US20230209626A1 - System and Method for Image Matching Using Networked Mobile Communication - Google Patents
System and Method for Image Matching Using Networked Mobile Communication Download PDFInfo
- Publication number
- US20230209626A1 US20230209626A1 US18/109,426 US202318109426A US2023209626A1 US 20230209626 A1 US20230209626 A1 US 20230209626A1 US 202318109426 A US202318109426 A US 202318109426A US 2023209626 A1 US2023209626 A1 US 2023209626A1
- Authority
- US
- United States
- Prior art keywords
- user
- mobile computing
- computing device
- proximity
- users
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/14—Direct-mode setup
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/2866—Architectures; Arrangements
- H04L67/30—Profiles
- H04L67/306—User profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/06—Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
- H04W4/08—User group management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/20—Services signaling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel
- H04W4/21—Services signaling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel for social networking applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/11—Allocation or use of connection identifiers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/186—Processing of subscriber group data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/005—Discovery of network devices, e.g. terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/02—Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
Definitions
- U.S. patent application Ser. No. 17/141,553 is a Continuation Application of U.S. patent application Ser. No. 16/552,834, filed Aug. 27, 2018, now U.S. Pat. No. 10,887,937, issued Jan. 5, 2021.
- U.S. patent application Ser. No. 16/552,834 is a Continuation Application of U.S. patent application Ser. No. 15/846,972, filed Dec. 19, 2017, now U.S. Pat. No. 10,397,971, issued Aug. 27, 2019.
- U.S. patent application Ser. No. 15/846,972 claims priority to U.S. patent application Ser. No. 15/132,868, filed Apr. 19, 2016, now U.S. Pat. No. 9,854,616.
- U.S. patent application Ser. No. 15/132,868 claims priority to Provisional Patent Application No. 62/152,838 filed Apr. 25, 2015, Provisional Patent Application No. 62/218,487 filed Sep. 14, 2015 and Provisional Patent Application No. 62/260,593 filed Nov. 29, 2015, which are filed by the inventors hereof and the entirety of which are incorporated by reference herein.
- the present disclosure relates generally to digital communication systems and methods and more specifically to digital communication systems and methods for image matching.
- Users of mobile communication devices are able to connect with one another through the use of social networking platforms in conjunction with applications on the mobile communication devices using a communication protocol.
- the communication protocol can be cellular or wireless based.
- a user of a mobile communication device In order to connect with a member of a social networking platform, a user of a mobile communication device must first register with the social networking platform and have some knowledge of the member to whom the connection is desired. The knowledge of the member allows the user of the mobile communication device to send a connection request to the member.
- connection request by the member is required for the user of the mobile communication device to communicate directly with the member.
- the user of the mobile communication device is seemingly a stranger and has no way of communicating with the member.
- a server communicates with a plurality of mobile computing devices, each mobile computing device associated with one or more Unique User Identifiers (UUIDs).
- the devices have means for connecting the mobile computing devices to the server and registering the UUIDs on said server through a network; and a database connected to the server and comprising the uploaded UUIDs and associated data.
- the server receives and sends communications to and from the mobile computing devices, receives UUIDs and associated data from mobile computing devices, and sends UUIDs and associated data to one or more mobile computing devices.
- the user's mobile computing device is used to identify an image and to determine an image resemblance measured with facial recognition algorithms that represent deviations in facial features and dimensions.
- FIG. 1 is a schematic diagram illustrating a system for proximity based networked mobile communication according to the present disclosure.
- FIGS. 2 A- 2 C are schematic diagrams illustrating a system for proximity based networked mobile communications in various environments.
- FIG. 2 A illustrates a system for proximity based networked mobile communication in which at least one mobile device is outside of Wi-Fi range.
- FIG. 2 B illustrates a system for proximity based networked mobile communication communicating with users within Wi-Fi range of each other.
- FIG. 2 C illustrates a system for proximity based networked mobile communication used to communicate with a fixed station.
- FIGS. 3 A and 3 B are schematic flow charts showing downloading, installation and registration of a mobile device.
- FIG. 3 A illustrates a mobile application process according to the present disclosure.
- FIG. 3 B illustrates a mobile application process according to the present disclosure.
- FIG. 4 is a schematic block diagram illustrating a server system according to the present disclosure.
- FIG. 5 is a schematic diagram illustrating a user interface scenario according to the present disclosure.
- FIG. 6 is a schematic diagram illustrating an exemplary computer architecture for use with the present disclosure.
- FIGS. 7 A and 7 B are schematic diagrams showing the operation of the system without and with an ability to respond when a mobile device is in an “inactive” mode.
- FIG. 7 A shows a configuration in which “inactive mode” response is not enabled.
- FIG. 7 B shows what a proximity-based system in accordance with the mobile device able to respond when in an “inactive” state.
- FIG. 8 is a schematic diagram of a group of mobile devices associated with users in proximity to each other and in proximity to a Wi-Fi hot spot.
- FIG. 9 is a schematic block diagram showing the communication used to establish groups.
- FIGS. 10 A- 10 C are representations of mobile device displays of contacts or other users to provide a proximity display.
- FIG. 10 A depicts a starting page.
- FIG. 10 B depicts a similar page obtained by removing message information.
- FIGS. 11 A and 11 B are schematic diagrams depicting a Presence Group Aggregation System platform in its functional aspect.
- FIG. 11 A shows establishing proximity.
- FIG. 11 B is a three ring model, based on the diagram of FIG. 11 A , based on a user's nearby user experience.
- a plurality of users each associated with a mobile computing device is within proximity of a wireless frequency range including Wi-Fi and/or Bluetooth (registered trademark of Bluetooth Special Interest Group of Kirkland, Wash.).
- a mobile application on a registered mobile computing device causes the mobile computing device to advertise and listen to unique user identifiers via wireless including Bluetooth frequencies.
- “advertise” refers to broadcast of data so that other devices within range may become aware of the presence of the device broadcasting the data.
- UUID Unique User Identification
- MAC address MAC address
- SSID SSID information
- unique identifiers obtained as either direct device identification (e.g., MAC address) or assigned identifiers (e.g., UUID)
- direct device identification e.g., MAC address
- UUID assigned identifiers
- positive matches of registered members are displayed on the mobile computing device and communication between the mobile computing device and mobile computing devices associated with registered members is enabled.
- UUID has particular advantages, in that the UUID is intended for broadcast transmission, whereas some other identifiers, such as MAC addresses, are not always available for security or other reasons.
- a registered user of the proximity based networked communication system can communicate with other registered users purely based on proximity rather than prior knowledge of the registered users.
- a registered user of the proximity based networked communication system can broadcast a message, view profiles of nearby users, comment on photos, and anonymously and non-anonymously choose “Gifts” to post next to the picture, call and/or video conference to other registered users who are within proximity of the registered user. Examples of such a scenario include social scenarios as well as law-enforcement scenarios such as Amber alerts (information regarding missing children).
- the system can show both users each other as soon as the first user sees the second user.
- the system does not wait for B to identify A; it already shows A on B's display screen as soon as B is shown on A's screen.
- the system also shows A what is on C's Screen.
- the users' phone number database can also be integrated such that the system provides a warning that someone in their phone book contacts is within a user's “proximity zone”.
- the system may create special status for people that the user wishes to see or avoid.
- the special status for people that the user wishes to see can include, by way of non-limiting example, best friends or crushes, so that one can observe which of their social media contacts, friends and friends of friends are within the proximity.
- the special status for people that the user wishes to avoid can include former partners, people restricted by restraining orders, parents, friends and relatives.
- the system also has a capability of using a sex offender database to warn parents that that a possible sex offender is within the Wi-Fi-“danger” zone or proximity.
- the system can cross reference phone numbers and social media stored within the phone.
- the system may also be integrated with social networking and professional social networking profiles with this application for business conferences.
- Tinder and similar dating and/or a features allows users to indicate dating and/or business interest in other nearby users, and which will only notify the other users if the other user also indicated this same interest.
- This system will be highly effective and efficient in matchmaking between people within conferences, nightclubs and bars.
- the system can link to niche dating sites and other special interest groups, so that users who so-desire can identify other users who are in the proximity and who share the same common interests.
- the system can further filter such associations according to subscriber status, provided that the site permits such information to be accessed.
- information concerning special interests is provided only if the user is also subscribed to or identified with the special interest.
- the user can select whether to limit disclosure of the special interest.
- Integration with point of sale systems such as Google Wallet, ApplePay and Paypal may be obtained.
- Integration with social media sites e.g., Facebook
- social media sites can be used to allow members to send invites and to reveal their social media links and their mutual friends when in social venues where they would like to share that information.
- payment can be made through the system, externally, or according to the user's choice.
- the disclosed technology will additionally provide a peer-to-peer ride sharing platform which will allow users to send ride requests by selecting their destination and choosing their own price that they are willing to pay. All nearby users of the disclosed technology will receive this ride request and they will have the ability to agree or to send a counter offer.
- the close range network will be ideal in providing the user with individuals who are in the immediate vicinity and thus immediately ready to initiate the requested journey.
- the Payment processing system will require users to scan a credit card and will hold a deposit in order to only allow prepaid users to send ride requests.
- the disclosed technology will also provide users the ability to request food at the click of a button. Utilizing a proximity nearby user that represents the nearby food production services, for example the nearby restaurants will be able to join the network using a special commercial account, and this will allow users to instantly make orders by clicking on the Profiles of these nearby options. This will provide the advantage of exclusively providing its own food delivery services to nearby users.
- the disclosed technology is useful, when coupled with facial images, to associate these individuals with profiles of individuals in proximity to the user, receiving, from the mobile device an image of a person.
- Facial recognition can be used to determine if a match exists between the image and a user detected in proximity to the device providing the image of the person. This is useful for identification of people who a user may recognize but not know their name and for assisting people with prosopagnosia.
- the server can use facial recognition to determine if a match exists between the image and a user in proximity to the user providing the image.
- the disclosed technology will additionally have the ability to provide users with other individuals in the database that most resemble that individual. Resemblance is measured with facial recognition algorithms that represent deviations in facial features and dimensions. This service provides entertainment value as well as the service of giving people “another chance” at romance with their specific taste.
- the face recognition can be performed by the user's mobile device or by face recognition software on a server.
- FIG. 1 is a schematic diagram illustrating a system for proximity based networked mobile communication 100 according to the present disclosure.
- proximity based networked mobile communication system 100 comprises a first mobile device 101 having a first mobile computing device 102 communicably coupled via internet/communication network 107 to server system 108 .
- the system 100 further comprises a second mobile device 103 having a second mobile computing device 104 communicably coupled via internet/communication network 107 to server system 108 .
- Internet/communication network 107 can be any communication network that allows data to be communicated or transferred from one point to another. Such a network might be wired or wireless as deemed necessary to be consistent with the spirit and scope of the present disclosure.
- the first mobile device 101 can utilize a mobile application (not shown here) on mobile computing device 102 to access server system 108 to register with server system 108 to become a member of the proximity based networked mobile communication system.
- the second mobile device 103 can utilize a mobile application (not shown here) on mobile computing device 104 to access server system 108 to register with server system 108 to also become a member of the proximity based networked mobile communication system.
- the first mobile device 101 and second mobile device 103 utilize the mobile application on their respective devices ( 102 , 104 ) to communicate with each other while their devices are both within a wireless frequency range including Wi-Fi and/or Bluetooth 105 .
- Wireless frequency range including Wi-Fi and/or Bluetooth 105 is associated with internet router 106 ; that is, in the present configuration, internet router 106 is either Bluetooth enabled and/or has Wi-Fi capability.
- Router 106 receives data from internet/communication network.
- Router 106 is a Wi-Fi router capable of receiving data from the internet and that is compliant with 802.11 standards or with other appropriate standards.
- Router 106 is capable of receiving data from internet/communication network 107 .
- Router 106 is also/or Bluetooth capable, operating in the unlicensed industrial, scientific and medical (ISM) band at 2.4 to 2.485 GHz, using a spread spectrum, frequency hopping, full-duplex signal at a nominal rate of 1600 hops/sec.
- ISM industrial, scientific and medical
- the first mobile device 101 and second mobile device 103 can then perform functionalities related to proximity based networked mobile communication consistent with the spirit and scope of the present disclosure. Although not shown, further descriptions of various configurations of the disclosed technology will be described with reference to the following figures.
- FIGS. 2 A- 2 C are schematic diagrams illustrating a system for proximity based networked mobile communications in various environments.
- FIG. 2 A illustrates a system for proximity based networked mobile communication in which at least one mobile device is outside of Wi-Fi range.
- FIG. 2 B illustrates a system for proximity based networked mobile communication communicating with users within Wi-Fi range of each other.
- FIG. 2 C illustrates a system for proximity based networked mobile communication used to communicate with a fixed station.
- internet router 206 provides for wireless frequencies including wireless frequency range including Wi-Fi and/or Bluetooth 205 .
- Users 201 , 203 , 209 , and 211 each have respective mobile computing devices 202 , 204 , 210 , and 212 and all of them are within wireless frequency range including Wi-Fi and/or Bluetooth 205 .
- a user 215 having mobile computing device 216 is not within the wireless frequency range including Wi-Fi and/or Bluetooth 205 . Regardless of whether user 215 is registered with the proximity based networked mobile communication system, because user 215 is outside of the wireless frequency range including Wi-Fi and/or Bluetooth 205 , the users and their mobile computing devices within the wireless frequency range including Wi-Fi and/or Bluetooth cannot communicate with user 215 through the system.
- each of the users 201 , 203 , 209 , and 211 may use their respective mobile computing devices 202 , 204 , 210 , and 212 while within wireless frequency range including Wi-Fi and/or Bluetooth 205 to request a social networking connection with any of the other devices.
- Social networking can include Facebook, Twitter, Instagram, and the like, as well as specialized and professional social networking services.
- FIG. 2 B illustrates a system for proximity based networked mobile communication 220 according to the present disclosure.
- internet router 206 provides for a wireless frequency range including Wi-Fi and/or Bluetooth 205 .
- Users 201 , 203 , 209 , and 211 each have respective mobile computing devices 202 , 204 , 210 , and 212 and all of them are within wireless frequency range including Wi-Fi and/or Bluetooth 205 .
- all of the users 201 , 203 , 209 , and 211 and their respective mobile computing devices 202 , 204 , 210 , and 212 are within wireless frequency range including Wi-Fi and/or Bluetooth 205 . Because they are all registered members of the proximity based networked mobile communication system, user 203 can broadcast a message, call and/or video conference and view/comment/“gift” photos using mobile computing device 204 to the other users 209 , 201 , 211 and their devices 210 , 202 , 212 .
- FIG. 2 C illustrates a system for proximity based networked mobile communication 240 according to the present disclosure.
- internet router 206 provides for a wireless frequency range including Wi-Fi and/or Bluetooth 205 .
- Users 201 , 203 , and 213 each have respective mobile computing devices 202 , 204 , and 214 and all of them are within wireless frequency range including Wi-Fi and/or Bluetooth 205 .
- user 213 provides a service or product desired by users 201 and 203 .
- All of the users 201 , 203 , and 213 and their respective mobile computing devices 202 , 204 , and 214 are within wireless frequency range including Wi-Fi and/or Bluetooth 205 . They are all registered members of the proximity based networked mobile communication system.
- users 203 and 201 can use their respective devices 204 and 202 to transmit order requests to user 213 's computing device 214 .
- users 203 and 201 can use their respective devices 204 and 202 to complete payment for their orders via payment processing with computing device 214 and a third party payment service.
- FIGS. 3 A and 3 B are schematic flow chart showing the installation and operation of a mobile application process onto a mobile device.
- FIG. 3 A illustrates the mobile application process according to the present disclosure.
- FIG. 3 B illustrates a mobile application process according to the present disclosure.
- the mobile application enables the mobile computing device to communicate on the networked communication system according to the present disclosure.
- a user having a mobile computing device downloads and installs a mobile application (step 301 ) onto the device.
- the mobile application causes the mobile computing device to connect to a remote server (step 302 ).
- the user registers with the remote server (step 303 ).
- profile components are transmitted from the mobile computing device to the server (step 304 ).
- Profile components can include the user's name and a digital photograph of the user, as well as any other information the user would like to include in the profile.
- the mobile application further causes the mobile computing device to transmit the device's Unique Identifiers, including but not limited to a randomly generated identifier, Unique User Identification (UUID) such as Bluetooth Low Energy UUID &/or Randomly Generated Identifier from 0 to 4294967295, MAC address (step 305 ) to the server as well as an SSID (step 306 ).
- UUID Unique User Identification
- MAC address MAC address
- a mobile application causes a mobile computing device to broadcast an “advertisement hotspot” (step 307 ) for a predefined period of time.
- the predefined period of time can be based on proximity and frequency of user input or stimuli.
- “advertising” refers to signaling the presence of a mobile device, such as by transmitting a radio beacon.
- the mobile application further causes the mobile computing device to scan “listen” for Wi-Fi and Bluetooth advertisements, for example by using a Bluetooth LE Advertising Capability, or hotspots (step 308 ).
- the mobile computing device transmits the detected unique identification hotspot information to the remote server system (step 309 ).
- the mobile computing device receives user information from the server (step 310 ).
- the mobile application displays the received user information (step 311 ), thereby displaying registered users within proximity of the mobile computing device.
- communication is enabled (step 312 ) between the mobile computing device and any of the registered users within proximity of the mobile computing device.
- communication between the mobile computing device and the registered users within proximity of the mobile computing device only continues as long as the mobile computing device and devices associated with the registered users remain within proximity of the mobile computing device.
- FIG. 4 is a schematic block diagram illustrating a server system 108 according to the present disclosure.
- server system 108 includes application server 404 .
- Application server 404 controls all networked communication capabilities accessible by members of the network.
- Mobile computing devices associated with members of the system transmit information to the server system 108 .
- the information is processed by a hotspot (Unique Identifier Advertisement) and user information retrieval module 406 .
- Server 108 is communicably coupled to database 418 , in which information for all registered users and hotspots and device information is stored.
- FIG. 5 is a schematic diagram illustrating a user interface scenario according to the present disclosure.
- a wireless frequency range including Wi-Fi and/or Bluetooth 105 includes a plurality of users in its proximity. Users A, B, and C are within proximity of wireless frequency range including Wi-Fi and/or Bluetooth 105 , and their presence is indicated on the user interfaces of mobile computing devices of other users in wireless frequency range including Wi-Fi and/or Bluetooth 105 . User D, who has recently left the wireless frequency range including Wi-Fi and/or Bluetooth , is also displayed as such.
- FIG. 6 is a schematic diagram illustrating an exemplary computer architecture 600 for use with the present disclosure.
- server system employs architectures similar to that depicted in FIG. 6 .
- the present disclosure comprises various computing entities that may have an architecture according to exemplary architecture 600 .
- One configuration of architecture 600 comprises a system bus 620 for communicating information, and a processor 610 coupled to bus 620 for processing information.
- Architecture 600 further comprises a random access memory (RAM) or other dynamic storage device 625 , which functions as a main memory, coupled to bus 620 for storing information and instructions to be executed by processor 610 .
- Data storage device 625 also may be used for storing temporary variables or other intermediate information during execution of instructions by processor 610 .
- Architecture 600 may also include a read only memory (ROM) and/or other static storage device 626 coupled to bus 620 for storing static information and instructions used by processor 610 .
- ROM read only memory
- a data storage device 625 such as a magnetic disk or optical disc and its corresponding drive may also be coupled to architecture 600 for storing information and instructions.
- Architecture 600 can also be coupled to a second I/O bus 650 via an I/O interface 630 .
- a plurality of I/O devices may be coupled to I/O bus 650 , including a display device 643 , an input device (e.g., an alphanumeric input device 642 and/or a cursor control device 641 ).
- the communication device 640 allows for access to other computers (e.g., servers or clients) via a network.
- the communication device 640 may comprise one or more modems, network interface cards, wireless network interfaces or other interface devices, such as those used for coupling to Ethernet, token ring, or other types of networks.
- system of the present disclosure comprises the following systems configuration to optimize the communication network. Once the first user has received a positive identity of a nearby user; both users will appear on each other's software modules.
- FIGS. 7 A and 7 B are schematic diagrams showing the operation of the system without and with an ability to respond when a mobile device is in an “inactive” mode.
- FIG. 7 A shows a configuration of a system 701 in which “inactive mode” response is not enabled
- FIG. 7 B shows a configuration of a system 702 in which the “inactive mode” is enabled.
- Both FIGS. 7 A and 7 B show clustering server 705 , an internet and communication network
- FIG. 7 A shows a configuration in which “inactive mode” response is not enabled.
- FIGS. 7 A and 7 B show clustering server 705 , an internet and communication network, represented by cloud 707 and multiple mobile devices 711 , 712 , 713 , 714 , associated with users.
- system 701 also includes additional mobile devices namely mobile device 713 and mobile device 714 , which are also registered with clustering server 1002 .
- Mobile devices 711 , 712 , 713 , 714 have been previously registered with clustering server 705 .
- FIG. 7 A shows direct communications executed through internet and communication network 707 or directly device-to-device between active devices.
- Clustering server 705 is also communicably coupled to another mobile device 712 via internet and communication network 707 .
- FIG. 7 B shows the system operating as a proximity-based system in accordance with the mobile device able to respond when in an “inactive” state.
- Configurations of the disclosed technology aggregates detected clusters of nearby users based on beacon detection.
- each user device includes a BLE (Bluetooth Low Energy) beacon that can transmit small amounts of data.
- BLE Bluetooth Low Energy
- a configuration of the disclosed technology creates clusters of currently active user groups.
- clusters are populated by active users within proximity of each other.
- an active mobile device 712 might have an initiated clustering application and an active beacon; a mobile device 713 may include an initiated clustering application as well as an active beacon; and a mobile device 714 may include an initiated clustering application as well as an active beacon.
- the cluster would be populated by mobile device 712 and mobile device 713 and mobile device 714 .
- the system is able to be adjusted to provide a lag in the timeframe that individuals disappear from a user's nearby view controller. This is a critical element in extending the network of nearby users, so that more individuals will be visible to one another.
- the shaded areas around mobile devices 712 , 713 and 714 represent the Wi-Fi-range of mobile device 712 .
- the algorithm for aggregating users is based on periodic detection reports from mobile devices.
- Each listening mobile device periodically detect another mobile device and send information about the detected mobile device to the user.
- each mobile device sends not only its identifier to a clustering server (e.g. server system 108 ) that stores and processes user and cluster membership information, each mobile device also sends the identifiers of other detected devices.
- a clustering server e.g. server system 108
- Mobile device 711 is active, that is, it has an active (advertising) beacon (not shown) and a proximity-based network application (not shown) that is active.
- Mobile device 712 also has an active beacon (not shown) and a proximity-based network application (not shown) that is active.
- mobile device 711 In operation, because mobile device 711 is on (active), it can detect and communicate with mobile device 712 , which is within proximity (Wi-Fi or Bluetooth based communication). Mobile device 712 can similarly communicate with mobile device 711 because they are proximal to each other. Each of mobile device 711 and mobile device 712 can further communicate with clustering server 705 via internet and communication network 707 .
- mobile device 713 cannot communicate with mobile device 711 because mobile device 713 is inactive. No communication occurs as long as mobile device 713 remains inactive even though mobile device 711 is active.
- inactive means that mobile device 713 has an active listening beacon but has a proximity-based network advertising application that is not running.
- Mobile device 714 also cannot communicate with mobile device 711 because mobile device 714 is inactive, having an active beacon and an inactive advertising proximity-based network application. Further, neither mobile device 713 nor mobile device 714 can communicate with clustering server 705 as mobile device 713 and mobile device 714 are inactive.
- FIG. 7 B shows what a proximity-based system 702 in accordance with the mobile device being able to respond when in an “inactive” state.
- proximity-based system 702 includes clustering server 705 that is communicably coupled to mobile device 711 via internet and communication network 707 .
- system 702 also includes additional mobile devices including mobile device 712 , mobile device 713 and mobile device 714 , which are have been previously registered with clustering server 705 .
- Mobile device 711 is active, that is, it has an active beacon (not shown) and a proximity-based network application (not shown) that is active.
- Mobile device 712 , mobile device 713 and mobile device 714 are inactive; they each have a beacon; however, their proximity-based network application (not shown) has not been executed and is inactive.
- a mobile device is “inactive” when the device's user interface application has been terminated intentionally by the user “shut down” or been sent to the background whereas.
- the phone is “inactive” when the phone is not advertising Unique Identifiers (e.g., Bluetooth Low Energy UUID &/or Randomly Generated Identifier from 0 to 4294967295) but it is still listening to unique identifiers.
- Unique Identifiers e.g., Bluetooth Low Energy UUID &/or Randomly Generated Identifier from 0 to 4294967295
- the mobile device senses a unique identifier advertisement the device immediately transmits this user's ID to the server via various methods including currently a web service call.
- FIG. 7 B In operation, unlike the system 701 of FIG. 7 A that requires that two mobile devices be active in order to communicate, in the configuration of FIG. 7 B , communication is facilitated with “inactive” devices so long as at least one active advertising mobile device is present.
- mobile device 711 is on (active). Once its proximity-based network application is open, mobile device 711 advertises and pings out or transmits signals across using wireless network including Wi-Fi and Bluetooth frequencies. Responsive thereof, although inactive, mobile devices 712 , 713 and 714 are listening and do pickup the advertising signals from mobile device 711 .
- Each of the listening mobile device 712 , 713 and 714 then retrieves the Unique Identifier including but not limited to UUID (Universally Unique Identifier) and/or “randomly generated identifier” associated with mobile device 711 . Then mobile device 712 , mobile device 713 and mobile device 714 all separately send the retrieved Unique identifier, for example UUID “randomly generated identifier”, for 711 as well as each of their own UUIDs to clustering server 902 .
- UUID Universally Unique Identifier
- the communication from the mobile devices arrive as separate web service calls; the service calls are then logically linked and grouped based on pairs of the mobile device 711 's Unique ID and the transmitters ID (UUID).
- UUID Unique ID and the transmitters ID
- This new user presence group is communicated to mobile device 711 and mobile devices 712 , 713 and 714 and the result is that devices 711 , 712 , 713 and 714 “the users in proximity” appear as nearby users on the phones of devices 711 , 712 , 713 and 714 .
- the user of device 711 would not be able to see any of devices 712 , 713 and 714 . Therefore the disclosed technology is revolutionary in terms of its abilities to create a viable proximity based communication platform.
- the clustering server applies the following algorithm to group them together:
- a purge cycle is run.
- all users that are part of a presence group that have not detected any other user in the presence group or have not been detected by any other users in the presence group in a specified period are purged from their presence group.
- This period referred to as the timeout period may be 60 seconds, for example. Users that are grouped by detections will time out and become degrouped after an adjustable amount of seconds of no detections.
- the web service returns the list of identifiers for the other users that are in the same presence group as the user reporting detections.
- FIG. 8 is a schematic diagram of a group of mobile devices 801 - 804 associated with users in proximity to each other and in proximity to a Wi-Fi hot spot 811 .
- the system populates user clusters that include no more than one active user, such as mobile device 801 , where the rest of the mobile devices 802 , 803 , 804 can be inactive.
- a user cluster might be populated with an active mobile device 801 , an inactive mobile device 802 and inactive mobile device 803 .
- Active mobile device 801 is a mobile/computing device that includes an active advertising beacon and a proximity-based network application developed in accordance with a configuration of the disclosed technology. Active mobile device 801 starts the proximity-based network application, which then remains active along with the beacon.
- Inactive mobile device 802 is a mobile/computing device that includes an active advertising beacon as well as the proximity-based network application of the present configuration.
- the proximity-based network application is not executed and remains inactive. This occurs for example on iPhones, in which, when the app has been put into the background or has been terminated by the user, the app will no longer advertise its Unique Identifier UUID ‘and/or ‘randomly generated identifier’’, and the fact that it stops advertising limits the nearby users able to detect it. This is also the permanent case for Android Devices 4 . 3 and higher which do not have Bluetooth LE Advertising Capabilities. Therefore the disclosed technology has created a viable system to workaround this technological limitation.
- inactive mobile device 803 is a mobile/computing device that includes an active advertising beacon and an inactive proximity-based network application.
- mobile device 804 may be considered to be within a desired proximity to mobile device 801 , mobile device 804 is outside of the proximity of Wi-Fi hot spot 811 , and also is outside of direct communication range and Bluetooth LE Advertising Capabilities of mobile device 801 . Mobile device 804 is, however within direct communication range and Bluetooth LE Advertising Capabilities of mobile device 803 . Since mobile device 803 is able to relay the UUID and/or “randomly generated identifier” of mobile devices 801 and 804 , mobile devices 801 and 804 are made aware of their mutual proximity.
- This configuration also applies to the immediate sharing of secondary identified users. For example not only does mobile device 801 not wait for mobile device 802 to identify mobile device 801 , but it already shows mobile device 801 on mobile device 802 's display screen as soon as mobile device 802 is shown on mobile device 801 's screen.
- the system also shows mobile device 801 what is on mobile device 803 's screen. For example the user of mobile device 801 sees mobile devices 802 and 803 but does not see mobile device 804 , either because mobile device 804 is too far away or because it just has not processed it yet. In such a configuration, if any other user in proximity: if either mobile device 802 or mobile device 803 detects mobile device 804 , then mobile device 801 will detect mobile device 804 as well. In this manner, there are no communication delays which are otherwise caused from users observing each other at different second intervals between network scans, in some cases with minute differentials. As soon as one person in the room picks up, everyone else gets up to speed.
- the “degrees of separation” or proximity are useful to control the size of the presence group. If the area has few local users, it is likely that the user would want to engage several degrees of separation until the physical proximity becomes too distant. On the other hand, if there are a large number of eligible users within a small area, then the user may elect to search for fewer degrees of separation.
- the user may wish to select according to category of user. For example, if the user is in a large gathering of people, the user may wish to select members of the user's university, members of the user's social group or another classification. The user may also wish to limit the group to people in the user's addressbook or other list of contacts.
- FIG. 9 is a schematic block diagram showing the communication used to establish presence groups.
- a presence group is a set of other users within proximity to the user.
- the presence group may be established by direct connection via short range radio communication or through a Wi-Fi hotspot. Additionally, the presence group may comprise users who are connected by degree of separation, as will be described.
- “advertising” refers to signaling the presence of a mobile device, such as by transmitting a radio beacon.
- advertising can be performed via Bluetooth or Wi-Fi hotspots.
- the user registers on the system (step 911 ).
- the user's profile is then automatically created via third (step 912 ) by third party application programming interfaces (APIs) such as social media APIs and other networks by which the user is known (step 913 ). It is further possible for the user to establish an identity with the system itself and use that identity for establishing a profile.
- the system's server then generates or issues a unique identifier for the user and links that unique identifier with the user's mobile device (step 914 ).
- the server may assign the same unique identifier (step 914 ) to these additional devices, much as a username-and-password combination can be used by someone to sign on through multiple devices.
- the mobile then initiates listening for incoming identifiers from other mobiles.(step 921 ).
- the identifier is transmitted using standard communication protocols which are available on most Wi-Fi and Bluetooth communication systems.
- the mobile In addition to listening (step 921 ), if the mobile has the required hardware, the mobile broadcasts the unique identifier (step 922 ). This activity is referred to herein as “advertising” in that the wireless device “advertises” its presence during radio beacon transmissions.
- the wireless device also listens (step 931 ) for other devices within its proximity. This is done in both active mode, with the wireless device having full communication and in a quiescent mode, in which the wireless device is not in full operation. If a nearby user is detected (step 937 ), the device sends the detected user's identifier to the server (step 938 ). The detection is then considered established (step 941 ).
- the established detection may be directly from the mobile or indirect from a nearby mobile device, which determines a “degree of separation”.
- the “degree of separation” is similar to a degree of separation in a social sense in that a direct detection would be a first degree of separation (i.e., outside of the user's device).
- a second degree would be a connection identified as a separate device through which a user is in direct communication.
- mobile device 712 is unable to communicate directly with mobile device 704 , there must be more than one degree of separation between mobile devices 712 and 704 . If there is a single intervening communication link, such as from mobile device 712 to mobile device 714 and thence from mobile device 714 to mobile device 704 , there would be two degrees of separation between mobile devices 712 and 704 .
- the degrees of separation are applied to forming presence groups.
- a presence group is established (step 946 ).
- the results are sent back to the user, as the advertising mobile, to update its list of nearby presence groups.
- the updated list is used by the mobile as a new presence group or updated presence group (step 947 ).
- the detections within the presence groups are:
- the system uses these direct and indirect transmissions of mobile identifiers to list users and the proximities of the users in terms of degrees of separation, in order to provide the user with an update of the user's presence group.
- the server then returns data for each user in the presence group and allows communication between users.
- This data may be provided for all instances or provided in response to a request from the user's mobile either at the request of the user or automatically.
- Non-limiting examples of data transferred and communication comprise:
- Additional features can optionally include:
- the system and app have the ability to message, call and video other users. In one configuration, this ability is limited to users who within a predetermined proximity to the user.
- the predetermined proximity can be defined in terms of physical distance, visual proximity, distance as determined by radio signal strength, absolute received radio signal strength, boundaries stored on a server or any convenient means to define proximity.
- the user can limit communications through the system to be received from callers within a degree of proximity determined by the user, and in some configurations, the user can separately limit communications through the system to be sent to people called within a degree of proximity determined by the user. In other configurations, communications to or from other users may be made available for communications with other people selected by the user.
- media may be broadcast to one or a group of, or all other users within a predetermined proximity to the user sending or requesting the broadcast.
- the disclosed technology permits makes proximity via radio signals the determining factor if users can communicate with one another in the system's network, which itself functions as a social network.
- This feature can be combined with external social media applications, in that the user's communication preferences can be combined with proximity via radio signals.
- the combination allows the user to retrieve profiles that meet a predetermined combination of proximity via radio signals and identification of profile links (“Friends”) on social media apps.
- a further configuration of the disclosed technology can disclose social media data, such as but not limited to Facebook. Integrating social media data thereby provides the ability for users to create special status and/or proximity alters of all and/or specific profile links (e.g., Facebook Friends) and/or individuals who have mutual profile links.
- the disclosed technology is clearly not limited to strictly operating as a messenger; it has the ability to provide advantages over common social media apps in terms of providing a default close range social network. Because the individuals that the user views are the ones around the user, in the student housing, school and office environments the utility.
- the disclosed technology allows individual users to view the profiles of their nearby users including photo albums and personal/work information of make comments, start blog and forums, request and accept friendships, like pictures, forum postings, etc. Users have the ability to control their privacy settings to hide their profiles and choose to reveal them to everyone, only friends or on an individual basis.
- FIGS. 10 A- 10 C are representations of mobile device displays of contacts or other users to provide a proximity display.
- FIG. 10 A depicts a starting page.
- FIG. 10 B depicts a similar page obtained by removing message information (in the case of FIG. 10 A incoming text messages).
- FIG. 10 C depicts a selected contact, obtained either from the displayed contacts, a message, voice call or other action, in which the contact is depicted in an enlarged format.
- contacts within a predetermined range of proximity are displayed as images; however, it is anticipated that individual users may select alternative displays, such as text, text and thumbnail image, etc.
- the starting page has the ability to automatically adjust vertically based on the number of nearby users. Therefore when there are no users nearby, the message list will reach the top of the screen and the user will not need to constantly jump back from page to page to check for nearby users. In contrast, the more users that appear, the lower the Message Bar will sink down limiting to one viewable message. Users identified as having social media links with the user are flagged, as indicated at 1011 , 1012 .
- the disclosed technology includes a logical user interface which incorporates a control viewer providing users with an adjustable scrolling grid display of all the users nearby; the viewer constantly adjusts as new nearby users are detected and previously detected users have left proximity after a predetermined amount of seconds.
- the Nearby User display shows users profile picture, User Name and also identifies if the user is a social network link, such as a Friend or Mutual Friend on Facebook, a Connection or Mutual Connection via Linkedin or any other social network that may be integrated into the disclosed technology.
- FIG. 10 B Removal of the message bar is shown in FIG. 10 B .
- Communication with a particular contact highlights that contact, as shown in FIG. 10 C .
- the disclosed technology has the ability to integrate with registered criminal databases in partnership with law enforcement agencies in order to warn parents of potential threats within close proximity.
- the disclosed technology provides the ability to display users social networking services, such as but not limited to LinkedIn profiles; naturally this will be most applicable in conferences, retreats and business networking events whereas users will have the ability to display their resume and business experience as part of their profile, thereby allowing users to rapidly filter the nearby business contacts and expedite their networking goals by focusing on starting conversations with prescreened business interests.
- social networking services such as but not limited to LinkedIn profiles
- the disclosed technology provides the ability to integrate restaurant and business critiquing crowd-source review publishers services, such as but not limited to Yelp, in such way that members of the service will be able to opt-in to the disclosed technology enabling them to identify nearby members within the restaurant and discuss applicable (as well as non-applicable) feedback and input regarding the restaurants and potential dishes of interest or promoted by the restaurant.
- restaurant and business critiquing crowd-source review publishers services such as but not limited to Yelp
- the disclosed technology provides the ability to integrate with geo-based dating applications such as but not limited to Tinder; providing a up-close proximity dating application; most applicable in a nightclub venue settings whereby users will identify their interest and create matches in-close proximity able to instantly communicate in person; therefore exponentially increasing the effectiveness of the app's ability to make successful matches.
- geo-based dating applications such as but not limited to Tinder
- providing a up-close proximity dating application most applicable in a nightclub venue settings whereby users will identify their interest and create matches in-close proximity able to instantly communicate in person; therefore exponentially increasing the effectiveness of the app's ability to make successful matches.
- the disclosed technology provides the ability to integrate customer service systems in order to facilitate customers requesting assistance. For example customer at Walmart needs help on aisle 4, utilizing the disclosed technology he can write an SMS to “Walmart Service Reps” and assistance will confirm that they are on their way. Additionally assistance can rapidly answer geographic based questions regarding locations of goods, etc.
- the disclosed technology provides the ability to integrate ordering systems: Customers will utilize the disclosed technology in order to place an order for goods or services; for example ordering meat at the deli counter at a supermarket. The order is send in an SMS and the order is confirmed with a responding SMS from the butcher.
- the disclosed technology provides the ability to integrate a links to payment systems, such as but not limited to Google Wallet, Apple Pay and PayPal, in order to facilitating purchase to consumers; following the above example the deli counter at a supermarket, the butcher can include, within the order confirmation, a google wallet link enabling the client to click the link and instantly portal to the appropriate google wallet payment screen, thereby further streamlining commerce.
- a links to payment systems such as but not limited to Google Wallet, Apple Pay and PayPal
- the user can set a persistence of presence, by which other users are able to identify that user. Thus, if a user enters an area, other users are able to identify the user according to the proximity and clustering criteria. If the user elects to “sustain” that proximity, the system will continue to provide other users with a proximity indication, even though the user has left the area. The persistence of the “sustain” function remains until the user's own timeout has expired, or the other user clears “sustain” users who are not present. It is further possible to provide users with an indication as to whether a persistent “sustain” user remains in the area.
- the “sustain” function can be set by the user for various amounts of time according to the user's selection.
- the “sustain” function may be set by the user from 1 second to infinite, with an option for no sustain (0 sec). Infinite “sustain” would leave the duration to other users, who would clear their persistent profiles on a regular basis.
- the “sustain” function can be useful in circumstances where a user wishes to be available for communication or identification after having left the area. Thus, if another user wishes to link a profile to someone who was in an area, this remains possible even if the user to be identified has physically left the area.
- the ability to cluster users and identify users according to other categories allows users to identify soldiers in the military environment. T he soldier can use the technology to identify the presence of members of the soldier's unit within a group, and to identify the presence of soldiers with a particular identified capability. The two groupings, combined with degree of presence can be used by the soldier to identify available assistance.
- the technology can be used to provide the unit information regarding the soldier's location, both directly through triangulation and proximity, and indirectly through the soldier's ability to transmit geographical coordinates.
- the system can further be used by the soldier to identify the location of others in the unit.
- the use in a military situation may require that the data be retained in encrypted format, so that it cannot be used by an enemy. Similar, radio transmissions must be maintained in a manner which does not lead to enemy units triangulating on the soldier making the transmission. Since the proximity information can be controlled by a server, the availability of the location information can be controlled by the military. The ability to store location data on a server allows the system to only transmit location data to other users (soldiers) as encrypted data.
- the feature is configured in a manner similar to combining proximity with external social media applications, in that the user's communication needs can be combined with proximity via radio signals.
- the combination allows the user to retrieve information regarding fellow soldiers that meet a predetermined combination of proximity via radio signals and identification of skills or unit association.
- the ability for a user to use the disclosed technology to identify other users within a proximity facilitates file sharing and media sharing, which may be relevant to the locus of the users or relevant to the individual users themselves. By way of non-limiting example, this could relate to the user commenting on a local event at which the user is present. Additionally, a speaker or entertainer can provide access of a media file to an audience or others nearby. This provides an ability to promote or advertise one's music, including songs, albums and randomized playlists to nearby users, additionally creating a community of music. This also allows file transfer to occur using local network facilities or directly as peer-to-peer transfers.
- the software will use an algorithmic rating system to compare and rate users' taste in music in contrast to other nearby users.
- the rating and a comparison with similar media can be accomplished within the area of proximity defined by the user or by other users.
- the ability to share media is based on a concept that these people would enjoy getting to know each other based on their similar taste in the media, such as a particular type of music or music by a particular artist.
- FIGS. 11 A and 11 B are schematic diagrams depicting a Presence Group Aggregation System platform in its functional aspect.
- FIG. 11 A shows establishing proximity.
- FIG. 11 B is a three ring model, based on the diagram of FIG. 11 A , based on a user's nearby user experience.
- API Application Programming Interface
- An empty array of other_user_identifiers may also be passed up, which is useful for querying the system to see which other users are detectable via the aggregation algorithm. Whatever is passed, a successful response returns a list of all the aggregated users in proximity like this:
- the Presence Group Aggregation System platform provides the required framework to create visual proximity “Degrees of Separation” or Rings as well as a View Controller User Interface to implement this functionality.
- the Presence Group Aggregation creates a nearby user contact list based on all the direct and indirect user connections available.
- IRY has direct connections to ALY, NERO, OREN and COOK.
- IRY has indirect Second Degree Connections with MONKEY and ALB and Third Degree Indirect Connections with Ape and Banana.
- the Disclosed technology provides the users with the ability to filter out Users based on the degrees of connection: first, second, third, fourth etc. This is naturally most useful in very highly dense settings.
- Rings are differentiated with the following logic
- FIG. 11 B shows user IRY's nearby user experience.
- the Presence Group Aggregation System platform creates a cluster including all of the users depicted in FIG. 11 A . Within the cluster, Rings are differentiated with the following logic:
- the Presence Group Aggregation System platform allows the system to provide users with the ability to reduce and extend their visible contacts via “Inherent Rings” representing degrees of separation. This reduces a random cluster of nearby users into an immediate group of “first Ring” members.
- the “first Ring” members can be people within a small room, such as a classroom or business establishment or otherwise within a small area.
- a filter button 1031 shown in FIG. 10 B can be used to determine which profiles and which Rings are presented.
- the control of the Rings and other proximity controls may be accessed through the “Filter” button which will be easily accessible one the main user interface screen, by pressing this button, the display will reveal to the user will the filters, “Rings” or “degrees of separation” that are available to be implemented.
- desktop devices can be used to identify Inherent Rings based on information identified through network connections, as manually designated by the user or as matched by the user to a particular location of a mobile device (i.e., “Make my location the present location of my phone.) It is possible to either permit or not permit the sharing of unique identifiers across multiple devices, and multiple devices can be associated with a single user or user profile as desired. In that way, multiple devices belonging to a user can be issued separate unique identifiers or can share unique identifiers, and the user can still be uniquely identified across multiple devices. In the case of multiple devices, the user can designate one or more devices as having a priority on the system, in order to avoid the use of multiple devices causing duplication of profiles displayed on other users' devices.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Databases & Information Systems (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
Communication is established between a plurality of users through mobile computing devices. A server communicates with the mobile computing devices. Unique User Identifiers (UUIDs) are registered on the server through a network, and a database connected to the server stores the uploaded UUIDs and associated data. The server receives and sends communications to and from the mobile computing devices, receives UUIDs and associated data from mobile computing devices, and sends UUIDs and associated data to one or more mobile computing devices. The user's mobile computing device is used to identify an image and to determine an image resemblance measured with facial recognition algorithms that represent deviations in facial features and dimensions.
Description
- The present disclosure is a Continuation Application of U.S. patent application Ser. No. 17/141,553, filed Jan. 5. 2021, now U.S. Pat. No. 11,582,817, issued Feb. 14, 2023. U.S. patent application Ser. No. 17/141,553 is a Continuation Application of U.S. patent application Ser. No. 16/552,834, filed Aug. 27, 2018, now U.S. Pat. No. 10,887,937, issued Jan. 5, 2021. U.S. patent application Ser. No. 16/552,834 is a Continuation Application of U.S. patent application Ser. No. 15/846,972, filed Dec. 19, 2017, now U.S. Pat. No. 10,397,971, issued Aug. 27, 2019. U.S. patent application Ser. No. 15/846,972 claims priority to U.S. patent application Ser. No. 15/132,868, filed Apr. 19, 2016, now U.S. Pat. No. 9,854,616. U.S. patent application Ser. No. 15/132,868 claims priority to Provisional Patent Application No. 62/152,838 filed Apr. 25, 2015, Provisional Patent Application No. 62/218,487 filed Sep. 14, 2015 and Provisional Patent Application No. 62/260,593 filed Nov. 29, 2015, which are filed by the inventors hereof and the entirety of which are incorporated by reference herein.
- The present disclosure relates generally to digital communication systems and methods and more specifically to digital communication systems and methods for image matching.
- Users of mobile communication devices are able to connect with one another through the use of social networking platforms in conjunction with applications on the mobile communication devices using a communication protocol. The communication protocol can be cellular or wireless based. In order to connect with a member of a social networking platform, a user of a mobile communication device must first register with the social networking platform and have some knowledge of the member to whom the connection is desired. The knowledge of the member allows the user of the mobile communication device to send a connection request to the member.
- Normally, acceptance of the connection request by the member is required for the user of the mobile communication device to communicate directly with the member. Without information identifying or related to a member of a social networking platform, the user of the mobile communication device is seemingly a stranger and has no way of communicating with the member.
- In the case of people within proximity to one another, there may be further reason to connect while using a wireless device, for example, if face-to-face communication is impractical or socially awkward. It is within the aforementioned context that a need for the disclosed technology has arisen. Thus, there is a need to provide a way of establishing wireless communication based at least in part on proximity of users to each other.
- Communications are established between a plurality of users having a mobile computing devices. A server communicates with a plurality of mobile computing devices, each mobile computing device associated with one or more Unique User Identifiers (UUIDs). The devices have means for connecting the mobile computing devices to the server and registering the UUIDs on said server through a network; and a database connected to the server and comprising the uploaded UUIDs and associated data. The server receives and sends communications to and from the mobile computing devices, receives UUIDs and associated data from mobile computing devices, and sends UUIDs and associated data to one or more mobile computing devices. The user's mobile computing device is used to identify an image and to determine an image resemblance measured with facial recognition algorithms that represent deviations in facial features and dimensions.
-
FIG. 1 is a schematic diagram illustrating a system for proximity based networked mobile communication according to the present disclosure. -
FIGS. 2A-2C are schematic diagrams illustrating a system for proximity based networked mobile communications in various environments.FIG. 2A illustrates a system for proximity based networked mobile communication in which at least one mobile device is outside of Wi-Fi range.FIG. 2B illustrates a system for proximity based networked mobile communication communicating with users within Wi-Fi range of each other.FIG. 2C illustrates a system for proximity based networked mobile communication used to communicate with a fixed station. -
FIGS. 3A and 3B are schematic flow charts showing downloading, installation and registration of a mobile device.FIG. 3A illustrates a mobile application process according to the present disclosure.FIG. 3B illustrates a mobile application process according to the present disclosure. -
FIG. 4 is a schematic block diagram illustrating a server system according to the present disclosure. -
FIG. 5 is a schematic diagram illustrating a user interface scenario according to the present disclosure. -
FIG. 6 is a schematic diagram illustrating an exemplary computer architecture for use with the present disclosure. -
FIGS. 7A and 7B are schematic diagrams showing the operation of the system without and with an ability to respond when a mobile device is in an “inactive” mode.FIG. 7A shows a configuration in which “inactive mode” response is not enabled.FIG. 7B shows what a proximity-based system in accordance with the mobile device able to respond when in an “inactive” state. -
FIG. 8 is a schematic diagram of a group of mobile devices associated with users in proximity to each other and in proximity to a Wi-Fi hot spot. -
FIG. 9 is a schematic block diagram showing the communication used to establish groups. -
FIGS. 10A-10C are representations of mobile device displays of contacts or other users to provide a proximity display.FIG. 10A depicts a starting page.FIG. 10B depicts a similar page obtained by removing message information. -
FIGS. 11A and 11B are schematic diagrams depicting a Presence Group Aggregation System platform in its functional aspect.FIG. 11A shows establishing proximity.FIG. 11B is a three ring model, based on the diagram ofFIG. 11A , based on a user's nearby user experience. - Overview
- Various aspects of methods and systems for proximity based networked mobile communication can be found in exemplary configurations of the disclosed technology. References are made in detail to the configurations of the disclosed technology, non-limiting examples of which are illustrated in the accompanying drawings. While the disclosed technology will be described in conjunction with the disclosed configurations, it will be understood that they are not intended to limit the disclosed technology to these configurations. On the contrary, the disclosed technology is intended to cover alternatives, modifications and equivalents, which may be included within the spirit and scope of the disclosed technology as defined by the appended claims. Furthermore, in the following detailed description, numerous specific details are set forth to provide a thorough understanding of the disclosed technology, which can be practiced by one of ordinary skill in the art without these specific details. In other instances, well-known methods, procedures, components, and circuits have not been described in detail as to not unnecessarily obscure aspects of the present disclosure.
- In a first configuration, a plurality of users each associated with a mobile computing device is within proximity of a wireless frequency range including Wi-Fi and/or Bluetooth (registered trademark of Bluetooth Special Interest Group of Kirkland, Wash.). A mobile application on a registered mobile computing device causes the mobile computing device to advertise and listen to unique user identifiers via wireless including Bluetooth frequencies. In this context, “advertise” refers to broadcast of data so that other devices within range may become aware of the presence of the device broadcasting the data. Detected unique identification phone data from the advertisements comprising Unique User Identification (UUID) such as Bluetooth Low Energy UUID &/or Randomly Generated Identifier from 0 to 4294967295, MAC address and SSID information are transmitted in a query to the server system and cross referenced with registered member information. By the use of unique identifiers, obtained as either direct device identification (e.g., MAC address) or assigned identifiers (e.g., UUID), positive matches of registered members are displayed on the mobile computing device and communication between the mobile computing device and mobile computing devices associated with registered members is enabled. The use of a UUID has particular advantages, in that the UUID is intended for broadcast transmission, whereas some other identifiers, such as MAC addresses, are not always available for security or other reasons.
- While specific examples of communication protocols are described, it is contemplated that other communication protocols may be used in accordance with the present disclosure.
- According to the present disclosure, a registered user of the proximity based networked communication system can communicate with other registered users purely based on proximity rather than prior knowledge of the registered users. A registered user of the proximity based networked communication system can broadcast a message, view profiles of nearby users, comment on photos, and anonymously and non-anonymously choose “Gifts” to post next to the picture, call and/or video conference to other registered users who are within proximity of the registered user. Examples of such a scenario include social scenarios as well as law-enforcement scenarios such as Amber alerts (information regarding missing children).
- In addition to the above-referenced functionalities, the system can show both users each other as soon as the first user sees the second user. The system does not wait for B to identify A; it already shows A on B's display screen as soon as B is shown on A's screen. The system also shows A what is on C's Screen. By way of non-limiting example, A sees B and C but does not see D, either because D is too far away or because it just has not processed the information concerning D yet. So long as someone else sees D, then A will see D as well. For example, if either B or C sees D, then A will see D as well. In this manner, there are no communication delays because users can observe each other at different times, in some cases with minute differentials. As soon as one person in the room picks up, everyone else gets up to speed.
- The users' phone number database can also be integrated such that the system provides a warning that someone in their phone book contacts is within a user's “proximity zone”. The system may create special status for people that the user wishes to see or avoid. The special status for people that the user wishes to see can include, by way of non-limiting example, best friends or crushes, so that one can observe which of their social media contacts, friends and friends of friends are within the proximity. The special status for people that the user wishes to avoid can include former partners, people restricted by restraining orders, parents, friends and relatives. The system also has a capability of using a sex offender database to warn parents that that a possible sex offender is within the Wi-Fi-“danger” zone or proximity.
- The system can cross reference phone numbers and social media stored within the phone. The system may also be integrated with social networking and professional social networking profiles with this application for business conferences.
- Integration of Tinder and similar dating and/or a features allows users to indicate dating and/or business interest in other nearby users, and which will only notify the other users if the other user also indicated this same interest. This system will be highly effective and efficient in matchmaking between people within conferences, nightclubs and bars. As an adjunct to this, the system can link to niche dating sites and other special interest groups, so that users who so-desire can identify other users who are in the proximity and who share the same common interests. The system can further filter such associations according to subscriber status, provided that the site permits such information to be accessed. According to one non-limiting configuration, information concerning special interests is provided only if the user is also subscribed to or identified with the special interest. According to another configuration, the user can select whether to limit disclosure of the special interest.
- Integration with point of sale systems such as Google Wallet, ApplePay and Paypal may be obtained. Integration with social media sites (e.g., Facebook) can be used to allow members to send invites and to reveal their social media links and their mutual friends when in social venues where they would like to share that information. In different non-limiting configurations, payment can be made through the system, externally, or according to the user's choice.
- The disclosed technology will additionally provide a peer-to-peer ride sharing platform which will allow users to send ride requests by selecting their destination and choosing their own price that they are willing to pay. All nearby users of the disclosed technology will receive this ride request and they will have the ability to agree or to send a counter offer. The close range network will be ideal in providing the user with individuals who are in the immediate vicinity and thus immediately ready to initiate the requested journey. The Payment processing system will require users to scan a credit card and will hold a deposit in order to only allow prepaid users to send ride requests.
- Instant Food Delivery Service: The disclosed technology will also provide users the ability to request food at the click of a button. Utilizing a proximity nearby user that represents the nearby food production services, for example the nearby restaurants will be able to join the network using a special commercial account, and this will allow users to instantly make orders by clicking on the Profiles of these nearby options. This will provide the the advantage of exclusively providing its own food delivery services to nearby users.
- Face Recognition Database of Similarities in People
- The disclosed technology is useful, when coupled with facial images, to associate these individuals with profiles of individuals in proximity to the user, receiving, from the mobile device an image of a person. Facial recognition can be used to determine if a match exists between the image and a user detected in proximity to the device providing the image of the person. This is useful for identification of people who a user may recognize but not know their name and for assisting people with prosopagnosia.
- If a user provides an image of a person to the server, the server can use facial recognition to determine if a match exists between the image and a user in proximity to the user providing the image.
- The disclosed technology will additionally have the ability to provide users with other individuals in the database that most resemble that individual. Resemblance is measured with facial recognition algorithms that represent deviations in facial features and dimensions. This service provides entertainment value as well as the service of giving people “another chance” at romance with their specific taste. In different non-limiting configurations, the face recognition can be performed by the user's mobile device or by face recognition software on a server.
- Technique
-
FIG. 1 is a schematic diagram illustrating a system for proximity based networkedmobile communication 100 according to the present disclosure. InFIG. 1 , proximity based networkedmobile communication system 100 comprises a firstmobile device 101 having a firstmobile computing device 102 communicably coupled via internet/communication network 107 toserver system 108. Thesystem 100 further comprises a secondmobile device 103 having a secondmobile computing device 104 communicably coupled via internet/communication network 107 toserver system 108. Internet/communication network 107 can be any communication network that allows data to be communicated or transferred from one point to another. Such a network might be wired or wireless as deemed necessary to be consistent with the spirit and scope of the present disclosure. - In
FIG. 1 , the firstmobile device 101 can utilize a mobile application (not shown here) onmobile computing device 102 to accessserver system 108 to register withserver system 108 to become a member of the proximity based networked mobile communication system. The secondmobile device 103 can utilize a mobile application (not shown here) onmobile computing device 104 to accessserver system 108 to register withserver system 108 to also become a member of the proximity based networked mobile communication system. The firstmobile device 101 and secondmobile device 103 utilize the mobile application on their respective devices (102, 104) to communicate with each other while their devices are both within a wireless frequency range including Wi-Fi and/orBluetooth 105. Wireless frequency range including Wi-Fi and/orBluetooth 105 is associated withinternet router 106; that is, in the present configuration,internet router 106 is either Bluetooth enabled and/or has Wi-Fi capability. -
Router 106 receives data from internet/communication network.Router 106 is a Wi-Fi router capable of receiving data from the internet and that is compliant with 802.11 standards or with other appropriate standards.Router 106, as mentioned, is capable of receiving data from internet/communication network 107.Router 106 is also/or Bluetooth capable, operating in the unlicensed industrial, scientific and medical (ISM) band at 2.4 to 2.485 GHz, using a spread spectrum, frequency hopping, full-duplex signal at a nominal rate of 1600 hops/sec. It will be appreciated that, while the present disclosure depicts mobile computing device as smartphones, any mobile computing device with the computing and communication capabilities to perform the functionalities described herein are within the scope of the present disclosure. - The first
mobile device 101 and secondmobile device 103 can then perform functionalities related to proximity based networked mobile communication consistent with the spirit and scope of the present disclosure. Although not shown, further descriptions of various configurations of the disclosed technology will be described with reference to the following figures. -
FIGS. 2A-2C are schematic diagrams illustrating a system for proximity based networked mobile communications in various environments.FIG. 2A illustrates a system for proximity based networked mobile communication in which at least one mobile device is outside of Wi-Fi range.FIG. 2B illustrates a system for proximity based networked mobile communication communicating with users within Wi-Fi range of each other.FIG. 2C illustrates a system for proximity based networked mobile communication used to communicate with a fixed station. - In
FIG. 2A ,internet router 206 provides for wireless frequencies including wireless frequency range including Wi-Fi and/orBluetooth 205.Users mobile computing devices Bluetooth 205. - Because all of the
users mobile computing devices Bluetooth 205, and because they are all registered members of the proximity based networked mobile communication system, they can all communicate with each other. - In
FIG. 2A , auser 215 havingmobile computing device 216, is not within the wireless frequency range including Wi-Fi and/orBluetooth 205. Regardless of whetheruser 215 is registered with the proximity based networked mobile communication system, becauseuser 215 is outside of the wireless frequency range including Wi-Fi and/orBluetooth 205, the users and their mobile computing devices within the wireless frequency range including Wi-Fi and/or Bluetooth cannot communicate withuser 215 through the system. - Optionally, each of the
users mobile computing devices Bluetooth 205 to request a social networking connection with any of the other devices. Social networking can include Facebook, Twitter, Instagram, and the like, as well as specialized and professional social networking services. -
FIG. 2B illustrates a system for proximity based networked mobile communication 220 according to the present disclosure. InFIG. 2B ,internet router 206 provides for a wireless frequency range including Wi-Fi and/orBluetooth 205.Users mobile computing devices Bluetooth 205. - In
FIG. 2B , all of theusers mobile computing devices Bluetooth 205. Because they are all registered members of the proximity based networked mobile communication system,user 203 can broadcast a message, call and/or video conference and view/comment/“gift” photos usingmobile computing device 204 to theother users devices -
FIG. 2C illustrates a system for proximity based networked mobile communication 240 according to the present disclosure. InFIG. 2C ,internet router 206 provides for a wireless frequency range including Wi-Fi and/orBluetooth 205.Users mobile computing devices Bluetooth 205. Alternatively, it is possible to provide one or more devices, such asdevice 214, which is wire-connected, provided it can communicate, albeit indirectly, with thewireless network 205. In linking a wire-connected device, it may be desired to identify the location of the wire-connected device. This can be done by inference, in that the device is connected to a communication device with a known location, by manual input of location or by matching the location of the wire-connected device to that of a wireless device. - In
FIG. 2C ,user 213 provides a service or product desired byusers users mobile computing devices Bluetooth 205. They are all registered members of the proximity based networked mobile communication system. As a result,users respective devices user 213'scomputing device 214. Further,users respective devices computing device 214 and a third party payment service. -
FIGS. 3A and 3B are schematic flow chart showing the installation and operation of a mobile application process onto a mobile device.FIG. 3A illustrates the mobile application process according to the present disclosure.FIG. 3B illustrates a mobile application process according to the present disclosure. The mobile application enables the mobile computing device to communicate on the networked communication system according to the present disclosure. - In
FIG. 3A , a user having a mobile computing device downloads and installs a mobile application (step 301) onto the device. The mobile application causes the mobile computing device to connect to a remote server (step 302). Through the mobile application, the user registers with the remote server (step 303). As part of registration, profile components are transmitted from the mobile computing device to the server (step 304). Profile components can include the user's name and a digital photograph of the user, as well as any other information the user would like to include in the profile. - In
FIG. 3A , the mobile application further causes the mobile computing device to transmit the device's Unique Identifiers, including but not limited to a randomly generated identifier, Unique User Identification (UUID) such as Bluetooth Low Energy UUID &/or Randomly Generated Identifier from 0 to 4294967295, MAC address (step 305) to the server as well as an SSID (step 306). - In
FIG. 3B , a mobile application causes a mobile computing device to broadcast an “advertisement hotspot” (step 307) for a predefined period of time. The predefined period of time can be based on proximity and frequency of user input or stimuli. Within this context, “advertising” refers to signaling the presence of a mobile device, such as by transmitting a radio beacon. - The mobile application further causes the mobile computing device to scan “listen” for Wi-Fi and Bluetooth advertisements, for example by using a Bluetooth LE Advertising Capability, or hotspots (step 308). The mobile computing device transmits the detected unique identification hotspot information to the remote server system (step 309). Upon comparison by the remote server system of the hotspot information and unique identifier for example UUID or MAC addresses, the mobile computing device receives user information from the server (step 310).
- In
FIG. 3B , the mobile application displays the received user information (step 311), thereby displaying registered users within proximity of the mobile computing device. Finally, communication is enabled (step 312) between the mobile computing device and any of the registered users within proximity of the mobile computing device. According to one configuration, communication between the mobile computing device and the registered users within proximity of the mobile computing device only continues as long as the mobile computing device and devices associated with the registered users remain within proximity of the mobile computing device. -
FIG. 4 is a schematic block diagram illustrating aserver system 108 according to the present disclosure. InFIG. 4 ,server system 108 includesapplication server 404.Application server 404 controls all networked communication capabilities accessible by members of the network. Mobile computing devices associated with members of the system transmit information to theserver system 108. The information is processed by a hotspot (Unique Identifier Advertisement) and userinformation retrieval module 406.Server 108 is communicably coupled to database 418, in which information for all registered users and hotspots and device information is stored. -
FIG. 5 is a schematic diagram illustrating a user interface scenario according to the present disclosure. InFIG. 5 , a wireless frequency range including Wi-Fi and/orBluetooth 105 includes a plurality of users in its proximity. Users A, B, and C are within proximity of wireless frequency range including Wi-Fi and/orBluetooth 105, and their presence is indicated on the user interfaces of mobile computing devices of other users in wireless frequency range including Wi-Fi and/orBluetooth 105. User D, who has recently left the wireless frequency range including Wi-Fi and/or Bluetooth , is also displayed as such. -
FIG. 6 is a schematic diagram illustrating anexemplary computer architecture 600 for use with the present disclosure. According to one configuration, server system employs architectures similar to that depicted inFIG. 6 . The present disclosure comprises various computing entities that may have an architecture according toexemplary architecture 600. One configuration ofarchitecture 600 comprises asystem bus 620 for communicating information, and aprocessor 610 coupled tobus 620 for processing information.Architecture 600 further comprises a random access memory (RAM) or otherdynamic storage device 625, which functions as a main memory, coupled tobus 620 for storing information and instructions to be executed byprocessor 610.Data storage device 625 also may be used for storing temporary variables or other intermediate information during execution of instructions byprocessor 610.Architecture 600 may also include a read only memory (ROM) and/or otherstatic storage device 626 coupled tobus 620 for storing static information and instructions used byprocessor 610. - A
data storage device 625 such as a magnetic disk or optical disc and its corresponding drive may also be coupled toarchitecture 600 for storing information and instructions.Architecture 600 can also be coupled to a second I/O bus 650 via an I/O interface 630. A plurality of I/O devices may be coupled to I/O bus 650, including adisplay device 643, an input device (e.g., analphanumeric input device 642 and/or a cursor control device 641). - The
communication device 640 allows for access to other computers (e.g., servers or clients) via a network. Thecommunication device 640 may comprise one or more modems, network interface cards, wireless network interfaces or other interface devices, such as those used for coupling to Ethernet, token ring, or other types of networks. - In addition to the above-referenced functionalities, the system of the present disclosure comprises the following systems configuration to optimize the communication network. Once the first user has received a positive identity of a nearby user; both users will appear on each other's software modules.
- Clustering
-
FIGS. 7A and 7B are schematic diagrams showing the operation of the system without and with an ability to respond when a mobile device is in an “inactive” mode.FIG. 7A shows a configuration of asystem 701 in which “inactive mode” response is not enabled, whereasFIG. 7B shows a configuration of asystem 702 in which the “inactive mode” is enabled. BothFIGS. 7A and 7B show clustering server 705, an internet and communication network,FIG. 7A shows a configuration in which “inactive mode” response is not enabled. BothFIGS. 7A and 7B show clustering server 705, an internet and communication network, represented bycloud 707 and multiplemobile devices - As shown,
system 701 also includes additional mobile devices namelymobile device 713 andmobile device 714, which are also registered with clustering server 1002.Mobile devices clustering server 705. -
FIG. 7A shows direct communications executed through internet andcommunication network 707 or directly device-to-device between active devices.Clustering server 705 is also communicably coupled to anothermobile device 712 via internet andcommunication network 707.FIG. 7B shows the system operating as a proximity-based system in accordance with the mobile device able to respond when in an “inactive” state. - Configurations of the disclosed technology aggregates detected clusters of nearby users based on beacon detection. In one configuration, each user device includes a BLE (Bluetooth Low Energy) beacon that can transmit small amounts of data. Typically, transmission via BLE might be up to a distance of >100 meters. A configuration of the disclosed technology creates clusters of currently active user groups. In one configuration, clusters are populated by active users within proximity of each other. As an example, an active
mobile device 712 might have an initiated clustering application and an active beacon; amobile device 713 may include an initiated clustering application as well as an active beacon; and amobile device 714 may include an initiated clustering application as well as an active beacon. Here, the cluster would be populated bymobile device 712 andmobile device 713 andmobile device 714. - Additionally, the system is able to be adjusted to provide a lag in the timeframe that individuals disappear from a user's nearby view controller. This is a critical element in extending the network of nearby users, so that more individuals will be visible to one another.
- The shaded areas around
mobile devices mobile device 712. - Algorithm
- The algorithm for aggregating users (i.e. populating user clusters) is based on periodic detection reports from mobile devices. Each listening mobile device periodically detect another mobile device and send information about the detected mobile device to the user. Specifically, each mobile device sends not only its identifier to a clustering server (e.g. server system 108) that stores and processes user and cluster membership information, each mobile device also sends the identifiers of other detected devices.
-
Mobile device 711 is active, that is, it has an active (advertising) beacon (not shown) and a proximity-based network application (not shown) that is active.Mobile device 712 also has an active beacon (not shown) and a proximity-based network application (not shown) that is active. - In operation, because
mobile device 711 is on (active), it can detect and communicate withmobile device 712, which is within proximity (Wi-Fi or Bluetooth based communication).Mobile device 712 can similarly communicate withmobile device 711 because they are proximal to each other. Each ofmobile device 711 andmobile device 712 can further communicate withclustering server 705 via internet andcommunication network 707. - In contrast,
mobile device 713 cannot communicate withmobile device 711 becausemobile device 713 is inactive. No communication occurs as long asmobile device 713 remains inactive even thoughmobile device 711 is active. Here, inactive means thatmobile device 713 has an active listening beacon but has a proximity-based network advertising application that is not running.Mobile device 714 also cannot communicate withmobile device 711 becausemobile device 714 is inactive, having an active beacon and an inactive advertising proximity-based network application. Further, neithermobile device 713 normobile device 714 can communicate withclustering server 705 asmobile device 713 andmobile device 714 are inactive. -
FIG. 7B shows what a proximity-basedsystem 702 in accordance with the mobile device being able to respond when in an “inactive” state. InFIG. 7B , proximity-basedsystem 702 includesclustering server 705 that is communicably coupled tomobile device 711 via internet andcommunication network 707. As shown,system 702 also includes additional mobile devices includingmobile device 712,mobile device 713 andmobile device 714, which are have been previously registered withclustering server 705. -
Mobile device 711 is active, that is, it has an active beacon (not shown) and a proximity-based network application (not shown) that is active.Mobile device 712,mobile device 713 andmobile device 714 are inactive; they each have a beacon; however, their proximity-based network application (not shown) has not been executed and is inactive. By way of non-limiting example, a mobile device is “inactive” when the device's user interface application has been terminated intentionally by the user “shut down” or been sent to the background whereas. For example in some iPhones, the phone is “inactive” when the phone is not advertising Unique Identifiers (e.g., Bluetooth Low Energy UUID &/or Randomly Generated Identifier from 0 to 4294967295) but it is still listening to unique identifiers. Each time the mobile device senses a unique identifier advertisement the device immediately transmits this user's ID to the server via various methods including currently a web service call. - In operation, unlike the
system 701 ofFIG. 7A that requires that two mobile devices be active in order to communicate, in the configuration ofFIG. 7B , communication is facilitated with “inactive” devices so long as at least one active advertising mobile device is present. As depicted inFIG. 7B ,mobile device 711 is on (active). Once its proximity-based network application is open,mobile device 711 advertises and pings out or transmits signals across using wireless network including Wi-Fi and Bluetooth frequencies. Responsive thereof, although inactive,mobile devices mobile device 711. Each of the listeningmobile device mobile device 711. Thenmobile device 712,mobile device 713 andmobile device 714 all separately send the retrieved Unique identifier, for example UUID “randomly generated identifier”, for 711 as well as each of their own UUIDs to clustering server 902. - In one configuration, the communication from the mobile devices arrive as separate web service calls; the service calls are then logically linked and grouped based on pairs of the
mobile device 711's Unique ID and the transmitters ID (UUID). This new user presence group is communicated tomobile device 711 andmobile devices devices devices device 711 would not be able to see any ofdevices - In a configuration, the clustering server applies the following algorithm to group them together:
-
1. User A sees User B 2. Is user B in the system? 3. No 4. Is User A in the system? 5. No 6. Create presence group. Add user A and user B to presence group 7. Yes 8. Add user B to the presence group of A 9. Update timestamp of both A and B in user record 10. Yes 11. Is User A in the system? 12. No 13. Add user A to the presence group of B 14. Update timestamp of both A and B in user record 15. Yes 16. Is A in same presence group as B? 17. Yes 18. Update timestamps on A and B in user record 19. No 20. Update timestamps on A and B in user record 21. Combine presence groups for A and B 22. Take all users from presence group B, move to presence group A 23. Delete presence group B - In one configuration, after running through the above algorithm to create presence groups, a purge cycle is run. During a purge cycle, all users that are part of a presence group that have not detected any other user in the presence group or have not been detected by any other users in the presence group in a specified period are purged from their presence group. This period referred to as the timeout period may be 60 seconds, for example. Users that are grouped by detections will time out and become degrouped after an adjustable amount of seconds of no detections.
- At the end of the above processing, the web service returns the list of identifiers for the other users that are in the same presence group as the user reporting detections.
- Control of Clustering
-
FIG. 8 is a schematic diagram of a group of mobile devices 801-804 associated with users in proximity to each other and in proximity to a Wi-Fihot spot 811. In this example, the system populates user clusters that include no more than one active user, such asmobile device 801, where the rest of themobile devices mobile device 801, an inactivemobile device 802 and inactivemobile device 803. Activemobile device 801 is a mobile/computing device that includes an active advertising beacon and a proximity-based network application developed in accordance with a configuration of the disclosed technology. Activemobile device 801 starts the proximity-based network application, which then remains active along with the beacon. - Inactive
mobile device 802 is a mobile/computing device that includes an active advertising beacon as well as the proximity-based network application of the present configuration. Here, the proximity-based network application is not executed and remains inactive. This occurs for example on iPhones, in which, when the app has been put into the background or has been terminated by the user, the app will no longer advertise its Unique Identifier UUID ‘and/or ‘randomly generated identifier’’, and the fact that it stops advertising limits the nearby users able to detect it. This is also the permanent case for Android Devices 4.3 and higher which do not have Bluetooth LE Advertising Capabilities. Therefore the disclosed technology has created a viable system to workaround this technological limitation. Similarly, inactivemobile device 803 is a mobile/computing device that includes an active advertising beacon and an inactive proximity-based network application. - While
mobile device 804 may be considered to be within a desired proximity tomobile device 801,mobile device 804 is outside of the proximity of Wi-Fihot spot 811, and also is outside of direct communication range and Bluetooth LE Advertising Capabilities ofmobile device 801.Mobile device 804 is, however within direct communication range and Bluetooth LE Advertising Capabilities ofmobile device 803. Sincemobile device 803 is able to relay the UUID and/or “randomly generated identifier” ofmobile devices mobile devices - This configuration also applies to the immediate sharing of secondary identified users. For example not only does
mobile device 801 not wait formobile device 802 to identifymobile device 801, but it already showsmobile device 801 onmobile device 802's display screen as soon asmobile device 802 is shown onmobile device 801's screen. - In one configuration, the system also shows
mobile device 801 what is onmobile device 803's screen. For example the user ofmobile device 801 seesmobile devices mobile device 804, either becausemobile device 804 is too far away or because it just has not processed it yet. In such a configuration, if any other user in proximity: if eithermobile device 802 ormobile device 803 detectsmobile device 804, thenmobile device 801 will detectmobile device 804 as well. In this manner, there are no communication delays which are otherwise caused from users observing each other at different second intervals between network scans, in some cases with minute differentials. As soon as one person in the room picks up, everyone else gets up to speed. - Determining Proximity and Presence Group Selection
- The “degrees of separation” or proximity are useful to control the size of the presence group. If the area has few local users, it is likely that the user would want to engage several degrees of separation until the physical proximity becomes too distant. On the other hand, if there are a large number of eligible users within a small area, then the user may elect to search for fewer degrees of separation.
- Likewise, the user may wish to select according to category of user. For example, if the user is in a large gathering of people, the user may wish to select members of the user's university, members of the user's social group or another classification. The user may also wish to limit the group to people in the user's addressbook or other list of contacts.
-
FIG. 9 is a schematic block diagram showing the communication used to establish presence groups. A presence group is a set of other users within proximity to the user. The presence group may be established by direct connection via short range radio communication or through a Wi-Fi hotspot. Additionally, the presence group may comprise users who are connected by degree of separation, as will be described. Within this context, “advertising” refers to signaling the presence of a mobile device, such as by transmitting a radio beacon. By way of non-limiting examples, advertising can be performed via Bluetooth or Wi-Fi hotspots. - To establish a presence group, the user registers on the system (step 911). The user's profile is then automatically created via third (step 912) by third party application programming interfaces (APIs) such as social media APIs and other networks by which the user is known (step 913). It is further possible for the user to establish an identity with the system itself and use that identity for establishing a profile. The system's server then generates or issues a unique identifier for the user and links that unique identifier with the user's mobile device (step 914).
- Once the unique identifier is generated or issued by the server (step 914), subsequent communications from the mobile device use that unique identifier. If the user has multiple mobile devices, the server may assign the same unique identifier (step 914) to these additional devices, much as a username-and-password combination can be used by someone to sign on through multiple devices.
- The mobile then initiates listening for incoming identifiers from other mobiles.(step 921). The identifier is transmitted using standard communication protocols which are available on most Wi-Fi and Bluetooth communication systems. In addition to listening (step 921), if the mobile has the required hardware, the mobile broadcasts the unique identifier (step 922). This activity is referred to herein as “advertising” in that the wireless device “advertises” its presence during radio beacon transmissions.
- The wireless device also listens (step 931) for other devices within its proximity. This is done in both active mode, with the wireless device having full communication and in a quiescent mode, in which the wireless device is not in full operation. If a nearby user is detected (step 937), the device sends the detected user's identifier to the server (step 938). The detection is then considered established (step 941).
- The established detection (step 941) may be directly from the mobile or indirect from a nearby mobile device, which determines a “degree of separation”. The “degree of separation” is similar to a degree of separation in a social sense in that a direct detection would be a first degree of separation (i.e., outside of the user's device). A second degree would be a connection identified as a separate device through which a user is in direct communication. Thus, returning to
FIG. 7 , ifmobile device 712 is unable to communicate directly with mobile device 704, there must be more than one degree of separation betweenmobile devices 712 and 704. If there is a single intervening communication link, such as frommobile device 712 tomobile device 714 and thence frommobile device 714 to mobile device 704, there would be two degrees of separation betweenmobile devices 712 and 704. - The degrees of separation are applied to forming presence groups. Upon detection a presence group is established (step 946). The results are sent back to the user, as the advertising mobile, to update its list of nearby presence groups. The updated list is used by the mobile as a new presence group or updated presence group (step 947). The detections within the presence groups are:
- Direct from mobiles broadcasting their identifiers; and
- Indirect from mobiles transmitting the unique identifiers of other mobiles.
- The system uses these direct and indirect transmissions of mobile identifiers to list users and the proximities of the users in terms of degrees of separation, in order to provide the user with an update of the user's presence group.
- The server then returns data for each user in the presence group and allows communication between users. This data may be provided for all instances or provided in response to a request from the user's mobile either at the request of the user or automatically. Non-limiting examples of data transferred and communication comprise:
- Username or Usernames
- User Profile
- Messaging
- Voice communication
- Video conferencing.
-
- Other functions may be provided, which comprise, by way of non-limiting example:
- Access to nearby drivers and ride sharing
- Food on demand
- Assistance in miscellaneous tasks (“Can you help me with . . . ?)
- Networking
-
- “Kudos” (called “Gold Gifts”) or other social interaction awards from other users and user's photographs and other social media objects.
- Additional features can optionally include:
- Phone Numbers
- Social Media Data
- Registered Criminal Databases
- Social Networking Services
- Restaurant Critiquing Services
- Dating Applications
- Customer Assistance Requests
- Customer Ordering Systems
- Payment systems
- The system and app have the ability to message, call and video other users. In one configuration, this ability is limited to users who within a predetermined proximity to the user. The predetermined proximity can be defined in terms of physical distance, visual proximity, distance as determined by radio signal strength, absolute received radio signal strength, boundaries stored on a server or any convenient means to define proximity. In some configurations, the user can limit communications through the system to be received from callers within a degree of proximity determined by the user, and in some configurations, the user can separately limit communications through the system to be sent to people called within a degree of proximity determined by the user. In other configurations, communications to or from other users may be made available for communications with other people selected by the user.
- In addition, media may be broadcast to one or a group of, or all other users within a predetermined proximity to the user sending or requesting the broadcast.
- The disclosed technology permits makes proximity via radio signals the determining factor if users can communicate with one another in the system's network, which itself functions as a social network. This feature can be combined with external social media applications, in that the user's communication preferences can be combined with proximity via radio signals. The combination allows the user to retrieve profiles that meet a predetermined combination of proximity via radio signals and identification of profile links (“Friends”) on social media apps. A further configuration of the disclosed technology can disclose social media data, such as but not limited to Facebook. Integrating social media data thereby provides the ability for users to create special status and/or proximity alters of all and/or specific profile links (e.g., Facebook Friends) and/or individuals who have mutual profile links.
- The disclosed technology is clearly not limited to strictly operating as a messenger; it has the ability to provide advantages over common social media apps in terms of providing a default close range social network. Because the individuals that the user views are the ones around the user, in the student housing, school and office environments the utility. The disclosed technology allows individual users to view the profiles of their nearby users including photo albums and personal/work information of make comments, start blog and forums, request and accept friendships, like pictures, forum postings, etc. Users have the ability to control their privacy settings to hide their profiles and choose to reveal them to everyone, only friends or on an individual basis.
- User Displays Showing Proximity
-
FIGS. 10A-10C are representations of mobile device displays of contacts or other users to provide a proximity display.FIG. 10A depicts a starting page.FIG. 10B depicts a similar page obtained by removing message information (in the case ofFIG. 10A incoming text messages).FIG. 10C depicts a selected contact, obtained either from the displayed contacts, a message, voice call or other action, in which the contact is depicted in an enlarged format. In this non-limiting example, contacts within a predetermined range of proximity are displayed as images; however, it is anticipated that individual users may select alternative displays, such as text, text and thumbnail image, etc. - Referring to
FIG. 10A , the starting page has the ability to automatically adjust vertically based on the number of nearby users. Therefore when there are no users nearby, the message list will reach the top of the screen and the user will not need to constantly jump back from page to page to check for nearby users. In contrast, the more users that appear, the lower the Message Bar will sink down limiting to one viewable message. Users identified as having social media links with the user are flagged, as indicated at 1011, 1012. - The disclosed technology includes a logical user interface which incorporates a control viewer providing users with an adjustable scrolling grid display of all the users nearby; the viewer constantly adjusts as new nearby users are detected and previously detected users have left proximity after a predetermined amount of seconds. The Nearby User display shows users profile picture, User Name and also identifies if the user is a social network link, such as a Friend or Mutual Friend on Facebook, a Connection or Mutual Connection via Linkedin or any other social network that may be integrated into the disclosed technology.
- Removal of the message bar is shown in
FIG. 10B . Communication with a particular contact highlights that contact, as shown inFIG. 10C . These are the default user settings, which are adjustable by user preferences. - The disclosed technology has the ability to integrate with registered criminal databases in partnership with law enforcement agencies in order to warn parents of potential threats within close proximity.
- The disclosed technology provides the ability to display users social networking services, such as but not limited to LinkedIn profiles; naturally this will be most applicable in conferences, retreats and business networking events whereas users will have the ability to display their resume and business experience as part of their profile, thereby allowing users to rapidly filter the nearby business contacts and expedite their networking goals by focusing on starting conversations with prescreened business interests.
- The disclosed technology provides the ability to integrate restaurant and business critiquing crowd-source review publishers services, such as but not limited to Yelp, in such way that members of the service will be able to opt-in to the disclosed technology enabling them to identify nearby members within the restaurant and discuss applicable (as well as non-applicable) feedback and input regarding the restaurants and potential dishes of interest or promoted by the restaurant.
- The disclosed technology provides the ability to integrate with geo-based dating applications such as but not limited to Tinder; providing a up-close proximity dating application; most applicable in a nightclub venue settings whereby users will identify their interest and create matches in-close proximity able to instantly communicate in person; therefore exponentially increasing the effectiveness of the app's ability to make successful matches.
- The disclosed technology provides the ability to integrate customer service systems in order to facilitate customers requesting assistance. For example customer at Walmart needs help on aisle 4, utilizing the disclosed technology he can write an SMS to “Walmart Service Reps” and assistance will confirm that they are on their way. Additionally assistance can rapidly answer geographic based questions regarding locations of goods, etc.
- The disclosed technology provides the ability to integrate ordering systems: Customers will utilize the disclosed technology in order to place an order for goods or services; for example ordering meat at the deli counter at a supermarket. The order is send in an SMS and the order is confirmed with a responding SMS from the butcher.
- The disclosed technology provides the ability to integrate a links to payment systems, such as but not limited to Google Wallet, Apple Pay and PayPal, in order to facilitating purchase to consumers; following the above example the deli counter at a supermarket, the butcher can include, within the order confirmation, a google wallet link enabling the client to click the link and instantly portal to the appropriate google wallet payment screen, thereby further streamlining commerce.
- Sustain
- The user can set a persistence of presence, by which other users are able to identify that user. Thus, if a user enters an area, other users are able to identify the user according to the proximity and clustering criteria. If the user elects to “sustain” that proximity, the system will continue to provide other users with a proximity indication, even though the user has left the area. The persistence of the “sustain” function remains until the user's own timeout has expired, or the other user clears “sustain” users who are not present. It is further possible to provide users with an indication as to whether a persistent “sustain” user remains in the area.
- The “sustain” function can be set by the user for various amounts of time according to the user's selection. By way of non-limiting example, the “sustain” function may be set by the user from 1 second to infinite, with an option for no sustain (0 sec). Infinite “sustain” would leave the duration to other users, who would clear their persistent profiles on a regular basis.
- The “sustain” function can be useful in circumstances where a user wishes to be available for communication or identification after having left the area. Thus, if another user wishes to link a profile to someone who was in an area, this remains possible even if the user to be identified has physically left the area.
- Situational Awareness
- The ability to cluster users and identify users according to other categories allows users to identify soldiers in the military environment. T he soldier can use the technology to identify the presence of members of the soldier's unit within a group, and to identify the presence of soldiers with a particular identified capability. The two groupings, combined with degree of presence can be used by the soldier to identify available assistance.
- Similarly, if a soldier becomes lost or separated from the soldier's unit, the technology can be used to provide the unit information regarding the soldier's location, both directly through triangulation and proximity, and indirectly through the soldier's ability to transmit geographical coordinates. The system can further be used by the soldier to identify the location of others in the unit.
- The use in a military situation may require that the data be retained in encrypted format, so that it cannot be used by an enemy. Similar, radio transmissions must be maintained in a manner which does not lead to enemy units triangulating on the soldier making the transmission. Since the proximity information can be controlled by a server, the availability of the location information can be controlled by the military. The ability to store location data on a server allows the system to only transmit location data to other users (soldiers) as encrypted data.
- Other than the need to protect and encrypt location data, the feature is configured in a manner similar to combining proximity with external social media applications, in that the user's communication needs can be combined with proximity via radio signals. The combination allows the user to retrieve information regarding fellow soldiers that meet a predetermined combination of proximity via radio signals and identification of skills or unit association.
- File Sharing, File Transfer and Media Sharing
- The ability for a user to use the disclosed technology to identify other users within a proximity facilitates file sharing and media sharing, which may be relevant to the locus of the users or relevant to the individual users themselves. By way of non-limiting example, this could relate to the user commenting on a local event at which the user is present. Additionally, a speaker or entertainer can provide access of a media file to an audience or others nearby. This provides an ability to promote or advertise one's music, including songs, albums and randomized playlists to nearby users, additionally creating a community of music. This also allows file transfer to occur using local network facilities or directly as peer-to-peer transfers.
- Additionally the software will use an algorithmic rating system to compare and rate users' taste in music in contrast to other nearby users. The rating and a comparison with similar media can be accomplished within the area of proximity defined by the user or by other users.
- In addition to the presumed relevance of media files to others within a defined proximity, the ability to share media is based on a concept that these people would enjoy getting to know each other based on their similar taste in the media, such as a particular type of music or music by a particular artist.
- API (Configuration)
-
FIGS. 11A and 11B are schematic diagrams depicting a Presence Group Aggregation System platform in its functional aspect.FIG. 11A shows establishing proximity.FIG. 11B is a three ring model, based on the diagram ofFIG. 11A , based on a user's nearby user experience. - Although an Application Programming Interface (API)is provided herein, one of skill in the art will understand that the API is exemplary and other APIs consistent with the spirit and scope of the disclosed technology may be utilized. In a configuration, a request stating that mobile user with UUID 1 (for example) can see another user with
UUID 1 andUUID 3; as an example: - An empty array of other_user_identifiers may also be passed up, which is useful for querying the system to see which other users are detectable via the aggregation algorithm. Whatever is passed, a successful response returns a list of all the aggregated users in proximity like this:
- {“identifier”:“6”,“other_user_identifiers”: [“5”,“7”,“9”,“11”]}
- Timeout
- Users that are grouped by detections will time out and become degrouped after a predetermined amount of time of no detections.
- The Presence Group Aggregation System platform provides the required framework to create visual proximity “Degrees of Separation” or Rings as well as a View Controller User Interface to implement this functionality.
- This tool is useful when a user is interested in reducing the nearby user field into a workable sum, for example just the students in a classroom. The Presence Group Aggregation creates a nearby user contact list based on all the direct and indirect user connections available. In the figure below, IRY has direct connections to ALY, NERO, OREN and COOK. IRY has indirect Second Degree Connections with MONKEY and ALB and Third Degree Indirect Connections with Ape and Banana. The Disclosed technology provides the users with the ability to filter out Users based on the degrees of connection: first, second, third, fourth etc. This is naturally most useful in very highly dense settings.
- Rings are differentiated with the following logic
- The formula for the logarithm is:
- First Ring (Degree of Separation)=This includes users' first degree “DIRECT” Contacts, users that the subject has detected and “INDIRECT” web service calls of the subject as advertiser made by listening only devices (Permanent Listening only users=Users with no listening but no advertising hardware and Temporary Listening Devices=iOS devices where the application has canceled or has stopped running while in the background.)
- Second Ring (Degree of Separation)=This includes all the results from the Peers in subjects First Ring “DIRECT” and “INDIRECT” connections excluding all entry pairs that include the subjects unique identifier.
- Third Ring (Degree of Separation)=This includes all the results from the Peers in the subjects Second Ring “DIRECT” and “INDIRECT” connections excluding all the entry pairs that include the subject and all the subjects First Ring connections.
-
FIG. 11B shows user IRY's nearby user experience. The Presence Group Aggregation System platform creates a cluster including all of the users depicted inFIG. 11A . Within the cluster, Rings are differentiated with the following logic: -
-
Ring 1=Direct and webservice UUIDs including user's UUID -
Ring 2=Direct and webservice of user's First Ring connections, excluding entries and web calls with user's UUID. (OREN, NERO) -
Ring 3=Direct and webservice of user's second ring connections, excluding entries and web calls with user's UUID and First Ring connections. (MONKEY, ALB)
-
- The Presence Group Aggregation System platform allows the system to provide users with the ability to reduce and extend their visible contacts via “Inherent Rings” representing degrees of separation. This reduces a random cluster of nearby users into an immediate group of “first Ring” members. The “first Ring” members can be people within a small room, such as a classroom or business establishment or otherwise within a small area.
- A
filter button 1031, shown inFIG. 10B can be used to determine which profiles and which Rings are presented. The control of the Rings and other proximity controls may be accessed through the “Filter” button which will be easily accessible one the main user interface screen, by pressing this button, the display will reveal to the user will the filters, “Rings” or “degrees of separation” that are available to be implemented. - Closing Statement
- While mobile devices have been described and the use of information from specific networking services has been described, it is also possible to use other devices and services. For example, desktop devices can be used to identify Inherent Rings based on information identified through network connections, as manually designated by the user or as matched by the user to a particular location of a mobile device (i.e., “Make my location the present location of my phone.) It is possible to either permit or not permit the sharing of unique identifiers across multiple devices, and multiple devices can be associated with a single user or user profile as desired. In that way, multiple devices belonging to a user can be issued separate unique identifiers or can share unique identifiers, and the user can still be uniquely identified across multiple devices. In the case of multiple devices, the user can designate one or more devices as having a priority on the system, in order to avoid the use of multiple devices causing duplication of profiles displayed on other users' devices.
- It will be understood that many additional changes in the details, materials, steps and arrangement of parts, which have been herein described and illustrated to explain the nature of the subject matter, may be made by those skilled in the art within the principle and scope of the invention as expressed in the appended claims.
Claims (17)
1. A method for providing signals broadcast from a user in a mobile network, the method comprising:
providing communications between users of mobile computing devices;
providing an application set up on a user's mobile computing device;
in a transmit mode:
using the application to cause the user's mobile computing device to identify a device location;
using the application to broadcast a message, call and/or video transmission to other users' devices advertising a presence of the user's mobile computing device as a broadcasting user's mobile computing device; and
in a receive mode:
using the application to cause the user's mobile computing device to identify an image and to determine an image resemblance measured with facial recognition algorithms that represent deviations in facial features and dimensions;
using the application to cause the user's mobile computing device to cross reference the identified second device with stored data;
using the application to cause the user's mobile computing device to identify at least one further device; and
using the application to cause the mobile computing device to provide the user with an indication of the broadcasting user's mobile computing device.
2. The method of claim 1 , further comprising:
using the application to cause the user's mobile computing device to cross reference the identified second device with data stored within the user's mobile computing device.
3. The method of claim 2 , further comprising:
associating the user with a profile, the profile comprising an administrative group or military unit and a capability;
providing the user with a selection of other users within at least one Presence Group in accordance with user-selected criteria comprising profile information from user profiles corresponding to the user's profile; and
storing, in the server, location information for the user, thereby providing other personnel in the administrative group or a military entity with an ability to locate the user.
4. The method of claim 1 , further comprising:
establishing at least one Presence Group comprising at least one device within a predetermined distance of the user, the predetermined distance established by at least one of the group consisting of physical distance, visual proximity, distance as determined by radio signal strength, absolute received radio signal strength and other defined proximity determination.
5. The method of claim 1 , further comprising:
providing the user with a selection of received messages for user notification, the selection comprising a plurality of:
a) messages of a predetermined category from a second device when the messages satisfy a cross reference of the identified second device with data stored within the user's mobile computing device;
b) messages of a predetermined category within a defined proximity to the user; and
c) all messages of a predetermined category received by the user; and
in the case of a received message meeting the criteria, providing that message to the user or providing an indication of the availability of that message to the user.
6. The method of claim 1 , further comprising:
providing a proximity database on the user's mobile computing device.
7. The method of claim 1 , further comprising:
providing a proximity database on the user's mobile computing device;
using the application to cause the user's mobile computing device to identify at least a second device within a predetermined proximity to the user, the predetermined proximity established by at least one of the group consisting of physical distance, visual proximity, distance as determined by radio signal strength, absolute received radio signal strength and other defined proximity determination;
using the application to cause the user's mobile computing device to cross reference the identified second device with stored data;
using the application to cause the user's mobile computing device to cross reference the identified second device with stored data;
using the application to cause the user's mobile computing device to identify at least one further device within a predetermined proximity to one of the user and the second device; and
using the application to cause the mobile computing device to provide the user with an indication of the broadcasting user's mobile computing device based on the predetermined proximity.
8. A method for receiving signals from a user in a mobile network, the method comprising:
providing communications between users of mobile computing devices;
using the application to cause the user's mobile computing device to identify an image and to determine an image resemblance measured with facial recognition algorithms that represent deviations in facial features and dimensions;
using the application to cause the user's mobile computing device to identify at least one further device according to the identified image; and
using the application to cause the mobile computing device to provide the user with an indication of the broadcasting user's mobile computing device.
9. The method of claim 8 , further comprising:
using the application to cause the user's mobile computing device to cross reference the identified second device with data stored within the user's mobile computing device;
10. The method of claim 9 , further comprising:
the associating of the user with a profile, the profile comprising an administrative group or military unit and a capability;
providing the user with a selection of other users within at least one Presence Group in accordance with user-selected criteria comprising profile information from user profiles corresponding to the user's profile; and
storing, in the server, location information for the user, thereby providing other personnel in the administrative group or a military entity with an ability to locate the user.
11. The method of claim 8 , further comprising:
establishing at least one Presence Group comprising at least one device within a predetermined distance of the user, the predetermined distance established by at least one of the group consisting of physical distance, visual proximity, distance as determined by radio signal strength, absolute received radio signal strength, boundaries stored on a server and other defined proximity determination.
12. The method of claim 8 , further comprising:
providing the user with a selection of received messages for user notification, the selection comprising a plurality of:
a) messages of a predetermined category from a second device when the messages satisfy a cross reference of the identified second device with data stored within the user's mobile computing device;
b) messages of a predetermined category within a defined proximity to the user; and
c) all messages of a predetermined category received by the user; and
in the case of a received message meeting the criteria, providing that message to the user or providing an indication of the availability of that message to the user.
13. The method of claim 8 , further comprising:
providing a proximity database on the user's mobile computing device.
14. The method of claim 8 , further comprising:
providing a proximity database on the user's mobile computing device.
using the application to cause the user's mobile computing device to identify at least a second device within a predetermined proximity to the user, the predetermined proximity established by at least one of the group consisting of physical distance, visual proximity, distance as determined by radio signal strength, absolute received radio signal strength and other defined proximity determination;
using the application to cause the user's mobile computing device to cross reference the identified second device with stored data;
using the application to cause the user's mobile computing device to cross reference the identified second device with stored data;
using the application to cause the user's mobile computing device to identify at least one further device within a predetermined proximity to one of the user and the second device; and
using the application to cause the mobile computing device to provide the user with an indication of the broadcasting user's mobile computing device based on the predetermined proximity.
15. A mobile device capable of sending and receiving broadcast messages to one or more users, comprising:
a circuit capable of communication between users of mobile computing devices and which:
in a transmit mode:
causes a user's mobile computing device to identify a device location;
broadcasts a message, call and/or video transmission to other users' devices advertising a presence of the user's mobile computing device as a broadcasting user's mobile computing device; and
in a receive mode:
causes the user's mobile computing device to identify an image and to determine an image resemblance measured with facial recognition algorithms that represent deviations in facial features and dimensions;
causes the user's mobile computing device to cross reference the identified second device with stored data;
causes the user's mobile computing device to identify at least one further device to one of the user and the second device; and
causes the mobile computing device to provide the user with an indication of the broadcasting user's mobile computing device.
16. The apparatus of claim 15 , further comprising:
a proximity database on the mobile device storing location information for the user or proximity of the user to the other users' mobile computing devices.
17. The apparatus of claim 15 , further comprising:
a proximity database on the user's mobile computing device;
a circuit or instructions to cause the user's mobile computing device to identify at least a second device within a predetermined proximity to the user, the predetermined proximity established by at least one of the group consisting of physical distance, visual proximity, distance as determined by radio signal strength, absolute received radio signal strength and other defined proximity determination;
a circuit or instructions to cause the user's mobile computing device to cross reference the identified second device with stored data;
a circuit or instructions to cause the user's mobile computing device to cross reference the identified second device with stored data;
a circuit or instructions to cause the user's mobile computing device to identify at least one further device within a predetermined proximity to one of the user and the second device; and
a circuit or instructions to cause the mobile computing device to provide the user with an indication of the broadcasting user's mobile computing device based on the predetermined proximity.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US18/109,426 US20230209626A1 (en) | 2015-04-25 | 2023-02-14 | System and Method for Image Matching Using Networked Mobile Communication |
Applications Claiming Priority (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201562152838P | 2015-04-25 | 2015-04-25 | |
US201562218487P | 2015-09-14 | 2015-09-14 | |
US201562260593P | 2015-11-29 | 2015-11-29 | |
US15/132,868 US9854616B2 (en) | 2015-04-25 | 2016-04-19 | System and method for proximity based networked mobile communication |
US15/846,972 US10397971B2 (en) | 2015-04-25 | 2017-12-19 | System and method for proximity based networked mobile communication |
US17/141,553 US11582817B2 (en) | 2015-04-25 | 2021-01-05 | System and method for proximity based networked mobile communication storing proximity on a database |
US18/109,426 US20230209626A1 (en) | 2015-04-25 | 2023-02-14 | System and Method for Image Matching Using Networked Mobile Communication |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/141,553 Continuation US11582817B2 (en) | 2015-04-25 | 2021-01-05 | System and method for proximity based networked mobile communication storing proximity on a database |
Publications (1)
Publication Number | Publication Date |
---|---|
US20230209626A1 true US20230209626A1 (en) | 2023-06-29 |
Family
ID=57148284
Family Applications (5)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/132,868 Expired - Fee Related US9854616B2 (en) | 2015-04-25 | 2016-04-19 | System and method for proximity based networked mobile communication |
US15/846,972 Expired - Fee Related US10397971B2 (en) | 2015-04-25 | 2017-12-19 | System and method for proximity based networked mobile communication |
US16/552,834 Active US10887937B2 (en) | 2015-04-25 | 2019-08-27 | System and method for proximity based networked mobile communication |
US17/141,553 Active US11582817B2 (en) | 2015-04-25 | 2021-01-05 | System and method for proximity based networked mobile communication storing proximity on a database |
US18/109,426 Pending US20230209626A1 (en) | 2015-04-25 | 2023-02-14 | System and Method for Image Matching Using Networked Mobile Communication |
Family Applications Before (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/132,868 Expired - Fee Related US9854616B2 (en) | 2015-04-25 | 2016-04-19 | System and method for proximity based networked mobile communication |
US15/846,972 Expired - Fee Related US10397971B2 (en) | 2015-04-25 | 2017-12-19 | System and method for proximity based networked mobile communication |
US16/552,834 Active US10887937B2 (en) | 2015-04-25 | 2019-08-27 | System and method for proximity based networked mobile communication |
US17/141,553 Active US11582817B2 (en) | 2015-04-25 | 2021-01-05 | System and method for proximity based networked mobile communication storing proximity on a database |
Country Status (7)
Country | Link |
---|---|
US (5) | US9854616B2 (en) |
EP (1) | EP3289785A4 (en) |
JP (1) | JP6835822B2 (en) |
KR (1) | KR101908387B1 (en) |
CN (1) | CN107710796A (en) |
AU (1) | AU2016254955B2 (en) |
WO (1) | WO2016176079A1 (en) |
Families Citing this family (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016176079A1 (en) * | 2015-04-25 | 2016-11-03 | Raphael Oren | System and method for proximity based networked mobile communications |
US9913089B2 (en) * | 2015-08-25 | 2018-03-06 | International Business Machines Corporation | Responding to a status for a user based on nearby electronic devices |
US20170124578A1 (en) * | 2015-08-29 | 2017-05-04 | AreaMetrics, Inc. | System and Method for Tracking the Location of Mobile Devices and Collecting Data Therefrom |
US10782778B2 (en) * | 2019-05-08 | 2020-09-22 | Maximilian Ralph Peter von und zu Liechtenstein | Gaze initiated interaction technique |
US11237629B2 (en) * | 2016-02-06 | 2022-02-01 | Maximilian Ralph Peter von und zu Liechtenstein | Social networking technique for augmented reality |
US10341352B2 (en) * | 2016-02-06 | 2019-07-02 | Maximilian Ralph Peter von Liechtenstein | Gaze initiated interaction technique |
US20170294070A1 (en) * | 2016-04-08 | 2017-10-12 | Nicholas A. Groetken | Peer competitor locating system |
US10402894B2 (en) * | 2016-07-12 | 2019-09-03 | International Business Machines Corporation | Automated service request system |
WO2018018099A1 (en) * | 2016-07-29 | 2018-02-01 | Cardex Group Pty Ltd | Contact information exchanging and content system and method for networking and marketing |
US9894477B1 (en) * | 2017-01-03 | 2018-02-13 | International Business Machines Corporation | Matching and tracking of individual and mobile device |
US10499193B2 (en) * | 2017-03-20 | 2019-12-03 | Satori Worldwide, Llc | Collaborative geo-positioning of electronic devices |
KR101921275B1 (en) * | 2017-06-16 | 2019-02-13 | 라인 가부시키가이샤 | Method and system of file transfer using device-to-device communication technique in messenger |
US10325480B2 (en) * | 2017-08-01 | 2019-06-18 | Cubic Corporation | Proximity assisted seamless service (PASS) |
CN107610453B (en) * | 2017-08-31 | 2020-10-02 | 武汉斑马快跑科技有限公司 | Car sharing method and system based on short-distance Bluetooth hotspot positioning |
US11164265B1 (en) * | 2018-04-18 | 2021-11-02 | Wells Fargo Bank, N.A. | User interface for interfacing with multiple human users |
JP2020013345A (en) * | 2018-07-18 | 2020-01-23 | トヨタ自動車株式会社 | Information processor and information processing method |
US10938834B2 (en) * | 2018-07-26 | 2021-03-02 | Microsoft Technology Licensing, Llc | Dynamic discovery range for online sessions |
US11012387B2 (en) | 2018-10-30 | 2021-05-18 | AMI Holdings Limited | Apparatus and method for matching individuals during an ephemeral time period based upon voting and matching criteria |
US11050688B2 (en) | 2018-10-30 | 2021-06-29 | AMI Holdings Limited | Apparatus and method for improving communication between matched individuals |
US10810403B2 (en) * | 2018-10-30 | 2020-10-20 | AMI Holdings Limited | Apparatus and method for coordinating the matching and initial communications between individuals in a dating application |
US10834035B2 (en) * | 2019-03-18 | 2020-11-10 | Universiti Brunei Darussalam | Instant messaging for mobile device with offline and online mode |
EP3861676A1 (en) * | 2019-10-21 | 2021-08-11 | Google LLC | Verifiable consent for privacy protection |
KR102117886B1 (en) * | 2019-12-16 | 2020-06-02 | 주식회사 화컴 | Method for providing community service based on near-field verification through bluetooth network |
WO2021125499A1 (en) | 2019-12-16 | 2021-06-24 | Hwacom Co., Ltd. | Method and system for providing community service using short-range broadcasting |
US11588699B2 (en) * | 2020-03-19 | 2023-02-21 | Fortinet, Inc. | Detecting access points located within proximity of a computing device for troubleshooting of a network |
US11676130B2 (en) * | 2020-03-30 | 2023-06-13 | Toshiba Global Commerce Solutions Holdings Corporation | Controlling a customer's mobile device to selectively perform the functions of a self-checkout (SCO) station |
KR102436157B1 (en) * | 2020-04-02 | 2022-08-24 | 이동열 | Confirmation system for contact point or area between specified or unspecified smart device using short range wireless communication function on smart device |
US11847519B2 (en) | 2022-05-16 | 2023-12-19 | Bluicity Inc. | System and method for tracking tags over bluetooth low energy |
Family Cites Families (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000167232A (en) * | 1998-06-30 | 2000-06-20 | Masanobu Kujirada | Meeting support system |
JP3980421B2 (en) * | 2002-06-27 | 2007-09-26 | 富士通株式会社 | Presence management method and apparatus |
JP2004274586A (en) * | 2003-03-11 | 2004-09-30 | Nec Corp | Mobile phone system with automatic searching function of unspecified opposite party and automatic searching method of unspecified opposite party by mobile terminal |
JP2005196600A (en) * | 2004-01-09 | 2005-07-21 | Hitachi Ltd | Presence data management method |
US7877082B2 (en) * | 2004-05-06 | 2011-01-25 | Massachusetts Institute Of Technology | Combined short range radio network and cellular telephone network for interpersonal communications |
US8688143B2 (en) * | 2004-08-24 | 2014-04-01 | Qualcomm Incorporated | Location based service (LBS) system and method for creating a social network |
US20080285542A1 (en) * | 2007-05-18 | 2008-11-20 | Alcatel Lucent | Location based presence groups |
US8010601B2 (en) * | 2007-12-21 | 2011-08-30 | Waldeck Technology, Llc | Contiguous location-based user networks |
US20100005520A1 (en) * | 2008-06-06 | 2010-01-07 | Mekey Llc | Personal area social networking |
US8751584B2 (en) | 2008-10-16 | 2014-06-10 | Blackberry Limited | System for assignment of a service identifier as a mechanism for establishing a seamless profile in a contextually aware presence access layer |
US20120047087A1 (en) * | 2009-03-25 | 2012-02-23 | Waldeck Technology Llc | Smart encounters |
US20100280904A1 (en) * | 2009-05-01 | 2010-11-04 | Sumit Pradeep Ahuja | Social marketing and networking tool with user matching and content broadcasting / receiving capabilities |
US8301581B2 (en) * | 2009-09-24 | 2012-10-30 | Avaya Inc. | Group compositing algorithms for presence |
US20110238755A1 (en) * | 2010-03-24 | 2011-09-29 | Hameed Khan | Proximity-based social networking |
US8831294B2 (en) * | 2011-06-17 | 2014-09-09 | Microsoft Corporation | Broadcast identifier enhanced facial recognition of images |
US8577354B2 (en) * | 2011-10-07 | 2013-11-05 | Newaer, Inc. | Automating actions within a phone network based upon scanned wireless signals |
US8805352B2 (en) * | 2011-10-07 | 2014-08-12 | Newaer Inc. | Determining virtual location based upon scanned wireless signals |
US9544075B2 (en) * | 2012-02-22 | 2017-01-10 | Qualcomm Incorporated | Platform for wireless identity transmitter and system using short range wireless broadcast |
US10419907B2 (en) * | 2012-02-22 | 2019-09-17 | Qualcomm Incorporated | Proximity application discovery and provisioning |
US20130282438A1 (en) * | 2012-04-24 | 2013-10-24 | Qualcomm Incorporated | System for delivering relevant user information based on proximity and privacy controls |
US10783749B2 (en) * | 2012-11-10 | 2020-09-22 | Dewaalip Llc | System and method for providing a secondary contest dependent on the results of a primary game |
US9037133B2 (en) * | 2012-12-27 | 2015-05-19 | Verizon Patent And Licensing Inc. | Broadcast based proximity service to mobile device users |
US9792772B2 (en) * | 2013-02-04 | 2017-10-17 | Formatfabriken STHLM idé och skrivbrå | Systems and methods for allowing players to play poker games having multiple decks |
US20140254466A1 (en) * | 2013-02-21 | 2014-09-11 | Qualcomm Incorporated | Interleaving Advertising Packets For Improved Detectability And Security |
WO2015069321A1 (en) * | 2013-05-21 | 2015-05-14 | Games Marketing Ltd. | System and method for dynamically presenting live remote dealer games |
CN105409132A (en) * | 2013-07-24 | 2016-03-16 | 诺基亚技术有限公司 | Handling bluetooth low energy messages |
US20150081346A1 (en) * | 2013-09-19 | 2015-03-19 | Fragmob, Llc | Event ticket sharing via networked mobile computing devices |
US9680529B2 (en) * | 2013-12-12 | 2017-06-13 | Marcelo Coelho Studio, LLC | Electronically enabled in-person social networking |
US10355797B2 (en) * | 2014-08-25 | 2019-07-16 | Music Pocket, Llc | Provisioning a service for capturing broadcast content to a user device via a network |
EP2993928B1 (en) * | 2014-09-04 | 2017-11-01 | Nokia Technologies OY | Device selection to establish a wireless communication |
WO2016036853A1 (en) * | 2014-09-07 | 2016-03-10 | University Of Florida Research Foundation Inc. | Dynamic user-defined check-in points |
KR102118420B1 (en) * | 2014-09-12 | 2020-06-03 | 삼성전자 주식회사 | Method and system for tracking location of an electronic device |
US10111156B2 (en) * | 2014-11-11 | 2018-10-23 | Qualcomm Incorporated | Neighborhood learning using neighbor awareness networking |
US9729667B2 (en) * | 2014-12-09 | 2017-08-08 | Facebook, Inc. | Generating user notifications using beacons on online social networks |
WO2016176079A1 (en) * | 2015-04-25 | 2016-11-03 | Raphael Oren | System and method for proximity based networked mobile communications |
-
2016
- 2016-04-19 WO PCT/US2016/028243 patent/WO2016176079A1/en active Application Filing
- 2016-04-19 CN CN201680037400.7A patent/CN107710796A/en active Pending
- 2016-04-19 US US15/132,868 patent/US9854616B2/en not_active Expired - Fee Related
- 2016-04-19 AU AU2016254955A patent/AU2016254955B2/en active Active
- 2016-04-19 KR KR1020177034283A patent/KR101908387B1/en active IP Right Grant
- 2016-04-19 EP EP16786934.6A patent/EP3289785A4/en active Pending
- 2016-04-19 JP JP2018507487A patent/JP6835822B2/en active Active
-
2017
- 2017-12-19 US US15/846,972 patent/US10397971B2/en not_active Expired - Fee Related
-
2019
- 2019-08-27 US US16/552,834 patent/US10887937B2/en active Active
-
2021
- 2021-01-05 US US17/141,553 patent/US11582817B2/en active Active
-
2023
- 2023-02-14 US US18/109,426 patent/US20230209626A1/en active Pending
Also Published As
Publication number | Publication date |
---|---|
US11582817B2 (en) | 2023-02-14 |
WO2016176079A1 (en) | 2016-11-03 |
US10397971B2 (en) | 2019-08-27 |
US20190387560A1 (en) | 2019-12-19 |
EP3289785A4 (en) | 2018-10-31 |
KR20180004185A (en) | 2018-01-10 |
EP3289785A1 (en) | 2018-03-07 |
US20210127439A1 (en) | 2021-04-29 |
CN107710796A (en) | 2018-02-16 |
JP6835822B2 (en) | 2021-02-24 |
KR101908387B1 (en) | 2018-10-16 |
US10887937B2 (en) | 2021-01-05 |
US20160316503A1 (en) | 2016-10-27 |
US9854616B2 (en) | 2017-12-26 |
AU2016254955B2 (en) | 2021-01-21 |
US20180110079A1 (en) | 2018-04-19 |
JP2018526906A (en) | 2018-09-13 |
AU2016254955A1 (en) | 2017-12-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11582817B2 (en) | System and method for proximity based networked mobile communication storing proximity on a database | |
US8989727B2 (en) | System and method for proximity area networking for mobile gaming | |
CN106211020B (en) | Systems, methods for facilitating social networking service connections via AD HOC peer-to-peer networking of mobile devices | |
US8559980B2 (en) | Method and system for integrated messaging and location services | |
US20100131502A1 (en) | Cohort group generation and automatic updating | |
US9800628B2 (en) | System and method for tagging images in a social network | |
US20140108556A1 (en) | Holiday expression and mapping in a geospatially constrained social network | |
US20090157496A1 (en) | Personal broadcast engine and network | |
US20210204089A1 (en) | Affinity and Proximity Information Exchange Systems and Methods | |
KR20120129888A (en) | Method and system for transmitting and receiving messages | |
US20180191651A1 (en) | Techniques for augmenting shared items in messages | |
US20140074957A1 (en) | Method and Apparatus for Social Information Exchange in a Vehicle | |
US20160321712A1 (en) | Crowd Sourced Networked Target Feedback | |
US10278067B2 (en) | Methods and systems for associating social media to wireless identifiers | |
WO2015097257A1 (en) | Social network system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |