Realtime, interactive and geographically defined computerized personal matching systems and methods

ABSTRACT

A system and method of interactive and live computerized matching in which a first user is provided with a personal data device including a wireless communication system. A secure network is configured to include a server programmed with a personal characteristic database and a database searching algorithm, and a wireless communication system at a specific geographic location that is capable of communicating with the user&#39;s personal data device. The first user is allowed to log on through the wireless communication system to the secure network using his or her personal data device, and communicates to and stores in the database personal data defining his or her characteristics and those for his or her ideal match. Either the secure network automatically identifies the first users precise geographic location, or the user himself otherwise indicates and stores in the database of the network an identifying address that indicates his current specific geographic location. The user then instructs the database searching algorithm to search for and identify other users similarly logged on to the network at the same specific geographic location. The user is able to initiate a search of the database for possible matches within the pool of other users also logged on to the network at the same specific geographic location. The secure network then indicates to the first user the results of the search.

BACKGROUND OF THE INVENTION

This invention relates to an interactive, real-time, personal matchingsystem and associated methods. An alternative form of the inventionrelates to real-time, interactive personal data gathering systems andmethods useful, for example, in the retail environment.

Numerous online dating systems exist, such as “Match.com,” “YahooPersonals,” “eHarmony.com”, “Date.com,” and others. However, in each ofthose systems and methods, there is no ability to electronically searchfor and find possible matches in a fun, live, interactive and wirelessformat within a locally-defined geographic area, such as in a specificlibrary, bar, coffee house, ball park, etc.

In accordance with aspects of the present inventions, participatingindividuals in a specifically defined social and geographic environment(such as a bar, nightclub, church function, ball-park, library, coffeeshop, concert hall, etc.), each log onto a preference matching networkusing a wireless communication and display device, such as a standardwireless-equipped PDA, multi-function Bluetooth-enabled cell phone, orother wireless computer. (The term “PDA” is used for conveniencethroughout this application, but is intended to mean broadly any form ofpersonal data or communication assistant.) Once logged onto the network,that individual's personal characteristics (such as height, weight, age,profession, religious preferences, etc.), along with his or herpreferences for an ideal match, are loaded into a database or otherwisemade available for real-time scanning and searching. The correspondingcharacteristics and preferences for other individuals currently loggedlive onto the same network and at the same defined geographic locationare similarly made available for real-time scanning and searching.Results for likely matches are returned in a “real-time” or “live”format to interested members signed onto the network live within thedefined geographic location. Then, by use of instant messaging, email,phone, visual display or other communication devices, online members ofthe network can locate instantly and in live format possible matcheswithin a specifically defined geographic location, and if desired, meetface-to-face at that same location.

In comparison, current online matching systems allow users to search formatches within geographic boundaries by a radial distance from zipcodes. Such existing systems do not allow for the use of secondary“branded” networks (e.g., Starbucks, Barnes & Noble, Applebees, etc.) tosearch for matches at specific locations unrelated to a distance from azip code.

In a simple form, this real-time matching service could be employed on atemporary basis with a one-time subscription fee (e.g., at a nightclub,say from 8 pm to closing). In this case, individuals would pay a fee,obtain the computer communication device, enter their personal data ontoa specially defined local network, and employ the live matching serviceonly on a one-time basis on the specific network at a specific location.Any number of possible live, fun and interactive “dating games” can beplayed by the subscribers, as explained hereafter. After a certainnumber of hours or minutes, the subscription expires. In this manner,for example, a particular bar can host a “live match” evening, charge asubscription fee for those wishing to participate in the live matchingprogram and the participants can engage in a fin, live, interactivesocial event.

Alternatively, and in a more complex form, this real-time matchingservice can be added as an additional paying subscription service toexisting online web-based dating services (such as Match.com or YahooPersonals!), for use in any locally defined wireless computerenvironment. In the latter case, once an individual logs onto thenetwork over the web, and indicates his or her specific geographiclocation, live scanning of the database will reveal possible matcheswithin the subset of all subscribers currently logged onto the networkin the same defined geographic location. For example, the wide number ofonline, web-based matching or dating services such as “Match.com” or“Yahoo Personals!” could be modified in accordance with the invention toallow members with portable computers or pda's having wirelesscommunication to pay a subscription fee for the ability to indicatetheir availability and current location in a manner more specificallydefined than simply distance from a zip code (e.g., “Chicago O'hareAirport,” “Starbuck's Store No. 487,” etc.). Other specially subscribingmembers who are at the same location and logged onto the system willhave their data similarly available for searching.

In yet another embodiment, existing “branded entities,” such as chainsof hotels, restaurants, bars, coffee houses, sports leagues, etc., canestablish their own dating and wireless networks and charge membershipfees for the live online dating service. For example, most chains ofcoffee houses now offer free wireless internet access. The live personalmatching system of the current invention can be programmed andestablished on the chain's existing website, with each location capableof being easily identified on the network. It is envisioned that such a“branded” live and interactive matching service would greatly increaseloyalty and business at the franchise. For example, those who have paida subscription fee at “Brand A” Coffee House, would continue to frequentBrand A even at different cities, so as to make use of the personalmatching network. Similarly, professional sports or racing leagues(i.e., NFL, NASCAR, etc.) can employ the inventive methods on wirelessor cellular networks within their stadiums or race tracks, or in bars orother social events so that they can search for matches within the moredefined pool of subscribers sharing the same interest, and being at thesame location. This “branding” enables those signed on to the network tohave some level of basic familiarity with the other individualsfrequenting the same branded locations.

In yet a further modification of the invention, the personal matchingnetwork can require consent for verification of name, date, and driverlicense number (or other form of identification) before access to thenetwork is granted, and in addition, publication of the verified data toan associated police or law enforcement agency. In this manner,participants in the matching system would be effectively screened, andwanted criminals, known sex offenders or other undesirable individualswill either avoid the system (whether “branded” or not) or be tracked bythe police criminal data base.

In a further embodiment of the invention, the above described systemsand methods can employ GPS data and existing online dating or personalmatching services to automatically indicate matches to speciallysubscribing individuals currently logged onto the network.

In still another form of the invention, the systems and methods of theinvention can be employed in retail locations to detect the presence ofa subscriber and to disseminate retail information, such as currentsales, product offerings, discounts, news, etc. If desired, the existingnetwork and wireless pda can be employed to allow the subscriber toorder, pay for, and pick up items on a live basis, without waiting inline.

It is an object of the invention to provide new and improved live-formatpersonal matching or dating systems and methods.

It is an object of the invention to provide new and improved live-formatpersonal matching systems and methods that can be employed by existingonline-dating services.

It is an object of the invention to provide new and improved live-formatpersonal matching services that can be employed on a geographicallydefined wired or wireless networks using, if desired, a one-timesubscription fee.

It is an object of the invention to provide a live-format personalmatching service that can be employed by existing “branded” entities,such as nationwide franchises, chains or leagues.

It is an object of the invention to provide improved live, computermatching dating systems and methods.

It is another object of the invention to provide an improved interactivedating network that includes the use of visual displays.

It is another object of the invention to provide an improved interactivedating network that are accessed by paying a subscription fee.

It is an object of the invention to provide improved live, computermatching dating systems and methods that employ existing communicationand computer devices.

It is another object of the invention to provide live and interactivedating games to be used in specially defined geographic locations for asubscription fee.

It is another object of the invention to provide live and interactivedating games to be used in specially defined geographic locations for asubscription fee, employing GPS systems to identify participants'location.

It is another object of the invention to provide safe, live andinteractive personal matching systems and methods that verify personaldata before allowing access to the network, and further, that allows asan option programming into the network a requirement that participantsapprove publication of their verified data with local police or lawenforcement agencies.

The above and other objects are achieved by a system and method ofinteractive and live computerized matching in which a first user isprovided with a personal data device including a wireless communicationsystem. A secure network is configured to include a server programmedwith a personal characteristic database and a database searchingalgorithm, and a wireless communication system at a specific geographiclocation that is capable of communicating with the user's personal datadevice. The first user is allowed to log on through the wirelesscommunication system to the secure network using his or her personaldata device, and communicates to and stores in the database personaldata defining his or her characteristics and those for his or her idealmatch. Either the secure network automatically identifies the firstusers precise geographic location, or the user himself otherwiseindicates and stores in the database of the network an identifyingaddress that indicates his current specific geographic location. Theuser then instructs the database searching algorithm to search for andidentify other users similarly logged on to the network at the samespecific geographic location. The user is able to initiate a search ofthe database for possible matches within the pool of other users alsologged on to the network at the same specific geographic location. Thesecure network then indicates to the first user the results of thesearch.

The above and other objects are also achieved by a system and method asdescribed, further comprising allowing any of the users logged on to thenetwork at the same specific geographic location to initiate searches ofthe database for possible matches within only the pool of users loggedon to the network at that same specific geographic location.

The above and other objects are also achieved by a system and method asdescribed, further comprising allowing users logged on to the network ata specific geographic location to initiate, accept, reject and engage ininstant messages amongst other users logged on to the network at thesame specific geographic location.

The above and other objects are also achieved by a system and method asdescribed, further comprising providing to users logged on to thenetwork at a specific geographic location an indicating device coupledto the users' personal data device and configured to display visuallydata communicated from the secure network as a result of initiatedsearches or instant messages.

The above and other objects are also achieved by a system and method asdescribed, further comprising allowing users to selectively activate ordeactivate their own indicating device or the presence on the network.

The above and other objects are also achieved by a system and method asdescribed, further comprising requiring each user logging on to thesecure network at a specific geographic location to provide a form oflegal identification that is forwarded to law enforcement agencies toallow identification of known criminals or sex offenders.

The above and other objects are also achieved by a system and method asdescribed, further comprising taking each user's picture and uploadingand storing the picture with the user's data stored in the database.

The above and other objects are also achieved by a system and method asdescribed, wherein the secure network is established as part of aservice offered by branded entities, including if desired at a specificbranded retail location. In such a system, it may be desirable torequire each user logging on to the secure network at a specificgeographic to pay a subscription fee.

The above and other objects are also achieved by a system and method asdescribed, wherein the secure network is linked to an existing onlinedating or matching service, the users logged onto the secure network ata specific geographic location are also subscribers to the existingonline dating or matching service, the users logged onto the securenetwork at a specific geographic location authorize the secure networkto access their data and preferences stored on the existing onlinedating or matching service, and the secure network conducts searches forpossible matches using the data accessed on the existing online datingor matching service.

The above and other objects are also achieved by a system and method asdescribed, further comprising allowing users to selectively activate anddeactivate their presence on the network at a specific geographiclocation.

The above and other objects are also achieved by a system and method asdescribed wherein the indicating device communicates to a user'spersonal data device using a low IF communication system. For example,the low IF communication system could operate in accordance with theBluetooth standard.

The above and other objects are also achieved by a system and method asdescribed, wherein the personal data device is a cellular phone equippedwith a display, camera and cellular and Bluetooth wireless communicationsystems.

The preferred embodiments of the invention presented here are describedbelow in the drawing figures and Description of the Drawings. Unlessspecifically noted, it is intended that the words and phrases in thespecification and the claims be given the ordinary and accustomedmeaning to those of ordinary skill in the applicable arts. If any otherspecial meaning is intended for any word or phrase, the specificationwill clearly state and define the special meaning.

Likewise, the use of the words “function” or “means” in the Descriptionof the Drawings is not intended to indicate a desire to invoke thespecial provisions of 35 U.S.C. 112, Paragraph 6, to define theinvention. To the contrary, if the provisions of 35 U.S.C. 112,Paragraph 6 are sought to be invoked to define the inventions, theclaims will specifically state the phrases “means for” or “step for” anda function, without also reciting in such phrases any structure,material or act in support of the function. Even when the claims recitea “means for” or “step for” performing a function, if they also reciteany structure, material or acts in support of that means or step, thenthe intention is not to invoke the provisions of 35 U.S.C. 112,Paragraph 6. Moreover, even if the provisions of 35 U.S.C. 112,Paragraph 6 are invoked to define the inventions, it is intended thatthe inventions not be limited only to the specific structure, materialor acts that are described in the preferred embodiments, but inaddition, include any and all structures, materials or acts that performthe claimed function, along with any and all known or later-developedequivalent structures, material or acts for performing the claimedfunction.

BRIEF DESCRIPTION OF THE DRAWING

FIG. 1 depicts possible locations for the even server and the variousaccess points to the Internet for the various embodiments of theinvention.

FIG. 2 shows one possible implementation of the computing device withany of several optional functional components.

FIG. 3 describes two possible identifier display means.

FIG. 4 shows a modem cell phone with optional functional components tobe used as the computing device.

FIG. 5 is a flow chart for the sequence of one who is likely aninitiator of a meeting or a pursuer.

FIG. 6 is a flow chart for the sequence of one who is likely passive, orwaiting to be contacted, e.g., the pursued.

FIG. 7 is a flow chart for the sequence of a likely gaming scenario forboth the pursuers and the pursued.

DETAILED SPECIFICATION

Several embodiments of the invention are herein disclosed including alocal area embodiment, a wide area embodiment, and a so-called worldembodiment. It will be appreciated that any of the features disclosedfor one specific embodiment or simply generally disclosed may beconstrued for use in any of the embodiments in which it is possible toinclude. All embodiments, as previously mentioned, are real time,geographically defined, and interactive forms of the invention. Eachembodiment can be used under a one-time subscription, ongoingsubscription, or underwritten scenario. A typical underwritten scenariomay be a business offering the service free to the user to increase thebusiness' customer traffic for example.

In a novel use of the invention, the service provider or subscriptionagreement may require that personal information be verified and the userconsent to publication of his personal data to law enforcement orpolice. Thus, users could be screened and wanted criminals, known sexoffenders or other undesirable individuals will avoid the system or betracked by the police criminal data base or other means.

As shown in FIG. 1 and FIG. 2, for the local area embodiment the devicewould comprise a PDA 30, tablet PC, small laptop, or any other computingdevice, which is outfitted with a wireless communication systems, suchas an 802.11 a/b/g WIFI 32, to communicate with a local server. Thelocal computer server may be physically in-house 16 a, or physicallyout-of-house 16 b, and may be networked via a LAN 11 to one or severalWIFI reception points 10 placed within the establishment. In the case ofan in-house server 16 a, this would typically be connected to theinternet through a gateway 12 by any of several typical means includingcable modem, DSL, satellite, T3, etc. If the server is out-of house 16b, the LAN with its WIFI reception points, is networked through anappropriate gateway to the internet, again, by any of several typicalmeans and server 16 awould serve only as a LAN host or may be removedcompletely. Thus, it is envisioned to use any appropriate method ofestablishing a local area network and, if desired, connection to theinternet. Applicant hereby incorporates by reference the followingdocuments regarding LAN and WIFI communication techniques: “802.11Wireless Networks: The Definitive Guide”, Gast and Gast; “Wireless LANsEnd to End”, Walter and Gilster; “Wireless Local-Area NetworkFundamentals”, Roshan and Leary; “Introduction to Data Networks: PAN,LAN, WAN, and Wireless Data Technologies and Systems”, Harte; “Mobile AdHoc Networks: From Wireless LANs to 4G Networks”, Aggelou; “Data OverWireless Networks: Bluetooth, WAP, and Wireless LANs”, Held; “Wi-Fi forthe Enterprise: Maximizing 802.11 For Business”, Muller; “Local AreaNetwork Handbook, Sixth Edition”, Slone; “Computer Networks: A SystemsApproach, 3rd Edition,” Peterson and Davie; “Taking Wi-Fi Beyond the HotSpot: Creating Carrier Grade Wireless Broadband Infrastructure,” PhilBelanger, VP Marketing, BelAir Networks.

Alternatively, a cell phone could be used as the device as depicted inFIG. 4 and, while it may lack 802.11 a/b/g functionality, it is easilyinterfaced to the internet through cellular service providers' network18 and geographic limitation maybe had by issuing passcodes to the userfor access to a certain server on the net used for this event or to thelocal in-house server accessible from the internet via its gateway.However, it should also be noted that cell phones 60 are appearing onthe market that are equipped with 802.11 b WIFI and these can connect tothe local network through the WIFI network points. The establishmenthosting the dating event may be, for the purposes of this event,associated with an affiliated match website 20 such as match.com,eharmony.com, yahoo.com. etc.

Should the establishment not wish to pay the expense of a server itcould simply rent “server-time” on the net somewhere or perhaps from theaffiliated match website, and it would only be required to host the wifimeans connected to the network, again by any of several means, (e.g.,dsl, cable modem, T1, etc). However, in a preferred form of theinvention, web hosting is provided only for the participants of aspecified dating event or location, so as to limit the potential pool ofmatches to visible attendees only. This server capability is referred tobelow as the event-server.

The website URL for attendees may simply be a nonpublic web address ormay be password protected, the password only being given to attendees asthey enter the establishment or subscribe to the branded location. Forexample, if “Coffee House A” has a wireless network, a password istypically required to access the network, which would allow theindividual to access the website for Coffee House A and the associatedwireless network for that location. Once logged on the Coffee House Awebsite, a second password would be entered to access the live datingfunctions, which second password could be issued only on an underwrittenor paid subscription basis.

The communication device 30 (e.g., a PDA, laptop computer or cell phone)may also be equipped with a small camera 40 and a Bluetooth transceiver34 and some sort of visual 42 or audible identification device thatserves to indicate visual information or whereabouts to othersubscribers at the same location. With reference to FIG. 3 theindication device could be LED character displays 50, a tone device, LCDdisplay, and LED array 52 or even a table top “number” such as thoseused in food service for servers to deliver ordered food to the correcttable. The point of the indicator device is to allow subscribers, ifdesired, to have a visual indication of the persons with which they arecommunicating or hope to communicate, so as to determine possiblecompatibility. Alternatively, the form of identification can simply be atrademark associated with the branded live matching system (e.g., asticker on the top of the laptop, a small decorative or electronic pinworn on the clothing, etc.), so that those in the same location can seeanother subscriber and thereafter elect to log onto the system. Such adisplay can be shaped or somehow customized into a recognizable form,worn on the clothing, and controlled through, for example, a wirelesscommunication protocol such as Bluetooth. Still further, thecommunication device may be a specially configured display customizedfor the live dating event or branded location, and handed to thesubscriber at the establishment only after logging onto the networkthrough the appropriate firewalls using valid passwords.

Applicant hereby incorporates by reference the following documentsdescribing such forms of Bluetooth communication: “Bluetooth: Operationand Use,” Morrow; “Bluetooth Application Programming with the JavaAPIs,” Kumar, Kline, and Thompson; “Introduction to Introduction toBluetooth, Technology, Market, Operation, Profiles, and Services,”Harte; “Bluetooth Revealed: The Insider's Guide to an Open Specificationfor Global Wireless Communications (2nd Edition),” Miller; “Bluetooth:Connect Without Cables,” Bray and Sturman; “Wireless Lans And Bluetooth:Wireless Networks And Mobile Computing (Wireless Networks and MobileComputing, V. 4),” XIAO and Pan; “Designing a bluetooth-based wirelessnetwork for distributed shipboard monitoring and control systems(U.S.N.A.—Trident Scholar project report),” Hoover.

In any of the embodiments employing some form of a controllable visualindicator built into or attached through a communication port to theuser's PDA or computer, the device may be operated to flash in a certainorder or display a certain character or figure, depending on thelocation, the user, and/or the compatibility levels of otherparticipating users of the network. The display could also be anycomputer generated game characters that may optionally be associatedwith this live, interactive matching system, such as trademarked symbolsand may also be used to help others visually identify the subscriber.Also, the aforementioned computer or electronically controlled displaycan indicate any of the computer-generated characters associated withthe invention. Any of this functionality could be built into thecomputing device or could simply attach to it through some expansionmeans like USB or RS232 or even a custom interface which might benecessary for a cell phone or otherwise. Furthermore, not all of theaforementioned functionality needs to be present all the time. Forinstance, one may only need the camera to snap a user's picture uponentering the establishment not needing it again for the rest of theevent. In this way, functionality may be shared, disabled, or swappedwith other functionality dynamically as the need arises.

Similarly to the various display mean contemplated above, sounds mayalso be used as an identifier or indicator. For instance, upon selectinga match to be met, a certain sound file, or ringtone in the case of acell phone, may be caused to play on the intended target's device (PDAor cell phone). Such sound file or ring tone may be preloaded on thedevice, downloaded to the device via the event server, dynamically ondemand or in background or to any other schedule chosen. It iscontemplated the sound file or ring tones that the target device isusing may even be selected by the individual searching for the target sothat he is searching for a familiar song or ring tone. Additionally,sounds or ring tones may be used to indicate status changes such asindividuals leaving or becoming available, indicating a new match hasbeen found, or perhaps a perfect match discovery. Such ringtones canalso be employed to indicate the degree of match, with differentringtones associated with different degrees of compatibility.

When a participant enters the establishment, he or she either picks upone of the appropriately equipped PDAs, laptop, etc. linked by WIFI tothe event server (directly by LAN or through the internet), or employshis or her own computer or cell phone as the communication device. Onceappropriately logged onto the matching network, the user can instructthe event's server to obtain a copy of his profile from an affiliatedmatch website 20 that already holds his or her profile, a non-affiliatedmatch website 22 that has his profile, or fill out a profile informationon the event server. The latter two cases are considered non-affiliateddating events. Now, the user can instruct the event's server to give himor her the corresponding match information of all the other attendees ofthe event who have elected to log onto the system and publish theirdata. The data for various attending users can be searched and sortedbased on the pre-existing algorithms of the affiliated match site thatthe attendees of this event use. From this match information, the usercan view the profiles and make a decision of those individuals logged onat the specific event that he or she would like to talk to and get toknow further. Once the user decides who he or she wishes to speak withor meet, one of several scenarios can take place for them to contacteach other using for examples, cameras, email, visual display or audibletones.

It is also possible for example, in the case of renting server spacefrom an affiliated match site and using this as the event server, thatthere is no physical transfer of profiles from one machine to another.Instead the affiliated match site's server simply limits it's search toa subset of profiles representing the people at the event, or perhapscreates a special database for this event and moves the profiles intothe searchable database.

In another form of the invention, the event may be dynamic, with peoplecoming and going. In this form of the invention, it is envisioned thatan attendee could instruct the event server to routinely performmatching at defined time intervals, say every 10 minutes or so, andinform him or her of any changes in matched people due to newparticipants or due to attendees leaving or otherwise becomingunavailable. This sort of dynamic matching would also easily facilitatean individual being able to enable or disable his profile from the matchprocess based on his current status. For instance, if a participant hasmet someone and is engaged in a conversation, he may not want to bedisturbed for the time being while he talks and gets to know the personhe is with. If he later decides to allow himself to be matched, he mayenable his profile again allowing others to potentially match hisprofile and perhaps contact him.

Typically, user's of the establishments dating services with fall intotwo categories. Those who are initiators (who actively seek and meetpeople) and those who are passive (wait to be contacted) FIG. 5 showsthe likely steps for the initiator role and FIG. 6 shows the likelysteps for the passive role. Of course, any combination of these stepsmay be followed as well, for instance, one may be acting as an initiatorand be contacted by someone else, in which case he would assume thepassive role for the purposes of the flow charts of FIG. 5 and 6. Oncean individual has a pool of matches from which to select, the user maywish to contact one or many of his matches. In one case the individual,by using the PDA, may simply attempt to open a local chat session withthe individual he would like to meet. This chat session can be hosted bythe event server or by any of the several chat websites on the net(e.g., Yahoo. AOL msn, etc), as long as the individuals are connected tothe internet via the PDA or computer. Alternatively, the individuals mayuse email, sms, or any of several text, voice, audio, or video messagingsystems or methods. The recipient of the query can either respond to theinitiator's query, elect not respond to the query, or otherwise blockother queries at his or her selection, for example, after seeing theperson visually (due to the display device or seeing a picture on thepda screen) or reviewing the profile of the initiator. In this wayindividuals can “break the ice” with one another and decide if they wishto meet further without ever having to actually meet face to face.Should they decide to pursue further, they can choose a physical placein the establishment where they would like to meet, say a specific placeat the bar or specific booth or specific window or they can search forone another as described below.

In accordance with another variation of the invention, an easy method isprovided for two people to meet that would be as follows: most activeprofiles at the major match web sites would contain photographs, and forthose individuals who do not have photographs the PDA, computer, or cellphone may be equipped with a small web cam, similar to the cams embeddedin the modem cell phones, whereby the user can take a picture of himselfor herself and include the picture with the login or password data whenhe or she gains access to the network. In this manner, those individualson the network can view pictures of the potential matches who elected topublish pictures or who enabled the viewing of their profile picture atthis event. Alternatively, pictures can be stored on the event-serverseparately but linked to profiles through a database, or they may bestored as part of the profile, or they may be stored in each individualcomputing device and only disseminated by specific request. Once a userviews the image or picture of a potential match, and the associatedprofile, the user can wander around the establishment in search of theselected individual and get to know them face to face, therebyeliminating the chat contact step altogether.

Another method of identification would be for the PDA or computer itselfto have some visual rendering of an identifying mark such as a paintednumber or a painted letter on its case. When an individual loads his orher profile to the event server, the identifying mark associated withthe PDA or computing device is likewise associated with the profile onthe event server through a linked database or other means. The user maythen go in search of the appropriate mark-bearing PDA or computingdevice associated with his or her target match. This method hassimplicity that any individual not wanting to be found can simply puthis PDA in his pocket or purse, out of site of other would-be matches.This method could of course be used alone or in conjunction withchat-first contact described above. Again, the individual could havefull control over the dissemination of his associated “mark” through theevent server as well, thus granting the user the opportunity to view theprofile of a would-be match before deciding whether to grant access tohim or her.

Yet another method of identification similar to the above but moredynamic would be to equip the PDA or computing device with some kind ofrelatively intense display device that can be easily viewed by otherpeople at a distance. This could be an array of LEDs arranged in a grid,a simple LED character display, or some other display of that nature.When the individual picks up the PDA or computing device at theestablishment, he or she chooses which identifying mark he or she wouldlike to have displayed to the potential matches, in a manner similar tothe use of personalized icons for internet instant messaging services.The selected identifying mark would be stored in the event server andassociated with the user's loaded profile. This method allows theexpression of individuality that seems to be an important point ofsingle's clubs. Alternatively, the identifying characters could becomputer generated game characters (either associated with the inventionor not) that may be displayed by the device, or capable of being affixedto the individuals device, clothing, etc. These identifying characterslikewise would be associated with the profile in a database. Theindividual still has complete control over which recipients or potentialmatches are allowed to know his or her identifying mark (as with theabove examples), or the user can elect disseminate the mark throughoutthe location (i.e., globally enable dissemination). Still another methodof identification would be to equip the PDA or computing device with areduced-range Bluetooth transceiver having the range limited to perhaps,three to five feet, as an example. This can be done by several means theeasiest of which would be to simply reduce transmitter power of eachBluetooth device. Another way would be to shield the Bluetooth antennaso as to attenuate the signal. In any case when two people wish to meetthey may enable their Bluetooth transmitters to seek out each other bytransmitting a unique code signal that only the other person's PDA wouldbe aware of. Similarly the other person's PDA would also have a uniquecode that only the first person's PDA would be aware of. These codeswould be negotiated through the server, assigned by the server, orchosen by the parties, either prior to this point or when the twoparties indicate that they wish to seek out each other. Then the two canwander around the establishment in search of the other, knowing thatwhen they are within some short distance of the each other's computingdevice, the devices will indicate such proximity via their display, orby other indication (i.e., audible ring tones, buzzing, etc.), therebymaking the match quest something of a game, which also seems to besomething of interest in dating.

Yet another variation on this approach, the Bluetooth receiver is madehighly directional, while the transmitter would be relativelyomni-directional. This could be accomplished through the use of a highlydirectional antenna for reception, and an omni-directional antenna forthe transmitter, for example. Configured in this manner, the PDAs wouldact as directional “homing” devices. This would again add to the gameeffect, for example, while one person may match many seekers, theseekers, by their homing PDAs would have to locate the one match. Inthis manner, the first of the seekers to locate the match would havesome priority (if the match is accepted) as others would have to waittheir turn. Thus, an individual would have to decide to wait and risknever being considered by the one (perhaps he or she was happy with thepreceding match), or elect in turn to pursue another potential match.

This gaming concept can be generalized in several different directions.One possibility is to generalize the above example of one (i.e., the“match”) and many (i.e., the “seekers”), to two groups, A and B. Theindividuals in groups A and B each have at least one match in the othergroup , but, as an example, say the number of matches in group A is lessthan the number of seekers in group B. In this case, perhaps the gamedoes not notify group A of matches, it being the smaller set, but doesnotify Group B of the matches. The event server may download the sameidentifying code to all of A and inform B of that code and allow onlyB's to look for A's. Knowing that they are in a larger set, the B's whodo not find first, face some potentially difficult choices as outlinedabove. Likewise, the A's face decisions too in that they have to decideto accept who found them and risk losing someone better, or reject whofound them and risk being stuck with nothing but worse matches.

Similarly, multiple groups can be allowed to play and not all groupsmust match each other. For example, men could be one group and womenanother group with only men being allowed to be pursuers, but where eachman is pursuing a list of potential matches which may or may not bedifferent from every other man's set. Furthermore, each man may beinformed of how many of his matches are matched by others, who they are,and how many matches each has. Likewise, the woman's match set may beunique from all other women, or may share some matches, or share theentire list, etc., or not. She may or may not be informed of how manymatches she has, who they are, how many other women they match, etc. atthe implementer-of-the-game's discretion.

While all possibilities of implementations are contemplated, one primarygame strategy is to make some individual(s) the likely pursuers/seekersand others the likely pursued/matched and the typical steps for thisscenario are depicted in FIG. 7. One way to do this is to allow someindividuals to have superior information with regard to otherindividuals (about matching, location, etc) such that they are madelikely pursuers. The gaming aspect may also have a risk/reward componentas further enticement to play and this can be accomplished by ensuringthat none of the participants have sufficient information to completelyeliminate all risk (e.g., risking the best match for them, riskinghaving a match at all, etc.) from any decision that they contemplate andultimately make with regard to a specific match or strategy (thereward). The game can be played with all being informed of theirmatches, or only subsets informed, such as groups, unions of groups,intersections of groups, or subset of groups. The permutations of playare endless and these examples are offered to effectively teach theparameters of possible games but are not meant to limit the disclosure.Those practicing the invention will certainly modify these examplesoutlined and still be within the spirit and scope of the invention.

Yet another contemplated use of the invention is to allow or conduct aninterview process between potential matches. In this scenario, everyonelogged in to the system would receive information regarding their matchalong with specifically designated area's around the facility or definedgeography to meet the match. For instance, the server could direct somepeople to others by sending them to the designated areas or locations.Alternatively, a schedule of areas to meet, and individuals to meet atthe areas, could simply be posted or disseminated over the network fromtime to time. Once in the presence of a matching individual, the twocould sit and engage in conversation, getting to know each other andtaking notes on the positive and negative qualities of each other. Thesenotes could be stored in the computing device and associated with theperson's profile. The two could use a standardized interview form thatis event or site provided, the answers to which could be used by thecomputing device and/or server to help rank order a persons matchesbased on interview results. The standardized interview results couldalso be used in the interim to help pare a person's match list based onresults of other interviews. The getting-to-know-each-other period couldbe of a predetermined fixed length, say, 15 minutes, for example, at theend of which time one or both could be directed to other predeterminedspots to meet another match wherein the process is repeated. At the endof the event, an individual might select his top several match choicesand inform the server, automatically or otherwise, to see if any of histop choices also selected him as one of their top choices. If so, thetwo could then arrange a more private meeting or a date subsequently. Inthis way, an individual can orderly meet his matches based on profilecriteria, interview them for their more esoteric or personal qualities,and refine his choices with no one's feelings hurt all the while beingassured that he had a large sampling of people at the event from whichto get acquainted and make his top choices. He may then determine if anyof his choices also chose him.

The above process also allows negative feedback to be left should anyindividual act inappropriately or otherwise in violation of prescribedguidelines established either by the matching sites or the brandedgeographically limited locations. In this manner, much like eBayparticipants receive positive and negative feedback, a person's “rating”can provide some level of comfort (or discomfort) for thoseparticipating in the matching program.

It will also be appreciated that while the above examples whereillustrated with Bluetooth technology, their implementation is by nomeans limited to Bluetooth. Practically any RF transceiver can be madeto perform the necessary functionality.

In the above described scenarios, association with an affiliated matchwebsite and use of its match algorithms was described. However, it isequally feasible to practice the invention without an affiliated websiteand without any matching being performed. In this case, when anindividual enters the establishment, the user causes his or her profileto be transferred from any website that may contain it to the eventserver, or the user may simply fill out a profile form on the eventserver. In this scenario, everyone would have access to all profiles(unless a user blocks access) and may peruse the database at his or herconvenience. Alternatively, a user may elect to only view profiles ofindividual fitting his or her select criteria (e.g., only unmarried,petite, female, non-smokers between the ages of 30-35) with suchfiltering being performed by the event server. Once the individual has alist of those he would like to meet, he may attempt to meet thepotential matches using any of the above-described or other availablemethods (e.g., contact by chat, seek by picture, seek by PDAidentification, etc.).

As part of its house keeping duties, the event server is configured tokeep track of newly arriving profiles and expiring profiles (eitherbecause the person left, or because he initiated a “do not disturb” lockon his profile or simply wishes to be hidden or cloaked). The eventserver may also periodically notify the participants on their computingdevices of these changes. The notification could take the form of aspecial icon or sound for arrival, departure, etc. It is envisioned thatsuch icons or sounds could be uniquely created so as to be associatedwith the specifically branded matching sites or locations. Additionally,in the case of the game or otherwise, the server may be required to sendidentification codes to the devices, arbitrate which devices can “find”other devices by enabling certain transmitters and receivers, keep trackof those who may have removed themselves by finding themselvescompatible with another or for other reasons, etc.

It will be appreciated that any combination of the above-describedscenarios is also possible. It is further contemplated that aparticipant maybe be allowed to go outside of the event server in searchof matches since not all people at an establishment may, in fact, beparticipants. For instance, a participant may ask for matches from theevent server, and finding none to his liking, he may then go into anon-affiliated, non-event search scenario in which he peruses theprofiles of individuals at certain websites in the hopes of finding amatch at this establishment.

The primary elements common to most forms of the invention are: (1) eachindividual must have some form of computing device or other PDA; (2) thecomputing device or PDA should be connected to either a speciallyconfigured local area network and/or the internet; (3) the computingdevices or PDA must be able to access an event-server containing theprofiles of voluntary participants in the matching process; (4) thereshould be some level of security and password, or other form ofqualification process that limits and monitors participant access to theevent server, and also indicating approval to disseminate profile datato other voluntary and qualified participants; (5) the event server oraffiliated matching service are configured with appropriate algorithmsto query the qualified database of participants in accordance withselected criteria to determine matches; (6) the computing devices musthave the ability to receive and indicate potential matches from thequalifying pool; and (7) those participants who match should be able tocontact one another either directly or in accordance with define “game”protocols only if both participants wish to engage one another indiscussion; and (8) participants should be able to disengage, hide orotherwise cloak themselves from any stage of the process if desired. Inthe above scenario, it is of course contemplated that the level ofcontact can be defined and limited by the participants in accordancewith all of the various permutations discussed hereinabove.

In another preferred embodiment of the invention, the systems andmethods are configured for relatively wider area networks. In that casecomputing means such as the PDA or laptop would be outfitted with aBluetooth transceiver and a means to connect, preferably wirelessly, toa larger network. Such connect means could be 802.11 n or a cellularmodem such as a GPRS modem or CDMA modem for the current cellularnetworks, or some other cellular means of connecting to the wider areanetwork (such as the internet, or other wider branded network such as aNASCAR, NBA, etc.). The computing device may also be equipped with a GPSreceiver for determining and disseminating to others (with approval orautomatically) a participant's physical location. Some method of displayfor identifying each participant in a manner similar to those discussedabove is also contemplated. Such a display device would connect to thecomputer device via USB, firewire, rs232, etc. or be attachable orfixable to the device, clothing, etc. However, this is not absolutelynecessary particularly when using GPS and/or pictures to identify thepotential whereabouts of the matches. It will be appreciated here, as itwas in the last embodiment, that the modem cell phone, potentially withBluetooth, GPS, CAM, etc. can be used very effectively as well.

The operation of the inventions in the wide area mode is very similar tothat of the local area embodiment. In this case a user, through hiscomputing means, would log onto the Internet or directly to the widearea network via the cellular modem or 802.11n device and would thenlogin to an event-specific Web address reserved only for participants ofthis event (e.g., a particular NASCAR race, concert, beach location,island vacation, freeway, etc). The web address would be hosted by anevent-server just as in the local area model. When the individual logsin he causes his profile to be downloaded to that event server from theaffiliated match host web site or otherwise. The user would have similarcontrols as to the above example as well, i.e., the ability to controlwho can match him and when, the ability to display a picture, theability to display a special character, the ability to have matchingdone dynamically (e.g. every 5 mins or even continuously) to account forattendees coming and going etc as part of his profile. Matches for thatindividual are then displayed on his computing means. As in the localarea embodiment description, a picture may be displayed to help inidentification of intended matches. The individual may open up a chatsession or communicate by other methods with another member at the eventas above. If they find themselves compatible, they may agree on aspecific location to meet, they may decide to exchange pictures to helpidentify one another, they may exchange display identification codes forthe led display panel, they may exchange GPS coordinates, or they maydecide to home-in on each other via the Bluetooth transceiver, again,used as a proximity detector or as a homing indicator.

In the case of the Bluetooth proximity detector, the two matchingparticipants would have each other's identifying code, and only whenthey are within the Bluetooth transmission range of each other, wouldtheir respective computing devices indicate that their intended matchesare within range. Open range Bluetooth transmission is about 100 feetand for a wide area event that may be enough to allow for a picture orother indication to identify the match physically. However to get closerto the intended match through the Bluetooth means, once the Bluetoothtransceiver has begun to receive the code of the intended match, thecomputing device or user may command the Bluetooth transmitter power tobe ramped down in a prescribed manner so as to act something as adirectional signal for the individual to get even closer as describednext.

For instance once within 100 feet of the individual and the Bluetoothtransceivers have found each other the individual could select throughthe computing device that the Bluetooth transmitter of both devices beramped down 10%. Now only when 20% (in accordance with the inversesquare law) closer to that individual will the Bluetooth transmittersagain capture each other's signal. Again, the transmitter could beinstructed to reduce the power by another 10% for both transmittersthrough my computing device and again only when 20% closer would thereceivers lock. In this way, the individual is given a crude form of ahoming signal or at least a directed vector (provided one keeps track ofhis progress) to the individual for whom one is searching. Also, thedisplay screen of the device could be used to keep track in accordancewith the above description and display an arrow or some other indicationof the track.

In a similar vein, the computing device could keep track of the receivedstrength signal indicator (RSSI) commonly found in Bluetooth transceiverchip sets and as the person wanders around, software on the computingdevice would determine the likely direction of the target. One suchmethod of determining target direction would be for the computing deviceto analyze the gradient of the RSSI map (automatically created from anumber of sample locations) and could then determine the most likelydirection to the target by finding the minimum gradient with maximumRSSI.

GPS is particularly helpful for the wide area event because it gives aperson's location at relatively short periodic intervals. The computingdevices may be programmed such that once parties decide to meet, the GPScoordinates of each are constantly transmitted to the other via theirinternet connections or their direct wide area network connection. Inthis way, the two can find each other even with neither beingstationary. While current GPS resolution is limited to about 10 feet, apicture on the display device is more than sufficient at this distanceto find the target individual. Once close enough, a picture may serve toidentify the individual visually or both may elect to use some otherform of visual display (e.g., an LED display or pin attached to thearticle of clothing) which is easily visible and which displays somesort of unique symbol that can be identified. This symbol may be givenonly to selected individuals or be globally available at the choice ofthe one who holds it.

As with the local area event, the wide area event can work quite wellwithout an affiliated and pre-established internet matching service. Itsoperation would be quite similar to that of the local-area,non-affiliated dating event in which the event server would simplyobtain profiles from websites on the internet and run proprietary oropen-source matching algorithms. Of course, combinations of bothaffiliated and non-affiliated scenarios are anticipated as well.Finally, the dating games as described under the local area eventdescription can be just as easily implemented for the wide area event aswell. And, just as in the case for the local area event, while thedescriptions here were to some extent illustrated with Bluetoothtechnology, the implementation is certainly not limited to Bluetoothtechnology for those intended functions. Any RF transceiver can be madeto perform the necessary functions, including, AM, FM, etc. radiotechnology.

Yet another form of the invention requires very little hardwaremodification to existing computing devices, and in essence requires nohosting except for the main match website or a server on anestablishment's website that is accessible via the internet. Forexample, modern cell phone already have the capability of connecting tothe Internet, using a micro browser, and likewise, include a camera,Bluetooth communication systems, and GPS. In that case all the hardwarethat is needed is potentially in the cell phone and the cell phonenumber could be an individual's unique identifier.

In this embodiment, a local server on an establishment's LAN (such atCoffee House A) is employed in addition to an affiliated match website.Of course, the local server could be physically located anywhere and isnot physically constrained in any sense, but is at least logicallyassociated with a particular branded group or establishment whereindividuals that are actively searching for matches are willing to befound. Each such participant would allow his or her profile to be storedon that server and could selectively enable or disable access to theprofile to allow searching to be conducted by potential matches. In thatcase the server performs the match of the profiles and then theindividual can look at those matches through his cell phone via a microbrowser. The individual could have a picture downloaded foridentification, could chat with the individual either by SMS, or any ofthe cell-ready chat services such as Yahoo, AOL, MSN, etc., or by email,etc. to further get acquainted with the individual. If desired, the twoindividuals could decide on a specific place to meet and could use theBluetooth, GPS or other homing methods discussed previously to helplocate each other. This form of the invention could be used by specificfranchises or branded groups as a subscription service accessibleanywhere in the world (e..g, to find a NASCAR fan in England). It wouldbe of potential great benefit for travelers who are single looking formatches within a more-limited universe of interest and geographic area.

Of course to implement the network in an area that is relativelyunlimited from a geographic perspective (in the most extreme case,worldwide), some method for narrowing searches would be necessary. Inthis case, it would be preferable to use an existing internet baseddatabase or matching network, or the network of an otherwise brandedestablishment. Most of these services are configured to enable users ofthe network to search for and identify particular locations withincertain geographic definitions. However, the disclosed inventive methodcontemplates limiting searching to both geographic boundaries and atleast a commonly defined geographic characteristic (such as certainStarbuck's Coffee House in New York City or a Holiday Inn in Chicago,etc.). These networks can further limit participation to a predefinedradius centered on a current physical location, participatingestablishment (building, apartment, hotel), or any other geographicallydefined place (e.g., concert hall, stadium, mall, race track, etc.).Most internet based matching services already allow some form ofgeographic focusing of the search using proximity to an existing zipcode. The current invention comprises modifying these databases andsearch tools to identify participating branded establishments, streetaddresses or groups located around the world. For example, if Starbuckselected to participate in the matching service, the existing databasewould be loaded with data enabling users to search for matches atparticular Starbuck's locations.

More generically, users may input a specified ZIP code and instruct thesystem to identify matches within a defined radius of a set number ofmiles from the zip code. Zip codes are almost uniformly in use nowthroughout the world though they may have different format than is usedhere in the US. It certainly is easy enough for an individual once in acertain location to find out his or her postal code (which is thegeneric name for ZIP code.) Other scenarios include defining the searchspace as Starbucks store #347, Indianapolis raceway, Soldier Stadium,the Ritz-Carlton hotel, etc.

It is also contemplated that an individual's profile could be renderedavailable and unavailable automatically based on the person'swhereabouts. For instance, an individual, upon entering an establishmentmay have his presence sensed by local means and his profile madeavailable for matching to those people looking for matches who are atthis establishment. To illustrate, an individual may subscribe, forexample, to a matching service provided by Chain X (Starbucks, NASCAR,Holiday Inn, etc.). Upon entering an establishment of Chain X, theperson's presence could be sensed by any of several methods. Forexample, the establishment may provide wireless networking means (suchas Bluetooth, 802.11 a/b/g, etc) and the person's cell phone could beconfigured so that it automatically negotiates with the wirelessnetworking means and upon completion of a predetermined authenticationprocess and identification of the individual (for example, by his cellphone number, an assigned user number, his name, etc), the individual'sprofile would be marked as available and present in that establishment.As a further safeguard, the individual may be queried and required toconfirm making his profile available to searches of this establishmentor chain if desired. Additionally, the individual could be queried as towhether he would like to try the latest offering of the establishment(say, the latest flavor of the month in the case of a Starbucks), hecould confirm or deny and receive an order number if he should confirm.He could even pay for the item via credit card over his cell phone, forexample.

A person could conceivable belong to any number of ‘local’ or corporatedating networks confident that users in those locales or establishmentscan search and match him no matter where he is, automatically. Thus, hecould be in a coffee shop, recognizable and searchable to clients there,leave, arrive at a hotel, have his profile automatically renderedavailable to clients there, etc.

A further use of this aspect of the invention provides that the user'sorder habits or purchase habits within this chain or establishment betracked by any means and that offers or information made to him betailored according to his previous habits. In this sense, the cell phoneserves a similar purpose to a cookie as used by internet sites. Forexample, a computer server associated with the chain store may beinformed by the wireless networking means, that cell number xxx-xxxx (orJohn Doe or user number yyyyyy or media access number (MAC) zzzzzzzz)has just arrived. The chain server may then search its user database andtailor a query to the individual asking the individual if he wants hisusual food, beverage, the special of the day, etc. In another example,an individual may enter a chain store (such as a WalMart, Sears, Target,etc), have his previous buying habits recognized by the chain store andthen be informed of specific ‘specials’ or sale items that may be ofinterest to him based on his previous shopping purchases or habits. Hemay also be informed of certain coupons or rebate forms that are onlyavailable at this store.

In many cases, where the individual is identifiable and theestablishment has an internet and traditional brick-and-mortar presenceand where the local network is connected to the network, a person'sonline habits and interests could be used to determine what informationis sent to his cell phone by the local network and vice versa (that is,what information is sent to him via the internet when logged on there).For instance, a Barnes and Noble local network, sensing an individualentering and identifying him, may reference his internet habits and/orpurchases to tailor information sent to him on his cell phone by thelocal network. As an example, it may be known from his internetpurchases that this individual is a sci-fi fan and so he is made awareof the latest sci-fi releases or perhaps the person purchased a bookthat was back-ordered at the time of ordering from the website but thatthis store happens to have and so he is informed that he may pick up hisbook at this establishment. Similarly, a person may have tried topurchase an item online but cancelled his order due to too long ofdelivery time, expense, etc. but that item is available in the store, oris on sale, etc., and so the local network can inform him of these factsso that the establishment has an attempt to recoup lost sales.

In yet another example, an individual may enter a chain store but not beindividually identifiable. That is, it may only be possible to identifythat a new cell phone has entered the establishment (by, for example,negotiating with its Bluetooth signal or WIFI signal but not be able toidentify anything with regard to its owner. In this case, generic storeinformation, sales information, specials information, etc can bestreamed via the LAN network connection over the wireless interconnectto the cell phone to inform the user. In this case, the individual couldbe offered special enticements in order to have him ‘join’ theestablishment's network so that he can be tracked in the future (e.g.,receive a free liter of diet Coke for joining Walmart's preferred buyersnetwork.) Even if he should elect not to join the establishment'snetwork, the invention contemplates the storage of cookie, that is, asmall file or marker data that helps identify this cell phone or user onsubsequent visits to the establishment's network, so that the next timehe enters the establishment, some different advertising, perhapstargeting his return, issuing a welcome back message or at leastrecognizing his previous visit(s), can be sent to his cell phone fromthe local network via wireless interconnect.

The present invention may also serve as a programmable point of saleterminal. An individual, entering an establishment has the presence ofhis cell phone sensed by its emission of the Bluetooth, WIFI, etc.signal. The establishment's network negotiates and connects with theindividual's cell phone and upon such connection; the establishmentdownloads order information to the cell phone and/or asks the individualto place his order. For example, most fast food establishments havetheir order menus plainly visible to customers. With the presentinvention, upon entering, say a McDonald's restaurant, the user isconnected to the in-house network and walked through the orderingprocess. For instance, he may be asked if he wishes to order thefamiliar McDonalds Meal Deal and if so, select which one (by number).Alternatively, he may choose to order specific items, in which case thenetwork may ask him which sandwich he wants, ask if he has anymodifications to the standard sandwich, whether he wants French Fries,whether he wants a drink, dessert, etc. Advantageously, the network canwalk through the ordering process consistent with the establishment'scurrent process, procedures or methods of ordering, thus seamlesslycutting out human order takers for at least a large portion of orders.

Automatically determining that the individual has left the network canbe used to advantage as well. It is quite easy to make suchdetermination. For instance, most large stores now have foyer entrances(where perhaps shopping carts, vending machine, etc. are kept. Sensingthat an individual has entered a foyer by his Bluetooth or WIFI signaland knowledge by the system that he was just in the store or is stillconnected to the network could be used to determine that he is leaving.Alternative, sensing his Bluetooth or WIFI signal passing a certainpoint (with a localized sensing device, i.e., a Bluetooth or WIFIreceiver desensitized in a way that it will sense the signal only whenin very close proximity to the transmitter) is another way of sensing aperson's probable leaving. This type of sensor could be placed at thesame place as the familiar merchandise scanners that are used to detectthat an item is leaving the store without having been paid for. Both ofthese methods have the advantage that the user is still connected to thelocal network and sensed that he is exiting, leaving some time for thenetwork to send exit-information to his cell phone. Other methods forexit detection that determine exiting but that have the user no longerconnected to the local network of the establishment would be selfsufficient, sending exit-information to the person concurrent orslightly after sensing him leaving.

Possible scenarios that may take place on exit sensing include a hotelchain can schedule house keeping services based on whether theindividual renting a room is in-network (on premises) or out-of-network(off premises). A chain store's network, upon sensing an individualleaving, may cause a special ring tone associated with that chain to beplayed on the user's cell phone by downloading it to the cell phone viathe wireless network connection. A Starbucks coffee shop may elect tosend to the person's cell phone via its network that he is the millionthcustomer served, or McDonalds may send to his phone that he was the98,578,438,230^(th) hamburger sold, for example. A grocery store chainmay inform the individual via it's network to his cell phone, that hewas the 100,000^(th) customer and that he can return and receive a cashcheck for $1000.00 just for being that customer. A bookstore chain mightinform a customer that this is his 20^(th) book he purchased and he isentitled to a free book the next time he visits. A submarine sandwichshop may tell the individual that he has purchased his 6^(th) sandwichand that the next one is on the house. Local and chain establishmentscan advertise these features as a way to entice the public to join theirnetworks (and thus be tracked) and in some cases, if the benefits ofbeing part of the network are sufficient, the establishment may be ableto exact a subscription fee (for example, dating services, or a bar mayoffer to have a subscription to its free drink network offering, forexample, every 50^(th) customer on Fridays a free drink). Advertising ofthese features can also be used just to increase traffic at theestablishments, requiring or not requiring, registration.

It is important to note that any of these aspects of the presentinvention do not require the use of a dating service to be usefulhowever they may be quite profitably used with such service. Similarly,connection with the internet is not necessary, this aspect of theinvention being utilizable in a local network environment only, butconnection to the internet by the local network can greatly enrich theexperience of the individual provided by the establishment in manycases. All that is required is a local network, a wireless interconnect,and a individual with a cell phone equipped with wireless interconnecttechnology (e.g., Bluetooth, 802.11 a/b/g WIFI, etc) and softwaremethods, herein described, to automatically detect and connect with thecell phone. Ideally he would be a recognizable ‘member’ of the localnetwork, either by subscription, election, cookie, etc. but even that isnot necessary. However, if he is individually or uniquely recognizable,tailoring of advertising, services, specials, promotions, etc can beperformed to the mutual advantage of the individual and theestablishment. Even if not individually recognizable, automaticallyconnecting the local network to his cell phone offers compelling costsavings for business. For example, using the individual's cell phone asa programmable point of sales ordering terminal (recall the McDonald'sexample above) can greatly reduce human overhead (i.e., order takers)and the costs associated.

One final method of identifying an individual contemplated is by thechain or store to team up with a cellular network provider. In thismethod, the establishment would be equipped with localized cellularsignal sensors and having access to the cellular service providers'database could determine the cell phone's number, user, etc. from thecellular signal emitted by the cell phone when in the establishment.Also, the establishment could attempt to connect the cell phone to itslocal network via the internet over the cellular signal to the phone oreven directly to its local network over the cellular signal without theinternet. It could even call the cell phone with a prerecorded messageabout store specials or other information of interest. It is furthercontemplated that cellular service providers could do this alone,perhaps renting space for the sensors in the store and then offering theservice of customized advertising to client chain stores. Or in somecases, the cellular provider might offer the capability to practice theabove methods as an enticement to the consumer to purchase cellularservice from them (e.g., Verizon offers the Wal-Mart shopping networkexclusively to its customers for example.)

Returning to the dating aspects of the invention, in still another formof the invention, an additional item of information may be voluntarilyincluded in the database of users indicating a participant's willingnessto be physically met. If a user is a highly populated area, such as NewYork or Chicago, and performs a search to identify matches within even arelatively small radius of postal code, one may receive hundreds ofpotential matches. Using a cell phone and an associated text messagingor chatting program could become quite cumbersome to contact each ofthese matches to find out if any of the potential matches were evenwilling to physically meet a potential match. A code or factor may beprogrammed into a profile, which indicates a participant's willingnessto meet physically. This data may comprise one digital bit that the userselects or clears to indicate his or her willingness to meet, therebygreatly reducing the number of matches, or at least greatly improve therelevancy of the matches, found for the intended purpose. However, it isnot a necessity to have this feature in order to practice the disclosedinventions.

It should be relatively easy to see that the third embodiment can beused to practice either of the other two methods of operation, i.e.,local area or wide area. It does not have quite the customization ofthose methods but it would certainly work. All an establishment ororganization would have to do is be willing to host such an event andarrange some event-serving on the web for participants only. This couldbe a great gimmick for bars or restaurants, bowling alleys, or whateverat very little cost and the use of the automatic profile enablement withsubsequent queries to the user soliciting his business (e.g., buy thespecial of the day?) could be quite profitable.

In accordance with the above-described inventions, it is contemplatedthat the participants may not only search for individuals that match hisor her criteria, but in addition, users may search for those individualsfor whom he is a match. In other words, it is common for one of twoparticipants to match the other's criteria, but it is not as common forboth participants to match each other's criteria. Thus, it may bedesirable to find out the degree to which you (as a user) match theother participant' criteria. Still further, the degree of “mutualmatching” may be indicated. In this manner, any permutation of matchingcan be searched for and determined.

1. A method of interactive and live computerized matching using apersonal data device having a wireless communication interface connectedto a wireless network and associated with a first user, comprising: a)configuring a server on a secure network to include a personalcharacteristic database and a database searching algorithm, andconfiguring the server to communicate with the personal data device viathe wireless communication interface of the personal data device; b) theserver wirelessly receiving a log on request from the first user'spersonal data device; c) the server storing a personal characteristic ofthe first user in the personal characteristic database; d) the serverautomatically detecting and automatically storing the first user'scurrent geographic location as a branded location; e) the serverreceiving a search request initiated by the first user via the wirelessnetwork; f) the server transmitting search results to the first user'spersonal data device identifying at least a second user from among aplurality of users that are logged on to the network at the brandedlocation, and g) further comprising the server requiring a form of legalidentification from the first user at least once at some time prior togranting the first user access to the personal characteristic databaseon the network.
 2. The method of claim 1 further comprising the serverreceiving a command from the first user to perform any of initiating,accepting, rejecting and engaging in instant messaging with another userfrom among the plurality of users.
 3. The method of claim 1 furthercomprising the second user having a personal data device and associatingan indicating device with the second user's personal data device,wherein the indicating device is configured to display search resultscommunicated from the secure network as a result of the search requestinitiated by the first user.
 4. The method of claim 2 further comprisingassociating an indicating device coupled to the first user's personaldata device, wherein the indicating device is to display datacommunicated from the network as a result of instant messages.
 5. Themethod of claim 3 further comprising the server receiving a command fromthe first user to activate or deactivate the indicating device.
 6. Themethod of claim 1 wherein the server requires the first user to providea form of legal identification again prior to granting the first usersubsequent access to the secure network.
 7. The method of claim 1further comprising the server receiving the first user's picture andstoring the picture in the personal characteristic database.
 8. Themethod of claim 1 wherein the wireless network is established as part ofa service offered by the branded location.
 9. The method of claim 1further comprising: a) linking the secure network to an existingwebsite, wherein the existing website hosts a second personalcharacteristic database; b) wherein the first user is maintains aprofile on the existing website, c) the server receiving authorizationfrom the first user to access the first user's data and preferencesstored on the second personal characteristic database; d) the servertransmitting search results to the first user's personal data deviceidentifying at least a second user from among the plurality of users,the search results based upon data received from the existing website.10. The method of claim 2 further comprising the server detecting if thefirst user's personal data device is present in the branded location andselectively activating and deactivating the first user's presence on thenetwork.
 11. The method of claim 1 wherein the branded location isfurther identified by a specific postal address.
 12. The method of claim1 wherein the branded location is a retailer.
 13. The method of claim 3wherein the indicating device communicates to a user's personal datadevice using a low IF communication system.
 14. The method of claim 13wherein the low IF communication system operates in accordance with theBluetooth standard.
 15. The method of claim 1 wherein the personal datadevice is a cellular phone equipped with a display and camera andconfigured with cellular and Bluetooth wireless communication systems.16. The method of claim 1 further comprising the branded locationreceiving a subscription fee when any user logs on the secure network atthe branded location.
 17. The method of claim 1 further comprising thebranded location sending an advertisement to the first user's personaldata device.
 18. The method of claim 6 further comprising the serverforwarding the legal identification to a law enforcement agency foridentification of known criminals or sex offenders.
 19. The method ofclaim 6 further comprising the server forwarding the legalidentification to a third party.
 20. The method of claim 1 furthercomprising the branded location sending a product advertisement to thefirst user's personal data device.
 21. A method of interactive and livecomputerized matching with a personal data device having a wirelesscommunication interface connected to a wireless network and associatedwith a first user, comprising: a) configuring a server on a securenetwork to include a personal characteristic database and a databasesearching algorithm, and configuring the server to communicate with thepersonal data device via the wireless communication interface of thepersonal data device; b) the server requiring a form of legalidentification from the first user prior to granting the first useraccess to the network; c) the server storing a personal characteristicset of the first user in the personal characteristic database; d) theserver storing the first user's current geographic location as a brandedlocation; e) the server receiving a search request initiated by thefirst user; and f) the server transmitting search results to the firstuser's personal data device identifying at least a second user fromamong a plurality of users that are logged on to the network at thebranded location.
 22. The method of claim 21 further comprising theserver forwarding the legal identification to a law enforcement agencyfor identification of known criminals or sex offenders.
 23. The methodof claim 21 further comprising the server forwarding the legalidentification to a third party.