`a2) Patent Application Publication 0) Pub. No.: US 2010/0138481 Al
`
` Behrens (43) Pub. Date: Jun. 3, 2010
`
`
`US 20100138481A1
`
`(54) DEVICE AND METHODFOR ESTABLISHING
`SOCIAL NETWORKS THROUGH THE USE
`OF WIRELESS TECHNOLOGY
`
`(52) US. CD. cc eseeeseescseneeenecnees 709/203; 709/224
`
`(76)
`
`Inventor:
`
`:
`
`12/598,425
`
`ABSTRACT
`(57)
`Philip Behrens, Sperryville, VA
`The inventionrelates to a portable electronic device, compris-
`(US)
`ing means(c) for scanning continuously/repeatedly for UIDs
`
`Peipendence Address: sent out by other devices and recording these UIDsinalog;
`141937th Str. NW
`and means(d) fortransferring the recorded UIDsto a server
`.
`,
`or another device(f);
`Washington,
`DC 20007
`;
`asmungrons
`and to a method for establishing-server-based communi-
`(21) Appl. No.:
`cation options, whereby:
`(a) portable electronic devices containing identifiers
`(UIDs) record identifiers that are transmitted wirelessly
`and non-directionally by other portable electronic
`devices,
`(b) the identifiers (UIDs) are transferred to a server, and
`(c) the identifiers (UIDs) are used by a server to provide
`communication betweenusers ofthe devices containing
`the identifiers that have been recorded.
`Moreover, the invention relates to a device and method for
`establishing contact wirelessly with a second compatible
`device, where the device comprises
`means (a) for automatically establishing non-directional
`contact as well as the transfer of one or morefirst data
`packets between the device and one or more target
`device(s); and
`means(b), which (following an automatic, non-directional
`contact as well as the transfer of one or morefirst data
`packets between the device and one or more target
`devices) allows the user to transfer one or more direc-
`tional second data packets.
`
`(22) PCT Filed:
`
`Apr. 30, 2008
`
`(86) PCT No.:
`
`PCT/EP08/55394
`
`§ 371 ()Q),
`(2), (4) Date:
`Oct. 30, 2009
`too.
`Related U.S. Application Data
`(60) Provisional application No. 61/024,794,filed on Jan.
`30, 2008.
`
`(30)
`
`Foreign Application Priority Data
`
`Apr. 30, 2007
`
`(DE) wee 10 2007 020 296.4
`oo.
`.
`.
`Publication Classification
`
`(51)
`
`Int. Cl.
`GO6F 15/173
`GO6F 15/16
`
`(2006.01)
`(2006.01)
`
`(
`
`|
`
`a,
`oo
`
`
`Tee
`— UIDs are transferred wirelessly
`
`,
`SL
`
`
`UID#1 > |( [ Device2 )}
`Device1
`
`
`
`
`
`
`
`withUID#2
`withUID#1
`:
`
`
`Mee
`Mee
`<==
`===
`
`UID2 seen log:
`UID1 seen log:
`Device 1 uploads
`_____ Device 2 uploads
`-UIDH1
`-UlD#2
`
`its ‘seen log’
`its ‘seen log’
`
`
`nggatyt
`Internet
`
`
`
`User
`account:
`UID#1
`
`
` Seen list (UIDH#1):
`
`User
`account:
`UID#2
`
`-UID#X
`-UID#Y
`-UID#2 (new)
`
`
`The server uses the UIDs from
`the ‘seenlogs’ to create‘seenlists’
`
`Seenlist (UID#2}:
`
`-UIDHX
`-UIDAY
`-UID#1 (new)
`
`
`
`Google v. SeeCommTech
`
`Google Exhibit 1006
`Google Exhibit 1006
`Google v. SecCommTech
`
`
`
`Patent Application Publication
`
`Jun. 3, 2010 Sheet 1 of 3
`
`US 2010/0138481 Al
`
`
`
`
`
`
`
`sjeusisAsuanba.yolpesa8ueJ-LUNIpa
`
`sjeusisApuanbadssolpesaBues-NIpawu
`
`
`
`
`
`‘LHCINSAAl92017BDIAAPUdYMpueJ|
`
`Za1Aaq
`
`(z#qINYUM)
`
`(THOIN4)Tadlaaq
`
`
`
`
`
`SO]Uaas,S1101THAINsppe1!
`
`
`
`
`
`‘ZHCINSAAIBI9ITSIIASpUBYMpue}|
`
`Uaas,SY01THINSppeU
`
`JNOBulpuasZad|AaQ BO]
`
`JO-JJOYsSBIATHININOBulpuasTaIN9q
`
`JO-JJOUSBIAZHQIN
`
`TOld
`
`
`
`
`
`
`
`
`
`Patent Application Publication
`
`Jun. 3, 2010 Sheet 2 of 3
`
`US 2010/0138481 Al
`
`c#dINYUMCVIIAVGT991A9q
`
`THINUUM
`
`speojdnzaa1aaq
`
`
`
`B0|UIAS,SH
`
`
`
`:30|uaasZIN
`
`speojdn[aa1aaq
`
`
`
`30]Ua—dS,SHI
`
`
`
`teeneengrevereSecatrcflty,i,We
`
`
`
`ggco"thee“gf19UJ9}U|oy,
`
`
`"ie,..ul
`
`x.
`
`151]Uaas
`
`Jasn
`
`JuUNnO39e
`
`z#aIN
`
`:Junoj3e
`
`THIN
`
`
`
`x#1N-x#aln-
`
`
`
`A#OIN-A#aIn-
`
`
`
`
`
`A|ssajauiMpasajsued)asesqin
`
`
`
`(mau)THCIN-(mau)Z#GIN-
`
`
`
`
`
`
`
`WOJ}SQ/N)9Y}SAasNJaAJaSBY]
`
`
`
`
`
`
`
`/S}SI|UBAS,9}LIID0}SSO]uaas,BU}
`
`
`
`
`
`
`
`
`
`
`
`
`Patent Application Publication
`
`Jun. 3, 2010 Sheet 3 of 3
`
`US 2010/0138481 Al
`
`
`JseSSOLUeCpuss-|©|apessowepuss-
`Me*eggcoJausaqU]aysarenrraf,Z
`JSI]U99S
`
`
` T#dInMou-Mau-(Twain:JuNnN039eISAISS:Junoo2e()c#IN
`
`7ceATHoehigettcane
`2451]UB9S
`
`
`oerannengrenranansetnahensvecmmseonceenenirrarnnvee
`
`
`_JasnUMOUUN,,AqpasnJayndwo)IY]
`x#aIN-ncSnyal
`
`A#QIN-A#QIN-
`
`prnerensesttiteanyeaeymgreeearenettyng
`(THAIN)ZHOINYIMJasn
`dosdos
`
`“a
`
`
`
`Aqpasnsajnduwio5
`
`THINYUMJasn
`
`
`
`JOSHSIU}SOUS]-
`
`
`
`729dUYOf,,
`
`€Old
`
`
`
`
`
`US 2010/0138481 Al
`
`Jun. 3, 2010
`
`DEVICE AND METHOD FOR ESTABLISHING
`SOCIAL NETWORKS THROUGH THE USE
`OF WIRELESS TECHNOLOGY
`
`[0001] The invention relates to a device and method for
`establishing contactelectronically through theuse ofwireless
`technology. More particularly,
`the invention relates to a
`device and a method through which contact is automatically
`established between users who comeinto proximity of one
`another.
`
`BACKGROUND
`
`In this day and age, mobile phones have become an
`[0002]
`integral part of the daily lives of hundreds of millions of
`people. Electronic messaging such as SMS(short messaging
`service) or E-Mail through the use of mobile devicesis also
`becomingincreasingly common,particularly among younger
`people. However, the exchange of personal contact informa-
`tion, which is required for establishing electronic communi-
`cation (telephone, SMS, instant messaging, e-mail) occurs
`largely in conventional, non-electronic manner. Phone num-
`bers as well as electronic addresses are often still communi-
`
`cated verbally or on paper. At times, a cell phone will be
`handed to the person with whom such contact is desired, in
`orderto let that person enter his own numberor e-address. An
`exception is the ability of some mobile devices to transmit
`electronic business cards to compatible devices, using infra-
`red or Bluetooth transmission, for example. Internet forums
`provide a means to establish contacts electronically. How-
`ever, these are accessed through the help of computers and are
`boundto Internet portals.
`[0003]
`Sharing one’s personal phone number or e-mail
`address with someoneusually represents a step which cannot
`be reversed very easily. Therefore, most people think twice
`before giving outtheir personal contact informationto strang-
`ers, often preferring to get acquainteda bit first. Moreover, it
`is normally not possible to contact strangers through mobile
`devices, since one would not have the coordinates for doing
`so. Current electronic communication systems thus do not
`offer a viable alternative to approaching strangers in person.
`[0004]
`Ithas, for some time been possible to make acquain-
`tances using various formsof Internet-based communication.
`Countless Internet services offer to bring users into contact
`with one another based on a variety of criteria, such as, for
`example, commoninterests, gender, age, regional location, as
`well as combinations thereof. Examples include Internet
`forums, messaging boards and online dating services.
`[0005]
`In recent years, emerging online social network
`websites have focused on allowing users to build their own
`individualonline social networks by adding knownfriends or
`acquaintances to their own personalprofiles or user accounts.
`This is typically achieved through users searching for names
`of friends who mayalready have registered with the service.
`If a friend is not yet a memberofthat service, the user may
`disclose that person’s e-mail address to let the service contact
`that person. The service then sends an e-mail to the person,
`asking whetherhe or she wouldlike to join the service as well
`as the initiating user’s friend list. By displaying, more orless
`openly, users’ friendlist to others, many of these services also
`encourage their users to contact their friends’ friends. This
`can lead to rapidly growing friendlists. In somecases, it has
`even resulted in users attaining hundreds and even thousands
`of “friendships” on such a site. As a measure of preventing
`
`this kind of “friendship inflation”, some services implement
`access filters, proposing friendships more in accordance to
`commoninterests, age or user locality. This can lead to more
`meaningful friendlists.
`[0006] A growing concern on social networking sites has
`been the misuse for purposes of delivering unsolicited com-
`munication (spam) for commercial, personal or criminal pur-
`poses.
`
`[0007] An object of the present invention is therefore to
`provide a device and a method through which users may come
`into electronic contact with one another on the basis of their
`
`individual, dynamiclocalities. A further object of the present
`invention is to use wireless technology for providing special
`communication layers through the help of which users may
`comeinto contact with one anotheronthebasis of past and/or
`present proximities in relation to one another. Said commu-
`nication layers are also intended to provide an alternative to
`the disclosure ofpersonal contact informationthatis typically
`required for electronic communication. Such a communica-
`tion layer may be viewed as a kind of sand box for generally
`open and unrestricted communication, which mayalso be
`shielded from the other functions provided by the devices.
`[0008]
`Ina first aspect, the present invention therefore pro-
`vides a device for establishing contact wirelessly with a sec-
`ond compatible device, comprising:
`[0009] Means(a), for automatically establishing non-direc-
`tional contact as well as the transfer of one or morefirst data
`
`packets between the device and one or more target device(s);
`and
`
`[0010] Means (b), which (following an automatic, non-
`directional contact as well as the transfer of one or morefirst
`
`data packets between the device and one or more target
`devices) allows the user to transfer one or more directional
`second data packets.
`[0011] According to the present invention, “automatically
`establishing non-directional contact”is to mean that the user
`does not specify with which device(s) a contact is to be made,
`butrather that all receptive devices are addressed, similar to a
`radio broadcast. In this context, the term “contact” merely
`describes an active connection between the device andat least
`one target device, regardless of the duration thereof. Specifi-
`cally, the reception of non-directional,first data packets does
`not require a responsebya receiving device. The device may
`also be adjusted in such a way that a search for receptive
`devices (within range) is conducted automatically and that
`contactis established automatically, or that such receptivity is
`to be inducedbythe user.
`[0012] According to the invention, “automatically estab-
`lishing non-directional contact as well as the transfer ofone or
`morefirst data packets”is to mean that the user may allocate
`or furnish specific information (e.g. photo,
`logo, sound,
`video) for establishing a first contact via first data packets;
`therebynot specifying which devices are to receive this data.
`[0013] Herein, no specific distinction is made between the
`terms“data” and “data packets”.
`[0014] Therefore, through means of the inventive device
`accordingto the first aspect, contact may be established with
`at least onetarget device. In general, the target device will be
`a compatible device of another user with whom a contact
`could or should occur. Both the device and the target device
`may be mobile phonesor other types of electronic devices.
`
`
`
`US 2010/0138481 Al
`
`Jun. 3, 2010
`
`[0015] The term “target device”is herein used to refer to a
`further inventive device, or a device that is compatible with
`the inventive device. Itis further used to indicate sucha device
`carried by a third user.
`[0016] The term “third user” is used herein to indicate a
`further user.
`
`In general, the means (a), and (b) are capable of
`[0017]
`transmitting as well as receiving electromagnetic radiation on
`one or more frequencies. This frequencyor these frequencies
`may, in general, differ from those typically used in mobile
`phones and other portable electronic devices, such as GSM,
`UMTS, Bluetooth and WLAN.
`[0018]
`Preferably, one or more frequencies in one of the
`license-free ISM-bands are used (e.g. 2400 MHz to 2500
`MHzor 433.05 MHz to 434.79 MHz). Frequency-hopping
`techniques can serve to prevent interference, such as that
`resulting from other devices using the same frequency ranges.
`Furthermore, checksum verification and/or encryption may
`be employed to maintain data integrity.
`[0019] Anestablished contact may be displayed orsignaled
`on the inventive device, and, if applicable, on the target
`device. This can specifically include optical, acoustic or
`mechanical signals, such as vibration mechanisms.
`[0020] The automatic establishment of contact through
`means(a) maybeinitiated by the user, or it may be established
`automatically, subject to settings or pre-adjustments on the
`device. This concerns one or moretargetedfirst data packets.
`Once a contact is established between the inventive device
`
`and at least one target device(1.e. the devices are able to “see”
`one another), data may be exchanged.
`[0021]
`Preferably, the inventive device comprises an elec-
`tronic component wherein the means (a) and (b) are con-
`tained. Accordingto the invention, this means that a connec-
`tion between the said electronic component, andthe rest of
`the device exists, at least temporarily. Specifically, the said
`electronic component can be integrated in the device,
`attached to the remainderof the device (by meansofa plug or
`cable connection), or it may be connected wirelessly to the
`remainder of the device.
`
`[0022] Themeans(a) are preferably equipped in such a way
`that a detection of the presence ofat least one target device
`within a minimum and/or maximum distance is made pos-
`sible. Specifically, the means(a) can beset in such a way that
`aminimum and/or maximum distance between the device and
`
`at least one target device maybe selected, and within which
`establishing a contact is possible. This distance can vary
`greatly. In general, the distance will not be more than 5 km.
`Preferably, the maximum distance will be 1 km. Morepref-
`erable is a distance of 100 m. In an especially preferred
`embodiment, this distance will be 50 m and, even more so, 20
`m.
`
`Preferably, the inventive device has an identifier
`[0025]
`(ID), which can be transferred to at least one target device.
`This identifier contains informationfor identifying the device
`(and thusits user).
`[0026]
`Preferably, the identifier is unique, especially to
`each device of its type, and unchangeable. Theidentifier may
`stem from the serial numberofthe electronic component, for
`example. In general, the identifier allows the device to recog-
`nize another device as well as to specifically respond to
`another device (orits user). The identifier also serves to allow
`the user of such a device or target device to block out other
`users from his device, in order to stop the other user from
`further contacting him, for example. Blocked identifiers are
`preferably stored on the device (the one that should block out
`the other). This allows users to demarcate, or mark them-
`selves off, in what is generally intendedto be an open, uncon-
`trolled and unrestricted setup.
`[0027]
`In general, the identifier is either transmitted simul-
`taneously with thefirst data packets, or before.
`[0028]
`Ina preferred embodimentofthe first aspect, the
`inventive device can store the identifier, and/or further data,
`from one or more target devices. Preferably, the inventive
`device allows a transfer of this information onto external
`
`storage. The device identifier contains information for iden-
`tifying the device.
`[0029] The device can be equipped in such a waythatfirst
`and second data packets may only be transferred after recep-
`tion of the identifier and, if applicable, verification thereof.
`[0030] According to settings on the inventive and target
`devices, second data packets that have been selected or fur-
`nished by the respective users may be transferred in one or
`both directions. Also possible is the directional communica-
`tion between three and more devices.
`
`Preferably, the means(a) and (b) permit controlling
`[0031]
`the content of data and/or the transmission of data to the at
`least one target device by the user.
`[0032] This data, especially in the form offirst data packets,
`mayinclude pictures, text, logos, videos, sounds as well as
`live video signals (e.g. from a camera built into the mobile
`device). Furthermore, the first data packets can include ques-
`tions or messages that have been prepared or structured by
`software. These can serve to address commoninterests, spe-
`cific questions or other information. In general, such infor-
`mation will be transferred to the target device, where it may
`be answered manually or automatically. Such a reply can be
`made subject to settings on the target device or to profiles
`containing information pertaining to pre-configured answers
`or responses, for example.
`[0033] Moreover, the exchange of data may be processed
`and structured in accordance with filters. Preferably, such
`filters are implemented and configurable through software.
`[0034]
`Preferably, the user of the inventive device may, at
`any time, view or scroll through received data from other
`devices/users. He may decide which data he wishes to keep or
`delete.
`
`[0023] The maximum distance can be adjusted through
`predefined signal strengths of the electromagnetic radiation,
`for example. Such a setting may also be influenced through
`software. By using software, further information can be taken
`Preferably, the inventive device is able to display (or
`[0035]
`into account. This can include information relating to the
`notify) whether another device, of which it has previously
`geographical location of the devices, derived from additional
`stored the identifier and possibly received other data from,is
`means including GPS, for example.
`within its range (therefore has reentered its range). Prefer-
`ably, a required proximity may bespecified or predefined for
`[0024]
`In an especially preferred embodimentof thefirst
`this. The display or notification can be an optical, acoustic or
`aspect, the inventive device comprises means (c) for deter-
`mining its own location.It is preferred, that the means(a) are
`mechanical signal, for example. If so desired, the user of the
`
`able to determine the distance betweenthe device andatarget inventive device may transmit further contact information.
`device, the location of which maybe ascertained.
`This could, for example, include a phone number, mobile
`
`
`
`US 2010/0138481 Al
`
`Jun. 3, 2010
`
`phone number, e-mail or instant messaging address. Once
`again, this contact information may be acceptedor blocked by
`the receiver.
`
`[0036] Transferred data (received and/or sent) may be
`stored by the devices involvedfor a predefined period oftime.
`[0037] More specifically, data which has been transferred
`automatically (without active involvement by the user) may
`remain stored on the device. This may be governedbysettings
`whichare selected by the user, or be made dependenton the
`device’s storage capacity.
`[0038]
`Ifso desired by the user, the device can memorize
`another device solelyon the basis of the other device’s iden-
`tifier. Therefore, communication is in principle possible on
`the basis of the inventive device-specific frequency, and with-
`out an exchangeof further contact data, so longas the devices
`are in range of one another.
`[0039]
`In a second aspect, the invention also relates to a
`methodfor establishing contact wirelessly betweenthe inven-
`tive device andat least one target device, whereby:
`[0040] means (a) automatically establish non-directional
`contact as well as transfer one or morefirst data packets
`between the device and one or moretarget device(s), and
`[0041] means (b) (after automatically and non-direction-
`ally establishing contact and transferring one or morefirst
`data packets between the device and one or moretarget device
`(s)) transfer one or more second data packets, directed and
`controllable by the user of the device.
`[0042]
`Several preferred and non-limiting embodiments
`are described in the following.
`[0043] According to the secondaspectof the invention, the
`device sends out non-directionalfirst data packets, preferably
`compressed,at specific intervals (e.g. millisecondsto several
`seconds). Thesefirst data packets may contain a content-type
`of information (e.g. text, photos, logos, video or live video
`signals) which has been predefined by the user, in general
`along with the device’s ownidentifier.
`[0044]
`Ifhe so desires, a user who has received such non-
`directed first data packets (generally together with the send-
`er’s identifier), may actively contact the person whom he has
`received these first data packets from. The following non-
`limiting embodiments are applicable in such a case.
`[0045]
`In a first embodimentofthe first aspect, a device
`according to the invention transmits second data packets
`(through which the third user wishes to make contact) using
`the same frequency and encryption level that were used for
`the undirected transmittal of the first data packets and the
`identifier. In this case, the identifier of the device or target
`device are includedin the second data packets. In sucha case,
`the inventive devices can be programmed in such a way that
`theyare able to verify the identifiers enclosed in data packets
`and to ignore data addressedto a different identifier than its
`own.In this context, the term “ignore” meansthat the datais
`either notstored or deleted.
`
`[0046] A second embodiment of the first aspect differs
`from thefirst in that additional encryption is used. This can
`involve the identifier of the receiving device for encrypting
`the second data packets. In such a case, the involved devices
`should be capable of encrypting directional data packets in
`such a waythat the data will be decrypted only by the device
`with the correspondingrecipient identifier.
`[0047]
`Ina third embodimentofthe first aspect, the inven-
`tive device sendsthe directional data packets using a different
`frequency. Directional data packets will therefore be trans-
`
`mitted on different frequencies than non-directional data
`packets. Encryption may be used independently thereof.
`[0048]
`Ina fourth embodimentofthefirst aspect, the inven-
`tive device transmits the directional data packets using a
`different transmission path than that which is used for non-
`directional data packets. This could include Bluetooth or
`Wireless LAN (ad-hoc mode), for example. In such a case, the
`recipient can accept the second data packets in accordance
`with any security measures of the used transmission path.
`[0049]
`Ina fifth embodimentofthefirst aspect, the inven-
`tive device transmits the second data packets via an Internet
`portal which has been configured accordingly. While this
`could require that the inventive devices be connected to the
`Internet, the online portal could also redirect such communi-
`cation through different types of connections, including SMS
`or MMS, for example.
`[0050]
`Ina sixth embodimentofthefirst aspect, the inven-
`tive device transmits the second data packets via communi-
`cation paths which are typically operated by mobile phone
`carriers. In this case,
`the carrier provides a connection
`through which the second data packets are transmitted (in
`accordanceto the recipient’s approval).
`[0051] There can be combinations of these non-limiting
`embodiments as well.
`
`[0052] A commonfactor of all inventive devices and meth-
`ods presented here lies in their ability to provide a meansfor
`communication to occur,
`independently of, and without
`requiring, the user’s personal contact data. This allows a user
`to be in contact with a third person for as long (and only as
`long) as he wishesto. In general, the identifiers are used for
`this purpose; the device provides a way to block unwanted
`identifiers, thereby preventing unwanted communication at
`any time.
`In a third aspect, the present invention provides a
`[0053]
`portable electronic device, comprising
`[0054] means (c) for scanning continuously/repeatedly
`for UIDssent out by other devices and recording these
`UIDsin a log; and
`[0055]
`means(d) for transferring the recorded UIDsto a
`server.
`
`[0056] These meanscan be in the form of software and/or
`hardware.
`
`[0057] Electronic devices accordingto the third aspect thus
`continuously/repeatedly transmit unique identifiers (UID)
`via non-directed wireless radio frequency transmission.
`Devices that are equipped with the means provided by the
`third aspect of the invention may scan continuously/repeat-
`edly for UIDstransmitted by other devices within range.
`[0058]
`Ina preferred embodimentofthe present invention,
`the device contains means(e) for transmitting continuously/
`repeatedly one or more unique identifiers (UID) via non
`directional wireless radio frequency signals.
`[0059] When sucha device receives another device’s UID,
`it records that UID and measuresthe length of time during
`whichit continues to receive that UID. The device stores the
`
`received UID, along with the time, date and duration of the
`reception. It stores this information in what shall herein be
`referred to as a “seen log”. A device’s seen log will contain
`information regarding which UIDs have been received (or
`“seen’’) by the device.It may also contain information regard-
`ing when and for how long a UID will have beenreceived.
`
`
`
`US 2010/0138481 Al
`
`Jun. 3, 2010
`
`[0060] The following definitions are used in the present
`invention:
`
`[0061] Unique identifier (UID): A code, number, address or
`other symbol that uniquely identifies an AC device, and, by
`association, the owner ofthe AC device. Specifically in regard
`to the third aspect of the invention, a UID mayconsist of or
`include a MAC (media access control) address, Bluetooth
`Device Address (i.e. BD_ADDR), or other unique or quasi-
`unique identifier. In general, it may be hardware-bound and
`unchangeable, as well as software-based and possibly modi-
`fiable by the user.
`[0062]
`Seen log: A log representing receptions of UIDs.
`Mayinclude information related to UID receptions, such as,
`for example, time, date, duration and location of UID recep-
`tions. May also include further information, orlinks thereto,
`such as those related to UID receptions, or those possibly
`deemed relevant by a user. A seen log may specifically
`include information pertaining to spatial locations of UID
`receptions. Furthermore, a seen log may include any form of
`information stemming from user input, such as to mark spe-
`cific events, for example.
`[0063]
`Seenlist: A list containing more or less processed,
`interpreted, and/or structured information stemming from
`one or more seen log(s). The information contained in a seen
`list may be linked, combined or otherwise put into relation
`with friendlists, such as, for example, those used by online
`social networking sites. A seen list may also reflect informa-
`tion and/or choices from users, and could be modifiable by
`users. Seen lists may provide informationina variety ofways,
`including personal and/or customized information for indi-
`vidual users. It may also include information to be displayed
`to specific groups of users, as well information that may be
`made accessible to anyone.
`[0064] Claimed UIDs and unclaimed UIDs: UIDs which
`have been linked to user accounts mayherein bereferred to as
`“claimed UIDs”, while those that have not maybereferred to
`as “unclaimed UIDs”.
`
`[0065] UID account: The term “UID account” mayalso be
`used herein to describe a kind of online user accountthat has
`
`been linked to a given UID by the server. The server may
`receive such a UID (to be able to link it) as contained in
`another device’s seen log or through a user supplying his
`device’s UIDto it (the server).
`[0066] Unclaimed account: A user account which is gener-
`ated on the basis of an unclaimed UID mayherein be referred
`to as an “unclaimed account”.
`
`[0067] Associate: The term “associate” is used herein to
`indicate an association of two or more UIDsandthereby the
`corresponding device users
`through server-based user
`accounts. Such associations may, for example, be used for
`providing server-based communication or options there for,
`including social networking or messaging functions.
`[0068] Generally, a device’s seen log will represent infor-
`mation pertaining to which devices have come into range of
`the used wireless transmission, as well as when and how
`often.
`
`[0069] According to a preferred embodiment, the device of
`the third aspect of the invention mayalso store information
`regarding its location at the time of a UID reception. Such
`information may be obtained from any available source,
`including Cell-IDs from mobile network operators, position
`determining equipmentusing Cell ID techniques, U-TDOA,
`
`A-GPS, E-CID, AOA, standard global positioning system
`equipment (GPS), WLAN access point based positioning,
`etc.
`
`Information regarding the device’s location at the
`[0070]
`time of a UID reception mayalso include or be derived from
`any form of user input, such as through key or touch-screen
`entries, “gestures”, device movements(e.g. via accelerom-
`eter), vocal input, etc.
`[0071] According to the invention, the device may also
`store further information relating to the reception of a UID,
`and specifically information relating to the time, date and/or
`locality of a UID reception. The device preferably storesthis
`information in a mannerthat links the information to events
`recorded in the seen log. Preferably, this manner can include
`some form ofuser input, perhaps marking a particular pointin
`time. This can also include the storing ofphotos, video and/or
`audio material. Furthermore, it may also include information
`regarding phonecalls, messaging or Internet activity, which
`may stand in somerelation to events stored in the seen log.
`[0072] The term “server” may herein be substituted for
`“online service”, indicating Internet-based services which are
`providedto the users, or potential users.
`[0073] According to a preferred embodimentofthe third
`aspectofthe invention, the device providesits seen log infor-
`mation to a server, along with its own UID. This may occur
`via any kind of data-capable connection, including GSM,
`GPRS, UMTS, LANor Wireless LAN, for example. It may
`occurin any form, including a direct, single-purpose upload,
`or bundled with other data, or in combination with other
`electronic transfers, such as e-mail, SMS, MMS, etc. Further-
`more, the device mayalso transfer the seen log information to
`other electronic devices, such as personal computers, for
`example, which, in turn, can uploador forward thesaid infor-
`mation to a server. Devices may also distribute seen log
`information in a peer-to-peer (P2P) fashion. Accordingly, any
`other computing device, including a personal computer, may
`assume,in part or entirely, the functions of the server. In the
`case that P2P is used, the devices may handle the server’s
`processing function described herein in a decentralized fash-
`ion.
`
`[0074] According to embodiments of the invention, once
`such seen log informationis received by theserver, the server
`may store the information in a mannerthat is linked to the
`corresponding device’s UID. Preferably, the server analyzes
`and further processes the seen log information.
`[0075]
`In general, each UID corresponds to one user
`account. However, a UID mayalso be linked to more than one
`user account, such as through different servers or online ser-
`vices. A user account,in turn, mayalso be linked to more than
`one UID. Furthermore, a UID may correspond to separate
`user accounts on different servers or online services.
`
`[0076] The server preferably associates or links a user
`account to every UIDit receives. The server may link UIDsin
`various ways. For example, a user may connectto the server
`through a web browserto supply his device’s UID in order to
`open (create) a new user account, or to append an existing
`one. In such a case, the device to be used (having the UID)
`will not need to connect to the server for this part of the
`process.
`[0077] There are various ways a user may obtain his
`device’s UID. For example, he may be able to access this
`information directly on his device. As such, manycell phones
`produced by the Nokia company will display such informa-
`tion if the user enters a special code directly on the device
`
`
`
`US 2010/0138481 Al
`
`Jun. 3, 2010
`
`(“*#2820#" for BD_ADDRor “*#62209526#” for WLAN
`MACAddresses). An additional, separate device may also be
`used to access a device’s UID. This could include a computer,
`PDA,or cell phone, for example. In certain cases, manufac-
`turers will also provide the information in the form ofa sticker
`on the device or manual.
`
`Ina preferred embodiment, the server automatically
`[0078]
`generates new user accounts for any unclaimed UIDsthatit
`receives. The server may receive such (unclaimed) UIDscon-
`tained in uploadedseen logs, for example.
`[0079] A user account which is generated on the basis of an
`unclaimed UID mayherein be referred to as an “unclaimed
`account”.
`
`[0080] The user ofa device mayherein bereferredto as the
`“user” of



