violation and or the current location of the wireless unit of interest 102 may be provided to a mobile terminal located near the area (e.g., a police car).
  • the location information may be provided to locations remote from the requesting LEA application 114 - 118 .
  • such information may be transmitted from the illustrated gateway 108 and/or intercept server 200 to a data network interface 124 for transmission across a data network such as the Internet.
  • the information may be packetized for transmission across the Internet in accordance with IP protocols.
  • Data may also be transmitted to a recipient utilizing proxies, a microbrowser and other elements for executing a wireless data communications protocol.
  • the CDR may be populated in accordance with telecommunications network protocols.
  • mapping information When location information is provided over a data network, such information may include mapping information.
  • the location of the mobile unit of interest may be superimposed on mapping information for receipt by a graphical display.
  • the intercept server 200 and/or the gateway may be operatively interconnected to a mapping application 260 .
  • a mapping application 260 may include an archive of mapping information in a form that may be readily incorporated into location information packages for transfer to desired recipients.
  • tracking information may be presented in various forms.
  • information may be transmitted to a desired recipient via a short messaging system via a data channel or via an audio channel for providing an audio message that can be played on the unit 102 .
  • a text message may be displayed on a LCD display or other display of the mobile unit 102 .
  • the LEA applications 114 , 116 and 118 may run on the intercept server 200 or on other platforms. In any case, communications between the LEA applications 114 , 116 and 118 intercept server 200 and thereby the source selection and location provisioning applications of the gateway 108 may be handled via wireless location interface (WLI) 113 .
  • WLI wireless location interface
  • This interface preferably provides a standardized form, message sets and data fields for transmitting/receiving location and tracking requests and receiving/transmitting location information as described in U.S. Pat. No. 6,321,092 entitled “Multiple Input Data Management for Wireless Location-Based Applications,” which is incorporated herein by reference.
  • Such an interface advantageously allows LEA applications 114 , 116 and 118 to operate without compatibility concerns regarding network environment and the nature of the location sources 126 - 129 .
  • the WLI 113 allows the LEA applications 114 - 118 , via the intercept server 200 , to selectively access information stored in the cache 122 at the gateway 108 and/or prompt one or more of the sources 126 - 129 to initiate a location determination.
  • the WLI 113 provides a standard format for submitting location requests to the gateway 108 and for receiving responses from the gateway 108 independent of the location finding technology(ies) employed.
  • the applications 114 - 118 can make use of the best or most appropriate location information available originating from any available sources 126 - 129 without concern for source dependent data formats or compatibility issues.
  • new location finding technologies can be readily incorporated into the system 100 and used by the applications 114 - 118 without significant accommodations.
  • the WLI 113 of the illustrated implementation allows the LEA applications 114 - 118 to include specifications with location and tracking requests for a wireless unit of interest 102 .
  • these specifications may include one or more triggering events that dictate when location information for a wireless unit of interest 102 is procured.
  • triggering events may include, without limitation: periodic determinations, ad hoc (i.e., one time requests), upon the wireless unit 102 nearing a predetermined border, zone or another wireless unit, upon the wireless unit 102 making or receiving a wireless communication (e.g., phone calls).
  • such specification may include any of the following: the timeliness of the location information (e.g., not older than [date stamp parameter]), the accuracy of the information (e.g., uncertainty not exceeding [uncertainty parameters]), confidence (confidence at least equal to [confidence parameter]).
  • the request may specify the use of the most recent available information, most accurate available information, etc.
  • the location request can specify whether the gateway 108 should wait for the next available update or force a location determination, whether redundant or unnecessary updates should be filtered (e.g., do not send updates more often than once a minute or if wireless unit has moved less than 50 meters), and what the priority of the request is. In this manner, ongoing monitoring may be employed, for example, by applications such as vehicle tracking and 911 .
  • the WLI 113 provides a graphical user interface to the LEA applications 114 - 118 such that users may select from a set of predetermined options. See FIG. 2 .
  • a window 300 having one or more user entry fields 302 - 306 allows a user to provide their identity 302 , case number 304 , and an authorization code 306 .
  • an order may be provided to an intercept server service provider who in turn may verify the authenticity of the court order and provide the requesting LEA the authorization code.
  • the intercept server 200 may be configured to access an official database (e.g. via the data network interface 124 ) in order to verify official authorization such as court orders.
  • a wireless unit identification field 308 may also be provided for identification of, for example, MIN/MSISDN, etc.
  • the window 300 also includes pull down menus that allow a user to select trigger events 310 and select tracking areas of interest 312 .
  • the trigger events 310 may include, for example, any of those discussed above.
  • the area of interest menu 310 may provide a user with the ability to select and/or specify states, counties, cities, zip codes, a specific address, a point and radius, a boundary etc. In this regard, once a user makes an initial selection, additional menus may be provided to fully identify an area of interest.
  • the window 300 may also include a recipient field 314 that will allow a user to specify where tracking information is to be provided.
  • Such a recipient could be identified using e-mail addresses, a telephone numbers (e.g., for SMS and/or voice messages), IM addresses, IP addresses etc. Alternatively, such information may be provided through the requesting window 300 .
  • the intercept server 200 may compare the request with a stored client profile to ensure that the requesting user is currently authorized to obtain the requested tracking information.
  • a standardized profile 400 for use with the WLI which includes information employed during the authorization and authentication process for client application.
  • the standardized profile 400 may be entered or modified in a manner other than that described in FIG. 3 (e.g., telephonically, etc.).
  • a client application may access and modify portions of the profile 400 .
  • the client ID 402 is a unique identifier for a LEA and the case ID 406 is a unique identifier for each of the client's active cases.
  • Each client who employs the system described herein may employ multiple case ID's 406 for which location information may be requested.
  • the client ID 402 and the case ID 406 may be employed in conjunction with authorization codes or passwords 404 , 408 , respectively, when a client application logs into the system.
  • a client may restrict access to a particular case to a particular set of that client's employees.
  • Status 410 may indicate whether the particular case is active or inactive. In this regard, status 410 may indicate if a court order is still valid such that a client may continue monitoring a mobile unit of interest 102 . Only active cases may be allowed to make location requests to the gateway platform 108 .
  • the mobile unit ID 412 of the client application profile 400 provides an identifier for a mobile unit of interest 102 . Such an identifier may include: MIN/MSISDN etc.
  • the privacy override 414 allows overriding a privacy setting on a wireless unit 102 .
  • the privacy override allows procuring location information irrespective of this mobile user request.
  • the jurisdiction 416 entry provides information in a form (e.g. quad-tree structure) that delineates one or more authorized tracking zones and/or boundaries. This entry may be linked to additional records.
  • the cache option 418 provides an indication of the maximum age of the location information stored in a cache that may be provided to the client application.
  • the location notification entry 420 identifies the type of notification a client may receive when location information is procured (i.e. textual, audio, etc.).
  • the provision notification entry 422 provides an indication of the where notification will be delivered.
  • the first step performed when an LEA application 114 - 118 makes a location information request is the authentication and authorization of that particular application.
  • FIG. 4 is a flow chart which describes in detail the steps performed when authenticating and authorizing an application.
  • the LEA application 114 - 118 will access the intercept server 200 either through the WLI 113 or alternatively though a data network interface 124 .
  • authentication and authorization 512
  • a query may be made as to whether the client identification number, case number and/or corresponding passwords have been received ( 514 ).
  • the intercept server 200 will search for the corresponding client application profile 400 in memory.
  • a comparison is made between identification information included in the profile 400 and that provided by the WLI 113 . If the information does not match, a “denied access” message will be presented ( 519 ) to the requesting application. If the proper identification and password information is provided, before any location information is identified and retrieved, a query ( 520 ) will be made as to whether official authorization for monitoring a particular wireless unit 102 is currently valid. If the official authorization is not valid, the intercept server 200 system will deny ( 521 ) the request and log the activity.
  • a further query ( 522 ) is made as to whether the wireless unit of interest 102 is within an area where surreptitious location monitoring is authorized. If the wireless unit of interest 102 is outside an authorized area, the request is denied ( 523 ) and the activity is logged in memory. If the wireless unit of interest 102 is within an authorized area, location information privacy settings query for the wireless unit of interest 102 is performed ( 524 ) to determine if any privacy settings are active. This may entail the intercept server 200 contacting the HLR of the wireless unit of interest 102 . If no privacy settings are active, location information is provided ( 528 ) to the LEA in accordance with the triggering events and/or other user specified constraints.
  • an override query 526 is performed to see if the requesting LEA application 114 - 118 is authorized to override ( 526 ) the privacy settings. If not so authorized, the request is denied ( 527 ) and the activity is logged in memory. If authorized, location information is provided ( 528 ) to the LEA.
  • Logging functionality may be incorporated into the intercept server 200 as well.
  • information for a wireless unit of interest may be monitored over time and stored for later retrieval and analysis.
  • the embodiments described hereinabove are further intended to explain best modes known of practicing the invention and to enable others skilled in the art to utilize the invention in such, or other embodiments and with various modifications required by the particular application(s) or use(s) of the present invention. It is intended that the appended claims be construed to include alternative embodiments to the extent permitted by the prior art.

Abstract

A system and method is provided for monitoring the activities and/or locations of wireless units in a wireless network independent of location-based service preferences of those wireless units. That is, a system and method is provided that allows an authorized requester override location-based service preferences (e.g., privacy settings) that may be set for a wireless unit. In this regard, an authorized entity may be able to effectively locate and/or monitor the activities of a wireless unit associated with an individual of interest. Furthermore, if proper authorization exists, such monitoring may be done surreptitiously without the wireless unit user's knowledge and/or consent. For example, in some instances, law enforcement agencies may be authorized to monitor call traffic and/or the location of persons utilizing wireless units.

Description

    CROSS-REFERENCES TO RELATED APPLICATIONS
  • This application is a continuation of U.S. patent application Ser. No. 10/802,323, entitled “Lawful Intercept Service,” filed Mar. 16, 2004, which claims priority to U.S. Provisional Patent Application No. 60/456,656, filed Mar. 18, 2003, each of which is hereby incorporated herein by reference.
  • BACKGROUND OF THE INVENTION
  • The present invention relates in general to location monitoring of wireless communication devices. More specifically, the present invention relates to location monitoring of a wireless communications device irrespective of privacy settings associated with the device and/or without notification of the device. Such functionality may have applications, for example, for law enforcement and homeland security purposes.
  • Wireless communications networks generally allow for voice and/or data communications between wireless units, e.g., wireless telephones (analog, digital, cellular, and PCS), pagers, or data terminals that communicate using RF signals. In recent years, a number of location-finding technologies have been developed that allow for determining the location of such wireless units. These location-finding technologies may utilize any of various location information sources and/or location-finding equipment (LFE) associated with the wireless network.
  • Due to variations in network environments and location finding technologies, location information for wireless devices is often provided on an application-by-application basis for subscribers of a particular network service application. Moreover, different wireless networks (e.g., CDMA, TDMA, GSM, and iDEN) may require adaptations to the location-based service application and associated interfaces. Accordingly, some applications are specifically adapted for a particular location-finding technology and a particular target network environment. Such location-finding technologies may include, but not be limited to: angle of arrival (AOA), time difference of arrival (TDOA), handset global positioning system (GPS), as well as network architecture (cell/sector). These different technologies involve different location accuracies and formats.
  • More recently, gateway systems have been developed to alleviate some of the difficulties encountered in positioning wireless units in various network environments. For example, these gateways may provide location information in a format that is independent of the source of the location information, and may provide a standardized interface for requesting and obtaining location information. In this manner, applications can be developed substantially independent of the particular network environment of a serviced subscriber. Accordingly, the location of many wireless units may be obtained from such gateway systems utilizing one or more of the above-listed technologies.
  • Concurrent with the development of location-based service applications, has been the development of privacy settings for wireless units. In this regard, wireless units may request that no location information be provided to location-based service providers or other entities attempting to obtain the location of the wireless unit. Additionally, systems have been developed to allow wireless units to be notified when location information for that wireless unit is requested. Such privacy settings have increased consumer acceptance of a variety of location-based service applications.
  • BRIEF SUMMARY OF THE INVENTION
  • The ability to monitor the location of a wireless unit free of any privacy settings associated with the wireless unit and/or utilizing one or more location finding technologies across one or more networks may in some instances be desirable. For example, in emergency situations it may be desirable to locate wireless units irrespective of any location-finding preferences of the wireless units and independent of the particular network environments of those units. Likewise, owners of wireless units may desire to monitor the activities of those wireless units independent of preferences of the user of the wireless unit. Moreover, in some instances, law enforcement agencies may be authorized to monitor persons utilizing wireless units. Accordingly, by being able to override location-finding preferences that may be set for wireless units and by being able to locate units in a variety of network environments, an authorized entity may be able to effectively locate and/or monitor the activities of wireless units associated with targeted individuals. Furthermore, if proper authorization exists, such monitoring may be done surreptitiously without the wireless unit user's knowledge and/or consent.
  • According to a first aspect of the present invention, a method is provided for interfacing a requesting entity with one or more applications operable to provide location information for an identified wireless unit, wherever the location information can be accessed independent of location finding preferences of the user. The method entails establishing an interface for communications between a system operative to procure location information from at least one location information source associated with a wireless network for a wireless unit of interest. The interface defines a standardized form for requesting and providing information. The interface may control communications between the requesting entity and the location provisioning platform, between the platform and a location-based services platform, and/or between the location-based services application and the subscriber wireless units. In this regard, the interface may act as an application program interface that supplies messages to a location information source or gateway application in a standardized form such that a user requesting location information does not have to supply a source-specific location information request. That is, a requestor may provide information in a standardized location request that may be utilized with any of a variety of differently configured location information sources and network environments. Once the interface receives a request for location information for a wireless unit of interest, authorization of the requesting entity to obtain such location information independent of the location finding preferences of the identified wireless unit is verified. Once so verified, location information for the wireless unit of interest is procured utilizing the identified system. This location information may be provided in a standardized output form to the requesting entity or to a third party (e.g., via the interface).
  • The interface may comprise any platform or processor operative to receive a location information request (e.g., in the standardized format) and access location information from any one or more of a number of wireless location information sources or location gateways associated with the wireless network. In this regard, the interface may be accessed via any suitable user interface such as a graphical user interface, telephonic interface (e.g., utilizing voice activated software and/or computerized prompts), or other input mechanism. In any case, the interface may be configured in a manner that allows a requesting entity to supply one or more fields of information that are subsequently supplied to one or more location information sources. For instance, the interface will typically include fields that allow a requesting entity to identify themselves, a recipient of the location information (e.g., if different than the requesting party) as well as a wireless unit of interest. In the latter regard, such identification may comprise, for example, a mobile identification number (MIN).
  • The interface may also allow a requesting entity to specify one or more triggering events that will prompt the procurement of location information from one of the sources. Such triggers may be based on wireless unit actions, or, may be independent of wireless units actions or a combination thereof. For example, wireless unit actions that trigger procurement of location information may include, inter alia, sending and/or receiving wireless communications as well as movements of the wireless unit relative to one or more predetermined boundaries or zones. Independent triggers may include procuring location information upon receiving a location request (i.e., ad-hoc), on a periodic basis, or upon a predetermined schedule.
  • When the procurement of location information is based on the wireless unit's location relative to a zone, boundary or point of interest (hereinafter “zones”), such zones may be identified through the interface. Examples of such zones may include addresses, a point and radius, another wireless unit, as well as geographic boundaries such as, but not limited to, cities, counties, states, and/or legal jurisdictions. In this regard, the interface may be operable to prompt information that enables a requesting entity to define one or more zones.
  • In addition to requesting entity identification, wireless unit identification, triggering events, and location information routing, the interface may also allow for the requesting entity to supply additional information the may be utilized for procuring the location information. For instance, the requesting entity may provide authorization information indicating the authority of the requesting entity to receive location information for the mobile unit of interest. Such authorization information may allow, inter alia, overriding privacy functions associated with the wireless unit of interest that would otherwise prevent the provision of location information to a requesting entity. Additionally, such authorization may allow a requesting entity to request location information without the wireless unit of interest being notified of the location request and/or procurement of location information. In this regard, a requesting entity may surreptitiously obtain location information and/or monitor the movements of the wireless unit of interest.
  • Such authorization may be in the form of a code, such as an owner's code, wherein an owner of a wireless unit may retain the authority to identify the location of that wireless unit while the unit is utilized by a third party. This may be applicable in employer-employee applications (e.g., for fleet tracking purposes) in parent-child relationships, as well as for the recovery of lost or stolen wireless units (e.g., tracking stolen vehicles). Such authorization may alternately be legal authorization wherein a requesting person or entity other than an owner of the wireless unit has obtained legal authority (e.g., a court order) to obtain location information for a wireless unit of interest. In the context of legal authority, authorization may entail accessing an official database and/or verifying court documents. In this regard, a legally authorized entity may provide an interface service provider or an official database with appropriate documentation prior to requesting location information. Such legally authorized entities may include law enforcement agencies (LEA) such as local police, probation, and/or federal authorities (e.g., FBI).
  • According to a second aspect of the present invention, a method is provided for monitoring the location of a wireless unit a wireless network free of any location-finding preferences of the wireless unit and irrespective of that wireless unit passing from a first carrier network to a second carrier network. That is, the method provides a system for aggregating information from separate carrier networks such that monitoring may be effectuated over an enhanced area with improved inclusiveness of subscribers of different carriers, and/or with an enhanced accuracy. The method includes providing a system in communication with a first wireless carrier network having a first subscriber set and a second carrier network having a second subscriber set, wherein the system is operative to provide location information for each of the carrier networks. A location information inquiry for a wireless unit of interest may be received and location information may then be procured irrespective of the carrier network currently servicing the wireless unit and provided to a location associated with the request. As will be appreciated, the location request may include, in addition to wireless unit of interest information, specifications regarding the desired location information, for example, indicating how recent or how accurate the information should be.
  • The first and second carrier networks may employ different location finding technologies, e.g., GPS, AOA, TDOA, and cell/sector technologies. In this regard, a location request from the requesting entity may result in prompting one or more different location information sources to obtain the location information. If multiple location information sources are available to make a location determination regarding a wireless station the method may include receiving a first location input from a first location information source and receiving a second location input from a second location information source. Furthermore, this first and second information may be combined to provide combined location information having an enhanced accuracy.
  • According to another aspect of the present invention, a method for obtaining location information of a wireless unit free of any location finding preferences is provided wherein a requesting entity may define one or more events that will trigger the procurement of such location information. The method includes the steps of accessing a system operative to provide location information for wireless units within a wireless network. A requesting entity may then identify a wireless unit and define at least one event that will result in the providing of location information for a wireless unit of interest wherein the location information is provided independent of any location finding preferences of the wireless unit of interest. Upon the occurrence of the defined event(s), location information of the wireless unit of interest may be received.
  • The present aspect allows a requesting entity to be updated with regard to the location of a wireless unit of interest. In this regard, the location updates may be provided based on trigger events that are wireless unit initiated (e.g., wireless communications to an from the wireless unit) as well as trigger events that are free of wireless unit actions (e.g., scheduled location updates). For instance, location updates may be procured for a wireless unit of interest on a periodic schedule for a predetermined portion of the day (working hours) to verify, for example, that the user of the wireless unit (e.g., an employee) is located within a predetermined area.
  • According to another aspect of the present invention, a method for obtaining location information for a wireless unit of interest based on the location of that wireless unit relative to one or more zones is provided. The method includes identifying a wireless unit of interest and establishing at least one zone of interest associated with that wireless unit. Location information for the wireless unit is obtained from at least one location information source associated with the wireless network. This may be performed on a period basis or on another schedule based on the location of the wireless unit of interest relative to the zone of interest. In any case, the location information is utilized to monitor a location of the wireless unit relative to the zone of interest. Upon the uncertainty of the location of the wireless unit of interest overlapping with one of the zones of interest, a third party may be notified. Likewise, when an uncertainty associated with the area of the wireless unit overlaps one or more zones of interest, a second monitoring schedule may be implemented: For instance, the rate and/or accuracy of the location monitoring may be increased.
  • As will be appreciated, the present aspect has numerous law enforcement and/or homeland security applications. In this regard, one or more locations of interest such as, for instance, airports may be defined. Such zones of interest may be global zones of interest applicable to a wide number of wireless units of interest. In this regard, all wireless units associated with a list of suspects (e.g., suspected terrorists) may be monitored relative to the global zones of interest. In this case, if any of the monitored wireless units were to approach within a predetermined distance of the zone of interest, a third party may be notified of the encroachment. For example, a law enforcement agent closest to the encroaching wireless unit may be notified.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a schematic diagram of a network implementing the present invention;
  • FIG. 2 is a graphical user interface that may be utilized with the present invention;
  • FIG. 3 is a user profile that may be utilized with the present invention; and
  • FIGS. 4 a and 4 b provide a process flow sheet of one embodiment of the present invention.
  • DETAILED DESCRIPTION OF THE INVENTION
  • The invention described below allows for procuring location information for a wireless unit without necessarily obtaining the permission of a user of the wireless unit. That is, a method is provided for overriding user preferences such that surreptitious monitoring of wireless units may be conducted. As will be appreciated, such monitoring is particularly well suited for law enforcement operations. In this regard, a wireless unit may be monitored or tracked relative to one or more predetermined zones or boundaries. This may allow for, inter alia, improved enforcement of restraining orders, terrorist suspect tracking, and otherwise monitoring the position or movement of assets of interest. Of course, in some instances the surreptitious monitoring may require official authorization (e.g., court order) due to privacy issues. However, it will be noted that the system described herein is not limited to law enforcement activities. For example, certain aspects may be applicable to monitoring employees and/or parental monitoring of minor children (e.g., situations where consent or implied consent is present).
  • FIG. 1 illustrates a wireless network 100 implementing the present invention. In the network 100, a wireless unit of interest 102 communicates with cell site equipment 104 via an RF interface 105. In the illustrated example, the wireless unit 102 is shown as being a wireless telephone. It will be appreciated, however, that any suitable wireless unit can be utilized including, for example, personal digital assistants, data terminals having a wireless modem, etc. The cell site equipment 104 may be, for example, a cell sector antenna or the like. In the illustrated network 100, the cell site equipment 104 is interconnected to a switch 106. Although only one piece of cell site equipment 104 is illustrated, it will be appreciated that switch 106 may service multiple cells. The switch 106 may include, for example, a home location register (HLR) for a wireless unit of interest 102, a mobile switching center (MSC), Service Control Point (SCP) or any other structure for routing communications between a calling unit and a called unit. Among other things, the switch 106 is operative for routing calls between the wireless network 100 and a wireline network 107 (e.g. an SS7 and/or PSTN network) for communications between the wireless unit 102 and another mobile unit, a wireline unit or a data network node.
  • FIG. 1 also shows a location manager or gateway 108, illustrated in connection with the switch 106. It will be appreciated that such a gateway 108 may be associated with one or more (typically numerous) switches. Moreover, different gateways may service different subscribers, carriers, applications, equipment, network areas, etc. The gateway 108 may be, for example, a computer platform for executing a variety wireless network applications. The gateway 108 may be physically located proximate to the switch 106 or may be remotely located and interconnected to the switch 106 by a local area network, wide area network or other communications pathway. The illustrated gateway 108 includes a processor 110 for running source selection and location provisioning applications.
  • In order to implement the lawful intercept service, the gateway 108 communicates with an intercept server 200, as will be more fully discussed below. To provide requested location information, applications running on processor 110 at the gateway 108 are operative to obtain location information from multiple sources 126-129 associated with the network 100. As shown, these sources may be connected to the gateway 108 via the switch or independent of the switch. These sources may employ any of a variety of location finding technologies including AOA, TDOA such as GPS and cell/sector technologies. It will be appreciated that the nature of the data obtained from the sources 126-129 as well as the path by which the data is transmitted varies depending on the type of source and that the ability to accommodate a variety of sources is an important aspect of the present invention. Some types of sources include equipment in the handset. Examples include certain GPS and other TDOA systems. In such cases, location information may be encoded into signals transmitted from the handset to a cell site or other receiver, and the information may then be transferred to the gateway 108 via the switch 106 or otherwise. Other sources, e.g., network-based systems, use equipment associated with individual cell sites such as specialized antennae to make location determinations such as by triangulation and, again, the resulting location information may be transferred to the gateway 108 via the switch 106 or otherwise. Still other sources employ a network of dedicated source equipment that is overlaid relative to the wireless network 100. Such systems may communicate location information to the gateway 108 independent of the switch 106 and network cell site equipment. In addition, some source technologies can be implemented via equipment resident in the handset, in cell sites or other network locations and/or in dedicated sites such that the data pathway of the location information may vary even for a given source technology.
  • Although a number of the illustrated sources 126-129 are shown as operating separate from the switch 106, in reality, certain ones of the sources, such as a cell ID source, would likely provide information via the switch 106. The sources may further include network-based AOA systems and network-based TDOA systems and external systems such as GPS. Generally, the illustrated network based systems such as AOA and network TDOA systems determine the location of a wireless unit 102 based on communications between the wireless unit 102 and the cell site equipment of multiple cell sites. For example, such systems may receive information concerning a directional bearing of the wireless unit 102 or a distance of the wireless unit 102 relative to each of multiple cell sites. Based on such information, the location of the unit 102 can be determined by triangulation or similar geometric/mathematic techniques. External systems such as GPS systems, determine the wireless station location relative to an external system. In the case of GPS systems, the wireless station 102 is typically provided with a GPS receiver for determining geographic position relative to the GPS satellite constellation or forwarding satellite based information to a network element that computes location. Thus, various types of location information may be transmitted across an air interface to the network 100. Additionally, in the case of network assisted GPS or A-GPS, certain GPS information may be combined with network information to compute the location of a wireless unit.
  • As shown, the gateway 108 receives location information from the various sources 126-129. Generally, such information is processed by source selection and location provisioning applications supported by the gateway 108 to provide location outputs for use by authorized users of the lawful intercept server 200. Location information may be stored in a cache 122 at the gateway 108 for subsequent retrieval. In this regard, the location cache 122 may include location information for wireless units at various times indexed, for example, to a mobile unit identifier such as a MIN/ESN.
  • The intercept server 200 may communicate with the gateway 108 over any appropriate communications link. The intercept server 200 may be, for example, a computer platform for executing a variety of intercept-related functions. Such functions may include providing a secure platform that allows access only to authorized users. The intercept server 200 may be physically located proximate to the gateway 108 or may be remotely located. Alternatively, the intercept server 200 may be incorporated onto the same platform as the gateway 108. What is important is that the intercept server provides an interface for client applications 114, 116 and 118 such as law enforcement agencies (LEAs) or otherwise authorized users, to access the location provisioning applications of the gateway 108 and obtain location information for a wireless unit of interest. As will be appreciated, for many law enforcement related tracking purposes, the obtainment of location information for a wireless unit of interest 102 may be done without the knowledge or permission of the user of the mobile unit. In this regard, some sort of official authorization (e.g., a court order) may be required before location information is provided for a mobile unit of interest 102. Furthermore, even if official authorization is obtained, such authorization may be limited in scope. For example, a court order may limit a law enforcement agency 114-118 to tracking a person of interest within a limited geographic boundary (e.g., a state, county, city). Accordingly, an application running on processor 210 within the intercept server 200 allows for validating official authorization as well as defining tracking zones for a wireless unit of interest 102 in which an authorized requesting LEA 114-118 may obtain location information.
  • In the illustrated embodiment, authorized areas or tracking zones for a wireless unit of interest 102 are stored at the intercept server 200. The tracking zone information 112 stores definitions of locations of interest for use by the LEA applications 114, 116 and 118. The definitions of these locations of interest may be provided in any suitable form. For example, an application for identifying when a wireless unit 102 crosses restricted a boundary may define boundaries in terms of cell identifiers and/or cell sector identifiers. Alternatively, the tracking zone information may be stored as a set of geographical coordinates or geographical boundaries that define a given zone. For cell sector implementations, such geographical information may be converted into current network topology, e.g., cell sector identifiers, at the time of a location comparison. It will be appreciated that other conventions may be utilized for storing a representation of a tracking zone area.
  • In addition, it will be appreciated that a GIS system 131 may be utilized for inputting and/or formatting the tracking zone information. For example, a service provider or other person defining a tracking zone may wish to input tracking zone boundaries relative to an address, streets, county lines, statelines, or other topological information. A GIS application, such as the MAPS application marketed by Openwave Systems, Inc. of Redwood City, Calif. may be utilized to receive such inputs and convert the associated tracking zone definitions into geographical information formatted for convenient handling by, for example, a boundary crossing application. Thus, tracking zone definitions may be converted from one topological system, e.g., addresses or street boundaries, to another topological system, e.g., geographical coordinates or cell/cell sector identifiers. In any case, the definition of the location of interest as well as the location of a mobile unit may be expressed in terms of a quadtree data structure as described in U.S. Pat. No. 6,212,392, entitled “Method for Determining if the Location of a Wireless Communication Device is Within a Specified Area,” which is incorporated herein by reference.
  • Depending on the specific LEA application 114-118 and other factors, procured location information can be transmitted to different recipients via different pathways. For example, in the case of a restraining order violation, where a wireless unit of interest 102 has entered a restricted zone, a notice of the violation and or the current location of the wireless unit of interest 102 may be provided to a mobile terminal located near the area (e.g., a police car). In this regard, the location information may be provided to locations remote from the requesting LEA application 114-118. For example, such information may be transmitted from the illustrated gateway 108 and/or intercept server 200 to a data network interface 124 for transmission across a data network such as the Internet. Thus, the information may be packetized for transmission across the Internet in accordance with IP protocols. Data may also be transmitted to a recipient utilizing proxies, a microbrowser and other elements for executing a wireless data communications protocol. Similarly, in the case of a CDR output, the CDR may be populated in accordance with telecommunications network protocols.
  • When location information is provided over a data network, such information may include mapping information. In this regard, the location of the mobile unit of interest may be superimposed on mapping information for receipt by a graphical display. To facilitate such functionality, the intercept server 200 and/or the gateway may be operatively interconnected to a mapping application 260. Such a mapping application 260 may include an archive of mapping information in a form that may be readily incorporated into location information packages for transfer to desired recipients.
  • Furthermore, the tracking information may be presented in various forms. For example, information may be transmitted to a desired recipient via a short messaging system via a data channel or via an audio channel for providing an audio message that can be played on the unit 102. Likewise, a text message may be displayed on a LCD display or other display of the mobile unit 102.
  • The LEA applications 114, 116 and 118 may run on the intercept server 200 or on other platforms. In any case, communications between the LEA applications 114, 116 and 118 intercept server 200 and thereby the source selection and location provisioning applications of the gateway 108 may be handled via wireless location interface (WLI) 113. This interface preferably provides a standardized form, message sets and data fields for transmitting/receiving location and tracking requests and receiving/transmitting location information as described in U.S. Pat. No. 6,321,092 entitled “Multiple Input Data Management for Wireless Location-Based Applications,” which is incorporated herein by reference. Such an interface advantageously allows LEA applications 114, 116 and 118 to operate without compatibility concerns regarding network environment and the nature of the location sources 126-129.
  • The WLI 113 allows the LEA applications 114-118, via the intercept server 200, to selectively access information stored in the cache 122 at the gateway 108 and/or prompt one or more of the sources 126-129 to initiate a location determination. As noted, the WLI 113 provides a standard format for submitting location requests to the gateway 108 and for receiving responses from the gateway 108 independent of the location finding technology(ies) employed. In this manner, the applications 114-118 can make use of the best or most appropriate location information available originating from any available sources 126-129 without concern for source dependent data formats or compatibility issues. Moreover, new location finding technologies can be readily incorporated into the system 100 and used by the applications 114-118 without significant accommodations.
  • The WLI 113 of the illustrated implementation allows the LEA applications 114-118 to include specifications with location and tracking requests for a wireless unit of interest 102. For example, these specifications may include one or more triggering events that dictate when location information for a wireless unit of interest 102 is procured. Such triggering events may include, without limitation: periodic determinations, ad hoc (i.e., one time requests), upon the wireless unit 102 nearing a predetermined border, zone or another wireless unit, upon the wireless unit 102 making or receiving a wireless communication (e.g., phone calls). Furthermore, such specification may include any of the following: the timeliness of the location information (e.g., not older than [date stamp parameter]), the accuracy of the information (e.g., uncertainty not exceeding [uncertainty parameters]), confidence (confidence at least equal to [confidence parameter]). Alternatively, the request may specify the use of the most recent available information, most accurate available information, etc. In addition, the location request can specify whether the gateway 108 should wait for the next available update or force a location determination, whether redundant or unnecessary updates should be filtered (e.g., do not send updates more often than once a minute or if wireless unit has moved less than 50 meters), and what the priority of the request is. In this manner, ongoing monitoring may be employed, for example, by applications such as vehicle tracking and 911.
  • In one embodiment, the WLI 113 provides a graphical user interface to the LEA applications 114-118 such that users may select from a set of predetermined options. See FIG. 2. For example, a window 300 having one or more user entry fields 302-306 allows a user to provide their identity 302, case number 304, and an authorization code 306. As will be appreciated, in cases where a court order is required, such an order may be provided to an intercept server service provider who in turn may verify the authenticity of the court order and provide the requesting LEA the authorization code. Alternatively, the intercept server 200 may be configured to access an official database (e.g. via the data network interface 124) in order to verify official authorization such as court orders. A wireless unit identification field 308 may also be provided for identification of, for example, MIN/MSISDN, etc. The window 300 also includes pull down menus that allow a user to select trigger events 310 and select tracking areas of interest 312. The trigger events 310 may include, for example, any of those discussed above. The area of interest menu 310 may provide a user with the ability to select and/or specify states, counties, cities, zip codes, a specific address, a point and radius, a boundary etc. In this regard, once a user makes an initial selection, additional menus may be provided to fully identify an area of interest. The window 300 may also include a recipient field 314 that will allow a user to specify where tracking information is to be provided. Such a recipient could be identified using e-mail addresses, a telephone numbers (e.g., for SMS and/or voice messages), IM addresses, IP addresses etc. Alternatively, such information may be provided through the requesting window 300. When the intercept server 200 receives tracking requests from the WLI 113, the processor 210 may compare the request with a stored client profile to ensure that the requesting user is currently authorized to obtain the requested tracking information.
  • Disclosed in FIG. 3 is a standardized profile 400 for use with the WLI which includes information employed during the authorization and authentication process for client application. In this embodiment, the standardized profile 400 may be entered or modified in a manner other than that described in FIG. 3 (e.g., telephonically, etc.). In some instances, a client application may access and modify portions of the profile 400. The client ID 402 is a unique identifier for a LEA and the case ID 406 is a unique identifier for each of the client's active cases. Each client who employs the system described herein may employ multiple case ID's 406 for which location information may be requested. The client ID 402 and the case ID 406 may be employed in conjunction with authorization codes or passwords 404, 408, respectively, when a client application logs into the system. In this regard, a client may restrict access to a particular case to a particular set of that client's employees.
  • Status 410 may indicate whether the particular case is active or inactive. In this regard, status 410 may indicate if a court order is still valid such that a client may continue monitoring a mobile unit of interest 102. Only active cases may be allowed to make location requests to the gateway platform 108. The mobile unit ID 412 of the client application profile 400 provides an identifier for a mobile unit of interest 102. Such an identifier may include: MIN/MSISDN etc.
  • The privacy override 414 allows overriding a privacy setting on a wireless unit 102. In this regard, if a mobile unit 102 enables its user to specify that no location-based applications be allowed to obtain location information for the unit 102, the privacy override allows procuring location information irrespective of this mobile user request. The jurisdiction 416 entry provides information in a form (e.g. quad-tree structure) that delineates one or more authorized tracking zones and/or boundaries. This entry may be linked to additional records.
  • The cache option 418 provides an indication of the maximum age of the location information stored in a cache that may be provided to the client application. The location notification entry 420 identifies the type of notification a client may receive when location information is procured (i.e. textual, audio, etc.). Finally the provision notification entry 422 provides an indication of the where notification will be delivered.
  • The first step performed when an LEA application 114-118 makes a location information request is the authentication and authorization of that particular application. Disclosed in FIG. 4 is a flow chart which describes in detail the steps performed when authenticating and authorizing an application. Initially, the LEA application 114-118 will access the intercept server 200 either through the WLI 113 or alternatively though a data network interface 124. Once the location request is received (510) from the LEA application 114-118, authentication and authorization (512) begin. As an initial step, a query may be made as to whether the client identification number, case number and/or corresponding passwords have been received (514). When received, the intercept server 200 will search for the corresponding client application profile 400 in memory.
  • Once the client application profile 400 is retrieved (516) from memory, a comparison (518) is made between identification information included in the profile 400 and that provided by the WLI 113. If the information does not match, a “denied access” message will be presented (519) to the requesting application. If the proper identification and password information is provided, before any location information is identified and retrieved, a query (520) will be made as to whether official authorization for monitoring a particular wireless unit 102 is currently valid. If the official authorization is not valid, the intercept server 200 system will deny (521) the request and log the activity.
  • A further query (522) is made as to whether the wireless unit of interest 102 is within an area where surreptitious location monitoring is authorized. If the wireless unit of interest 102 is outside an authorized area, the request is denied (523) and the activity is logged in memory. If the wireless unit of interest 102 is within an authorized area, location information privacy settings query for the wireless unit of interest 102 is performed (524) to determine if any privacy settings are active. This may entail the intercept server 200 contacting the HLR of the wireless unit of interest 102. If no privacy settings are active, location information is provided (528) to the LEA in accordance with the triggering events and/or other user specified constraints. If privacy settings are active, an override query 526 is performed to see if the requesting LEA application 114-118 is authorized to override (526) the privacy settings. If not so authorized, the request is denied (527) and the activity is logged in memory. If authorized, location information is provided (528) to the LEA.
  • The foregoing description of the present invention has been presented for purposes of illustration and description. Furthermore, the description is not intended to limit the invention to the form disclosed herein. Consequently, variations and modifications commensurate with the above teachings, and skill and knowledge of the relevant art, are within the scope of the present invention. For instance, it may be desirable to monitor more than one wireless unit (e.g., multiple cell phones, pagers etc.) for an individual of interest in this regard, a single profile may allow for entry of multiple mobile unit identifiers. Likewise, functionality may be incorporated that allows entry of the name of a person of interest. In this instance, a search may be performed to identify wireless units (i.e., for subsequent monitoring) believed to be associated with the identified person of interest. Logging functionality may be incorporated into the intercept server 200 as well. In this regard, information for a wireless unit of interest may be monitored over time and stored for later retrieval and analysis. The embodiments described hereinabove are further intended to explain best modes known of practicing the invention and to enable others skilled in the art to utilize the invention in such, or other embodiments and with various modifications required by the particular application(s) or use(s) of the present invention. It is intended that the appended claims be construed to include alternative embodiments to the extent permitted by the prior art.

Claims (26)

1. A method for monitoring a location of a wireless unit of interest across multiple wireless networks, comprising the steps of:
establishing communication between an entity requesting location information for a wireless unit of interest and a system operative to procure the location information, the communication utilizing a standardized format for requesting and providing said location information from any of multiple location information sources associated with any of multiple wireless networks;
obtaining the location information from the system, including overriding a privacy setting associated with said wireless unit of interest where necessary to obtain the location information;
analyzing the location information to monitor a location of the wireless unit over-time; and
providing the monitored location information in response to the request.
2. A method according to claim 1, further comprising:
verifying authorization for said entity to obtain the location information for said wireless unit of interest independent of location finding preferences of the wireless unit of interest.
3. A method according to claim 1, wherein:
the obtaining is performed without the wireless unit of interest being notified of said location information being procured.
4. A method according to claim 1, further comprising:
procuring the location information from at least first and second location information sources, wherein said first and second location information sources employ first and second different location finding technologies.
5. A method according to claim 4, further comprising:
aggregating information from said at least first and second different location finding technologies to enhance the accuracy of said location information.
6. A method according to claim 2, wherein:
verifying authorization includes verifying court ordered authorization.
7. A method according to claim 1, further comprising:
providing said monitored location information to a recipient at a location other than that associated with said requesting entity.
8. A method according to claim 1, further comprising:
comparing said location information to at least one location of interest to monitor the movement of said wireless unit relative to said point of interest.
9. A method according to claim 1, further comprising:
upon an uncertainty associated with said location information overlapping at least one location of interest, notifying a third party that said wireless unit is proximate to said at least one location of interest.
10. A method according to claim 9, wherein said third party is one of an owner of the wireless device, a law enforcement agency, a parent, and an employer.
11. A system for monitoring a location of a wireless unit of interest across multiple wireless networks, the system including a processor and a memory device including instructions that when executed by said processor causes the processor to:
establish communication between an entity requesting location information for a wireless unit of interest and a system operative to procure the location information, the communication utilizing a standardized format for requesting and providing said location information from any of multiple location information sources associated with any of multiple wireless networks;
obtain the location information from the system, including overriding a privacy setting associated with said wireless unit of interest where necessary to obtain the location information;
analyze the location information to monitor a location of the wireless unit over time; and
provide the monitored location information in response to the request.
12. A system according to claim 11, wherein the instructions when executed by said processor further cause the processor to:
verify authorization for said entity to obtain the location information for said wireless unit of interest independent of location finding preferences of the wireless unit of interest.
13. A system according to claim 11, wherein:
the processor obtains the location information without the wireless unit of interest being notified of said location information being procured.
14. A system according to claim 11, wherein:
the processor procures the location information from at least first and second location information sources, wherein said first and second location information sources employ first and second different location finding technologies.
15. A system according to claim 11, wherein the instructions when executed by said processor further cause the processor to:
aggregate information from at least first and second different location finding technologies to enhance the accuracy of said location information.
16. A system according to claim 11, wherein the instructions when executed by said processor further cause the processor to:
provide said monitored location information to a recipient at a location other than that associated with said requesting entity.
17. A system according to claim 11, wherein the instructions when executed by said processor further cause the processor to:
compare said location information to at least one location of interest to monitor the movement of said wireless unit relative to said point of interest.
18. A system according to claim 11, wherein the instructions when executed by said processor further cause the processor to:
upon an uncertainty associated with said location information overlapping at least one location of interest, notify a third party that said wireless unit is proximate to said at least one location of interest.
19. A computer program product embedded in a computer readable medium for monitoring a location of a wireless unit of interest across multiple wireless networks, comprising:
program code for establishing communication between an entity requesting location information for a wireless unit of interest and a system operative to procure the location information, the communication utilizing a standardized format for requesting and providing said location information from any of multiple location information sources associated with any of multiple wireless networks;
program code for obtaining the location information from the system, including overriding a privacy setting associated with said wireless unit of interest where necessary to obtain the location information;
program code for analyzing the location information to monitor a location of the wireless unit over time; and
program code for providing the monitored location information in response to the request.
20. A computer program product according to claim 19, further comprising:
program code for verifying authorization for said entity to obtain the location information for said wireless unit of interest independent of location finding preferences of the wireless unit of interest.
21. A computer program product according to claim 19, further comprising:
program code for obtaining the location information without the wireless unit of interest being notified of said location information being procured.
22. A computer program product according to claim 19, further comprising:
program code for procuring the location information from at least first and second location information sources, wherein said first and second location information sources employ first and second different location finding technologies.
23. A computer program product according to claim 19, further comprising:
aggregating information from at least first and second different location finding technologies to enhance the accuracy of said location information.
24. A computer program product according to claim 19, wherein:
program code for providing the monitored location information includes program code for providing said monitored location information to a recipient at a location other than that associated with said requesting entity.
25. A computer program product according to claim 19, further comprising:
program code for comparing said location information to at least one location of interest to monitor the movement of said wireless unit relative to said point of interest.
26. A computer program product according to claim 19, further comprising:
program code for notifying a third party that said wireless unit is proximate to said at least one location of interest upon an uncertainty associated with said location information overlapping at least one location of interest.
US11/746,232 2003-03-18 2007-05-09 Lawful intercept service Abandoned US20070287428A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/746,232 US20070287428A1 (en) 2003-03-18 2007-05-09 Lawful intercept service

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US45665603P 2003-03-18 2003-03-18
US10/802,323 US7231218B2 (en) 2003-03-18 2004-03-16 Lawful intercept service
US11/746,232 US20070287428A1 (en) 2003-03-18 2007-05-09 Lawful intercept service

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US10/802,323 Continuation US7231218B2 (en) 2003-03-18 2004-03-16 Lawful intercept service

Publications (1)

Publication Number Publication Date
US20070287428A1 true US20070287428A1 (en) 2007-12-13

Family

ID=32830056

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/802,323 Expired - Fee Related US7231218B2 (en) 2003-03-18 2004-03-16 Lawful intercept service
US11/746,232 Abandoned US20070287428A1 (en) 2003-03-18 2007-05-09 Lawful intercept service

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US10/802,323 Expired - Fee Related US7231218B2 (en) 2003-03-18 2004-03-16 Lawful intercept service

Country Status (2)

Country Link
US (2) US7231218B2 (en)
EP (1) EP1460876A2 (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080198993A1 (en) * 2005-05-31 2008-08-21 Amedeo Imbimbo Lawful Interception Method and Architecture for Transparent Transmission of Interception Information
US20080280609A1 (en) * 2005-12-22 2008-11-13 Amedeo Imbimbo Provisioning of User Information
US20100115018A1 (en) * 2008-10-31 2010-05-06 Electronics And Telecommunications Research Institute Interception method interworking with communication network and internet network
US20100291906A1 (en) * 2006-12-05 2010-11-18 Deluca Enrico Systems and methods for location related data interception
US20110314177A1 (en) * 2010-06-18 2011-12-22 David Harp IP Traffic Redirection for Purposes of Lawful Intercept
US20120088532A1 (en) * 2010-10-11 2012-04-12 Motorola, Inc. Method and apparatus for radio frequency fingerprint distribution
US20120208550A1 (en) * 2011-02-15 2012-08-16 Technocom Corporation System and method for dynamically monitoring status in location services
US20120252485A1 (en) * 2011-04-01 2012-10-04 Wolverton Andrew N System and Method for Determining Best Available Location for a Mobile Device
US20130182118A1 (en) * 2012-01-13 2013-07-18 Tim J. Olker Method For Performing Video Surveillance Of A Mobile Unit
US8712019B2 (en) * 2011-11-14 2014-04-29 Qualcomm Incorporated Apparatus and method for performing lawful intercept in group calls
US8768315B2 (en) 2012-09-05 2014-07-01 Motorola Solutions, Inc. Method and apparatus for identifying a suspect through multiple correlated device identities
US8892132B2 (en) 2012-09-05 2014-11-18 Motorola Solutions, Inc. Analytic and tracking systems and methods using over-the-air identifiers of mobile devices
US9026645B2 (en) * 2011-03-29 2015-05-05 Telefonaktiebolaget L M Ericsson (Publ) Lawful interception in an IP multimedia subsystem network
US9161196B2 (en) * 2012-08-07 2015-10-13 Google Technology Holdings LLC Apparatus and method for secure private location information transfer

Families Citing this family (103)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7426380B2 (en) 2002-03-28 2008-09-16 Telecommunication Systems, Inc. Location derived presence information
US9154906B2 (en) 2002-03-28 2015-10-06 Telecommunication Systems, Inc. Area watcher for wireless network
US7120450B2 (en) * 2002-03-28 2006-10-10 Telecommunication Systems, Inc. Consequential location derived information
US8290505B2 (en) 2006-08-29 2012-10-16 Telecommunications Systems, Inc. Consequential location derived information
CN1257475C (en) * 2002-10-23 2006-05-24 国际商业机器公司 Information providing system, device, method and popular operation device based on geological location
EP1673957B1 (en) * 2003-09-30 2007-12-12 Telecom Italia S.p.A. Method for generating triggers based on the position of a terminal in a mobile communication network, related network and computer program product therefor
US20050159170A1 (en) * 2004-01-16 2005-07-21 Gagan Puranik Method and system for transmitting assistance location data for fleet and asset management
US7616665B2 (en) * 2004-04-13 2009-11-10 Research In Motion Limited Method and system for monitoring the health of wireless telecommunication networks
US7004389B1 (en) 2005-01-13 2006-02-28 Biopay, Llc System and method for tracking a mobile worker
US8565788B2 (en) * 2005-02-03 2013-10-22 Mexens Intellectual Property Holding Llc Method and system for obtaining location of a mobile device
US9392406B2 (en) 2005-02-03 2016-07-12 Trueposition, Inc. Method and system for location-based monitoring of a mobile device
US20060209809A1 (en) * 2005-03-10 2006-09-21 Paul Ellingham Monitoring mobile phone communications
US8472923B2 (en) 2005-03-10 2013-06-25 At&T Intellectual Property Ii, L.P. Monitoring mobile phone communications
CN101142805B (en) * 2005-03-18 2011-08-03 艾利森电话股份有限公司 Lawful interception of unauthorized subscribers and equipments
US7353034B2 (en) 2005-04-04 2008-04-01 X One, Inc. Location sharing and tracking using mobile phones or other wireless devices
US20060240812A1 (en) * 2005-04-25 2006-10-26 Benco David S Network support for suspect's geo-location monitoring and alerting
ITBG20050028A1 (en) * 2005-05-13 2006-11-14 Abb Service Srl DEVICE FOR DETECTION OF THE POSITION OF A MOBILE ELEMENT WHICH IS PAIRED TO IT AND ITS MOBILE ELEMENT.
US8660573B2 (en) 2005-07-19 2014-02-25 Telecommunications Systems, Inc. Location service requests throttling
US20070032227A1 (en) * 2005-08-03 2007-02-08 Inventec Appliances Corp. Mobile-phone repairing system
US9282451B2 (en) 2005-09-26 2016-03-08 Telecommunication Systems, Inc. Automatic location identification (ALI) service requests steering, connection sharing and protocol translation
US8467320B2 (en) 2005-10-06 2013-06-18 Telecommunication Systems, Inc. Voice over internet protocol (VoIP) multi-user conferencing
US7525425B2 (en) 2006-01-20 2009-04-28 Perdiem Llc System and method for defining an event based on relationship between an object location and a user-defined zone
WO2007073470A2 (en) 2005-12-23 2007-06-28 Perdiem, Llc System and method for defining an event based on a relationship between an object location and a user-defined zone
US7444131B2 (en) * 2006-01-31 2008-10-28 Lucent Technologies Inc. Method and apparatus for rerouting terminations for CALEA targets through a predetermined surveilling MSC
US8150363B2 (en) 2006-02-16 2012-04-03 Telecommunication Systems, Inc. Enhanced E911 network access for call centers
US8059789B2 (en) 2006-02-24 2011-11-15 Telecommunication Systems, Inc. Automatic location identification (ALI) emergency services pseudo key (ESPK)
BRPI0621363A2 (en) * 2006-02-27 2012-09-04 Ericsson Telefon Ab L M method, arrangement and system for providing access to received data to a centralized boring means, and article for fabrication
US20070208860A1 (en) * 2006-03-02 2007-09-06 Zellner Samuel N User specific data collection
US7747246B2 (en) * 2006-03-02 2010-06-29 At&T Intellectual Property I, L.P. Environment independent user preference communication
US20070208861A1 (en) * 2006-03-02 2007-09-06 Zellner Samuel N User preference interpretation
US8108914B2 (en) 2006-04-25 2012-01-31 Vetrix, Llc Converged logical and physical security
US8208605B2 (en) 2006-05-04 2012-06-26 Telecommunication Systems, Inc. Extended efficient usage of emergency services keys
US8014341B1 (en) 2006-05-08 2011-09-06 Embarq Holdings Company, Llc Method and intermediary device for reporting a civic address during an emergency call
US20080082612A1 (en) * 2006-09-28 2008-04-03 Motorola, Inc. Methods handset and system for downloadable ims middleware
US7966013B2 (en) 2006-11-03 2011-06-21 Telecommunication Systems, Inc. Roaming gateway enabling location based services (LBS) roaming for user plane in CDMA networks without requiring use of a mobile positioning center (MPC)
US9031207B2 (en) * 2006-12-18 2015-05-12 Centurylink Intellectual Property Llc System and method for providing location information for addressed based E-911 calls to public safety answering points
US10045327B2 (en) 2007-01-17 2018-08-07 Eagency, Inc. Mobile communication device monitoring systems and methods
US8126456B2 (en) * 2007-01-17 2012-02-28 Eagency, Inc. Mobile communication device monitoring systems and methods
US7996005B2 (en) * 2007-01-17 2011-08-09 Eagency, Inc. Mobile communication device monitoring systems and methods
US9324074B2 (en) 2007-01-17 2016-04-26 Eagency, Inc. Mobile communication device monitoring systems and methods
US8712396B2 (en) 2007-01-17 2014-04-29 Eagency, Inc. Mobile communication device monitoring systems and methods
US8060887B2 (en) 2007-03-30 2011-11-15 Uranus International Limited Method, apparatus, system, and medium for supporting multiple-party communications
US7765266B2 (en) 2007-03-30 2010-07-27 Uranus International Limited Method, apparatus, system, medium, and signals for publishing content created during a communication
WO2008119149A1 (en) * 2007-03-30 2008-10-09 Uranus International Limited Method, apparatus, system, and medium for supporting multiple-party communications
US7950046B2 (en) * 2007-03-30 2011-05-24 Uranus International Limited Method, apparatus, system, medium, and signals for intercepting a multiple-party communication
US8627211B2 (en) 2007-03-30 2014-01-07 Uranus International Limited Method, apparatus, system, medium, and signals for supporting pointer display in a multiple-party communication
US7765261B2 (en) 2007-03-30 2010-07-27 Uranus International Limited Method, apparatus, system, medium and signals for supporting a multiple-party communication on a plurality of computer servers
US8702505B2 (en) 2007-03-30 2014-04-22 Uranus International Limited Method, apparatus, system, medium, and signals for supporting game piece movement in a multiple-party communication
US8811956B2 (en) * 2007-06-14 2014-08-19 Intel Corporation Techniques for lawful interception in wireless networks
US8644153B2 (en) * 2007-07-31 2014-02-04 Cisco Technology, Inc. Infrastructure for mediation device to mediation device communication
US8290470B2 (en) 2007-08-13 2012-10-16 Centurylink Intellectual Property Llc System and method for providing location information to a public safety answering point during an emergency 911 call from a WiFi handset
US8140062B1 (en) 2007-09-12 2012-03-20 Oceans' Edge, Inc. Mobile device monitoring and control system
US8964945B2 (en) 2007-09-28 2015-02-24 Centurylink Intellectual Property Llc System and method for providing location based E-911 of network access devices registered with a network gateway
US8289953B2 (en) 2007-10-16 2012-10-16 Centurylink Intellectual Property Llc System and method for providing location information to a public safety answering point during an emergency 911 call from a softphone
US8364117B2 (en) 2008-02-21 2013-01-29 Centurylink Intellectual Property Llc System and method for updating location information of voice-over-internet protocol based devices for E911 service
US8891749B2 (en) * 2008-02-21 2014-11-18 Centurylink Intellectual Property Llc System and method for providing emergency wireline telephone services to residences
US20090287415A1 (en) * 2008-05-15 2009-11-19 Helio, Llc Systems, devices and methods for increasing location based service accuracy
US8838131B1 (en) * 2008-06-19 2014-09-16 Sprint Communications Company L.P. Providing geographic locations of a user's wireless device
US8521121B2 (en) 2008-07-03 2013-08-27 Centurylink Intellectual Property Llc System and method for performing an abbreviated power-up sequence on a wireless communications device
US8976938B2 (en) * 2008-07-07 2015-03-10 Centurylink Intellectual Property Llc Deluxe emergency notification
IL192918A (en) * 2008-07-20 2013-07-31 Verint Systems Ltd Systems and methods for verification of wireless terminals on board vehicles using country-of-origin information
US8380176B2 (en) 2008-08-08 2013-02-19 Websafery, Inc. Method of inhibiting functions of a mobile communications device
US8068587B2 (en) 2008-08-22 2011-11-29 Telecommunication Systems, Inc. Nationwide table routing of voice over internet protocol (VOIP) emergency calls
WO2010040413A1 (en) * 2008-10-10 2010-04-15 Telefonaktiebolaget Lm Ericsson (Publ) Lawful authorities warrant management
US20120309340A1 (en) 2011-06-01 2012-12-06 Embarq Holdings Company, Llc System and method for communicating emergency information through messaging
US9491307B2 (en) * 2009-02-24 2016-11-08 Centurylink Intellectual Property Llc System and method for establishing pre-stored emergency messages
US8855665B2 (en) * 2008-12-17 2014-10-07 Avaya Inc. Location privacy enforcement in a location-based services platform
US9166885B2 (en) 2008-12-19 2015-10-20 Telefonaktiebolaget L M Ericsson (Publ) Lawful identification of unknown terminals
KR20100086358A (en) * 2009-01-22 2010-07-30 엘지전자 주식회사 Portable terminal location tracking system and mehtod
US7973678B2 (en) * 2009-02-02 2011-07-05 Robert Bosch Gmbh Control of building systems based on the location and movement of a vehicle tracking device
WO2010102176A1 (en) * 2009-03-06 2010-09-10 Vetrix, Llc Systems and methods for mobile tracking, communications and alerting
US9301191B2 (en) 2013-09-20 2016-03-29 Telecommunication Systems, Inc. Quality of service to over the top applications used with VPN
US20100318588A1 (en) * 2009-06-12 2010-12-16 Avaya Inc. Spatial-Temporal Event Correlation for Location-Based Services
CN102026175A (en) * 2009-09-23 2011-04-20 中兴通讯股份有限公司 Method and system for positioning mobile subscribers in monitoring system
US8849925B2 (en) * 2009-12-21 2014-09-30 Dexrex, Llc Systems and methods for capturing electronic messages
US9361631B2 (en) 2010-01-06 2016-06-07 Ghostery, Inc. Managing and monitoring digital advertising
US9386116B2 (en) 2010-05-13 2016-07-05 Futurewei Technologies, Inc. System, apparatus for content delivery for internet traffic and methods thereof
US8688087B2 (en) 2010-12-17 2014-04-01 Telecommunication Systems, Inc. N-dimensional affinity confluencer
US8942743B2 (en) 2010-12-17 2015-01-27 Telecommunication Systems, Inc. iALERT enhanced alert manager
US9450752B2 (en) * 2011-04-29 2016-09-20 Nokia Technologies Oy Method and apparatus for providing service provider-controlled communication security
US8892082B2 (en) * 2011-04-29 2014-11-18 At&T Intellectual Property I, L.P. Automatic response to localized input
US9479344B2 (en) 2011-09-16 2016-10-25 Telecommunication Systems, Inc. Anonymous voice conversation
US8984591B2 (en) 2011-12-16 2015-03-17 Telecommunications Systems, Inc. Authentication via motion of wireless device movement
US9384339B2 (en) 2012-01-13 2016-07-05 Telecommunication Systems, Inc. Authenticating cloud computing enabling secure services
US9338153B2 (en) 2012-04-11 2016-05-10 Telecommunication Systems, Inc. Secure distribution of non-privileged authentication credentials
WO2013163306A1 (en) * 2012-04-24 2013-10-31 World Emergency Network - Nevada, Ltd. Mobile device geolocation for law enforcement
US10291492B2 (en) 2012-08-15 2019-05-14 Evidon, Inc. Systems and methods for discovering sources of online content
US9208346B2 (en) 2012-09-05 2015-12-08 Telecommunication Systems, Inc. Persona-notitia intellection codifier
US20140162684A1 (en) * 2012-12-12 2014-06-12 At&T Intellectual Property I, Lp Long Term Evolution Advanced Location-Sensitive Information Management
US9485206B2 (en) 2013-12-19 2016-11-01 Websafety, Inc. Devices and methods for improving web safety and deterrence of cyberbullying
USD792421S1 (en) 2014-10-01 2017-07-18 Websafety, Inc. Display screen or portion thereof with graphical user interface
JP2018513482A (en) * 2015-04-11 2018-05-24 エヴィドン,インコーポレイティド Method, apparatus and system for providing notification of digital tracking technology in a mobile application on a mobile device and recording user consent in relation to this notification
US10162351B2 (en) 2015-06-05 2018-12-25 At&T Intellectual Property I, L.P. Remote provisioning of a drone resource
US10129706B2 (en) 2015-06-05 2018-11-13 At&T Intellectual Property I, L.P. Context sensitive communication augmentation
WO2016210327A1 (en) 2015-06-25 2016-12-29 Websafety, Inc. Management and control of mobile computing device using local and remote software agents
US9942710B2 (en) * 2015-08-04 2018-04-10 At&T Intellectual Property I, L.P. Determination of location of a mobile device
US10460308B2 (en) 2015-08-12 2019-10-29 At&T Intellectual Property I, L.P Crowd-location based transactions
KR102326651B1 (en) 2015-08-13 2021-11-16 삼성전자 주식회사 Apparatus and method for handling multiple scheduling request in wireless communication system
US10470241B2 (en) 2016-11-15 2019-11-05 At&T Intellectual Property I, L.P. Multiple mesh drone communication
US10630728B2 (en) * 2017-03-31 2020-04-21 Wipro Limited Systems and methods for minimizing privacy intrusion during internet of things lawful interception
WO2020048600A1 (en) * 2018-09-06 2020-03-12 Nokia Solutions And Networks Gmbh & Co. Kg Coordinated lawful interception
US11210951B2 (en) * 2020-03-03 2021-12-28 Verizon Patent And Licensing Inc. System and method for location data fusion and filtering
US11528613B2 (en) * 2020-07-02 2022-12-13 Dell Products L.P. Systems and methods to provide lawful interception of infrastructure state in a manner known only to law enforcement

Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5208756A (en) * 1991-01-28 1993-05-04 Song Han L Vehicle locating and navigating system
US5218367A (en) * 1992-06-01 1993-06-08 Trackmobile Vehicle tracking system
US5255306A (en) * 1991-01-10 1993-10-19 Bi Inc. Cellular interface unit for use with an electronic house arrest monitoring system
US5461390A (en) * 1994-05-27 1995-10-24 At&T Ipm Corp. Locator device useful for house arrest and stalker detection
US5577100A (en) * 1995-01-30 1996-11-19 Telemac Cellular Corporation Mobile phone with internal accounting
US5721678A (en) * 1993-03-23 1998-02-24 Mannesmann Aktiengesellschaft Arrangement for a use billing system
US5731757A (en) * 1996-08-19 1998-03-24 Pro Tech Monitoring, Inc. Portable tracking apparatus for continuous position determination of criminal offenders and victims
US5767788A (en) * 1996-03-19 1998-06-16 Ness; James C. Computer aided dispatch and locator cellular system
US5774802A (en) * 1996-04-10 1998-06-30 Motorola Inc. Apparatus and method for billing in a wireless communication system
US5787354A (en) * 1994-02-24 1998-07-28 Gte Mobile Communications Service Corporation Method and apparatus for locating a radiotelephone within a cellular system
US5884221A (en) * 1991-01-17 1999-03-16 Highwaymaster Communications, Inc. Vehicle locating and communicating method and apparatus
US6104931A (en) * 1998-04-20 2000-08-15 Ericsson Inc. System and method for defining location services
US6134447A (en) * 1998-05-29 2000-10-17 Ericsson Inc. System and method for monitoring and barring location applications
US6212392B1 (en) * 1999-02-26 2001-04-03 Signal Soft Corp. Method for determining if the location of a wireless communication device is within a specified area
US6282427B1 (en) * 1999-07-14 2001-08-28 Telefonaktiebolaget L M Ericsson (Publ) Selection of location measurement units for determining the position of a mobile communication station
US6360102B1 (en) * 1998-09-10 2002-03-19 Ericsson Inc. System and method for defining a subscriber location privacy profile
US6456852B2 (en) * 1997-01-08 2002-09-24 Trafficmaster Usa, Inc. Internet distributed real-time wireless location database
US6463288B1 (en) * 1999-03-18 2002-10-08 Ericsson Inc. System and method for monitoring positioning requests for mobile subscribers
US20020183077A1 (en) * 2000-12-30 2002-12-05 Mundi Fomukong Method and apparatus for locating mobile units tracking another or within a prescribed geographic boundary
US6577865B2 (en) * 1998-11-05 2003-06-10 Ulysses Holdings, Llc System for intercept of wireless communications
US20040203879A1 (en) * 2002-10-24 2004-10-14 Gardner Michael R. System and method for E911 location privacy protection

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4672653A (en) * 1986-01-15 1987-06-09 Loveless John H Remote security system
US4908604A (en) * 1987-09-21 1990-03-13 Dimango Products Corporation Remotely controlled security system
US5920270A (en) * 1994-07-22 1999-07-06 Digital Security Controls Ltd. Security system remote control
CA2337508A1 (en) 1998-07-20 2000-01-27 Signalsoft Corp. Subscriber delivered location-based services
US6321092B1 (en) 1998-11-03 2001-11-20 Signal Soft Corporation Multiple input data management for wireless location-based applications
WO2001026393A1 (en) 1999-10-01 2001-04-12 Signalsoft Corp. Location based auctioning services for wireless networks
US6424840B1 (en) 1999-11-05 2002-07-23 Signalsoft Corp. Method and system for dynamic location-based zone assignment for a wireless communication network
WO2001033825A1 (en) 1999-11-05 2001-05-10 Signalsoft Corp. Spatial toolkits for wireless location based services

Patent Citations (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5255306A (en) * 1991-01-10 1993-10-19 Bi Inc. Cellular interface unit for use with an electronic house arrest monitoring system
US5884221A (en) * 1991-01-17 1999-03-16 Highwaymaster Communications, Inc. Vehicle locating and communicating method and apparatus
US5208756A (en) * 1991-01-28 1993-05-04 Song Han L Vehicle locating and navigating system
US5218367A (en) * 1992-06-01 1993-06-08 Trackmobile Vehicle tracking system
US5721678A (en) * 1993-03-23 1998-02-24 Mannesmann Aktiengesellschaft Arrangement for a use billing system
US5787354A (en) * 1994-02-24 1998-07-28 Gte Mobile Communications Service Corporation Method and apparatus for locating a radiotelephone within a cellular system
US5461390A (en) * 1994-05-27 1995-10-24 At&T Ipm Corp. Locator device useful for house arrest and stalker detection
US5577100A (en) * 1995-01-30 1996-11-19 Telemac Cellular Corporation Mobile phone with internal accounting
US5767788A (en) * 1996-03-19 1998-06-16 Ness; James C. Computer aided dispatch and locator cellular system
US6256504B1 (en) * 1996-04-10 2001-07-03 Motorola, Inc. Apparatus and method for billing in a wireless communication system
US5774802A (en) * 1996-04-10 1998-06-30 Motorola Inc. Apparatus and method for billing in a wireless communication system
US5731757A (en) * 1996-08-19 1998-03-24 Pro Tech Monitoring, Inc. Portable tracking apparatus for continuous position determination of criminal offenders and victims
US6456852B2 (en) * 1997-01-08 2002-09-24 Trafficmaster Usa, Inc. Internet distributed real-time wireless location database
US6104931A (en) * 1998-04-20 2000-08-15 Ericsson Inc. System and method for defining location services
US6134447A (en) * 1998-05-29 2000-10-17 Ericsson Inc. System and method for monitoring and barring location applications
US6360102B1 (en) * 1998-09-10 2002-03-19 Ericsson Inc. System and method for defining a subscriber location privacy profile
US6577865B2 (en) * 1998-11-05 2003-06-10 Ulysses Holdings, Llc System for intercept of wireless communications
US6212392B1 (en) * 1999-02-26 2001-04-03 Signal Soft Corp. Method for determining if the location of a wireless communication device is within a specified area
US6463288B1 (en) * 1999-03-18 2002-10-08 Ericsson Inc. System and method for monitoring positioning requests for mobile subscribers
US6282427B1 (en) * 1999-07-14 2001-08-28 Telefonaktiebolaget L M Ericsson (Publ) Selection of location measurement units for determining the position of a mobile communication station
US20020183077A1 (en) * 2000-12-30 2002-12-05 Mundi Fomukong Method and apparatus for locating mobile units tracking another or within a prescribed geographic boundary
US20040203879A1 (en) * 2002-10-24 2004-10-14 Gardner Michael R. System and method for E911 location privacy protection

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080198993A1 (en) * 2005-05-31 2008-08-21 Amedeo Imbimbo Lawful Interception Method and Architecture for Transparent Transmission of Interception Information
US8265077B2 (en) * 2005-05-31 2012-09-11 Telefonaktiebolaget Lm Ericsson (Publ) Lawful interception method and architecture for transparent transmission of interception information
US8478227B2 (en) * 2005-12-22 2013-07-02 Telefonaktiebolaget Lm Ericsson (Publ) System and method for lawful interception of user information
US20080280609A1 (en) * 2005-12-22 2008-11-13 Amedeo Imbimbo Provisioning of User Information
US20100291906A1 (en) * 2006-12-05 2010-11-18 Deluca Enrico Systems and methods for location related data interception
US20100115018A1 (en) * 2008-10-31 2010-05-06 Electronics And Telecommunications Research Institute Interception method interworking with communication network and internet network
US20110314177A1 (en) * 2010-06-18 2011-12-22 David Harp IP Traffic Redirection for Purposes of Lawful Intercept
US8756339B2 (en) * 2010-06-18 2014-06-17 At&T Intellectual Property I, L.P. IP traffic redirection for purposes of lawful intercept
US20120088532A1 (en) * 2010-10-11 2012-04-12 Motorola, Inc. Method and apparatus for radio frequency fingerprint distribution
US8457673B2 (en) * 2010-10-11 2013-06-04 Motorola Mobility Llc Method and apparatus for radio frequency fingerprint distribution
US8903424B2 (en) 2011-02-15 2014-12-02 Technocom Corporation System and method for dynamically monitoring status in location services
US20120208550A1 (en) * 2011-02-15 2012-08-16 Technocom Corporation System and method for dynamically monitoring status in location services
US8755823B2 (en) * 2011-02-15 2014-06-17 Technocom Corporation System and method for dynamically monitoring status in location services
US9973541B2 (en) 2011-03-29 2018-05-15 Telefonaktiebolaget Lm Ericsson (Publ) Lawful interception in an IP multimedia subsystem network
US9026645B2 (en) * 2011-03-29 2015-05-05 Telefonaktiebolaget L M Ericsson (Publ) Lawful interception in an IP multimedia subsystem network
US20120252485A1 (en) * 2011-04-01 2012-10-04 Wolverton Andrew N System and Method for Determining Best Available Location for a Mobile Device
US8712019B2 (en) * 2011-11-14 2014-04-29 Qualcomm Incorporated Apparatus and method for performing lawful intercept in group calls
US20130182118A1 (en) * 2012-01-13 2013-07-18 Tim J. Olker Method For Performing Video Surveillance Of A Mobile Unit
US9161196B2 (en) * 2012-08-07 2015-10-13 Google Technology Holdings LLC Apparatus and method for secure private location information transfer
US8892132B2 (en) 2012-09-05 2014-11-18 Motorola Solutions, Inc. Analytic and tracking systems and methods using over-the-air identifiers of mobile devices
US8768315B2 (en) 2012-09-05 2014-07-01 Motorola Solutions, Inc. Method and apparatus for identifying a suspect through multiple correlated device identities
US9084103B2 (en) 2012-09-05 2015-07-14 Motorola Solutions, Inc. Analytic and tracking systems and methods using over-the-air identifiers of mobile devices

Also Published As

Publication number Publication date
US7231218B2 (en) 2007-06-12
EP1460876A2 (en) 2004-09-22
US20040185875A1 (en) 2004-09-23

Similar Documents

Publication Publication Date Title
US7231218B2 (en) Lawful intercept service
US10354079B2 (en) Location-based security rules
US6167266A (en) Method for handling of positioning triggers for batch location requests within a location services system
US7133685B2 (en) Monitoring boundary crossings in a wireless network
CN102640090B (en) Location intelligence management system
US7966020B2 (en) Wireless user based notification system
US8878681B2 (en) Location based proximity alert
US8849254B2 (en) Location intelligence management system
US7224956B1 (en) Enhanced 911 system for providing witness identification in a wireless communication system
US7468659B2 (en) Method of configuring a tracking device
EP2070354B1 (en) System, apparatus and method for location related data interception
US20050202832A1 (en) Privacy features for a cellular telephone location identification system
US20050032532A1 (en) Method for the provision of location information
US20080108330A1 (en) Methods, systems and computer products for notification to a remote party of mobile party presence status change
KR20070116912A (en) Location-based emergency announcements
US8208892B2 (en) Remotely activatable locator system and method using a wireless location system
US8467808B1 (en) Mobile object location-based privacy protection
US11477615B2 (en) Alerting mobile devices based on location and duration data
EP2544468B1 (en) Region access platform, mobile positioning method and system
CN110913347B (en) Precise positioning method for 5G mobile phone alarm person
US10506415B1 (en) Mobile-initiated SMS cell broadcast
US9565527B1 (en) Location-based services for exigent circumstances
US11756141B2 (en) Communications systems, methods, and devices
KR100764471B1 (en) Method for service periodic location information using mobile phone
WO2011058499A1 (en) Methods for profiling cellular network towers and locating mobile communication device, and tools therefrom

Legal Events

Date Code Title Description
AS Assignment

Owner name: OPENWAVE SYSTEMS, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DIACAKIS, ATHANASSIOS;PAVLIDIS, IOANNIS;HEBERT, PAUL JOSEPH;REEL/FRAME:019429/0589

Effective date: 20040312

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION