WO2005006145A2 - System and method for providing proximity based services using automatic search, discovery and match-making inventions and processes - Google Patents

System and method for providing proximity based services using automatic search, discovery and match-making inventions and processes Download PDF

Info

Publication number
WO2005006145A2
WO2005006145A2 PCT/US2004/021134 US2004021134W WO2005006145A2 WO 2005006145 A2 WO2005006145 A2 WO 2005006145A2 US 2004021134 W US2004021134 W US 2004021134W WO 2005006145 A2 WO2005006145 A2 WO 2005006145A2
Authority
WO
WIPO (PCT)
Prior art keywords
profile
subset
user
wireless device
overlap metric
Prior art date
Application number
PCT/US2004/021134
Other languages
French (fr)
Other versions
WO2005006145A3 (en
Inventor
Simon Davidoff
Original Assignee
Simon Davidoff
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Simon Davidoff filed Critical Simon Davidoff
Publication of WO2005006145A2 publication Critical patent/WO2005006145A2/en
Publication of WO2005006145A3 publication Critical patent/WO2005006145A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/107Computer-aided management of electronic mailing [e-mailing]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • H04L67/306User profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/51Discovery or management thereof, e.g. service location protocol [SLP] or web services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/005Discovery of network devices, e.g. terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data

Definitions

  • TITLE System and Method for Providing Proximity Based Services using automatic search, discovery and match-making inventions and processes.
  • the present invention generally relates to the area of wireless communications, and, more particularly, to providing a method and system for rapid and secure exchange of data between physically proximate mobile communication inventions having databases containing overlapping data.
  • SMS Short Message Service
  • GPS Global Positioning System
  • Bluetooth Wireless LAN
  • a second, business related problem is how to generate a search stream directly or indirectly from such computer assisted interactions.
  • a third problem is how to avoid contacts that waste user's time and do not lead to any value or utility.
  • a forth, more technical problem, is that the systems of the prior art require cellular networks or a GPS facility to determine whether two cellular phones are within the same cell. Once this determination is made and if certain pre-existing conditions exist, the network may send a signal to one or both of the cellular phones so that at least one cellular phone user is made aware that another user may be in the vicinity. For example, the network may have access to a database that indicates that the users of both cellular phones have registered themselves as being single and looking to meet someone new. By alerting at least one of the users to the other user's presence (perhaps via a text message with information on how to contact the other user), the users may take further steps to meet.
  • Such a service depends on the network operator's installing and maintaining additional infrastructure so that users are tied to one particular operator's network. Thus, users subscribing to different cellular networks may be unable to take advantage of this service.
  • Another disadvantage is that the network may be slow to alert a user of the presence of another user due to the overhead of several communication transactions and a server-based matching system. Discovery and response times may be as long as one minute, by which timer the user may have traveled out of the network coverage area or into an area of poor or no reception (e.g. underground, or remote geographical areas) increasing the chances that they will miss each other.
  • Another disadvantage is that users have to share all their personal profile information and preferences with each network operator's infrastructure in order for matching to take place effectively, raising major privacy and security concerns.
  • the present invention relates to a system and method of automatically determining and alerting a user to an overlap of interests between their interests and the interests of other, geographically proximate users.
  • the system also allows automated determination of a level of trust and options such as automated referral to a third party.
  • a user may broadcast and receive information in a geographically contained geographic location (also known as a "personal area network” (PAN), or a “databubble”), using, for instance, the peer-to-peer functionality of a mobile wireless device.
  • PAN personal area network
  • received information may be decoded and evaluated against a predetermined set of criteria for a match or an overlap of interests. This automated overlap may for instance look for common responses to standard questions.
  • the evaluation may take the form of a series of interactive exchanges of data between users in which the degree or region of overlap detected in a first exchange guides the type of data exchange in the subsequent interchange.
  • a user may be alerted to the overlap.
  • a user may be automatically referred to a third party site to retrieve information that may enhance the quality of the match. For instance, two parties may automatically establish a mutual interest in action adventure films, but one party may have no data indicating an opinion on a newly released film which the other has a strong opinion on. The opinionated party may for instance, automatically refer the un-opinionated party to a web-site or other data-store to obtain information pertaining to the new film, including purchasable options.
  • first responders to a critical situation would be able to quickly and automatically detect other key members of their team, unit or group, silently without the need to verbalize instructions or commands, instead using the computer assisted automatic search, matching and alerting features of the invention possibly in conjunction with and integrated to, other communication and control systems.
  • the user may be alerted by being provided an identifier for the other party, a method of contact and a synopsis of the type and degree of overlap. For instance the user may be provided a screen name, a telephone contact number and a subject of mutual interest.
  • the contact information may be encrypted or a series of anonymous virtual addresses transmitted to allow future or current indirect communication.
  • the evaluation process may include automatic referral to a reference database for authentication of data exchanged.
  • an authenticated overlap may result in the initiation of a secure chat using, for instance instant messaging protocols.
  • the data template broadcast by the user may vary in a predetermined manner depending on, for instance, geographical location, time of day, day of the week or some combination thereof, and may include options such as initiate contacts immediately or save and initiate later or on subsequent meeting.
  • the referral by one user to a third party service may entail collection of a commission by the referee from the third party.
  • Fig. 1 entitled “Top Level” shows the overall concept of the invention from a top level and incorporates some of the particular features and processes relating to a method to increase the security of the user, its commercial potential and how to follow up initial matches with direct or indirect contact to a user.
  • Fig.2. entitled “Follow Up” shows the general process flow of a method to follow up with actual direct or indirect contact after the initial match has been discovered and automatically evaluated by the invention.
  • Fig.3 entitled “Contact Safety Rating” shows the general process flow of a method to increase the security of the user by hooking into 3 rd party safety service providers.
  • Fig.4 entitled “Commercial Opportunity” shows the general process flow of a method of referring users to 3 rd party commercial enterprises thus, creating the potential for generating revenues in the form of referral, or affiliate commissions.
  • Fig.5 entitled “An overview of the referral to a third party derived from the initial discovery of a match” shows a schematic of the physical method of referring users to 3 rd party commercial enterprises thus generating referral commission.
  • Fig. 6 entitled “The Required Rechnology” shows an exemplary configuration of one embodiment of the invention.
  • Fig. 1 is a top level flow diagram that shows various components of an exemplary embodiment that can be utilized to implement the inventive concepts described herein.
  • the process is initiated by the user. This may consist of the user turning on a wireless communications invention, being presented with a menu of choices and selecting an "Activate" option. Selecting to activate the process may lead to step 12, in which the user is presented with a menu that offer the option of either first configuring the device for his personal profile or of accepting a possible standard user profile, or of using a previously configured profile. In the preferred embodiment, this configuring can be done directly on the mobile device in step 86.
  • the user may, in step 86, be connected via a network such as, but not limited to, the Internet, to a web-site where profile initialization my be accomplished using on-line tools.
  • step 14 in which the wireless devices automatically searches and discovers other users that are permanently or momentarily in the range of the user's personal area network.
  • This searching may be done using short range wireless communications technology such as, but not limited to, Bluetooth and Wireless LAN technology.
  • Step 16 a unique contact identification code is automatically generated and stored in a database (known as the "Experience Database").
  • Other data is automatically exchanged that is arranged in a set of templates that contain structured data that has been either pre-configured or loaded with data by the device supplier or data that is defined, input and configured by the user. The data can be entirely new or previously stored or a mixture of both depending on the users preferences and choices.
  • an automatic process of exchanging data takes place until the quality of the match reaches a user predefined level.
  • the first wireless device may receive a subset of a second user's profile.
  • the first wireless device may compare this subset of a second user profile with a corresponding subset of a first user profile and establish an overlap metric, which may be, but is not limited to, the number of items in the subsets which match.
  • the first wireless device may be programmed to then select a subset of the first profile, based on the overlap metric, and transmit that data.
  • the first device may select a subset of the first user profile that is more personal or more detailed. If the overlap metric is closer to, but not below, a predetermined low value indicative of an unsuccessful match, the subset chosen may attempt to explore a different area of possible overlap of interests, by for instance choosing data from another template.
  • the level of matching also known as an "overlap metric" may a numerical value created by algorithms comparing and testing for logical conditions throughout the data sets and assigning a numerical value within a defined range. For example, in a range of 1 to 10, the closer to the 10 value the high quality the match.
  • Each data item in the data under evaluation is assigned a value in this way, and based on an aggregation of all assigned values, a matching level is determined.
  • a matching level is determined.
  • the user is presented with a menu of choices that includes selecting a "Do you want to make a live contact" option in Step 20. This may be done by, for instance, the wireless device issuing a command when the overlap metric is greater than the predetermined higher value indicative of a successful match.
  • the command may be an alert which additionally shows the user all or part of the subset of the profile.
  • the user has the option of making contact with the second user either immediately, in real time or at some future point in time.
  • the user's choice of this option may have already been preloaded into the appropriate data set, template or similar at an earlier point and would, in the preferred embodiment, be based on the analysis of the matching quality level, or it may be manually initiated by the user.
  • the user is likely to require the use for example, of a 3 rd party communication medium such as but not limited to, Instant Messaging, SMS text, a wireless telephone call or some other form of communication, including non-electronic forms.
  • a 3 rd party communication medium such as but not limited to, Instant Messaging, SMS text, a wireless telephone call or some other form of communication, including non-electronic forms.
  • the user does not choose the option to follow up, i.e. engaging the matching user in an direct or indirect communication at this point (for reasons such as, but not limited to, not trusting the second user enough, at this point in time) in a further embodiment, the user has the option of determining or retrieving a "contact safety rating" in order to make the decision to initiate actual contact or follow up involve less perceived risk to the aforementioned user.
  • the user may choose to use the features of the invention to automatically establish an electronic link with, for example, to a 3 rd party organization or individual.
  • the wireless device issuing a command to a third party device such as, but not limited to, another wireless device or a device accessible by a wireless network, that is running software, such as a web server, capable of responding to a request for confirmation of authenticity of the subset of the second user profile that has been received by the device and which resulted in the successful overlap metric being met.
  • a third party device such as, but not limited to, another wireless device or a device accessible by a wireless network, that is running software, such as a web server, capable of responding to a request for confirmation of authenticity of the subset of the second user profile that has been received by the device and which resulted in the successful overlap metric being met.
  • the user's choice of this option may have already been preloaded into the appropriate data set, template or similar at an earlier point or it may be manually initiated.
  • a process automatically determines a safety rating factor by a combination of data mining of gathered data from the preceding steps, running computer algorithms or automatically initiating links and exchanging information with one or more 3 rd party organizations or individuals, or a combination of these and other potential sources of relevant data that is able to contribute to the determination of a users safety rating. Further information on these possible process options described more fully in Figure 3.
  • the process may go to Step 62: At this point, in a further embodiment, the user has the option to initiate and pursue a commercial opportunity. In the preferred embodiment, this pursuit can be done directly on the mobile device beginning in step 64 by initiating a referral to a 3 rd party or individual.
  • the determination whether this action is appropriate may be automated based on a previously defined data profile setting, or it may be made manually in real-time or at some other point in time. If a referral is required by the user, an automatic process may be initiated to do this to an appropriate set of known 3 rd parties or individuals or an automatic search is carried out using well known search tools as used by on-line search services such as but not limited to those provide by GoogleTM, YahooTM and other well-known search engine sites, to locate them.
  • the referral may consist of providing a locator of a third party, or a third party service, such as, but not limited to a universal resource locator (URL), a telephone number or even a physical address.
  • URL universal resource locator
  • the referral may include a sender code such as, but not limited to, an alphanumeric string, that allows the third party to identify the device, or the user of the device, that made the referral.
  • the sender code may also enable the third party, or third party service, to compensate the device, or the user of the device, for the referral. This compensation may, for instance, be accomplished using a well known electronic payment facility such as, but not limited to the PayPalTM facility. Further information on these possible process options described more fully in Figure 4.
  • the user has the options, presented via menu systems, of but not limited to, categorizing the contact (adding to the information for example noting possible follow up actions), rating the commercial potential of the contact and adding the user contact to his buddy list, for example, or to personal networking systems such as the on-line service FriendsterTM.
  • This feature may be performed in conjunction with complimentary on-line tools (step 86), to enhance the capabilities of this process. For example, to facilitate data entry, or to use other applications to find and/or manage data.
  • the user may be allowed to make additional data entries to the "experience" database at any time via user menu options to builds the quantity and quality of the data and information stored.
  • the database will become a knowledge pool allowing the user to manually or automatically draw upon this data to make a more customized data exchange with users, in the future. For example, this would be similar to meeting someone a user has met before and therefore more information is stored in the database before the new engagement and data exchanges occurs in Step 16.
  • the device is therefore able to draw upon this more complete data set, and present the user with options or automatically make recommendations with less process steps and computer possessing time. For example, this "known contact/user" would most likely have more data objects associated with it in the database. In addition, it is likely that this contact would have more data associated with determining the contact safety rating stored in the associated profile, therefore increasing the quality of that particular data item.
  • Fig. 2 entitled “Follow Up” is a flow diagram that shows various components of an exemplary embodiment that can be utilized to implement the inventive concepts described herein and specifically describes the processes that a user may initiate and implement a follow up communication in real time, instantly or to prepare for a future communication with a second user.
  • Step 22 enters this process flow automatically from the preceding figure 1 without any user interaction.
  • the device automatically requests the necessary data templates and other associated information from the second user's invention.
  • the users are exchanging data within the personal area network (PAN) in a peer-to-peer mode.
  • PAN personal area network
  • the data is analyzed by the both device in Step 26 and information, in the form of an initial set of user interactive menus displayed on the invention's man to machine interface. The content and configuration of the menus is dependant on the specific data received.
  • the menus are presented to the user. The choice of what actions to select from the individual menu items are made by the user manually. These options can also be selected automatically depending on the predefined user configuration.
  • the user may decide to populate the personal profile with a number of "go" decisions in predefined areas in order to automate the processes and reduce the number of items requiring human interaction. This could lead to rapid deployment and a reduction in the number of processing steps required achieving a desired outcome, useful for the rapid assembly of human resources.
  • the templates also known as "subsets of personal profiles” may have contain different data dependant on the devices geographical location, the time of day, the day of the week or year, or some combination thereof.
  • Step 28 the device automatically requests that the relevant sections of profile data and associated templates of the second user are exchanged in order that a later follow up may take place.
  • the user may automatically predefine how the follow up could take place and this information would be exchanged rather than data that had a direct link to one user.
  • a virtual Post Office box could be used to act as a neutral medium by which both users could communicate in the future.
  • an ordinary mail PO Box could also provide this same function.
  • Step 38 the device may proceed to Step 30.
  • an electronic wireless link is established to an appropriate 3 rd party service provider or systems to allow for an instant or real time virtual meeting and/or communication to take place.
  • the level of automation of this step is predefined by the personal profile of the user making the request.
  • the systems and methods to establish an immediate connection may include services but not limited to Instant Messaging from wireless network carriers, or SMS text messaging and push-to-talk systems in addition to an actual cellular phone call.
  • technologies such as global positioning satellite (GPS) systems, providing the actual location of the users may be utilized to facilitate a connection or live meeting.
  • GPS global positioning satellite
  • the mechanism of connection the previously generated unique identification numbers are stored in a database.
  • the transaction is logged to ensure that all appropriate fees can be collected via established billing mechanisms. For example, any external services made use of and facilitated by the device receive the necessary tracking information so that an affiliate referral fee may be paid. This process is described in further detail in Fig 4 and Fig 5.
  • Step 36 where the actual communication takes place.
  • the device returns to the main process flow via step 38.
  • Fig. 3 Contact Safety shows how a "contact safety rating" factor is derived.
  • a safety rating may for instance, be a numerical determination of the risk of contact based on what 3 rd party checks have been run on the user. Using this and other information and a proprietary algorithm, the device may determine a contact safety rating factor and communicates the result to the user.
  • Step 42 initiates the generation of the contact safety rating factor process flow from the preceding flow described in figure 1.
  • the device automatically sources all of the available safety related information from the user via the users' safety profile normally stored in a predefined template in Step 44.
  • the users are exchanging data within the personal area network (PAN). This may include available security clearances, immigration records, police records, court records or include data on political standing, role in the community, job profile, credit ratings etc. It takes this data but not limited to this data alone and inputs it into the invention.
  • PAN personal area network
  • Step 46 the data it contains pertaining to a user contact safety, is automatically evaluated by comparing a generated safety rating based on the available data at this point against a predefined safety acceptability level or "trust level".
  • the contact safety rating is a numerical value created using algorithms comparing and testing for logical conditions throughout the data sets and assigning a numerical value within a defined range. For example, in a range of 1 to10, the closer to the 10 value the higher the user's safety rating is likely to be.
  • Each data item in the data under evaluation is assigned a value in this way, and based on an aggregation of all assigned values, a contact safety rating is determined.
  • Step 48 the invention, depending on the users' preference, may prompt the user for a decision on whether a sufficient level of confidence or trust has been reached (as each user will have predefined what the numerical level of contact safety rating is acceptable) or until the invention, running automatically, is satisfied, based on a previously defined level and/or criteria, that enough safety data has been gathered to determine a rating of acceptable quality. If is not satisfied, Step 50 prompts the user to decide or automatically determines that more safety level data should be obtained i.e. if the currently determined safety level factor does not meet the required value, then the user has the option to search and retrieve further data.
  • Step 52 external 3 rd party organizations or individuals are automatically contacted via, for example, an external network, as in the processes described above.
  • the wireless device automatically sends a sequence of handshaking signals that includes the previously generated unique contact ID and other messages to the 3 rd party to request the transfer of data in Step 54.
  • the commercial link is ready and other necessary information (for example information to be used in billing the user) has been exchanged, included in Step 56, the safety related information on the user is retrieved, the transaction is completed by the device automatically receiving the data and the transaction details a recorded and logged in Step 58.
  • the additional safety related data is added to the known data on the second user thereby supplementing and enriching the safety profile allowing a better basis on which to subsequently determine the safety or risk factor associated with the particular user under scrutiny.
  • the updated safety factor is again evaluated in Step 46 as previously described. In this way, the data exchanges continue to take place until the device is satisfied, based on a user predefined level and/or criteria, that enough safety data has been gathered to determine a rating of sufficient quality.
  • the main process flow is resumed via step 60.
  • Step 60 initiates the process flow from the preceding flow described in figure 1.
  • This process flow is similar to the process flows described in the previous figures in that the first step is to retrieve all the relevant data templates and other information relating to the potential commercial referral or opportunity, from the user's profile in Step 66.
  • This commercial opportunity may also include the ability to trade or barter goods or services.
  • the users are exchanging data within the personal area network (PAN).
  • PAN personal area network
  • the data contained within the templates is evaluated and a determination is made as to if there is a need or potential for a transaction or user interaction that could be potentially attractive to the user and to a 3 rd party enterprise, individual or provider of products & services.
  • This commercial matchmaking process is carried out in Step 68 and continued in Step 70.
  • a recommendation will be made by the second users wireless device to refer the first user to a 3 rd party game supplier.
  • one of the users will have already established an affiliation with a set of 3 rd party suppliers that would be the recipient of the referral. If not, then an automatic search process could be carried out to locate a potential match by enlisting the assistance of an established search engine or similar mechanism. Once located, an affiliation could be established by the user using the mechanisms offered by commercial enterprises on the World Wide Web (for example Amazon.comTM) and a referral subsequently made at a later time.
  • Step 70 therefore determines if there is a potential opportunity for a referral to a third party and that the user gives permission for data to be transmitted before proceeding to the next step.
  • the wireless device may then prompt the user to make a manual entry (decision) on whether to begin the actual referral process or this could be done automatically depending on the user's previously defined preferences. However, if the user decides, either manually or his "profile decides" automatically, that this should not be done (e.g. the first user do not allow this), then the process may return to the Top Level process described in figure 1 via Step 82. If the decision is to refer, in Step 74, an automatic electronic communication may be sent to the appropriate 3 rd party organization with the unique contact identification number (Contact ID).
  • Contact ID unique contact identification number
  • the necessary codes and protocols are sent and exchanged in order to establish a secure link with the 3 rd party in Step 76.
  • a special message or set of messages is sent to the 3 rd party with a unique identification number requesting the product or service or simply alerting the 3 rd party to a potential sales lead.
  • the 3 rd party and the wireless device complete an exchange of data in a commercially orientated transaction in Step 78.
  • the user in exchange for the contact identifier and a means to make actual contact to the user (for an example see the process flow "Follow up" Step 28), the user, via the wireless device, and the 3 rd party effect a transaction with the user receiving a unique data code that can be later exchanged for monetary compensation for the referral made.
  • the received product or service or details and references to it containing any commercial or contractual data is stored in a master Experience Database accessible in Step 80.
  • These details and references could be retrieved from other communication inventions, and/or information and communication technologies.
  • selective contents of the stored referral transactions made in user's database can be made available via electronic but not limited to, communication methods.
  • the recipient 3 rd party of such information would validate the data, codes, Contact ID, dates of transactions and other items, in order to make a monetary payment as a reward for said referrals.
  • Step 82 On completion of the commercial opportunity process described above, the main process flow is resumed via Step 82.
  • Fig. 5 shows, at a high level four basic elements that may required for a referral to a 3 rd party organization. These are, discovery, matching referral and fee payment (all facilitated by the software of the present invention) and an available communications network infrastructure in order to enable the automatic electronic connections to 3 rd party systems and in a further embodiment, to another system to assist in validating and processing associated fees.
  • the matching functions and capabilities of one embodiment of the invention enables users to discover and connect with each other either in real time or at some other time.
  • the commercial process steps ⁇ will facilitate an actual commercial transaction between the user and a 3 rd party. This is done in a number of steps as described above.
  • Figure 5 shows that it may be possible to engage a specialist organization or service provider that can electronically links to both the user and the 3 rd party, decode and validate that transactions in order to facilitate the payment of fees due on either side of the transacting party.
  • the PAN is shown encircling the example device in dotted lines.
  • the device (shown as a black square) is activated and running in a cell phone, which is freely available in the marketplace.
  • a second user running software embodying the concepts of the present invention has entered the PAN of the first user and an automatic discovery process has taken place (largely a standard function of the transport layer shown in Figure 6).
  • What follows, is a type of matchmaking process as described above with the users exchanging data as many times as the software and user defined levels plus any manual interventions allows. This continues until the device alerts the user to the match and other information pertaining to the quality of the match.
  • one of the functions of the present invention is to facilitate a referral to a 3 rd party in order to exploit a potential commercial opportunity.
  • the 3 rd party for instance, would be a service provider who would benefit from a user referral as it would increase the chances of making a commercially beneficial transaction for example selling something to a user.
  • the diagram shows, graphically, the establishment of a link to a 3 rd party via an available network such as the World Wide Web or some similar method such as email, SMS text. Also shown is the possibility of including another organization that provides a cross checking, transaction validating function and facilitates the collection of fees due to and from the user.
  • Fig 6 shows the required technology components or similar to embody the invention.
  • the configuration of the components is shown in the diagram and they are organized in layers or modules for simplicity of design and to more easily manage changes and upgrades. A brief description of the functionality of each now follows.
  • the matchmaking platform contains the necessary tools, computer based code and algorithms to perform the core functionality of a preferred embodiment of the invention such as but not limited to matchmaking between data sets, comparison and evaluations between these data within predefined limits to generate numerical values that can be used to generate items such as the contact safety rating and the match quality level.
  • This layer is envisaged to be enabled in JavaTM software or something similar.
  • the next layer is also enabled by JavaTM or similar software that has been coded to perform designated functions such as to communicate between the layers and critically, to interface with the external environment via the chosen Transport layer (see below).
  • the search and discovery of contacts (users) within the personal area network (PAN) is implemented at this level.
  • the primary functions are therefore the search and discovery of other users within the PAN and to engage the user in a computer assisted dialogue whereby data is exchanged.
  • the data is converted to a suitable format so that other modules can easily interpret the data presented to it.
  • the third layer is the actual operating system and other enabling components that comprise a software environment such as JavaTM or something similar. Progressing down the component stack, the next layer is the actual transport layer that facilitates the data exchange between two devices using standard protocols and other relevant standards.
  • This layer operates the communication systems such as BluetoothTM, ZigbeeTM or other available applications and methods available at the time of embodiment thus creating the Personal Area Network (PAN).
  • the communication system has a number of automatic or built in features that facilitate the PAN such as but not limited to the searching for other similarly enabled devices within it's transmission range and establishing the communications link with minimal or no user intervention.
  • the second to last layer shown is the database.
  • This is known as the Experience Database" and has multiple functions albeit that it's primary function is to store data.
  • the database is managed by computer algorithms that enable the database to become a knowledge management system of user contact experiences, storing among other things, the user templates, profiles, uniquely and dynamically generated codes, calculation values, transaction logs, referral successes and many other numerical values used in the invention.
  • the final layer shown is the central processing unit (CPU) that provides the computer processing facilities necessary to run the above components.
  • the ancillary systems such as the power supply and man to machine interface.
  • the appropriate circuitry can be housed in a mobile device (such as but not limited to a cell phone) or a fixed device (such as but not limited to a network computer server).
  • One or more embodiments may be performed by a computer storing computer readable instructions on a computer readable medium, such that when the computer readable instructions are read and executed by a processor of the computer, the computer is caused to perform in accordance with the invention as described herein. While the invention has been described with respect to specific examples including presently preferred modes of carrying out the invention, those skilled in the art will appreciate that there are numerous variations and permutations of the above described systems and techniques that fall within the spirit and scope of the invention as set forth in the appended claims.
  • This invention has industrial applicability in the wireless electronic communications invention industry and in the telecommunications industry. It also has industrial applicability to the advertising and marketing industries, both of which are increasingly making use of social networking and peer-to-peer mobile connections to stimulate commercial transactions.

Abstract

A system and method of automatically determining and alerting a user to an overlap of interests between their interests and the interests of other, geographically proximate users. In a series of real time automated iterative interactions, the system allows automated determination of a level of trust between users and provides a number of user configurable options such as automated referral to a third party. It thus addresses a key user concern of safety and security of such computer assisted communications. It also provides an automated method of initiating real-time communications via available established methods by establishing automatic partnering links with 3rd party service providers. In addition, using freely available series such as GPS, the user's location may be determined for an actual meeting dependant on the users configurable parameters. The system allows for the management and storage of past and present matches and virtual meetings thus providing a knowledge database. This facility is particularly important if an instant or real-time meeting is not initially sought but communications could take place at a later date.

Description

TITLE: System and Method for Providing Proximity Based Services using automatic search, discovery and match-making inventions and processes.
Inventors: Simon Davidoff
Cross Reference to Inventions
This invention is related to, and claims priority from U.S. Provisional Patent invention identification number 60/483,869 filed on June 30th 2003 by Simon Davidoff entitled "System and Method for Providing Location Based Services", the contents of which are hereby incorporated by reference.
Technical Field
The present invention generally relates to the area of wireless communications, and, more particularly, to providing a method and system for rapid and secure exchange of data between physically proximate mobile communication inventions having databases containing overlapping data.
Background Art Social interaction is a basic human need and therefore, it is easy to understand why the internet has stimulated the creation of numerous inventions and services to "connect" ndividuals" in some way or another. The human desire to belong to a trusted social group ncreasingly involves technology to provide the mechanism to develop our own personal networks, communities of trust and relationships. The explosive growth in Internet based social networking such as online matching (dating) services is evidence of this latent need, and how technology is being used to fulfill it.
A "chance meeting" at some point in time is something that we have probably all experienced. However, it is more likely that we miss many potential connections that are of high specific interest to us without knowing it. Computer technology can assist in reducing the "odds" of making a connection of interest. Due to its affordability, broad-ranging inventions and increasingly sophisticated capabilities, wireless technology has become an every day part of our lives. For instance, mobile communication inventions now include Short Message Service (SMS) technology, Global Positioning System (GPS) technology, Bluetooth and Wireless LAN technology, cameras and personal digital assistant functionality. This convergence of features has opened the way to new inventions and added value services, many of which relate to the human desire to establish new contacts and relationships.
Many of these services use the wireless inventions ability to make short range contact and their computing power to provide services that attempt to locate near by users with similar interests, as described in, for instance, US patent 6,542,749 issued on April 1st 2003 to Tanaka et al .entitled "Method and system for connecting proximately located users based on compatible attributes", US patent 6,618,593 issued on Sept 9th 2003 to Drutman et al, entitled "Location dependant user matching system" and US patent publication 20040009750 filed by Beros et al., Suman on January 15, 2004; titled "Method and apparatus for effecting a detection of mobile inventions that are proximate and exhibit commonalities between specific data sets, or profiles, associated with the persons transporting the mobile inventions", all of which are hereby incorporated by reference. There are, however, significant problems in implementing such systems.
Firstly, there is the problem of how to make contact with unknown people (users) as safe as possible particularly with the high level concern over personal security and information privacy. Data privacy and personal safety are major issues which do not appear to be adequately dealt with in any prior art implementations of such systems.
A second, business related problem is how to generate a revue stream directly or indirectly from such computer assisted interactions. A third problem is how to avoid contacts that waste user's time and do not lead to any value or utility.
A forth, more technical problem, is that the systems of the prior art require cellular networks or a GPS facility to determine whether two cellular phones are within the same cell. Once this determination is made and if certain pre-existing conditions exist, the network may send a signal to one or both of the cellular phones so that at least one cellular phone user is made aware that another user may be in the vicinity. For example, the network may have access to a database that indicates that the users of both cellular phones have registered themselves as being single and looking to meet someone new. By alerting at least one of the users to the other user's presence (perhaps via a text message with information on how to contact the other user), the users may take further steps to meet.
There are several disadvantages to such a system and service. One disadvantage is that such a service depends on the network operator's installing and maintaining additional infrastructure so that users are tied to one particular operator's network. Thus, users subscribing to different cellular networks may be unable to take advantage of this service. Another disadvantage is that the network may be slow to alert a user of the presence of another user due to the overhead of several communication transactions and a server-based matching system. Discovery and response times may be as long as one minute, by which timer the user may have traveled out of the network coverage area or into an area of poor or no reception (e.g. underground, or remote geographical areas) increasing the chances that they will miss each other.
Another disadvantage is that users have to share all their personal profile information and preferences with each network operator's infrastructure in order for matching to take place effectively, raising major privacy and security concerns.
The prior art appears to only addresses the superficial challenges of making connections and does not address in any meaningful way, how to quickly but safely make meaningful contacts in way that may also be commercially viable.
What is needed is a system that more closely matches the natural way humans create new relationships, namely an interactive exchange of data, starting with very general information and only moving to an exchange of more personal information as a degree of mutual trust and interest is established. Disclosure of Invention
The present invention relates to a system and method of automatically determining and alerting a user to an overlap of interests between their interests and the interests of other, geographically proximate users. In a series of automated iterative interactions, the system also allows automated determination of a level of trust and options such as automated referral to a third party.
In a preferred embodiment, a user may broadcast and receive information in a geographically contained geographic location (also known as a "personal area network" (PAN), or a "databubble"), using, for instance, the peer-to-peer functionality of a mobile wireless device. In an automated sequence, received information may be decoded and evaluated against a predetermined set of criteria for a match or an overlap of interests. This automated overlap may for instance look for common responses to standard questions. In a preferred embodiment, the evaluation may take the form of a series of interactive exchanges of data between users in which the degree or region of overlap detected in a first exchange guides the type of data exchange in the subsequent interchange. If after an iterative series of exchanges, a sufficient degree of overlap is discovered in a region of mutual interest, the user may be alerted to the overlap. If a significant area of overlap is established but with a significant data gap, a user may be automatically referred to a third party site to retrieve information that may enhance the quality of the match. For instance, two parties may automatically establish a mutual interest in action adventure films, but one party may have no data indicating an opinion on a newly released film which the other has a strong opinion on. The opinionated party may for instance, automatically refer the un-opinionated party to a web-site or other data-store to obtain information pertaining to the new film, including purchasable options. In another instance, first responders to a critical situation (such as a fire or wartime operation) would be able to quickly and automatically detect other key members of their team, unit or group, silently without the need to verbalize instructions or commands, instead using the computer assisted automatic search, matching and alerting features of the invention possibly in conjunction with and integrated to, other communication and control systems. In a preferred embodiment, the user may be alerted by being provided an identifier for the other party, a method of contact and a synopsis of the type and degree of overlap. For instance the user may be provided a screen name, a telephone contact number and a subject of mutual interest. Depending on predetermined user preferences and level of trust established in the automated data exchange, the contact information may be encrypted or a series of anonymous virtual addresses transmitted to allow future or current indirect communication. . In a further embodiment of the evaluation process may include automatic referral to a reference database for authentication of data exchanged. In a further embodiment, an authenticated overlap may result in the initiation of a secure chat using, for instance instant messaging protocols. In a further embodiment, the data template broadcast by the user may vary in a predetermined manner depending on, for instance, geographical location, time of day, day of the week or some combination thereof, and may include options such as initiate contacts immediately or save and initiate later or on subsequent meeting. In a further embodiment, the referral by one user to a third party service may entail collection of a commission by the referee from the third party. These and other advantages of the system will be described in more detail, with reference to the following diagrams. Brief Description of Drawings
Fig. 1 entitled "Top Level" shows the overall concept of the invention from a top level and incorporates some of the particular features and processes relating to a method to increase the security of the user, its commercial potential and how to follow up initial matches with direct or indirect contact to a user.
Fig.2. entitled "Follow Up" shows the general process flow of a method to follow up with actual direct or indirect contact after the initial match has been discovered and automatically evaluated by the invention. Fig.3 entitled "Contact Safety Rating" shows the general process flow of a method to increase the security of the user by hooking into 3rd party safety service providers.
Fig.4 entitled "Commercial Opportunity" shows the general process flow of a method of referring users to 3rd party commercial enterprises thus, creating the potential for generating revenues in the form of referral, or affiliate commissions. Fig.5 entitled "An overview of the referral to a third party derived from the initial discovery of a match" shows a schematic of the physical method of referring users to 3rd party commercial enterprises thus generating referral commission.
Fig. 6 entitled "The Required Rechnology"" shows an exemplary configuration of one embodiment of the invention.
Best Wiode for Carrying Out the Invention
To understand the inventive concepts of the present invention it is useful to refer to the figures and drawings listed above.
Fig. 1 is a top level flow diagram that shows various components of an exemplary embodiment that can be utilized to implement the inventive concepts described herein. In step 10, the process is initiated by the user. This may consist of the user turning on a wireless communications invention, being presented with a menu of choices and selecting an "Activate" option. Selecting to activate the process may lead to step 12, in which the user is presented with a menu that offer the option of either first configuring the device for his personal profile or of accepting a possible standard user profile, or of using a previously configured profile. In the preferred embodiment, this configuring can be done directly on the mobile device in step 86. In a further embodiment, the user may, in step 86, be connected via a network such as, but not limited to, the Internet, to a web-site where profile initialization my be accomplished using on-line tools.
In the preferred embodiment, when the user selects to use a default or a preconfigured profile, they proceed to step 14, in which the wireless devices automatically searches and discovers other users that are permanently or momentarily in the range of the user's personal area network. This searching may be done using short range wireless communications technology such as, but not limited to, Bluetooth and Wireless LAN technology.
After a second user is discovered, the device proceeds to Step 16, in which a unique contact identification code is automatically generated and stored in a database (known as the "Experience Database"). Other data is automatically exchanged that is arranged in a set of templates that contain structured data that has been either pre-configured or loaded with data by the device supplier or data that is defined, input and configured by the user. The data can be entirely new or previously stored or a mixture of both depending on the users preferences and choices. In step 18, an automatic process of exchanging data takes place until the quality of the match reaches a user predefined level. This may be achieved by multiple data exchanges in a series of iterations until the predefined level of matching quality based on matching criteria that are pre-configured by the device supplier or defined, input and configured by the user, is reached. For instance, the first wireless device may receive a subset of a second user's profile. The first wireless device may compare this subset of a second user profile with a corresponding subset of a first user profile and establish an overlap metric, which may be, but is not limited to, the number of items in the subsets which match. The first wireless device may be programmed to then select a subset of the first profile, based on the overlap metric, and transmit that data. For instance, if the overlap of the first subset is within is close to, but doe not quite reach a predefined high value indicating a successful match, the first device may select a subset of the first user profile that is more personal or more detailed. If the overlap metric is closer to, but not below, a predetermined low value indicative of an unsuccessful match, the subset chosen may attempt to explore a different area of possible overlap of interests, by for instance choosing data from another template. The level of matching (also known as an "overlap metric") may a numerical value created by algorithms comparing and testing for logical conditions throughout the data sets and assigning a numerical value within a defined range. For example, in a range of 1 to 10, the closer to the 10 value the high quality the match. Each data item in the data under evaluation is assigned a value in this way, and based on an aggregation of all assigned values, a matching level is determined. One this match quality level has been reached, the user is presented with a menu of choices that includes selecting a "Do you want to make a live contact" option in Step 20. This may be done by, for instance, the wireless device issuing a command when the overlap metric is greater than the predetermined higher value indicative of a successful match. The command may be an alert which additionally shows the user all or part of the subset of the profile. At this point the user has the option of making contact with the second user either immediately, in real time or at some future point in time. The user's choice of this option may have already been preloaded into the appropriate data set, template or similar at an earlier point and would, in the preferred embodiment, be based on the analysis of the matching quality level, or it may be manually initiated by the user. In many cases, the user is likely to require the use for example, of a 3rd party communication medium such as but not limited to, Instant Messaging, SMS text, a wireless telephone call or some other form of communication, including non-electronic forms. However, it may be possible at this stage, to engage the matching partner without the further aid of automatic processes and simply initiate contact based on acquired information through the preceding stages described above. Further information on these possible process options described more fully in Figure 2.
If the user does not choose the option to follow up, i.e. engaging the matching user in an direct or indirect communication at this point (for reasons such as, but not limited to, not trusting the second user enough, at this point in time) in a further embodiment, the user has the option of determining or retrieving a "contact safety rating" in order to make the decision to initiate actual contact or follow up involve less perceived risk to the aforementioned user. In a preferred embodiment, the user may choose to use the features of the invention to automatically establish an electronic link with, for example, to a 3rd party organization or individual. This may be done by for instance, the wireless device issuing a command to a third party device such as, but not limited to, another wireless device or a device accessible by a wireless network, that is running software, such as a web server, capable of responding to a request for confirmation of authenticity of the subset of the second user profile that has been received by the device and which resulted in the successful overlap metric being met. The user's choice of this option may have already been preloaded into the appropriate data set, template or similar at an earlier point or it may be manually initiated. A process automatically determines a safety rating factor by a combination of data mining of gathered data from the preceding steps, running computer algorithms or automatically initiating links and exchanging information with one or more 3rd party organizations or individuals, or a combination of these and other potential sources of relevant data that is able to contribute to the determination of a users safety rating. Further information on these possible process options described more fully in Figure 3. On completion of step 40, the process may go to Step 62: At this point, in a further embodiment, the user has the option to initiate and pursue a commercial opportunity. In the preferred embodiment, this pursuit can be done directly on the mobile device beginning in step 64 by initiating a referral to a 3rd party or individual. The determination whether this action is appropriate may be automated based on a previously defined data profile setting, or it may be made manually in real-time or at some other point in time. If a referral is required by the user, an automatic process may be initiated to do this to an appropriate set of known 3rd parties or individuals or an automatic search is carried out using well known search tools as used by on-line search services such as but not limited to those provide by Google™, Yahoo™ and other well-known search engine sites, to locate them. For instance, the referral may consist of providing a locator of a third party, or a third party service, such as, but not limited to a universal resource locator (URL), a telephone number or even a physical address. At some appropriate point in the process, a transaction between the device and the service provider is recorded so that the appropriate compensation can be paid at some time, to the user. The referral may include a sender code such as, but not limited to, an alphanumeric string, that allows the third party to identify the device, or the user of the device, that made the referral. The sender code may also enable the third party, or third party service, to compensate the device, or the user of the device, for the referral. This compensation may, for instance, be accomplished using a well known electronic payment facility such as, but not limited to the PayPal™ facility. Further information on these possible process options described more fully in Figure 4.
Once the process reaches this point, all of the data in the preceding series of data exchanges that has been determined to be of value by the user (either manually or automatically by referencing the data in the profiled templates) plus the relevant information received from them (again the value of which is determined by the user either manually via menu options or automatically by referencing the data in the profiled templates), is stored in the master experience database, and accessed, configured and managed by a process called "manage & configure" in Step 84, in conjunction with Step 86 (described above).
In the preferred embodiment, the user has the options, presented via menu systems, of but not limited to, categorizing the contact (adding to the information for example noting possible follow up actions), rating the commercial potential of the contact and adding the user contact to his buddy list, for example, or to personal networking systems such as the on-line service Friendster™. This feature may be performed in conjunction with complimentary on-line tools (step 86), to enhance the capabilities of this process. For example, to facilitate data entry, or to use other applications to find and/or manage data.
In the preferred embodiment, the user may be allowed to make additional data entries to the "experience" database at any time via user menu options to builds the quantity and quality of the data and information stored. For example, due to multiple data inputs from multiple new and old encounters, repeated contact with the same user (i.e. the user re-enters the PAN of another user), the database will become a knowledge pool allowing the user to manually or automatically draw upon this data to make a more customized data exchange with users, in the future. For example, this would be similar to meeting someone a user has met before and therefore more information is stored in the database before the new engagement and data exchanges occurs in Step 16. The device is therefore able to draw upon this more complete data set, and present the user with options or automatically make recommendations with less process steps and computer possessing time. For example, this "known contact/user" would most likely have more data objects associated with it in the database. In addition, it is likely that this contact would have more data associated with determining the contact safety rating stored in the associated profile, therefore increasing the quality of that particular data item.
The process steps detailed above, continue until the device is deactivated by the user manually or automatically deactivates upon some predefined user criteria or criteria related to the external environment for example but not limited to, adhere hence to local laws and customs, safety and environmental factors or the availability of resources.
Fig. 2, entitled "Follow Up" is a flow diagram that shows various components of an exemplary embodiment that can be utilized to implement the inventive concepts described herein and specifically describes the processes that a user may initiate and implement a follow up communication in real time, instantly or to prepare for a future communication with a second user.
Step 22: enters this process flow automatically from the preceding figure 1 without any user interaction. In the preferred embodiment, in Step 24, the device automatically requests the necessary data templates and other associated information from the second user's invention. In a preferred embodiment, at this stage, the users are exchanging data within the personal area network (PAN) in a peer-to-peer mode. The data is analyzed by the both device in Step 26 and information, in the form of an initial set of user interactive menus displayed on the invention's man to machine interface. The content and configuration of the menus is dependant on the specific data received. The menus are presented to the user. The choice of what actions to select from the individual menu items are made by the user manually. These options can also be selected automatically depending on the predefined user configuration. For example, if the user is simply searching for someone with common interests to chat with, the decision to initiate a live, real-time or instant meeting type of connection will be automatically assumed affirmative, as this "go" decision will have been preset in the relevant personal profile templates. In a further embodiment, the user may decide to populate the personal profile with a number of "go" decisions in predefined areas in order to automate the processes and reduce the number of items requiring human interaction. This could lead to rapid deployment and a reduction in the number of processing steps required achieving a desired outcome, useful for the rapid assembly of human resources. For instance, the templates (also known as "subsets of personal profiles") may have contain different data dependant on the devices geographical location, the time of day, the day of the week or year, or some combination thereof.
If, the user decides not to initiate a follow up connection, they may proceed to Step 28 where the device automatically requests that the relevant sections of profile data and associated templates of the second user are exchanged in order that a later follow up may take place. In a preferred embodiment, the user may automatically predefine how the follow up could take place and this information would be exchanged rather than data that had a direct link to one user. For example, a virtual Post Office box could be used to act as a neutral medium by which both users could communicate in the future. Indeed, an ordinary mail PO Box could also provide this same function. Once the user is satisfied (by manually interacting via a menu option presented by the device or by automatic determination using predefined criteria) that enough information has been exchanged to allow for a future communication to take place, they are returned to the main process flow via step 38. If the user initiates an immediate follow up contact as earlier described in Step 26, the device may proceed to Step 30. Here, in a preferred embodiment, an electronic wireless link is established to an appropriate 3rd party service provider or systems to allow for an instant or real time virtual meeting and/or communication to take place. The level of automation of this step is predefined by the personal profile of the user making the request. The systems and methods to establish an immediate connection, may include services but not limited to Instant Messaging from wireless network carriers, or SMS text messaging and push-to-talk systems in addition to an actual cellular phone call. In a further embodiment, technologies such as global positioning satellite (GPS) systems, providing the actual location of the users may be utilized to facilitate a connection or live meeting. In Steps 32 and 34, the mechanism of connection, the previously generated unique identification numbers are stored in a database. When the use of 3rd party services have been involved in the connection, the transaction is logged to ensure that all appropriate fees can be collected via established billing mechanisms. For example, any external services made use of and facilitated by the device receive the necessary tracking information so that an affiliate referral fee may be paid. This process is described in further detail in Fig 4 and Fig 5.
After the service is in place and ready to enable the communication, the device may proceed to Step 36: where the actual communication takes place. On completion of the communication, the device returns to the main process flow via step 38.
Fig. 3 Contact Safety: shows how a "contact safety rating" factor is derived. A safety rating may for instance, be a numerical determination of the risk of contact based on what 3rd party checks have been run on the user. Using this and other information and a proprietary algorithm, the device may determine a contact safety rating factor and communicates the result to the user.
In the preferred embodiment, Step 42: initiates the generation of the contact safety rating factor process flow from the preceding flow described in figure 1.
The device automatically sources all of the available safety related information from the user via the users' safety profile normally stored in a predefined template in Step 44. Note, please remember that at this stage, the users are exchanging data within the personal area network (PAN). This may include available security clearances, immigration records, police records, court records or include data on political standing, role in the community, job profile, credit ratings etc. It takes this data but not limited to this data alone and inputs it into the invention. In Step 46, the data it contains pertaining to a user contact safety, is automatically evaluated by comparing a generated safety rating based on the available data at this point against a predefined safety acceptability level or "trust level". (Note that this level is likely to be directly related to how risk averse the first or receiving user is and is a personal choice and/or setting made prior to this step). As in the process above, the contact safety rating is a numerical value created using algorithms comparing and testing for logical conditions throughout the data sets and assigning a numerical value within a defined range. For example, in a range of 1 to10, the closer to the 10 value the higher the user's safety rating is likely to be. Each data item in the data under evaluation is assigned a value in this way, and based on an aggregation of all assigned values, a contact safety rating is determined.
At this point, in Step 48, the invention, depending on the users' preference, may prompt the user for a decision on whether a sufficient level of confidence or trust has been reached (as each user will have predefined what the numerical level of contact safety rating is acceptable) or until the invention, running automatically, is satisfied, based on a previously defined level and/or criteria, that enough safety data has been gathered to determine a rating of acceptable quality. If is not satisfied, Step 50 prompts the user to decide or automatically determines that more safety level data should be obtained i.e. if the currently determined safety level factor does not meet the required value, then the user has the option to search and retrieve further data.
If it is decided to continue gathering and researching information related to the user's safety, the wireless device continues to Step 52. In this step, external 3rd party organizations or individuals are automatically contacted via, for example, an external network, as in the processes described above. The wireless device automatically sends a sequence of handshaking signals that includes the previously generated unique contact ID and other messages to the 3rd party to request the transfer of data in Step 54. Once the commercial link is ready and other necessary information (for example information to be used in billing the user) has been exchanged, included in Step 56, the safety related information on the user is retrieved, the transaction is completed by the device automatically receiving the data and the transaction details a recorded and logged in Step 58.
At this point, the additional safety related data is added to the known data on the second user thereby supplementing and enriching the safety profile allowing a better basis on which to subsequently determine the safety or risk factor associated with the particular user under scrutiny. Now, the updated safety factor is again evaluated in Step 46 as previously described. In this way, the data exchanges continue to take place until the device is satisfied, based on a user predefined level and/or criteria, that enough safety data has been gathered to determine a rating of sufficient quality. On completion of the safety factor evaluation process, the main process flow is resumed via step 60.
Fig. 4, entitled "Commercial Opportunity", describes how a user can be referred to a 3rd party or individual that is a commercial organization with the intention to create an opportunity for monetary reward from that organization or individual. In the preferred embodiment, Step 60 initiates the process flow from the preceding flow described in figure 1.
This process flow is similar to the process flows described in the previous figures in that the first step is to retrieve all the relevant data templates and other information relating to the potential commercial referral or opportunity, from the user's profile in Step 66. This commercial opportunity may also include the ability to trade or barter goods or services. In a preferred embodiment, stage, the users are exchanging data within the personal area network (PAN). The data contained within the templates is evaluated and a determination is made as to if there is a need or potential for a transaction or user interaction that could be potentially attractive to the user and to a 3rd party enterprise, individual or provider of products & services. This commercial matchmaking process is carried out in Step 68 and continued in Step 70. For example, based on information in a first user's profile, it maybe determined that the first user is an avid computer games aficionado and has recently purchased new games. Here, a recommendation will be made by the second users wireless device to refer the first user to a 3rd party game supplier. In the preferred embodiment, one of the users will have already established an affiliation with a set of 3rd party suppliers that would be the recipient of the referral. If not, then an automatic search process could be carried out to locate a potential match by enlisting the assistance of an established search engine or similar mechanism. Once located, an affiliation could be established by the user using the mechanisms offered by commercial enterprises on the World Wide Web (for example Amazon.com™) and a referral subsequently made at a later time.
Step 70 therefore determines if there is a potential opportunity for a referral to a third party and that the user gives permission for data to be transmitted before proceeding to the next step. In one embodiment of the invention, the wireless device may then prompt the user to make a manual entry (decision) on whether to begin the actual referral process or this could be done automatically depending on the user's previously defined preferences. However, if the user decides, either manually or his "profile decides" automatically, that this should not be done (e.g. the first user do not allow this), then the process may return to the Top Level process described in figure 1 via Step 82. If the decision is to refer, in Step 74, an automatic electronic communication may be sent to the appropriate 3rd party organization with the unique contact identification number (Contact ID). As described in the above processes, the necessary codes and protocols are sent and exchanged in order to establish a secure link with the 3rd party in Step 76. This could be implemented using standard tools and software such as XML, Java™ or similar. A special message or set of messages is sent to the 3rd party with a unique identification number requesting the product or service or simply alerting the 3rd party to a potential sales lead. On receipt of the special messages from the wireless device, the 3rd party and the wireless device complete an exchange of data in a commercially orientated transaction in Step 78. Therefore, in exchange for the contact identifier and a means to make actual contact to the user (for an example see the process flow "Follow up" Step 28), the user, via the wireless device, and the 3rd party effect a transaction with the user receiving a unique data code that can be later exchanged for monetary compensation for the referral made.
The received product or service or details and references to it containing any commercial or contractual data is stored in a master Experience Database accessible in Step 80. In addition, These details and references could be retrieved from other communication inventions, and/or information and communication technologies. For example, in a further embodiment, selective contents of the stored referral transactions made in user's database (the Experience Database described above) can be made available via electronic but not limited to, communication methods. The recipient 3rd party of such information, would validate the data, codes, Contact ID, dates of transactions and other items, in order to make a monetary payment as a reward for said referrals.
On completion of the commercial opportunity process described above, the main process flow is resumed via Step 82.
In order to further describe the preferred embodiment of the commercial process flow description, Fig. 5 shows, at a high level four basic elements that may required for a referral to a 3rd party organization. These are, discovery, matching referral and fee payment (all facilitated by the software of the present invention) and an available communications network infrastructure in order to enable the automatic electronic connections to 3rd party systems and in a further embodiment, to another system to assist in validating and processing associated fees.
As described in the other figures, the matching functions and capabilities of one embodiment of the invention enables users to discover and connect with each other either in real time or at some other time. In a preferred embodiment, the commercial process steps \ will facilitate an actual commercial transaction between the user and a 3rd party. This is done in a number of steps as described above. Figure 5 shows that it may be possible to engage a specialist organization or service provider that can electronically links to both the user and the 3rd party, decode and validate that transactions in order to facilitate the payment of fees due on either side of the transacting party.
In the diagram, the PAN is shown encircling the example device in dotted lines. In this case, the device (shown as a black square) is activated and running in a cell phone, which is freely available in the marketplace. In the instance shown, a second user running software embodying the concepts of the present invention has entered the PAN of the first user and an automatic discovery process has taken place (largely a standard function of the transport layer shown in Figure 6). What follows, is a type of matchmaking process as described above with the users exchanging data as many times as the software and user defined levels plus any manual interventions allows. This continues until the device alerts the user to the match and other information pertaining to the quality of the match.
As described in Figure 4, one of the functions of the present invention is to facilitate a referral to a 3rd party in order to exploit a potential commercial opportunity. The 3rd party for instance, would be a service provider who would benefit from a user referral as it would increase the chances of making a commercially beneficial transaction for example selling something to a user. The diagram shows, graphically, the establishment of a link to a 3rd party via an available network such as the World Wide Web or some similar method such as email, SMS text. Also shown is the possibility of including another organization that provides a cross checking, transaction validating function and facilitates the collection of fees due to and from the user.
Fig 6 shows the required technology components or similar to embody the invention. The configuration of the components is shown in the diagram and they are organized in layers or modules for simplicity of design and to more easily manage changes and upgrades. A brief description of the functionality of each now follows.
Beginning at the top of the diagram, the matchmaking platform contains the necessary tools, computer based code and algorithms to perform the core functionality of a preferred embodiment of the invention such as but not limited to matchmaking between data sets, comparison and evaluations between these data within predefined limits to generate numerical values that can be used to generate items such as the contact safety rating and the match quality level. This layer is envisaged to be enabled in Java™ software or something similar.
The next layer is also enabled by Java™ or similar software that has been coded to perform designated functions such as to communicate between the layers and critically, to interface with the external environment via the chosen Transport layer (see below). The search and discovery of contacts (users) within the personal area network (PAN) is implemented at this level. The primary functions are therefore the search and discovery of other users within the PAN and to engage the user in a computer assisted dialogue whereby data is exchanged. The data is converted to a suitable format so that other modules can easily interpret the data presented to it.
The third layer is the actual operating system and other enabling components that comprise a software environment such as Java™ or something similar. Progressing down the component stack, the next layer is the actual transport layer that facilitates the data exchange between two devices using standard protocols and other relevant standards. This layer operates the communication systems such as Bluetooth™, Zigbee™ or other available applications and methods available at the time of embodiment thus creating the Personal Area Network (PAN). The communication system has a number of automatic or built in features that facilitate the PAN such as but not limited to the searching for other similarly enabled devices within it's transmission range and establishing the communications link with minimal or no user intervention.
The second to last layer shown is the database. This is known as the Experience Database" and has multiple functions albeit that it's primary function is to store data. The database is managed by computer algorithms that enable the database to become a knowledge management system of user contact experiences, storing among other things, the user templates, profiles, uniquely and dynamically generated codes, calculation values, transaction logs, referral successes and many other numerical values used in the invention. The final layer shown is the central processing unit (CPU) that provides the computer processing facilities necessary to run the above components.
Not shown, are the ancillary systems such as the power supply and man to machine interface. In the preferred embodiment, the appropriate circuitry can be housed in a mobile device (such as but not limited to a cell phone) or a fixed device (such as but not limited to a network computer server).
One or more embodiments may be performed by a computer storing computer readable instructions on a computer readable medium, such that when the computer readable instructions are read and executed by a processor of the computer, the computer is caused to perform in accordance with the invention as described herein. While the invention has been described with respect to specific examples including presently preferred modes of carrying out the invention, those skilled in the art will appreciate that there are numerous variations and permutations of the above described systems and techniques that fall within the spirit and scope of the invention as set forth in the appended claims.
Industrial Applicability
This invention has industrial applicability in the wireless electronic communications invention industry and in the telecommunications industry. It also has industrial applicability to the advertising and marketing industries, both of which are increasingly making use of social networking and peer-to-peer mobile connections to stimulate commercial transactions.

Claims

What is Claimed
1. A method of exchanging information between a first wireless device, having a stored, first profile representative of a first user, and a second wireless device having a stored, second profile, representative of a second user , comprising the steps of: receiving, by said first wireless device, a subset of said second profile; comparing said subset of said second profile with a corresponding subset of said first profile to obtain an overlap metric; transmitting a subset of said first profile, said subset of said first profile being chosen dependent on said overlap metric.
2. The method recited in claim 1 , further comprising the steps of: receiving, by said second wireless device, said subset of said first profile; comparing said subset of said first profile with a corresponding subset of said second profile to obtain a second device overlap metric; transmitting a subset of said second profile, said subset of said second profile being chosen dependent on said second device overlap metric.
3. The method recited in claim 2, further comprising repeating said steps of receiving, comparing and transmitting until said overlap metric is less than a predefined lower target value or said overlap metric is greater than a predefined higher target value, said lower target value being indicative of an unsuccessful match between profiles and said higher target value being indicative of a successful match between profiles.
4. The method of claim 3, further comprising the step of issuing a command by said first wireless device once said overlap metric is greater than said higher predefined value.
5. The method of claim 4, wherein said command is issued to a user of said first wireless device and is indicative of said successful match.
6. The method of claim 5, wherein said command further includes displaying said subset of said second profile.
7. The method of claim 4, wherein said command is transmitted to said second wireless device.
8. The method of claim 7, wherein said command comprises a referral, said referral being a locator of a third party.
9. The method of claim 8, wherein said locator comprises a universal resource locator.
10. The method of claim 7 wherein said referral further comprises a sender code, said sender code being capable of identifying said first device to said third party.
11. The method of claim 10 wherein said sender code further enables said third party to compensate said first device for sending said referral.
12. The method recited in claim 7, wherein said command comprises a locator of said user of said first device.
13. The method recited in claim 12, wherein said locator of said user is a virtual post office.
14. The method of claim 4, wherein said command is issued to a third party.
15. The method of claim 14, wherein said command is a request for confirmation of authenticity of said subset of said second profile.
16. The method of claim 14, wherein said command results in a third party supplying a safety rating factor using said subset of said second profile and a public record chosen from the group of public records comprising credit ratings, immigration records, police records and court records, or some combination thereof.
17. The method of claim 1, wherein said first profile is dependant on one of geographical location, time of day, day of week or some combination thereof.
18. An apparatus for exchanging information, comprising: a first wireless device, comprising a memory capable of storing a first profile representative of a first user; receiving circuitry capable of receiving a subset of a second profile, representative of a second user; comparison circuitry capable of comparing said subset of said second profile with a corresponding subset of said first profile to obtain an overlap metric; and transmitting circuitry capable of transmitting a subset of said first profile, said subset of said first profile being chosen dependent on said overlap metric.
19. The apparatus recited in claim 18, further comprising: a second wireless device, comprising a memory capable of storing said second profile representative of said second user; receiving circuitry capable of receiving said subset of said first profile, representative of said first user; comparison circuitry capable of comparing said subset of said first profile with a corresponding subset of said second profile to obtain a second device overlap metric; and transmitting circuitry capable of transmitting said subset of said second profile, said subset of said second profile being chosen dependent on said second device overlap metric.
20. The apparatus recited in claim 19, wherein said first device further comprises circuitry for determining if said overlap metric is less than a predefined lower target value or greater than a predefined higher target value, said lower target value being indicative of an unsuccessful match between profiles and said higher target value being indicative of a successful match between profiles.
21. The apparatus recited in claim 20, wherein said first device further comprises command issuing circuitry capable of issuing a command once said overlap metric is greater than said higher predefined value.
22. A computer readable medium for storing computer readable instructions that, when executed by a processor, cause a computing device to perform a method for exchanging information between a first wireless device, having a stored, first profile representative of a first user, and a second wireless device having a stored, second profile, representative of a second user , comprising the steps of: receiving, by said first wireless device, a subset of said second profile; comparing said subset of said second profile with a corresponding subset of said first profile to obtain an overlap metric; transmitting a subset of said first profile, said subset of said first profile being chosen dependent on said overlap metric.
23. The computer readable medium of claim 22, wherein the method further comprises the steps of: receiving, by said second wireless device, said subset of said first profile; comparing said subset of said first profile with a corresponding subset of said second profile to obtain a second device overlap metric; transmitting a subset of said second profile, said subset of said second profile being chosen dependent on said second device overlap metric.
24. The computer readable medium of claim 23, wherein the method further comprises repeating said steps of receiving, comparing and transmitting until said overlap metric is less than a predefined lower target value or said overlap metric is greater than a predefined higher target value, said lower target value being indicative of an unsuccessful match between profiles and said higher target value being indicative of a successful match between profiles.
25. The computer readable medium of claim 23, wherein the method further comprises the step of issuing a command by said first wireless device once said overlap metric is greater than said higher predefined value.
PCT/US2004/021134 2003-06-30 2004-06-30 System and method for providing proximity based services using automatic search, discovery and match-making inventions and processes WO2005006145A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US48386903P 2003-06-30 2003-06-30
US60/483,869 2003-06-30

Publications (2)

Publication Number Publication Date
WO2005006145A2 true WO2005006145A2 (en) 2005-01-20
WO2005006145A3 WO2005006145A3 (en) 2005-09-22

Family

ID=34062000

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2004/021134 WO2005006145A2 (en) 2003-06-30 2004-06-30 System and method for providing proximity based services using automatic search, discovery and match-making inventions and processes

Country Status (1)

Country Link
WO (1) WO2005006145A2 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7797642B1 (en) 2005-12-30 2010-09-14 Google Inc. Method, system, and graphical user interface for meeting-spot-related contact lists
US7831917B1 (en) 2005-12-30 2010-11-09 Google Inc. Method, system, and graphical user interface for identifying and communicating with meeting spots
US7917866B1 (en) 2005-12-30 2011-03-29 Google Inc. Method, system, and graphical user interface for meeting-spot-related online communications
US7945861B1 (en) 2007-09-04 2011-05-17 Google Inc. Initiating communications with web page visitors and known contacts
US8171424B1 (en) 2005-12-30 2012-05-01 Google Inc. Method, system, and graphical user interface for meeting-spot maps for online communications
US8756501B1 (en) 2005-12-30 2014-06-17 Google Inc. Method, system, and graphical user interface for meeting-spot-related introductions
WO2014157801A1 (en) * 2013-03-26 2014-10-02 Lg Electronics Inc. Method and apparatus of performing a discovery procedure

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020178072A1 (en) * 2001-05-24 2002-11-28 International Business Machines Corporation Online shopping mall virtual association

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020178072A1 (en) * 2001-05-24 2002-11-28 International Business Machines Corporation Online shopping mall virtual association

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7797642B1 (en) 2005-12-30 2010-09-14 Google Inc. Method, system, and graphical user interface for meeting-spot-related contact lists
US7831917B1 (en) 2005-12-30 2010-11-09 Google Inc. Method, system, and graphical user interface for identifying and communicating with meeting spots
US7917866B1 (en) 2005-12-30 2011-03-29 Google Inc. Method, system, and graphical user interface for meeting-spot-related online communications
US8171424B1 (en) 2005-12-30 2012-05-01 Google Inc. Method, system, and graphical user interface for meeting-spot maps for online communications
US8756501B1 (en) 2005-12-30 2014-06-17 Google Inc. Method, system, and graphical user interface for meeting-spot-related introductions
US10139996B2 (en) 2005-12-30 2018-11-27 Google Llc Method, system, and graphical user interface for meeting-spot-related contact lists
US7945861B1 (en) 2007-09-04 2011-05-17 Google Inc. Initiating communications with web page visitors and known contacts
US8839120B2 (en) 2007-09-04 2014-09-16 Google Inc. Initiating communications with web page visitors and known contacts
WO2014157801A1 (en) * 2013-03-26 2014-10-02 Lg Electronics Inc. Method and apparatus of performing a discovery procedure
US9226226B2 (en) 2013-03-26 2015-12-29 Lg Electronics Inc. Method and apparatus of performing a discovery procedure

Also Published As

Publication number Publication date
WO2005006145A3 (en) 2005-09-22

Similar Documents

Publication Publication Date Title
JP7242750B2 (en) Technologies for messaging agent platforms
JP6726203B2 (en) Technology for authorizing and customizing social messaging
US8949278B2 (en) Contact information management
US20040181540A1 (en) System and method for the provision of socially-relevant recommendations
US10360554B2 (en) Generation of locally broadcasted uniform resource locators for checkout and payment
US20200005274A1 (en) Display of locally broadcasted uniform resource locators for checkout and payment
US20080235600A1 (en) Interaction with a Display System
US20130173424A1 (en) System for delivering gift item using social network information and method thereof
US11423463B2 (en) Dynamically rendered interface elements during online chat sessions
WO2015095837A1 (en) Location-based messages
CN101689210A (en) Gathering and search are from the profile data of a plurality of services
CN102084391A (en) Method and apparatus for image recognition services
CN105453076A (en) Systems and methods for location-based device security
WO2007059241A2 (en) Proximity-a ware virtual agents for use with wireless mobile devices
US20110153669A1 (en) Online dating with private support groups
WO2010080668A2 (en) Stateful server based social networking using mobile devices
US20170098256A1 (en) System and method for conveying entertainment or social events
US20200219169A1 (en) Method and apparatus for providing a unified cloud-based platform for commercial transactions and analysis
US20180352428A1 (en) Reporting service hybrid web/mobile application platform system and methods
WO2005006145A2 (en) System and method for providing proximity based services using automatic search, discovery and match-making inventions and processes
US20090187490A1 (en) System and a method enabling a customer and a business to interconnect via instant messaging in order to complete a business transaction
US20100318444A1 (en) Methods and systems for purchasing and selling goods via mobile computing devices
US20130085973A1 (en) Library intelligence gathering and reporting
WO2020139702A1 (en) Code sharing in e-commerce
US20090287588A1 (en) Method, a system and a user interface for shopping using a communication network

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase