throbber
as) United States
`a2) Patent Application Publication 0) Pub. No.: US 2010/0138481 Al
`
` Behrens (43) Pub. Date: Jun. 3, 2010
`
`
`US 20100138481A1
`
`(54) DEVICE AND METHODFOR ESTABLISHING
`SOCIAL NETWORKS THROUGH THE USE
`OF WIRELESS TECHNOLOGY
`
`(52) US. CD. cc eseeeseescseneeenecnees 709/203; 709/224
`
`(76)
`
`Inventor:
`
`:
`
`12/598,425
`
`ABSTRACT
`(57)
`Philip Behrens, Sperryville, VA
`The inventionrelates to a portable electronic device, compris-
`(US)
`ing means(c) for scanning continuously/repeatedly for UIDs
`
`Peipendence Address: sent out by other devices and recording these UIDsinalog;
`141937th Str. NW
`and means(d) fortransferring the recorded UIDsto a server
`.
`,
`or another device(f);
`Washington,
`DC 20007
`;
`asmungrons
`and to a method for establishing-server-based communi-
`(21) Appl. No.:
`cation options, whereby:
`(a) portable electronic devices containing identifiers
`(UIDs) record identifiers that are transmitted wirelessly
`and non-directionally by other portable electronic
`devices,
`(b) the identifiers (UIDs) are transferred to a server, and
`(c) the identifiers (UIDs) are used by a server to provide
`communication betweenusers ofthe devices containing
`the identifiers that have been recorded.
`Moreover, the invention relates to a device and method for
`establishing contact wirelessly with a second compatible
`device, where the device comprises
`means (a) for automatically establishing non-directional
`contact as well as the transfer of one or morefirst data
`packets between the device and one or more target
`device(s); and
`means(b), which (following an automatic, non-directional
`contact as well as the transfer of one or morefirst data
`packets between the device and one or more target
`devices) allows the user to transfer one or more direc-
`tional second data packets.
`
`(22) PCT Filed:
`
`Apr. 30, 2008
`
`(86) PCT No.:
`
`PCT/EP08/55394
`
`§ 371 ()Q),
`(2), (4) Date:
`Oct. 30, 2009
`too.
`Related U.S. Application Data
`(60) Provisional application No. 61/024,794,filed on Jan.
`30, 2008.
`
`(30)
`
`Foreign Application Priority Data
`
`Apr. 30, 2007
`
`(DE) wee 10 2007 020 296.4
`oo.
`.
`.
`Publication Classification
`
`(51)
`
`Int. Cl.
`GO6F 15/173
`GO6F 15/16
`
`(2006.01)
`(2006.01)
`
`(
`
`|
`
`a,
`oo
`
`
`Tee
`— UIDs are transferred wirelessly
`
`,
`SL
`
`
`UID#1 > |( [ Device2 )}
`Device1
`
`
`
`
`
`
`
`withUID#2
`withUID#1
`:
`
`
`Mee
`Mee
`<==
`===
`
`UID2 seen log:
`UID1 seen log:
`Device 1 uploads
`_____ Device 2 uploads
`-UIDH1
`-UlD#2
`
`its ‘seen log’
`its ‘seen log’
`
`
`nggatyt
`Internet
`
`
`
`User
`account:
`UID#1
`
`
` Seen list (UIDH#1):
`
`User
`account:
`UID#2
`
`-UID#X
`-UID#Y
`-UID#2 (new)
`
`
`The server uses the UIDs from
`the ‘seenlogs’ to create‘seenlists’
`
`Seenlist (UID#2}:
`
`-UIDHX
`-UIDAY
`-UID#1 (new)
`
`
`
`Google v. SeeCommTech
`
`Google Exhibit 1006
`Google Exhibit 1006
`Google v. SecCommTech
`
`

`

`Patent Application Publication
`
`Jun. 3, 2010 Sheet 1 of 3
`
`US 2010/0138481 Al
`
`
`
`
`
`
`
`sjeusisAsuanba.yolpesa8ueJ-LUNIpa
`
`sjeusisApuanbadssolpesaBues-NIpawu
`
`
`
`
`
`‘LHCINSAAl92017BDIAAPUdYMpueJ|
`
`Za1Aaq
`
`(z#qINYUM)
`
`(THOIN4)Tadlaaq
`
`
`
`
`
`SO]Uaas,S1101THAINsppe1!
`
`
`
`
`
`‘ZHCINSAAIBI9ITSIIASpUBYMpue}|
`
`Uaas,SY01THINSppeU
`
`JNOBulpuasZad|AaQ BO]
`
`JO-JJOYsSBIATHININOBulpuasTaIN9q
`
`JO-JJOUSBIAZHQIN
`
`TOld
`
`
`
`
`
`
`
`

`

`Patent Application Publication
`
`Jun. 3, 2010 Sheet 2 of 3
`
`US 2010/0138481 Al
`
`c#dINYUMCVIIAVGT991A9q
`
`THINUUM
`
`speojdnzaa1aaq
`
`
`
`B0|UIAS,SH
`
`
`
`:30|uaasZIN
`
`speojdn[aa1aaq
`
`
`
`30]Ua—dS,SHI
`
`
`
`teeneengrevereSecatrcflty,i,We
`
`
`
`ggco"thee“gf19UJ9}U|oy,
`
`
`"ie,..ul
`
`x.
`
`151]Uaas
`
`Jasn
`
`JuUNnO39e
`
`z#aIN
`
`:Junoj3e
`
`THIN
`
`
`
`x#1N-x#aln-
`
`
`
`A#OIN-A#aIn-
`
`
`
`
`
`A|ssajauiMpasajsued)asesqin
`
`
`
`(mau)THCIN-(mau)Z#GIN-
`
`
`
`
`
`
`
`WOJ}SQ/N)9Y}SAasNJaAJaSBY]
`
`
`
`
`
`
`
`/S}SI|UBAS,9}LIID0}SSO]uaas,BU}
`
`
`
`
`
`
`
`
`
`
`

`

`Patent Application Publication
`
`Jun. 3, 2010 Sheet 3 of 3
`
`US 2010/0138481 Al
`
`
`JseSSOLUeCpuss-|©|apessowepuss-
`Me*eggcoJausaqU]aysarenrraf,Z
`JSI]U99S
`
`
` T#dInMou-Mau-(Twain:JuNnN039eISAISS:Junoo2e()c#IN
`
`7ceATHoehigettcane
`2451]UB9S
`
`
`oerannengrenranansetnahensvecmmseonceenenirrarnnvee
`
`
`_JasnUMOUUN,,AqpasnJayndwo)IY]
`x#aIN-ncSnyal
`
`A#QIN-A#QIN-
`
`prnerensesttiteanyeaeymgreeearenettyng
`(THAIN)ZHOINYIMJasn
`dosdos
`
`“a
`
`
`
`Aqpasnsajnduwio5
`
`THINYUMJasn
`
`
`
`JOSHSIU}SOUS]-
`
`
`
`729dUYOf,,
`
`€Old
`
`
`
`

`

`US 2010/0138481 Al
`
`Jun. 3, 2010
`
`DEVICE AND METHOD FOR ESTABLISHING
`SOCIAL NETWORKS THROUGH THE USE
`OF WIRELESS TECHNOLOGY
`
`[0001] The invention relates to a device and method for
`establishing contactelectronically through theuse ofwireless
`technology. More particularly,
`the invention relates to a
`device and a method through which contact is automatically
`established between users who comeinto proximity of one
`another.
`
`BACKGROUND
`
`In this day and age, mobile phones have become an
`[0002]
`integral part of the daily lives of hundreds of millions of
`people. Electronic messaging such as SMS(short messaging
`service) or E-Mail through the use of mobile devicesis also
`becomingincreasingly common,particularly among younger
`people. However, the exchange of personal contact informa-
`tion, which is required for establishing electronic communi-
`cation (telephone, SMS, instant messaging, e-mail) occurs
`largely in conventional, non-electronic manner. Phone num-
`bers as well as electronic addresses are often still communi-
`
`cated verbally or on paper. At times, a cell phone will be
`handed to the person with whom such contact is desired, in
`orderto let that person enter his own numberor e-address. An
`exception is the ability of some mobile devices to transmit
`electronic business cards to compatible devices, using infra-
`red or Bluetooth transmission, for example. Internet forums
`provide a means to establish contacts electronically. How-
`ever, these are accessed through the help of computers and are
`boundto Internet portals.
`[0003]
`Sharing one’s personal phone number or e-mail
`address with someoneusually represents a step which cannot
`be reversed very easily. Therefore, most people think twice
`before giving outtheir personal contact informationto strang-
`ers, often preferring to get acquainteda bit first. Moreover, it
`is normally not possible to contact strangers through mobile
`devices, since one would not have the coordinates for doing
`so. Current electronic communication systems thus do not
`offer a viable alternative to approaching strangers in person.
`[0004]
`Ithas, for some time been possible to make acquain-
`tances using various formsof Internet-based communication.
`Countless Internet services offer to bring users into contact
`with one another based on a variety of criteria, such as, for
`example, commoninterests, gender, age, regional location, as
`well as combinations thereof. Examples include Internet
`forums, messaging boards and online dating services.
`[0005]
`In recent years, emerging online social network
`websites have focused on allowing users to build their own
`individualonline social networks by adding knownfriends or
`acquaintances to their own personalprofiles or user accounts.
`This is typically achieved through users searching for names
`of friends who mayalready have registered with the service.
`If a friend is not yet a memberofthat service, the user may
`disclose that person’s e-mail address to let the service contact
`that person. The service then sends an e-mail to the person,
`asking whetherhe or she wouldlike to join the service as well
`as the initiating user’s friend list. By displaying, more orless
`openly, users’ friendlist to others, many of these services also
`encourage their users to contact their friends’ friends. This
`can lead to rapidly growing friendlists. In somecases, it has
`even resulted in users attaining hundreds and even thousands
`of “friendships” on such a site. As a measure of preventing
`
`this kind of “friendship inflation”, some services implement
`access filters, proposing friendships more in accordance to
`commoninterests, age or user locality. This can lead to more
`meaningful friendlists.
`[0006] A growing concern on social networking sites has
`been the misuse for purposes of delivering unsolicited com-
`munication (spam) for commercial, personal or criminal pur-
`poses.
`
`[0007] An object of the present invention is therefore to
`provide a device and a method through which users may come
`into electronic contact with one another on the basis of their
`
`individual, dynamiclocalities. A further object of the present
`invention is to use wireless technology for providing special
`communication layers through the help of which users may
`comeinto contact with one anotheronthebasis of past and/or
`present proximities in relation to one another. Said commu-
`nication layers are also intended to provide an alternative to
`the disclosure ofpersonal contact informationthatis typically
`required for electronic communication. Such a communica-
`tion layer may be viewed as a kind of sand box for generally
`open and unrestricted communication, which mayalso be
`shielded from the other functions provided by the devices.
`[0008]
`Ina first aspect, the present invention therefore pro-
`vides a device for establishing contact wirelessly with a sec-
`ond compatible device, comprising:
`[0009] Means(a), for automatically establishing non-direc-
`tional contact as well as the transfer of one or morefirst data
`
`packets between the device and one or more target device(s);
`and
`
`[0010] Means (b), which (following an automatic, non-
`directional contact as well as the transfer of one or morefirst
`
`data packets between the device and one or more target
`devices) allows the user to transfer one or more directional
`second data packets.
`[0011] According to the present invention, “automatically
`establishing non-directional contact”is to mean that the user
`does not specify with which device(s) a contact is to be made,
`butrather that all receptive devices are addressed, similar to a
`radio broadcast. In this context, the term “contact” merely
`describes an active connection between the device andat least
`one target device, regardless of the duration thereof. Specifi-
`cally, the reception of non-directional,first data packets does
`not require a responsebya receiving device. The device may
`also be adjusted in such a way that a search for receptive
`devices (within range) is conducted automatically and that
`contactis established automatically, or that such receptivity is
`to be inducedbythe user.
`[0012] According to the invention, “automatically estab-
`lishing non-directional contact as well as the transfer ofone or
`morefirst data packets”is to mean that the user may allocate
`or furnish specific information (e.g. photo,
`logo, sound,
`video) for establishing a first contact via first data packets;
`therebynot specifying which devices are to receive this data.
`[0013] Herein, no specific distinction is made between the
`terms“data” and “data packets”.
`[0014] Therefore, through means of the inventive device
`accordingto the first aspect, contact may be established with
`at least onetarget device. In general, the target device will be
`a compatible device of another user with whom a contact
`could or should occur. Both the device and the target device
`may be mobile phonesor other types of electronic devices.
`
`

`

`US 2010/0138481 Al
`
`Jun. 3, 2010
`
`[0015] The term “target device”is herein used to refer to a
`further inventive device, or a device that is compatible with
`the inventive device. Itis further used to indicate sucha device
`carried by a third user.
`[0016] The term “third user” is used herein to indicate a
`further user.
`
`In general, the means (a), and (b) are capable of
`[0017]
`transmitting as well as receiving electromagnetic radiation on
`one or more frequencies. This frequencyor these frequencies
`may, in general, differ from those typically used in mobile
`phones and other portable electronic devices, such as GSM,
`UMTS, Bluetooth and WLAN.
`[0018]
`Preferably, one or more frequencies in one of the
`license-free ISM-bands are used (e.g. 2400 MHz to 2500
`MHzor 433.05 MHz to 434.79 MHz). Frequency-hopping
`techniques can serve to prevent interference, such as that
`resulting from other devices using the same frequency ranges.
`Furthermore, checksum verification and/or encryption may
`be employed to maintain data integrity.
`[0019] Anestablished contact may be displayed orsignaled
`on the inventive device, and, if applicable, on the target
`device. This can specifically include optical, acoustic or
`mechanical signals, such as vibration mechanisms.
`[0020] The automatic establishment of contact through
`means(a) maybeinitiated by the user, or it may be established
`automatically, subject to settings or pre-adjustments on the
`device. This concerns one or moretargetedfirst data packets.
`Once a contact is established between the inventive device
`
`and at least one target device(1.e. the devices are able to “see”
`one another), data may be exchanged.
`[0021]
`Preferably, the inventive device comprises an elec-
`tronic component wherein the means (a) and (b) are con-
`tained. Accordingto the invention, this means that a connec-
`tion between the said electronic component, andthe rest of
`the device exists, at least temporarily. Specifically, the said
`electronic component can be integrated in the device,
`attached to the remainderof the device (by meansofa plug or
`cable connection), or it may be connected wirelessly to the
`remainder of the device.
`
`[0022] Themeans(a) are preferably equipped in such a way
`that a detection of the presence ofat least one target device
`within a minimum and/or maximum distance is made pos-
`sible. Specifically, the means(a) can beset in such a way that
`aminimum and/or maximum distance between the device and
`
`at least one target device maybe selected, and within which
`establishing a contact is possible. This distance can vary
`greatly. In general, the distance will not be more than 5 km.
`Preferably, the maximum distance will be 1 km. Morepref-
`erable is a distance of 100 m. In an especially preferred
`embodiment, this distance will be 50 m and, even more so, 20
`m.
`
`Preferably, the inventive device has an identifier
`[0025]
`(ID), which can be transferred to at least one target device.
`This identifier contains informationfor identifying the device
`(and thusits user).
`[0026]
`Preferably, the identifier is unique, especially to
`each device of its type, and unchangeable. Theidentifier may
`stem from the serial numberofthe electronic component, for
`example. In general, the identifier allows the device to recog-
`nize another device as well as to specifically respond to
`another device (orits user). The identifier also serves to allow
`the user of such a device or target device to block out other
`users from his device, in order to stop the other user from
`further contacting him, for example. Blocked identifiers are
`preferably stored on the device (the one that should block out
`the other). This allows users to demarcate, or mark them-
`selves off, in what is generally intendedto be an open, uncon-
`trolled and unrestricted setup.
`[0027]
`In general, the identifier is either transmitted simul-
`taneously with thefirst data packets, or before.
`[0028]
`Ina preferred embodimentofthe first aspect, the
`inventive device can store the identifier, and/or further data,
`from one or more target devices. Preferably, the inventive
`device allows a transfer of this information onto external
`
`storage. The device identifier contains information for iden-
`tifying the device.
`[0029] The device can be equipped in such a waythatfirst
`and second data packets may only be transferred after recep-
`tion of the identifier and, if applicable, verification thereof.
`[0030] According to settings on the inventive and target
`devices, second data packets that have been selected or fur-
`nished by the respective users may be transferred in one or
`both directions. Also possible is the directional communica-
`tion between three and more devices.
`
`Preferably, the means(a) and (b) permit controlling
`[0031]
`the content of data and/or the transmission of data to the at
`least one target device by the user.
`[0032] This data, especially in the form offirst data packets,
`mayinclude pictures, text, logos, videos, sounds as well as
`live video signals (e.g. from a camera built into the mobile
`device). Furthermore, the first data packets can include ques-
`tions or messages that have been prepared or structured by
`software. These can serve to address commoninterests, spe-
`cific questions or other information. In general, such infor-
`mation will be transferred to the target device, where it may
`be answered manually or automatically. Such a reply can be
`made subject to settings on the target device or to profiles
`containing information pertaining to pre-configured answers
`or responses, for example.
`[0033] Moreover, the exchange of data may be processed
`and structured in accordance with filters. Preferably, such
`filters are implemented and configurable through software.
`[0034]
`Preferably, the user of the inventive device may, at
`any time, view or scroll through received data from other
`devices/users. He may decide which data he wishes to keep or
`delete.
`
`[0023] The maximum distance can be adjusted through
`predefined signal strengths of the electromagnetic radiation,
`for example. Such a setting may also be influenced through
`software. By using software, further information can be taken
`Preferably, the inventive device is able to display (or
`[0035]
`into account. This can include information relating to the
`notify) whether another device, of which it has previously
`geographical location of the devices, derived from additional
`stored the identifier and possibly received other data from,is
`means including GPS, for example.
`within its range (therefore has reentered its range). Prefer-
`ably, a required proximity may bespecified or predefined for
`[0024]
`In an especially preferred embodimentof thefirst
`this. The display or notification can be an optical, acoustic or
`aspect, the inventive device comprises means (c) for deter-
`mining its own location.It is preferred, that the means(a) are
`mechanical signal, for example. If so desired, the user of the
`
`able to determine the distance betweenthe device andatarget inventive device may transmit further contact information.
`device, the location of which maybe ascertained.
`This could, for example, include a phone number, mobile
`
`

`

`US 2010/0138481 Al
`
`Jun. 3, 2010
`
`phone number, e-mail or instant messaging address. Once
`again, this contact information may be acceptedor blocked by
`the receiver.
`
`[0036] Transferred data (received and/or sent) may be
`stored by the devices involvedfor a predefined period oftime.
`[0037] More specifically, data which has been transferred
`automatically (without active involvement by the user) may
`remain stored on the device. This may be governedbysettings
`whichare selected by the user, or be made dependenton the
`device’s storage capacity.
`[0038]
`Ifso desired by the user, the device can memorize
`another device solelyon the basis of the other device’s iden-
`tifier. Therefore, communication is in principle possible on
`the basis of the inventive device-specific frequency, and with-
`out an exchangeof further contact data, so longas the devices
`are in range of one another.
`[0039]
`In a second aspect, the invention also relates to a
`methodfor establishing contact wirelessly betweenthe inven-
`tive device andat least one target device, whereby:
`[0040] means (a) automatically establish non-directional
`contact as well as transfer one or morefirst data packets
`between the device and one or moretarget device(s), and
`[0041] means (b) (after automatically and non-direction-
`ally establishing contact and transferring one or morefirst
`data packets between the device and one or moretarget device
`(s)) transfer one or more second data packets, directed and
`controllable by the user of the device.
`[0042]
`Several preferred and non-limiting embodiments
`are described in the following.
`[0043] According to the secondaspectof the invention, the
`device sends out non-directionalfirst data packets, preferably
`compressed,at specific intervals (e.g. millisecondsto several
`seconds). Thesefirst data packets may contain a content-type
`of information (e.g. text, photos, logos, video or live video
`signals) which has been predefined by the user, in general
`along with the device’s ownidentifier.
`[0044]
`Ifhe so desires, a user who has received such non-
`directed first data packets (generally together with the send-
`er’s identifier), may actively contact the person whom he has
`received these first data packets from. The following non-
`limiting embodiments are applicable in such a case.
`[0045]
`In a first embodimentofthe first aspect, a device
`according to the invention transmits second data packets
`(through which the third user wishes to make contact) using
`the same frequency and encryption level that were used for
`the undirected transmittal of the first data packets and the
`identifier. In this case, the identifier of the device or target
`device are includedin the second data packets. In sucha case,
`the inventive devices can be programmed in such a way that
`theyare able to verify the identifiers enclosed in data packets
`and to ignore data addressedto a different identifier than its
`own.In this context, the term “ignore” meansthat the datais
`either notstored or deleted.
`
`[0046] A second embodiment of the first aspect differs
`from thefirst in that additional encryption is used. This can
`involve the identifier of the receiving device for encrypting
`the second data packets. In such a case, the involved devices
`should be capable of encrypting directional data packets in
`such a waythat the data will be decrypted only by the device
`with the correspondingrecipient identifier.
`[0047]
`Ina third embodimentofthe first aspect, the inven-
`tive device sendsthe directional data packets using a different
`frequency. Directional data packets will therefore be trans-
`
`mitted on different frequencies than non-directional data
`packets. Encryption may be used independently thereof.
`[0048]
`Ina fourth embodimentofthefirst aspect, the inven-
`tive device transmits the directional data packets using a
`different transmission path than that which is used for non-
`directional data packets. This could include Bluetooth or
`Wireless LAN (ad-hoc mode), for example. In such a case, the
`recipient can accept the second data packets in accordance
`with any security measures of the used transmission path.
`[0049]
`Ina fifth embodimentofthefirst aspect, the inven-
`tive device transmits the second data packets via an Internet
`portal which has been configured accordingly. While this
`could require that the inventive devices be connected to the
`Internet, the online portal could also redirect such communi-
`cation through different types of connections, including SMS
`or MMS, for example.
`[0050]
`Ina sixth embodimentofthefirst aspect, the inven-
`tive device transmits the second data packets via communi-
`cation paths which are typically operated by mobile phone
`carriers. In this case,
`the carrier provides a connection
`through which the second data packets are transmitted (in
`accordanceto the recipient’s approval).
`[0051] There can be combinations of these non-limiting
`embodiments as well.
`
`[0052] A commonfactor of all inventive devices and meth-
`ods presented here lies in their ability to provide a meansfor
`communication to occur,
`independently of, and without
`requiring, the user’s personal contact data. This allows a user
`to be in contact with a third person for as long (and only as
`long) as he wishesto. In general, the identifiers are used for
`this purpose; the device provides a way to block unwanted
`identifiers, thereby preventing unwanted communication at
`any time.
`In a third aspect, the present invention provides a
`[0053]
`portable electronic device, comprising
`[0054] means (c) for scanning continuously/repeatedly
`for UIDssent out by other devices and recording these
`UIDsin a log; and
`[0055]
`means(d) for transferring the recorded UIDsto a
`server.
`
`[0056] These meanscan be in the form of software and/or
`hardware.
`
`[0057] Electronic devices accordingto the third aspect thus
`continuously/repeatedly transmit unique identifiers (UID)
`via non-directed wireless radio frequency transmission.
`Devices that are equipped with the means provided by the
`third aspect of the invention may scan continuously/repeat-
`edly for UIDstransmitted by other devices within range.
`[0058]
`Ina preferred embodimentofthe present invention,
`the device contains means(e) for transmitting continuously/
`repeatedly one or more unique identifiers (UID) via non
`directional wireless radio frequency signals.
`[0059] When sucha device receives another device’s UID,
`it records that UID and measuresthe length of time during
`whichit continues to receive that UID. The device stores the
`
`received UID, along with the time, date and duration of the
`reception. It stores this information in what shall herein be
`referred to as a “seen log”. A device’s seen log will contain
`information regarding which UIDs have been received (or
`“seen’’) by the device.It may also contain information regard-
`ing when and for how long a UID will have beenreceived.
`
`

`

`US 2010/0138481 Al
`
`Jun. 3, 2010
`
`[0060] The following definitions are used in the present
`invention:
`
`[0061] Unique identifier (UID): A code, number, address or
`other symbol that uniquely identifies an AC device, and, by
`association, the owner ofthe AC device. Specifically in regard
`to the third aspect of the invention, a UID mayconsist of or
`include a MAC (media access control) address, Bluetooth
`Device Address (i.e. BD_ADDR), or other unique or quasi-
`unique identifier. In general, it may be hardware-bound and
`unchangeable, as well as software-based and possibly modi-
`fiable by the user.
`[0062]
`Seen log: A log representing receptions of UIDs.
`Mayinclude information related to UID receptions, such as,
`for example, time, date, duration and location of UID recep-
`tions. May also include further information, orlinks thereto,
`such as those related to UID receptions, or those possibly
`deemed relevant by a user. A seen log may specifically
`include information pertaining to spatial locations of UID
`receptions. Furthermore, a seen log may include any form of
`information stemming from user input, such as to mark spe-
`cific events, for example.
`[0063]
`Seenlist: A list containing more or less processed,
`interpreted, and/or structured information stemming from
`one or more seen log(s). The information contained in a seen
`list may be linked, combined or otherwise put into relation
`with friendlists, such as, for example, those used by online
`social networking sites. A seen list may also reflect informa-
`tion and/or choices from users, and could be modifiable by
`users. Seen lists may provide informationina variety ofways,
`including personal and/or customized information for indi-
`vidual users. It may also include information to be displayed
`to specific groups of users, as well information that may be
`made accessible to anyone.
`[0064] Claimed UIDs and unclaimed UIDs: UIDs which
`have been linked to user accounts mayherein bereferred to as
`“claimed UIDs”, while those that have not maybereferred to
`as “unclaimed UIDs”.
`
`[0065] UID account: The term “UID account” mayalso be
`used herein to describe a kind of online user accountthat has
`
`been linked to a given UID by the server. The server may
`receive such a UID (to be able to link it) as contained in
`another device’s seen log or through a user supplying his
`device’s UIDto it (the server).
`[0066] Unclaimed account: A user account which is gener-
`ated on the basis of an unclaimed UID mayherein be referred
`to as an “unclaimed account”.
`
`[0067] Associate: The term “associate” is used herein to
`indicate an association of two or more UIDsandthereby the
`corresponding device users
`through server-based user
`accounts. Such associations may, for example, be used for
`providing server-based communication or options there for,
`including social networking or messaging functions.
`[0068] Generally, a device’s seen log will represent infor-
`mation pertaining to which devices have come into range of
`the used wireless transmission, as well as when and how
`often.
`
`[0069] According to a preferred embodiment, the device of
`the third aspect of the invention mayalso store information
`regarding its location at the time of a UID reception. Such
`information may be obtained from any available source,
`including Cell-IDs from mobile network operators, position
`determining equipmentusing Cell ID techniques, U-TDOA,
`
`A-GPS, E-CID, AOA, standard global positioning system
`equipment (GPS), WLAN access point based positioning,
`etc.
`
`Information regarding the device’s location at the
`[0070]
`time of a UID reception mayalso include or be derived from
`any form of user input, such as through key or touch-screen
`entries, “gestures”, device movements(e.g. via accelerom-
`eter), vocal input, etc.
`[0071] According to the invention, the device may also
`store further information relating to the reception of a UID,
`and specifically information relating to the time, date and/or
`locality of a UID reception. The device preferably storesthis
`information in a mannerthat links the information to events
`recorded in the seen log. Preferably, this manner can include
`some form ofuser input, perhaps marking a particular pointin
`time. This can also include the storing ofphotos, video and/or
`audio material. Furthermore, it may also include information
`regarding phonecalls, messaging or Internet activity, which
`may stand in somerelation to events stored in the seen log.
`[0072] The term “server” may herein be substituted for
`“online service”, indicating Internet-based services which are
`providedto the users, or potential users.
`[0073] According to a preferred embodimentofthe third
`aspectofthe invention, the device providesits seen log infor-
`mation to a server, along with its own UID. This may occur
`via any kind of data-capable connection, including GSM,
`GPRS, UMTS, LANor Wireless LAN, for example. It may
`occurin any form, including a direct, single-purpose upload,
`or bundled with other data, or in combination with other
`electronic transfers, such as e-mail, SMS, MMS, etc. Further-
`more, the device mayalso transfer the seen log information to
`other electronic devices, such as personal computers, for
`example, which, in turn, can uploador forward thesaid infor-
`mation to a server. Devices may also distribute seen log
`information in a peer-to-peer (P2P) fashion. Accordingly, any
`other computing device, including a personal computer, may
`assume,in part or entirely, the functions of the server. In the
`case that P2P is used, the devices may handle the server’s
`processing function described herein in a decentralized fash-
`ion.
`
`[0074] According to embodiments of the invention, once
`such seen log informationis received by theserver, the server
`may store the information in a mannerthat is linked to the
`corresponding device’s UID. Preferably, the server analyzes
`and further processes the seen log information.
`[0075]
`In general, each UID corresponds to one user
`account. However, a UID mayalso be linked to more than one
`user account, such as through different servers or online ser-
`vices. A user account,in turn, mayalso be linked to more than
`one UID. Furthermore, a UID may correspond to separate
`user accounts on different servers or online services.
`
`[0076] The server preferably associates or links a user
`account to every UIDit receives. The server may link UIDsin
`various ways. For example, a user may connectto the server
`through a web browserto supply his device’s UID in order to
`open (create) a new user account, or to append an existing
`one. In such a case, the device to be used (having the UID)
`will not need to connect to the server for this part of the
`process.
`[0077] There are various ways a user may obtain his
`device’s UID. For example, he may be able to access this
`information directly on his device. As such, manycell phones
`produced by the Nokia company will display such informa-
`tion if the user enters a special code directly on the device
`
`

`

`US 2010/0138481 Al
`
`Jun. 3, 2010
`
`(“*#2820#" for BD_ADDRor “*#62209526#” for WLAN
`MACAddresses). An additional, separate device may also be
`used to access a device’s UID. This could include a computer,
`PDA,or cell phone, for example. In certain cases, manufac-
`turers will also provide the information in the form ofa sticker
`on the device or manual.
`
`Ina preferred embodiment, the server automatically
`[0078]
`generates new user accounts for any unclaimed UIDsthatit
`receives. The server may receive such (unclaimed) UIDscon-
`tained in uploadedseen logs, for example.
`[0079] A user account which is generated on the basis of an
`unclaimed UID mayherein be referred to as an “unclaimed
`account”.
`
`[0080] The user ofa device mayherein bereferredto as the
`“user” of

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket