Method and system for using bluetooth and other nearby-communications technologies to help governments and health agencies reduce the spread of novel corona viruses and other highly-contagious diseases, with user privacy and security central to the design

ABSTRACT

A communications method is established enabling exposure notification, contact tracing and movement tracking by using Bluetooth or other nearby communications technology for communicating with nearby smartphones and mobile devices, and for data exchange both to alert participants of possible exposure to someone who they have recently been in contact with, and who has subsequently been positively diagnosed, or potentially diagnosed as having, a novel coronavirus or other highly contagious disease, and to trace and identify containers, packages, envelopes and other objects that may have been in contact with a person or object carrying or potentially carrying the virus or disease.

CROSS-REFERENCE TO RELATED APPLICATIONS

The present application is a continuation of U.S. application Ser. No. 16/216,777 filed on Dec. 11, 2018 (“Second Continuation Application”, or “SCA”), entitled “Method and system for establishing variable authentication and targeting communications networks where network devices may detect, discover, authenticate and communicate directly with each other, based on such attributes as interests, proximity, or location within or outside of a specified zone”, in respect of which application U.S. patent Ser. No. 10,637,932 issued on 28 Apr. 2020 (the “Second Continuation Patent” or “SCP”), which itself is a continuation of U.S. application Ser. No. 15/084,376 filed on 29 Mar. 2016 (“First Continuation Application“, or “FCA”) entitled “Method and system for establishing RF Aware and SST Aware communications networks where network aware devices may detect, discover, authenticate and communicate directly with each other, based on such attributes as interests, proximity, or location within or outside of a specified zone”, in respect of which application U.S. Pat. No. 10,206,089 issued on Feb. 12, 2019 (the “First Continuation Patent” or “FCP”), which itself is a continuation of U.S. application Ser. No. 13/870,456 filed on Apr. 25, 2013 (the “Parent Application”, or “PA”) entitled “Method and system for searching, sensing, discovering, screening, enabling awareness, alerting, sharing, sending, receiving, buying, selling, and otherwise transmitting stories, content, interests, data, goods and services among known and unknown devices in a communication network”, filed on Apr. 25, 2013, in respect of which application U.S. Pat. No. 9,374,397 issued on 16 Jun. 2016 (the “Parent Patent” or “PP”)), which claims the benefit of U.S. Provisional Patent Application Ser. No. 61/648,212, entitled “1. Communication Methods between, among and to Unknown Devices; 2. Searching, Sending and Receiving Voice, Video and Data between, among and to Unknown Devices; 3. Creating Sixth-Sense Technologies for Sharing and Learning Stories and Interests; and 4. Discovery engine to identify others with whom to communicate” and filed on May 17, 2012. Each of the SCA, SCP, FCA, FCP, PA and PP identified above is incorporated here by reference in its entirety to provide continuity of disclosure.

BACKGROUND OF THE INVENTION Field of the Invention

This disclosure relates generally to a method and system for searching, sensing, discovering, screening, enabling awareness, alerting, sharing, sending, receiving, buying, selling, and otherwise transmitting stories, content, interests, data, goods and services among known and unknown devices in a communication network.

Description of Related Art

General background information regarding the related art is set forth in paragraphs [0002] through [0016] of the Parent application and in the applicant's Information Disclosure Statement filed with this Continuation patent application, which background is incorporated herein by reference.

It may be argued that the current inventions are anticipated in part by Heinemann (Andreas Heinemann, Collaboration in Opportunistic Networks (VDM Verlag 2007) (dissertation, Darmstadt University of Technology)) (“Heinemann”), because Heinemann may disclose methods for searching, sensing, and discovering attributes, etc. among known and unknown devices.

A careful review of the Heinemann dissertation, however, reveals that the current inventions were not, and are not, anticipated by that prior publication.

Heinemann described the use of filters and profiles as a means of data dissemination in acollaborative opportunistic network (a “CON”) (pp. v, 4, 5, 13-14, 18, 43-44); and also envisioned use of changing network identifiers in a collaborative network, by using public key cryptography and linking public keys to, e.g., email addresses, as a method to authenticate information items or identity and preserve anonymity in an ad hoc mobile network (pp. vi, 14, 48, 49-52, 77-78, 81, 87, 94).

The art taught by and foreseeable from Heinemann's CON has several critical limitations, which are conceded by Heinemann. First, his CONs are limited to the dissemination of broadcast-type information to others users in close proximity to each other; they do not support any message routing functionality (p. 78). Second, his ad hoc networks do not authenticate the user/device to deliver either user- or device-specific messages or other content. Third, his CONs do not enable communication with devices/users outside or beyond such closely proximate zone. (pp. H, 15, 28, 49-52, 78, 81, 94).

The Applicant's inventions in the First Continuation application and Parent application, including its Claims in this Continuation application for variable authentication and targeting networks, overcome these limitations:

first by solving the problem of how to authenticate devices at both ends (i.e., sending and receiving) of a communication by using variable identification information, or VII—defined to include one or more of the searched-for attributes, varying device identifying information, or other datum or data associated with or pertinent to the device (including its software or firmware) or its user, without the use of or reliance on, e.g., public or private cryptography keys, other known contact information, or enrollment in a social network; second, by using VII, to route messages to specific devices, thus overcoming Heinemann's limitation of only being able to send the same broadcast-type information to all devices/users; third, by using VII, to be able to be able to authenticate and communicate with devices or users who are not in close proximity to each other; fourth, by using VII, to maintain communications with devices or users who move outside of the same proximate location or zone; and fifth, by using VII, to re-authenticate and initiate targeted communications with specific devices or users who move outside of the same proximate location or zone; in each case without the use of or reliance on, e.g., public or private cryptography keys, other known contact information, or enrollment in a social network.

Furthermore, the current inventions combine variable identification information with search, detect and functional operations (jointly, “Sixth-Sense Technology”, or simply “SST”) to enable users to conduct personal and commercial activities in new ways, while giving users control over their privacy and anonymity. These inventions enables for the first time the sharing of stories and content, and the marketing, sale, purchase, and license of goods and services between or among intended but unknown devices or their users.

Applicant's inventions are not taught by or foreseeable from Heinemann and other prior art because they disclose and teach the nonobvious features that:

(a) The SST inventions use variable identification information from each of the first device and the recipient devices to authenticate and maintain directed communication by and among the first device with the recipient devices

(b) The SST inventions describe a new method of communication that does not use and is not dependent upon the use of public or private cryptography keys

(c) The SST Inventions describe a new method of communication that enables authentication of devices to deliver user- or device-specific messages or other content

(d) The SST Inventions describe a new method of communication that enables communication with devices/users outside or beyond limited physical areas or zones

(e) By combining these authentication and communications capabilities with search and detect functionalities, filters, and user attributes, the Applicant's inventions create new functional operations that enable users to conduct personal and commercial activities in new ways, while giving users control over their privacy and anonymity. The SST inventions enable for the first time the sharing of directed stories and content, and the marketing, sale, purchase, and license of goods and services between or among intended but unknown devices or their users.

None of these features is taught or suggested by Heinemann or the prior art.

Applicant is the first to recognize the advantage of combining variable identification information for authentication and communication purposes with search and detect functionalities, filters and user attributes, so that a new result—not anticipated by Heinemann or the prior art—has been achieved; that is, devices and users can communicate and share with those around them—both nearby and around the globe—to enhance their individual and social experiences, to connect them with their past and with each other, to improve their understanding and enjoyment of life, and to conduct and engage in commerce in new ways.

BRIEF SUMMARY OF THE INVENTION

Variable Authentication and Targeting Networks

The Claims set forth in this Continuation application do not contain new matter relative to the Parent application; the Claims herein are conceived and based entirely on the detailed specification of the Parent application—which is repeated and set forth at length in this Contination Application below. Specific embodiments of the Claims set forth in this Continuation Application are also summarized below.

A communications network is established where devices are assigned either a static or random unique device identifier based on one or more of a broad variety of network, device or user-based attributes; where devices in public mode may, using their SST clients, detect, discover, authenticate and communicate directly with other devices in one or more other specified networks, based on such attributes as interests, proximity, or location within a specified zone (such authentication herein “Variable Network-Attribute Authentication”, and such devices herein, “VNAA Devices”). For example, a VNAA-certified printer could broadcast its availability continuously to nearby devices.

Furthermore, devices in public mode may, using their SST clients, select to send or receive either broadcast or customized messages/content to or from targeted other devices in one or more other specified networks based on static or variable network, device or user attributes (such targeting herein, “Variable Network-Attribute Targeting”, and such devices herein, “VNAT Devices”). VNAT Devices can advertise or subscribe to services based on proximity, interests or other attributes. They can indicate their preference to detect replies only from closer devices or from all network devices by setting parameters. They can publish messages and make the service discoverable by other devices in the same network or other defined cluster. A service can broadcast its availability continuously (unsolicited) or only when requested by an active subscriber (solicited).

Subscribe messages sent to devices in a specified network or other cluster can indicate that the VNAT devices should transmit publish messages when specific criteria are met. Active subscribe messages look for solicited publishers. Passive subscribe messages look for the continuously broadcast unsolicited publishers. By using matching filter parameters, VNAT Devices can specify in more detail the services being sought or offered. Also, service response filters enable network devices to respond to each other (or not) based on their static or random service ID or other variable identification information, and whether they are included or excluded from a list defined in attributes.

Applications can follow up with services on other VNAA or VNAT Devices. This is how a service or application can determine which people at a conference trigger an alert on a network device, or whether to display information about an exhibit as the device passes it in a museum.

Sixth-Sense Technology

This Brief Summary of the SST Invention is the same as set forth in the Parent Application, and thus contains no new matter.

For wired, wireless and other communications, we have conceived, created and developed new communications methods for people, businesses and organizations (“participants”) to search, sense and become aware of what others are interested in (and/or with whom they want or are willing to communicate) and to connect those people in private and anonymous communications based on their shared interests and thoughts.

A shorthand description of this new invention is as follows:

(a) it performs a search/discovery engine function in the fields of communications, thoughts and interests, similar to the following familiar tools: what an Internet search engine does for URL addresses and content; what a telephone directory does for phone numbers; what a television guide does for broadcast and cable television; (b) it enables sensing, alerting, and becoming aware of such other persons and/or devices; (c) it enables the delivery and completion of the sender's communications and stories, privately and anonymously, with unknown recipients and devices selected by the sender; and (d) the sixth sense discovery invention performs both “push” and “pull” functions.

One aspect of the present SST invention relates to creating and providing people with the ability to search, “sense” and be alerted to unknown third parties with whom they want or are willing to communicate (“recipients”), and engage directly in real-time communications with such unknown recipients, without knowing the identity, address, contact information or location of the recipients (herein, “unknown recipients”).

Another aspect of the present SST invention also relates to creating and providing people with the ability to search, sense and be alerted to what others are interested in (and/or with whom they want or are willing to communicate) and to connect those people in private (or public) and anonymous communications based on their shared interests and thoughts.

Another aspect of the present SST invention also relates to creating and providing participants, groups, businesses, organizations and other parties with the means to search, discover and be alerted to what other people are interested in, and to deliver, share and learn to, with and from new and unknown recipients, through the exchange of voice, video, data and multi-media.

A first embodiment—of the single or multi-user push operation for our sixth-sense discovery invention—relates to creating and providing people with the ability to send real-time content to one or more others who might be interested in a particular topic. An example of this embodiment is where a person or organization wants to direct in real-time content (e.g., in the form of a message or voice alert) to one or more others who might be interested in a particular political or social cause. The person or organization would use a device and communications network enhanced by the invention to discover and become aware of who is interested in receiving such content, and then send the desired content, privately and anonymously, to all unknown recipients chosen by the sender.

A second embodiment—of the single or multi-user pull operation of our sixth-sense discovery invention—relates to creating and providing people with the ability to learn more about a particular topic. An example of this embodiment is where a person wants to learn more about “gay marriage”. While attending a business conference, his device (enhanced with our invention) senses that a gay rights activist is nearby, and sends him an alert. The participant checks his device; learns that Lloyd C. Blankfein, the chief of Goldman Sachs and national corporate spokesperson for The Human Rights Campaign (THRC), is sitting across the aisle; texts Mr. Blankfein to set up an inquiry or even a meet and greet; and then at Mr. Blankfein's request, receives a full report from THRC reviewing both sides of the gay marriage debate.

A third embodiment relates to creating and providing new communications methods for people, groups, businesses, organizations and other parties to search, discover and become aware of what other people are interested in, and to deliver, share and learn, with and from new and unknown recipients, through the exchange of voice, video, data and multi-media. An example of this embodiment is where a person desires to find out what interests others, inclusive of everyone from the newcomer at school, the person across town, or someone halfway around the globe. People will get a sense of and be alerted to the other guy's ‘story’, and be able to share voice, pictures, video and data content based on common interests, creating ties that bind, and bringing people together.

A fourth embodiment relates to creating and providing businesses and people, and governments, institutions, and other organizations, with:

-   -   new methods for searching and prospecting for new customers and         contacts,     -   new methods for distributing and selling new and additional         products to existing and new customers,         -   new methods for conducting market research, consumer             surveys, surveys and focus groups for new product features,             new products, product development, and research and             development,         -   new methods for forecasting demand and creating, maintaining             and improving operations and supply-chain management, and     -   new methods for conducting global, supra-national, national,         regional and census, public health and other data-gathering;         public policy development; dissemination of emergency alerts,         public-health news and other information; distribution of         benefits; and political outreach, recruitment, opinion polls,         advocacy and other political activities.

An example of this embodiment is where a businesses or organization wants to discover, become aware of, and/or engage new customers and prospects for their products, services and causes. Another example of this embodiment is where a media content producer would use our new communications methods to discover and become aware of which groups of anonymous consumers are or might be interested in their content; send those people a message or alert that their content is available for purchase, streaming or download; and then complete the delivery of their content to such unknown people or devices—without needing to negotiate with a cable television company or other digital distributor, for example, terms and conditions, including without limitation such terms as: bundled-service package restrictions and/or other conditions; distribution fees and/or transaction commissions or fees; or digital rights management restrictions. Freed of such restrictions and costs, vendors will receive the following benefits:

(i) greater adjusted gross margins, which enable both lower consumer prices and greater business reinvestment;

(ii) by gaining direct access to customers and prospects: (a) new ideas for new products, features, and improvements to existing products, and (b) greater customer satisfaction and loyalty;

(iii) lower costs resulting from reduced license fees and similar expenses relating to license/rental of third-party ‘house lists’ and other prospecting databases; and

(iv) other benefits resulting from avoidance of competitive restrictions dictated by third parties who control access to the customer and prospect of the vendor's products, services and/or causes.

A fifth embodiment relates to creating and providing consumers with new methods for purchasing products or services. An example of this embodiment is where an individual wants to remain anonymous throughout the entire purchase process, from research and screening, to referrals and recommendations, to closing the deal. Another example of our searching, sensing, discovery, alerting, and delivery method is where a novice consumer wants to start a reggae musical collection, so she uses our new communications method to identify an industry expert, solicit and procure their recommendations, and purchase selected digital music directly from the artists' mobile website, all privately and anonymously—without needing: (i) an account; (ii) membership for distributors like iTunes or Spotify; or (iii) searches of websites or Internet URLs.

In some embodiments, a method is disclosed of selectively communicating with one or more other devices whose identification information is unknown, the method comprising launching a client application on a device, wherein the client application enables communication with other devices whose identification information is unknown, identifying and locating other devices listing a searched-for identified attribute (such as at least one of the user's professional, associational, personal, physical, social, athletic, recreational, hobby and other interests and attributes), or any other data associated with the device or its user, that the second client application compiles; obtaining information regarding the other devices listing such searched-for attribute; compiling the information regarding the other devices listing the searched-for attribute to enable selection of at least one device to initiate communication using service messages, tags or tokens or other identifiers (jointly herein, “Variable Identifiers”); displaying a selection of the at least one device from the compiled information of the other devices listing such searched-for attribute; enabling privacy preferences for the device, wherein the privacy preferences enable the device to provide variable identification information to the at least one other device; enabling the client application on the device to specify whether the Variable Identifier is associated with private content, wherein the private content is sent only to the at least one other device; and sending the private content from the device to the at least one other device.

In some embodiments, a method is disclosed of selectively communicating with one or more other devices whose identification information is unknown, the method comprising launching a client application on a device, wherein the client application enables communication with other devices whose identification information is unknown; identifying an attribute (such as at least one of the user's gender, professional, associational, personal, physical, social, athletic, recreational, hobby and other interests and attributes), or any other data associated with the device or its user, that the device or its user wants to make known to other devices and users whose identification is unknown, which attribute is compiled by the first client application; identifying at least one criterion (such as attribute, location, time of day, date, etc) for sharing such attribute with at least one other user or device, which criterion is compiled by the first client application; identifying and locating other devices based on such one or more criteria; obtaining information regarding the other devices meeting such criteria; compiling the information regarding the other devices meeting such criteria to enable selection of at least one device to initiate communication using service messages, tags or tokens or other identifiers (jointly herein, “Variable Identifiers”); displaying a selection of the at least one device from the compiled information of the other devices meeting such criteria; enabling privacy preferences for the device, wherein the privacy preferences enable the device to provide variable identification information to the at least one other device; enabling the client application on the device to specify whether the Variable Identifier is associated with private content, wherein the private content is sent only to the at least one other device; and sending the private content from the device to the at least one other device.

In some embodiments, a method is disclosed of selectively communicating with one or more other devices whose identification information is unknown, the method comprising launching a client application on a device, wherein the client application enables communication with other devices whose identification information is unknown; identifying the other devices based on selected criteria using the client application, wherein the selected criteria comprise both (i) a searched-for identified attribute (such as at least one of the user's professional, associational, personal, physical, social, athletic, recreational, hobby and other interests and attributes), or any other data associated with the device or its user, and (ii) one or more searched-for locations or zones (jointly herein, a “zone”); obtaining attribute and/or other data and information regarding the other devices located in the searched-for zone; compiling such information regarding the other devices located in the searched-for zone to enable selection of at least one device to initiate communication using service messages; displaying a selection of the at least one device from the compiled information of the other devices located in the searched-for zone; enabling privacy preferences for the device, wherein the privacy preferences enable the device to provide variable identification information to the at least one other device; enabling the client application on the device to specify whether the Variable Identifier is associated with private content, wherein the private content is sent only to the at least one other device; and sending the private content from the device to the at least one other device.

In some embodiments, a device for selectively communicating with one or more other devices whose identification information is unknown, the device comprising an interface that is configured to communicate with the one or more other devices, and a client application that is configured to communicate with the interface to search for at least one of the one or more other devices based on selected criteria specified in the client application and to compile information obtained from the one or more other devices; the client application further configured to send a message to one or more other devices selected from the compiled information, and to enable privacy preferences for the device, wherein the privacy preferences enable the device to provide variable identification information to the at least one other device, as well as to enable the client application to specify whether the variable identification information is associated with private content, so that the private content is sent only to the at least one other device; and the device interface configured to send the private content from the device to the at least one other device.

In some embodiments, a method of selectively communicating between devices when identification information used to contact a device is unknown, the method comprising receiving, at a remote processing server, registration information from a first device; creating user identification information for the first device and associating the user identification information with the registration information; determining attributes and criteria for the first device and associating the criteria in the database with the user identification information of the first device; receiving, at the remote processing server, a second registration from at least one other device; organizing information from the first device and the at least one other device in a database on the remote processing server; determining attributes and criteria for the at least one other device and storing in the database; receiving a service message, at the remote processing server, from the first device, wherein the service message comprises content and user identification information; searching the database using the criteria selected by the first device to locate at least one other device that is within parameters specified by the first device; obtaining information for the at least one other device and processing the service message to send to the at least one other device; and sending a processed service message including the content of the service message to the at least one other device.

BRIEF DESCRIPTION OF THE DRAWINGS

This Brief Description of the Drawings is the same as set forth in the Parent Application, and thus contains no new matter.

FIG. 1 illustrates communications devices that provide searching, discovering, sensing, sharing, sending and receiving stories, content, interests and data among known and unknown people and devices, including communication to and with recipients whose traditional identification information is unknown in accordance with certain embodiments.

A method and system for searching, sensing, discovering, enabling awareness, alerting, screening, sharing, sending, receiving, buying, selling, and otherwise transmitting stories, content, interests, data, goods and services among known and unknown devices in a communication network.

DETAILED DESCRIPTION

This Detailed Description of the Invention is the same as set forth in the Parent application, and thus contains no new matter.

Methods and systems are provided for searching, sensing, discovering, sharing, sending and receiving stories, content, interests and data among known and unknown people and devices in a communication network, in accordance with certain embodiments.

Platt et als teach us how to communicate without traditional identification information or communication methods, both directly between devices, U.S. Pat. No. 8,396,489, and with the aid of a server, U.S. Pat. No. 8,396,490 (the “Related Inventions”).

But the Related Inventions do not teach how to search, discover, sense, share, send and receive stories, content, interests and data among known and unknown people and devices. For example, you may want to “know the story” of, or learn something about, an unknown person across the street, across the stadium, or on the other side of the world—without sending a message and awaiting a response. Another example is where you may want to purchase a new product or service, but don't know a business that sells it—and you don't have access to the Internet or don't have the time to conduct a web search. Another instance could be where business may want to find new customers or prospects—without renting or buying a list of names. A different example could be where an artist or producer may want to distribute its artistic creation—without using a digital distributor like Comcast or iTunes. In order to provide this type of communication among and with people, groups, and devices whose traditional identification information is unknown, various systems, methods, and apparatus are disclosed.

Reference will now be made in detail to embodiments, an example of which is illustrated in the accompanying drawing. In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, it will be apparent to one of ordinary skill in the art that the present invention may be practiced without these specific details. In other instances, methods, procedures, components, and circuits taught by the Related Inventions—for both (a) communications without traditional identification information, and (b) communication methods, both directly between devices and with the aid of a server—have not been described in detail so as not to unnecessarily obscure aspects of the embodiments.

FIG. 1 illustrates communications devices that provide searching, discovering, sensing, sharing, sending and receiving stories, content, interests and data among known and unknown people and devices, including communication to and with recipients whose traditional identification information is unknown in accordance with certain embodiments.

FIG. 1 illustrates a portable, mobile or static-location electronic device, according to some embodiments of the invention, including, by way of illustration and not limitation, a server, router, switch, personal computer, laptop, notebook, mobile devices such as a tablet, smartphone, and wearable computers such as shoes, glasses, or implanted chips. The device 100 includes a memory 102, a memory controller 104, one or more processing units (CPU's) 106, a peripherals interface 108, RF circuitry 112, audio circuitry 114, a speaker 116, a microphone 118, an input/output (I/O) subsystem 120, a touch screen 126, other input or control devices 128, and an external port 148. These components communicate over the one or more communication buses or signal lines 110. The device 100 can be any electronic device, including but not limited to a desktop or laptop computer, a landline telephone, handheld computer, a tablet computer, a mobile phone, a media player, a personal digital assistant (PDA), or the like, including a combination of two or more of these items. It should be appreciated that the device 100 is only one example of an electronic device 100, and that the device 100 may have more or fewer components than shown, or a different configuration of components. The various components shown in FIG. 1 may be implemented in hardware, software or a combination of both hardware and software, including one or more signal processing and/or application specific integrated circuits.

The memory 102 may include high speed random access memory and may also include non-volatile memory, such as one or more magnetic disk storage devices, flash memory devices, or other non-volatile solid state memory devices. In some embodiments, the memory 102 may further include storage remotely located from the one or more processors 106, for instance network attached storage accessed via the RF circuitry 112 or external port 148 and a communications network (not shown) such as the Internet, intranet(s), Local Area Networks (LANs), Wide Local Area Networks (WLANs), Storage Area Networks (SANs) and the like, or any suitable combination thereof. Access to the memory 102 by other components of the device 100, such as the CPU 106 and the peripherals interface 108, may be controlled by the memory controller 104.

The peripherals interface 108 couples the input and output peripherals of the device to the CPU 106 and the memory 102. The one or more processors 106 run various software programs and/or sets of instructions stored in the memory 102 to perform various functions for the device 100 and to process data.

In some embodiments, the peripherals interface 108, the CPU 106, and the memory controller 104 may be implemented on a single chip, such as a chip 111. In some other embodiments, they may be implemented on separate chips.

The RF (radio frequency) circuitry 112 receives and sends electromagnetic waves. The RF circuitry 112 converts electrical signals to/from electromagnetic waves and communicates with communications networks and other communications devices via the electromagnetic waves. The RF circuitry 112 may include well-known circuitry for performing these functions, including but not limited to an antenna system, an RF transceiver, one or more amplifiers, a tuner, one or more oscillators, a digital signal processor, a CODEC chipset, a subscriber identity module (SIM) card, memory, and so forth. The RF circuitry 112 may communicate with the networks, such as the Internet, also referred to as the World Wide Web (WWW), an Intranet and/or a wireless network, such as a cellular telephone network, a wireless local area network (LAN) and/or a metropolitan area network (MAN), and other devices by wireless communication. The wireless communication may use any of a plurality of communications standards, protocols and technologies, including but not limited to Long Term Evolution (LTE/4G). Global System for Mobile Communications (GSM), Enhanced Data GSM Environment (EDGE), wideband code division multiple access (W-CDMA), code division multiple access (CDMA), time division multiple access (TDMA), Bluetooth, Wireless Fidelity (Wi-Fi) (e.g., IEEE 802.11a, IEEE 802.11b, IEEE 802.11g and/or IEEE 802.11n), voice over Internet Protocol (VoIP), Wi-MAX, a protocol for email, instant messaging, Short Message Service (SMS) and/or Multimedia Messaging Service (MMS)), or any other suitable communication protocol, including communication protocols not yet developed as of the filing date of this document.

The audio circuitry 114, the speaker 116, and the microphone 118 provide an audio interface between a user and the device 100. The audio circuitry 114 receives audio data from the peripherals interface 108, converts the audio data to an electrical signal, and transmits the electrical signal to the speaker 116. The speaker converts the electrical signal to human-audible sound waves. The audio circuitry 114 also receives electrical signals converted by the microphone 116 from sound waves. The audio circuitry 114 converts the electrical signal to audio data and transmits the audio data to the peripherals interface 108 for processing. Audio data may be may be retrieved from and/or transmitted to the memory 102 and/or the RF circuitry 112 by the peripherals interface 108. In some embodiments, the audio circuitry 114 also includes a headset jack (not shown). The headset jack provides an interface between the audio circuitry 114 and removable audio input/output peripherals, such as output-only headphones or a headset with both output (headphone for one or both ears) and input (microphone).

The I/O subsystem 120 provides the interface between input/output peripherals on the device 100, such as the touch screen 126 and other input/control devices or components, such as device-control sensors 128, and the peripherals interface 108. The I/O subsystem 120 includes a touch-screen controller 122 and one or more input controllers 124 for other input or control devices. The one or more input controllers 124 receive/send electrical signals from/to other input or control devices 128. The other input/control devices 128 may include physical buttons (e.g., push buttons, rocker buttons, etc.), dials, slider switches, sticks, and so forth.

The touch screen 126 provides both an output interface and an input interface between the device and a user. The touch-screen controller 122 receives/sends electrical signals from/to the touch screen 126. The touch screen 126 displays visual output to the user. The visual output may include text, graphics, video, and any combination thereof. Some or all of the visual output may correspond to user-interface objects, further details of which are described below.

The touch screen 126 also accepts input from the user based on haptic and/or tactile contact. The touch screen 126 forms a touch-sensitive surface that accepts user input.

In some embodiments, in addition to the touch screen, the device 100 may include a touchpad (not shown) for activating or deactivating particular functions. In some embodiments, the touchpad is a touch-sensitive area of the device that, unlike the touch screen, does not display visual output. The touchpad may be a touch-sensitive surface that is separate from the touch screen 126 or an extension of the touch-sensitive surface formed by the touch screen 126.

The device 100 also includes a power system 130 for powering the various components. The power system 130 may include a power management system, one or more power sources (e.g., battery, alternating current (AC)), a recharging system, a power failure detection circuit, a power converter or inverter, a power status indicator (e.g., a light-emitting diode (LED)) and any other components associated with the generation, management and distribution of power in portable devices.

In some embodiments, the software components include an operating system 132, a communication module (or set of instructions) 134, a contact/motion module (or set of instructions) 138, a graphics module (or set of instructions) 140, a user interface state module (or set of instructions) 144, and one or more applications 146, including a VII Client 149 and an SST Client (as each term is defined below) 150.

The operating system 132 (e.g., Darwin, RTXC, LINUX, UNIX, OS X, iOS, ANDROID, WINDOWS, or an embedded operating system such as VxWorks) includes various software components and/or drivers for controlling and managing general system tasks (e.g., memory management, storage device control, power management, etc.) and facilitates communication between various hardware and software components.

The communication module 134 facilitates communication with other devices over one or more external ports 148 and also includes (i) various software components for handling data received by the RF circuitry 112 and/or the external port 148, and (ii) a device interface and client application that enable communications with Variable Identifier information (jointly herein, (a “VII Client”) 149—as taught by the Related Inventions, in addition to and independently of email addresses, telephone numbers, social network or social media registration, or instant messaging handles, aliases or addresses. The external port 148 (e.g., Universal Serial Bus (USB), FIREWIRE, etc.) is adapted for coupling directly to other devices or indirectly over a network (e.g., the Internet, wireless LAN, etc.).

The contact/motion module 138 detects contact with the touch screen 126 or interaction with other input/control devices 100, in conjunction with the touch-screen controller 122. The contact/motion module 138 includes various software components for performing various operations related to detection of contact with the touch screen 122, such as determining if contact has occurred, determining if there is movement of the contact and tracking the movement across the touch screen, and determining if the contact has been broken (i.e., if the contact has ceased). Determining movement of the point of contact may include determining speed (magnitude), velocity (magnitude and direction), and/or an acceleration (including magnitude and/or direction) of the point of contact. In some embodiments, the contact/motion module 126 and the touch screen controller 122 also detects contact on the touchpad.

The graphics module 140 includes various known software components for rendering and displaying graphics on the touch screen 126. Note that the term “graphics” includes any object that can be displayed to a user, including without limitation text, web pages, icons (such as user-interface objects including soft keys), digital images, videos, animations and the like.

The device includes an application deploying sixth-sense technology (SST), known as the SST Client 150, which enables the discovery, alerting, and delivery of all forms (e.g., voice, video, data, multi-media) of global content and commerce among devices and people based on such sixth-sense communications capabilities.

The one or more applications 146 can include any applications installed on the device 100, including without limitation, a VII Client, an SST Client, a browser, address book, contact list, email, instant messaging, word processing, keyboard emulation, widgets, JAVA-enabled applications, encryption, digital rights management, voice recognition, voice replication, location determination capability (such as that provided by the global positioning system (GPS)), a music player (which plays back recorded music stored in one or more files, such as MP3 or AAC files), etc.

In some embodiments, the device may include a hardware GPS unit 151 which determines current location based on current GPS satellite locations and/or cell-tower positioning.

In some embodiments, the device 100 may include the functionality of an MP3 player, such as an iPod (trademark of Apple Computer, Inc.). In some embodiments, the device 100 is a device where operation of a predefined set of functions on the device is performed exclusively through the touch screen 126 and, if included on the device 100, the touchpad.

The predefined set of functions that are performed exclusively through the touch screen and the touchpad include navigation between user interfaces. In some embodiments, the touchpad, when touched by the user, navigates the device 100 to a main, home, or root menu from any user interface that may be displayed on the device 100. In such embodiments, the touchpad may be referred to as a “menu button.” In some other embodiments, the menu button may be a physical push button or other physical input/control device instead of a touchpad.

User Attributes and User Profiles

The device 100 may have a single or plurality of user attributes and user profiles. These attributes and user profiles are created, set or maintained by each of one or more individuals using the device, or by the device itself applying an algorithm or other software program running on or deployed by the device (such individual, individuals or device creating, set or maintained the attributes or profile herein, a user) via the SST Client 150. User attributes may include, by way of example and not by way of limitation, one or more of the user's professional, associational, personal, physical, social, athletic, recreational, hobby, locational, geospatial, and other interests, preferences, and attributes, or any other data associated with the device or its user (collectively herein, “Attributes”). A user might set up one or more user profiles (each of which might contain or prioritize different attributes or topics) (herein, “Profiles”), such as a work profile, a hobby profile, a family profile, and a social profile. These Attributes and Profiles are stored in one or more databases that, using the SST Client 150, can be named, indexed, searched for, retrieved, edited, merged, grouped, terminated or otherwise configured by one or more users who have authorized access to the device and the specific SST Client.

One embodiment of the present SST invention relates to creating and providing people (herein, “seekers”) with the ability to search, “sense” and be alerted to unknown third parties with whom they want or are willing to communicate (“recipients”), wherein both seekers and recipients are using devices equipped and operating both an SST Client and a VII Client—and engage directly in real-time communications with such unknown recipients, without knowing the identity, address, contact information or location of the recipients (herein, “unknown recipients”).

Using features of an SST Client on the device 100, a user, or ‘seeker’, may search, detect, discover, alert and sense unknown recipients and their unknown devices with Attributes lying within specified parameters selected by the user of the first device—which Attributes of the at least one third-party device 200 might, but are not required to, overlap in whole or in part with the Attributes of the device 100 of the first user. The parameters might include, for example, third-party devices within one or more certain or general geographic location(s) or zone(s) (jointly herein, a “zone”) being used by a person with a specified age range with a professional or academic interest in certain topics or fields.

Seekers can configure the SST Client on their device 100 to search for, identify, alert, and display when it has detected the searched-for attribute(s) and parameters of users, or ‘recipient’ of the at least one third-party device 200, and, using the VII Client 149 on each device, initiate contact and communications with such third party device, even when its traditional identification information is unknown.

Another embodiment creates and providers users, or seekers, with the ability to search, sense and be alerted to what other users (herein, a collaborator) are interested in, and/or with whom they want or are willing to communicate; and to connect those people in private (or public) and anonymous communications based on their shared interests and thoughts—where each device is equipped with and operating an SST Client and a VII Client.

For example, a collaborator might configure the SST Client on her device 100 to specify that she is interested in topics A, B and C; and is willing to communicate about topics B1 and C2 with other unknown seekers who are affiliated with the post-secondary academic community in a specified geographic region. That communication interest would be sensed by the SST Client on the device 200 of a third-party seeker with such an academic affiliation interested in communication topics B1 and C2, and trigger an alert on such device. Upon checking the alert and reading the related display, the seeker would use the SST Client on his device 200 to compose and send a private and anonymous email or other message to the collaborator, notifying her of his interest in communication topics B1 and C2. From there, the collaborator and seeker would engage in such further communications and exchange of information as they deem suitable; maintaining such privacy and anonymity as each desires, using the communications capabilities of the VII Client, as integrated with the SST Client.

A third embodiment relates to creating and providing participants, groups, businesses, organizations and other parties with the means to search, discover and be alerted to what other people are interested in, and to deliver, share and learn to, with and from new and unknown recipients, through the exchange of voice, video, data and multi-media.

For example, the product manager (herein, a seeker) of a major snowboard brand might want to learn what new tricks riders are trying in diverse urban and backwoods environments, and product enhancements and new performance criteria suggested by rider usage. Random riders (each, a responder) might configure the SST Client on his device 100 to specify that she is interested in snowboarding, and is willing to communicate about new tricks, urban riding, and extreme terrain with unknown persons and businesses interested in snowboarding. That communication interest would be sensed by the SST Client on the device 200 of the seeker, and trigger an alert on such device. Upon checking the alert and reading the related display, the seeker would use the SST Client on his device 200 to compose and send a private and anonymous email or other message to the responder, notifying him of his interest in new snowboarding tricks, urban riding, and extreme terrain. From there, responder and seeker would engage in such further communications and exchange of information as they deem suitable, such as the responder sending the seeker a secure link to a private video of his extreme rides down urban sidewalk steps and down gnarly mountain chutes; maintaining such privacy and anonymity as each desires, using the communications capabilities of the VII Client, as integrated with the SST Client.

Another example of this embodiment is where a person (user 1) desires to find out what interests others (user 2 et seq), inclusive of everyone from the newcomer at school, the person across town, or someone halfway around the globe. Using devices 100/200 equipped with and operating an SST Client and a VII Client, each of user 1 and user 2 configure their STT Client selecting to disclose to the public at large certain attributes. The device 100 of user 1 discovers such attributes of User 2, and displays them on user 1's device. User 1 thus gets a sense of and be alerted to the other guy's ‘story’, and be able to share voice, pictures, video and data content based on common interests, creating ties that bind, and bringing people together.

A fourth embodiment—illustrating the push operation of the SST Client—relates to creating and providing people with the ability to send real-time content to one or more others who might be interested in a particular topic.

An example of this embodiment is where a person or organization (herein, a ‘broadcaster’) wants to direct in real-time content (e.g., in the form of a message or voice alert) to one or more others (“recipients”) who might be interested in a particular political or social cause. The device (or communications network) of both broadcaster and recipient would be equipped with and running an SST Client and VII Client. A Broadcaster can configure the SST Client on their device 100 to search for, identify, alert, and display specific attribute(s) and parameters in third-party devices. Others users of such third party devices 200/300 would configure their respective SST Client indicating various interests that they have and any time/place restrictions on communications with others regarding such interests. The device of the broadcaster discovers those people and groups who are interested in receiving the searched-for content, displays an alert when it has detected the searched-for attribute(s) and parameters of recipient(s) using at least one third-party device 200, and, using the VII Client 149 on each device, initiates contact and communications with such third party device, and then send the desired content, privately and anonymously, to all unknown recipients chosen by the broadcaster.

Another embodiment—illustrating the pull operation of our sixth-sense discovery invention—relates to creating and providing people with the ability to learn more about a particular topic.

An example of this embodiment is where a person (a seeker) wants to learn more about “gay marriage”. She configures the SST Client on her device 100 to indicate that one of her interests is gay marriage, and a willingness to communicate with unknown third parties during business hours or when she is away from home. Separately, a prominent gay rights activist (an Activist) has configured the SST Client on his device 200 with comparable settings, together with his official role with a national human rights organization. Both devices are equipped with a VII Client. While attending a business conference, the seeker's device 100 senses that the device 200 of the Activist is nearby, and displays an alert. The seeker checks her device; learns that the national corporate spokesperson for The Human Rights Campaign (THRC), is sitting across the aisle; and using the VII Client 149 on each device, sends a text, privately and anonymously, to the Activist, seeking to set up an inquiry or even a meet and greet.

Without exchanging or revealing email addresses, phone numbers or other contact data, the seeker and Activist are able to exchange messages, and then, the Activist arranges for THRC to send seeker a full report reviewing both sides of the gay marriage debate.

A sixth embodiment relates to creating and providing businesses and people, and governments, institutions, and other organizations, with:

-   -   new methods for searching and prospecting for new customers or         contacts,     -   new methods for distributing and selling new and additional         products to existing and new customers,     -   new methods for engaging in any or all forms of commercial         transactions, including without limitation sharing, sending,         receiving, procuring, distributing, streaming, purchasing,         subscribing, leasing, renting, borrowing, licensing, selling, or         transmitting products, services or content (all such commercial         transactions collectively, “Commercial Sale”),         -   new methods for conducting market research, consumer             surveys, surveys and focus groups for new product features,             new products, product development, and research and             development,         -   new methods for forecasting demand and creating, maintaining             and improving operations and supply-chain management, and     -   new methods for conducting global, supra-national, national,         regional and census, public health and other data-gathering;         public policy development; dissemination of emergency alerts,         public-health news and other information; distribution of         benefits; and political outreach, recruitment, opinion polls,         advocacy and other political activities.

An example of this embodiment is where a businesses or organization (a business) wants to discover and become aware of, and direct marketing content to, new customers and prospects (jointly, a consumer) for their products, services and causes. The business equips its customer-facing staff with tablets 100 running an SST Client and VII Client. Each staff member configures their SST Client identifying their expertise in specific categories of business products; ability to speak one or more languages; availability to engage in consumer communications during various intervals throughout the day. Separately, consumers holding devices 200/300 running SST and VII Clients configure their SST Client noting their interest in certain product categories, and their desire to text or call in Spanish at specified times of day or when present in certain locations (e.g., at home, in-store, or near-store). A Spanish-speaking business staff member with relevant product knowledge receives an alert on his device 100 of such consumer's interest, and is able, using the VII Client on his device, initiate a private and anonymous communication with such consumer, and then, at the consumer's convenience and regardless of location, renew the private and anonymous communication with the consumer, through and including the close of the sale. Using this embodiment, businesses will be able to sell direct to the public, without having to incur distribution costs, for example to distributors and retailers, or to digital distributors (e.g., Amazon).

Another example of this embodiment is where a media content producer (a producer) wants to discover and become aware of which groups of anonymous consumers (a viewer) are or might be interested in their content. The producer equips its server 100 running an SST Client and VII Client, and configures their SST Client listing and indexing their library of movies, videos and ads, along with other information such as duration, language, and pertinent pricing (if any). Separately, viewers holding devices 200/300 running SST and VII Clients configure their SST Client noting their interest in certain movie genres, video categories, and ad topics, along with any pertinent time and location parameters restricting when and where they are willing to receive and view such content. The producer's server 100 receives notice of such viewer's interest, and is able, using the VII Client on the server, establish a private and anonymous communication with such viewer, informing her that the content is available for purchase, streaming or download; and then complete the delivery of desired content to the anonymous viewer in a private communication.

A seventh embodiment relates to creating and providing consumers with new methods for purchasing products or services.

An example of this embodiment is where an individual (a driver) wants to remain anonymous throughout the entire process of purchasing a car, from research and screening, to referrals and recommendations, to closing the deal. Using a smartphone device 100, the driver configures the SST Client to indicate his interest in buying a new or used car with various attributes and that is available for inspection, test drive and delivery within a designated mileage radius from his place of work. Separately, car dealers, car-search platforms (e.g., Autotrader), and private sellers (jointly, sellers) configure the SST Clients on their computers 200 identifying the attributes (including, e.g., pictures and videos) of their inventory of cars for sale; while car-service organizations (e.g., CarFax; Consumer Reports magazine; Car & Driver magazine; state vehicle registration bureaus)(jointly, resource groups) configure the SST Clients on their servers 300 to provide access to car reviews, car specifications, and vehicle information. The driver's phone 100 discovers from sellers' computers 200 (using SST and VII Clients) car(s) meeting the driver's criteria and any pertinent available reviews, etc from resource groups, and displays an alert on his phone. When he taps on the alert, the SST Client opens and displays links to the sellers' car listings and resource groups' car reviews, etc. From there, the driver and sellers and/or resource groups would engage in such further communications and exchange of information as they deem suitable; maintaining such privacy and anonymity as each desires, using the communications capabilities of the VII Client, as integrated with the SST Client.

Another example of our searching, sensing, discovery, alerting, and delivery method for purchasing a product or service is where an inexperienced individual (a listener) wants to start a reggae musical collection. She configures the SST client on her tablet or MP3 player 100 to indicate her reggae interest and solicit names of top reggae performers, critics and bloggers. Separately, at least one reggae performer, critic or blogger (a specialist) configures the SST Client on each of his computer 200 and music-storage server 300 identifying: (i) attributes both of reggae music (including any accompanying recommendation and referrals) stored on the server and referencing playlists of various collections comprised of single and multiple artists for first-time reggae followers, and of persons with whom they are willing to consult (while preserving the privacy of their contact information); and any personal temporal, location and other parameters restrictions on the devices that might sense and communicate with such specialist. The listener's device 100 discovers from specialist's computer 200 and server 300 (using SST and VII Clients) music and any recommendations or referrals meeting the listener's criteria and displays an alert on her phone. When she taps on the alert, the SST Client opens and displays links to the specialist. From there, the listener and specialist would engage in such further communications and exchange of information as they deem suitable; maintaining such privacy and anonymity as each desires, using the communications capabilities of the VII Client, as integrated with the SST Client.

In an eighth embodiment, a user (an initiator) can selectively communicate about desired topics with known or unknown people (a recipient) possessing certain characteristics who are using one or more other devices whose identification information is unknown. Using device 100 configured with an SST Client, the initiator launches the SST Client, and identifies an attribute or any other data associated with the device or its user, that he wants to make known to other devices and users whose identification is unknown, which attribute is compiled by the SST Client; the VII Client on the first device 100 enables communication with other devices 200 (also deploying a VII Client) whose identification information is unknown; the SST Client on the first device searches for and identifies at least one criterion (such as attribute, location, time of day, date, etc) for sharing such attribute with at least one other user or device deploying an SST Client, which criterion is compiled by the first SST Client; the SST Client running on the first device identifies and locates other devices based on such one or more criteria; obtains information regarding the other devices meeting such criteria; compiles the information regarding the other devices meeting such criteria to enable selection of at least one device to initiate communication using the VII Client on the first device; and displays a selection of the at least one device from the compiled information of the other devices meeting such criteria. Using the SST Client on the first device 100, the initiator selects the at least one other device 200 either with which he wants to communicate on a desired topic or which is being used by a person with the desired characteristics, and then using privacy preference settings within the SST Client on the first device 100, chooses whether he wants to preserve the privacy of his contact information; reveal his real name or location; or open a private 1:1 or public communication with such selected recipient or device 200; wherein the privacy preferences enable the device to provide variable identification information to the at least one other device; enables the VII Client on the first device to specify whether the Variable Identifier is associated with private content, wherein the private content is sent only to the at least one other device; and sends the private content from the first device to the at least one other device.

The foregoing description, for purpose of explanation, has been described with reference to specific embodiments. However, the illustrative discussions above are not intended to be exhaustive or to limit the invention to the precise forms disclosed. Many modifications and variations are possible in view of the above teachings. The embodiments were chosen and described in order to best explain the principles of the invention and its practical applications, to thereby enable others skilled in the art to best utilize the invention and various embodiments with various modifications as are suited to the particular use contemplated. 

We claim:
 1. A new privacy-preserving communications method for implementing exposure notification, contact tracing, and movement tracking measures by using Bluetooth or other nearby communications technology for communicating with nearby smartphones and mobile devices, and for a data exchange mechanism both to alert participants of possible exposure to someone who they have recently been in contact with, and who has subsequently been positively or potentially diagnosed as having a novel coronavirus or other highly contagious disease, and to trace and identify containers, packages, envelopes and other objects that may have been in contact with a person or object carrying or potentially carrying the virus or disease, the method comprising: For each smartphone or other mobile device (“Tracing Device”) equipped with at least one item from a set of the following wireless technologies—ZigBee, WiFi, Bluetooth, Bluetooth Low Energy (BLE), Bluetooth Smart, Near-Field Communication (NFC) and WiMax (a “Wireless Technology”)—use of a variable identification information software or firmware client to assign a unique device identifier (“Tracing Key”), selected by using either: generation of a static Tracing Key (“STK”) based on at least one item from a set comprised of at least one of the following identifiers (“VII”) associated with the Tracing Device (including its software and firmware): a one-time tracing key, a randomly generated one-time tracing key, operating system software, MAC address, IP address, local area network, wide area network, cloud network, cloud account, serial number, other device identifying information, attribute, interest, preference, activity, service message, tag, token, vendor device identifier, advertising device identifier, other datum, other data set, and other variable identification information, or generation of a random or dynamically changing Tracing Key (“RTK”) derived from at least one VII associated with the Tracing Device; Using a client application (herein, a sixth-sense client or, “SS Client”) on the Tracing Device to conduct at least one of the following functions: detect the Tracing Key stored on at least one other Tracing Device (“Other Tracing Device”) and authenticate at least one Other Tracing Device based on its Tracing Key; and Using the SS Client on the at least one Other Tracing Device to authenticate the first Tracing Device or any Other Tracing Device based on its Tracing Key.
 2. A communications method described in claim 1, wherein at least one of the Tracing Devices may be configured to enable at least one of the following tracking, privacy and security capabilities: Encryption of metadata exchanged by the Tracing Device; Configuration of the Tracing Device to enable measurement of the power level of the wireless signal strength and the received signal strength indication between the Tracing Device and at least one Other Tracing Device, in order to more accurately estimate the distance between detected devices; Be in public mode wherein at least one Other Tracing Device can detect at least one of the following keys on the Tracing Device: the Tracing Key of the Tracing Device, all keys (“Derivative Keys”) on the Tracing Device derived from the said Tracing Key, and all keys on the Tracing Device derived from said Derivative Keys; Periodically generate a random RTK (the “Periodic Tracing Key” or “PTK”); Generation of a Rolling Proximity Identifier (“RPI”) derived from the PTK, using keyed-hashing for message authentication or other random number generator for authentication; Configuration of the Tracing Device to enable its user to set location parameters specifying the home region (“Home Base”) of the Tracing Device; Configuration of the Tracing Device to enable its user to enter parameters prescribed or recommended by applicable public health authorities defining a congested area (“Congestion Area”) based on at least one of the following criteria: an identified place of public assembly; other place of public assembly, based on meeting at least one of the following criteria: cruise ship, resort hotels, beach, park, golf course, tennis center, ski area, trail system, public bus, school bus, train, subway, street car, ride sharing, library, school, gymnasium, church, retail store, bar, pub, tavern, restaurant, sports field, sports stadium, sports arena, hockey rink, convention center, conference hall, and hotel dining room; and other hyper-local zones where the density of Tracing Devices per square meter exceeds a maximum level prescribed or recommended by applicable public health authorities; Configuration of the Tracing Device to enable its user to identify, measure and track on the Tracing Device movements (“Tracked Movement”) of the Tracing Device based on one or more of the following criteria: movement of the Tracing Device outside of the Home Base; movement of the Tracing Device into a Congested Area; and duration of time the Tracing Device spends in a Congestion Area; Configuration of the Tracing Device to enable its user to enter time and density thresholds prescribed or recommended by applicable public health authorities for storage (“Stored Tracked Movement”) on the Tracing Device of at least one Tracked Movement in at least one Congested Area; Configuration of the Tracing Device to enable its user to activate a feature to correlate and store on the Tracing Device the following data (“Tracked Congestion Data”): at least one Stored Tracked Movement and the RPI of the Tracing Device at the at least one time interval when at least one Stored Tracked Movement occurred; Configuration of the Tracing Device to enable its user to opt-in to a mobile application or messaging service (“Tracking Service”) that collects the Tracked Congestion Data of the Tracing Device; Configuration of the Tracing Device to enable its user to deactivate the Tracking Service; and Configuration of the Tracing Device to enable its user to reactivate the Tracking Service.
 3. A communications method described in claim 1, wherein at least one of the Tracing Devices may be configured to enable at least one of the following alerting, tracing, privacy and security capabilities: Encryption of metadata exchanged by the Tracing Device; Configuration of the Tracing Device to enable measurement of the power level of the wireless signal strength and the received signal strength indication between the Tracing Device and at least one Other Tracing Device, in order to more accurately estimate the distance between detected devices; Be in public mode wherein at least one Other Tracing Device can detect at least one of the following keys on the Tracing Device: the Tracing Key of the Tracing Device, all keys (“Derivative Keys”) on the Tracing Device derived from the said Tracing Key, all keys on the Tracing Device derived from said Derivative Keys, and all random exposure keys on the Tracing Device; Periodically generate a random RTK (the “Periodic Tracing Key” or “PTK”); Generation of a Rolling Proximity Identifier (“RPI”) derived from the PTK, using keyed-hashing for message authentication or other random number generator for authentication; Configuration of the Tracing Device to enable its user to opt-in to a mobile application or messaging service (“Mobile Service”) that will permit said Mobile Service to share the Tracing Device's RPI with at least one nearby Other Tracing Device; Configuration by the Mobile Service or user of the Tracing Device to enable the setting on the Tracing Device of the date (“Virus Identification Date”, or “VID”) of the earliest of the following events to occur: date of the said user's first onset of symptoms of the coronavirus or highly contagious disease; date of the said user's potentially positive virus diagnosis; and date of the said user's medically confirmed positive virus diagnosis; Configuration by the Mobile Service or user of the Tracing Device to enable the setting on the Tracing Device of the date (“Exposure Date”) the said user was or may have been exposed to the coronavirus or other highly contagious disease; Configuration by the Mobile Service or user of a first Tracing Device to enable the setting of prescribed parameters to limit collection and storage to the RPI received from at least one Other Tracing Device (“Proximate Device”) detected by the first Tracing Device to meet at least one of the following criteria: the Proximate Device was detected to have been within a prescribed distance of the first Tracing Device; the Proximate Device was detected for a prescribed time duration within a prescribed time interval; and the detection of the Proximate Device occurred within a prescribed number of days after at least one Exposure Date; Configuration by the Mobile Service or user of a first Tracing Device to enable the setting of prescribed parameters for the rolling deletion of the RPI of at least one Proximate Device from storage in the first Tracing Device based on at least one of the following criteria: the passage of a prescribed number of days since receipt of the RPI, and any criterion approved by applicable public health authorities; Configuration by the Mobile Service or user of the Tracing Device to measure the number of days since first and last detection of the at least one Proximate Device; Broadcast of the RPI from the Tracing Device using Bluetooth Low Energy or other Wireless Technology; Exchange its RPI with at least one Proximate Device detected by the SST Client; Store the RPI (“Shared Identifier”) received from the at least one Proximate Device; Keep track and store on the Tracing Device at least one item from a set comprised of the following data (“Tracing Data”): the date, location, proximity and duration of each contact with each of the at least one Proximate Device; and at least one of any Exposure Date; If a user of the Tracing Device is diagnosed positive or as potentially positive (an “Affected User”) for a novel coronavirus or other highly contagious disease, generation on the said Tracing Device of a diagnostic identifier key (“Diagnostic Identifier Key” or “DIK”) derived from the Tracing Key of the Tracing Device using keyed-hashing for message authentication or other random number generator for authentication; Configuration of the Tracing Device (“Source Device”) of the Affected User to enable the Affected User to opt-in to a Mobile Service that will permit said Mobile Service to share data (“Exposure Alert Data”) comprised of at least one of the following data groups: share its DIK with at least one Proximate Device; based on Tracing Data, share an alert (“Exposure Alert”) with at least one Proximate Device of potential exposure to a virus or disease; share the Virus Identification Date of the Affected User; share the Exposure Date of the Affected User; and share the Source Device's Tracing Data; Exchange by said Source Device of its DIK and an Exposure Alert with the at least one Proximate Device (“Exposed Device”) for which the Tracing Device of the Affected User has stored a Shared Identifier; Exchange by the Source Device of Exposure Alert Data with the at least one Exposed Device; If and when an Exposed Device receives an Exposure Alert from at least one Source Device, generate and store on the Exposed Device a random exposure key (“Exposure Identifier Key” or “EIK”) for the Exposed Device; For each Exposure Alert received by an Exposed Device, compile and store on the Exposed Device Tracing Data regarding at least one Proximate Device (a “Secondary-Exposure Device”) from which the Exposed Device received an RPI on or after the date (“Notice Date”) either (i) determined in a manner mandated or recommended by applicable public health authorities, or in the absence of such a date, (ii) the earliest of the following events to occur: the Virus Identification Date referenced in the Exposure Alert Data; the Exposure Date referenced in the Exposure Alert Data; and the date of the Exposure Alert sent by the Source Device; Exchange by the Exposed Device of its EIK and potential-exposure alert with at least one Secondary-Exposure Device; Exchange by the Exposed Device of the Notice Date and relevant Tracing Data with the at least one Secondary-Exposure Device; If and when a Secondary-Exposure Device receives a potential exposure alert from at least one Exposed Device, generate and store on the Secondary Exposure Device a random exposure key (“Secondary-Exposure Identifier” or “SEIK”) for said Secondary-Exposure Device; For each Exposure Identifier received by a Secondary-Exposure Device, compile and store on the Secondary-Exposure Device Tracing Data (“Secondary-Exposure Tracing Data”) regarding at least one Proximate Device (“Tertiary-Exposure Device”) from which the Secondary-Exposure Device received an RPI on or after the Notice Date; and Exchange by the Secondary-Exposure Device with at least one Tertiary-Exposure Device of at least one of the following data groups: a potential-exposure alert; the Notice Date; its SEIK; and relevant Secondary-Exposure Tracing Data.
 4. A new privacy-preserving communications method for implementing exposure notification, contact tracing, and movement tracking measures by using Bluetooth or other nearby communications technology for communicating with nearby smartphones and mobile devices, and for a data exchange mechanism both to alert participants of possible exposure to someone who they have recently been in contact with, and who has subsequently been positively or potentially diagnosed as having a novel coronavirus or other highly contagious disease, and to trace and identify containers, packages, envelopes and other objects that may have been in contact with a person or object carrying or potentially carrying the virus or disease, the method comprising: For each smartphone or other mobile device (“Tracing Device”) equipped with at least one item from a set of the following wireless technologies—ZigBee, WiFi, Bluetooth, Bluetooth Low Energy (BLE), Bluetooth Smart, Near-Field Communication (NFC) and WiMax (a “Wireless Technology”)—generation of a random or dynamically changing unique device identifier (“Tracing Key”) that is derived from at least one item from a set comprised of at least one of the following identifiers associated with the Tracing Device (including its software and firmware): a one-time tracing key, a randomly generated one-time tracing key, operating system software, MAC address, IP address, local area network, wide area network, cloud network, cloud account, serial number, other device identifying information, attribute, interest, preference, activity, service message, tag, token, vendor device identifier, advertising device identifier, other datum, other data set, and other variable identification information; Using a client application (herein, a sixth-sense client or, “SS Client”) on the Tracing Device to conduct at least one of the following functions: detect the Tracing Key stored on at least one other Tracing Device (“Other Tracing Device”) and authenticate at least one Other Tracing Device based on its Tracing Key; and Using the SS Client on the at least one Other Tracing Device to authenticate the first Tracing Device or any Other Tracing Device based on its Tracing Key.
 5. A communications method described in claim 4, wherein at least one of the Tracing Devices may be configured to enable at least one of the following tracking, privacy and security capabilities: Encryption of metadata exchanged by the Tracing Device; Configuration of the Tracing Device to enable measurement of the power level of the wireless signal strength and the received signal strength indication between the Tracing Device and at least one Other Tracing Device, in order to more accurately estimate the distance between detected devices; Be in public mode wherein at least one Other Tracing Device can detect on the Tracing Device at least one of the following keys: the Tracing Key of the Tracing Device, all keys (“Derivative Keys”) on the Tracing Device derived from the said Tracing Key, and all keys on the Tracing Device derived from said Derivative Keys; Periodically generate a random Tracing Key (the “Periodic Tracing Key” or “PTK”); Generation of a Rolling Proximity Identifier (“RPI”) derived from the PTK, using keyed-hashing for message authentication or other random number generator for authentication; Configuration of the Tracing Device to enable its user to set location parameters specifying the home region (“Home Base”) of the Tracing Device; Configuration of the Tracing Device to enable its user to enter parameters prescribed or recommended by applicable public health authorities defining a congested area (“Congestion Area”) based on at least one of the following criteria: a designated place of public assembly; other place of public assembly, based on meeting at least one of the following criteria: cruise ship, resort hotels, beach, park, golf course, tennis center, ski area, trail system, public bus, school bus, train, subway, street car, ride sharing, library, school, gymnasium, church, retail store, bar, pub, tavern, restaurant, sports field, sports stadium, sports arena, hockey rink, convention center, conference hall, and hotel dining room; and other hyper-local zones where the density of Tracing Devices per square meter exceeds a maximum level prescribed or recommended by applicable public health authorities; Configuration of the Tracing Device to enable its user to identify, measure and track on the Tracing Device movement (“Tracked Movement”) of the Tracing Device based on one or more of the following criteria: movement of the Tracing Device outside of the Home Base; movement of the Tracing Device into a Congested Area; and duration of time the Tracing Device spends in a Congestion Area; Configuration of the Tracing Device to enable its user to enter time and density thresholds prescribed or recommended by applicable public health authorities for storage (“Stored Tracked Movement”) on the Tracing Device of at least one Tracked Movement in at least one Congested Area; Configuration of the Tracing Device to enable its user to active a feature to correlate and store on the Tracing Device the following data (“Tracked Congestion Data”): at least one Stored Tracked Movement and the RPI of the Tracing Device at the at least one time interval when at least one Stored Tracked Movement occurred; Configuration of the Tracing Device to enable its user to opt-in to a mobile application or messaging service (“Tracking Service”) that collects the Tracked Congestion Data of the Tracing Device; Configuration of the Tracing Device to enable its user to deactivate the Tracking Service; and Configuration of the Tracing Device to enable its user to reactivate the Tracking Service.
 6. A communications method described in claim 4, wherein at least one of the Tracing Devices may be configured to enable at least one of the following alerting, tracing, privacy and security capabilities: Encryption of metadata exchanged by the Tracing Device; Configuration of the Tracing Device to enable measurement of the power level of the wireless signal strength and the received signal strength indication between the Tracing Device and at least one Other Tracing Device, in order to more accurately estimate the distance between detected devices; Be in public mode wherein at least one Other Tracing Device can detect on the Tracing Device at least one of the following keys: the Tracing Key of the Tracing Device, all keys (“Derivative Keys”) on the Tracing Device derived from the said Tracing Key, all keys on the Tracing Device derived from said Derivative Keys, and all random exposure keys on the Tracing Device; Periodically generate a random Tracing Key (the “Periodic Tracing Key” or “PTK”); Generation of a Rolling Proximity Identifier (“RPI”) derived from the PTK, using keyed-hashing for message authentication or other random number generator for authentication; Configuration of the Tracing Device to enable its user to opt-in to a mobile application or messaging service (“Mobile Service”) that will permit said Mobile Service to share the Tracing Device's RPI with at least one nearby Other Tracing Device; Configuration of the Mobile Service or user of the Tracing Device to enable the setting on the Tracing Device of the date (“Virus Identification Date”, or “VID”) of the earliest of the following events to occur: date of the said user's first experience of symptoms of the coronavirus or highly contagious disease; date of the said user's potentially positive virus diagnosis; and date of the said user's medically confirmed positive virus diagnosis; Configuration by the Mobile Service or user of the Tracing Device to enable the setting on the Tracing Device of the date (“Exposure Date”) the said user was or may have been exposed to the coronavirus or other highly contagious disease; Configuration by the Mobile Service or user of a first Tracing Device to enable the setting of prescribed parameters to limit collection and storage to the RPI received from at least one Other Tracing Device (“Proximate Device”) detected by the first Tracing Device to meet at least one of the following criteria: the Proximate Device was detected to have been within a prescribed distance of the first Tracing Device; the Proximate Device was detected for a prescribed time duration within a prescribed time interval; and the detection of the Proximate Device occurred within a prescribed number of days after at least one Exposure Date; Configuration by the Mobile Service or user of a first Tracing Device to enable the setting of prescribed parameters for the rolling deletion of the RPI of at least one Proximate Device from storage in the first Tracing Device based on at least one of the following criteria: the passage of a prescribed number of days since receipt of the RPI, and any criterion approved by applicable public health authorities; Configuration by the Mobile Service or user of the Tracing Device to measure the number of days since first and last detection of the at least one Proximate Device; Broadcast of the RPI from the Tracing Device using Bluetooth Low Energy or other Wireless Technology; Exchange its RPI with at least one Proximate Device detected by the SS Client; Store the RPI (“Shared Identifier”) received from the at least one Proximate Device; Keep track and store on the Tracing Device at least one item from a set comprised of the following data (“Tracing Data”): the date, location, proximity and duration of each contact with each of the at least one Proximate Device; and at least one of any Exposure Date; If a user of the Tracing Device is diagnosed positive or as potentially positive (an “Affected User”) for a novel coronavirus or other highly contagious disease, generation on the said Tracing Device of a diagnostic identifier key (“Diagnostic Identifier Key” or “DIK”) derived from the Tracing Key of the Tracing Device using keyed-hashing for message authentication or other random number generator for authentication; Configuration of the Tracing Device (“Source Device”) of the Affected User to enable the Affected User to opt-in to a Mobile Service that will permit said Mobile Service to share data (“Exposure Alert Data”) comprised of at least one of the following data groups: share its DIK with at least one Proximate Device; based on Tracing Data, share an alert (“Exposure Alert”) with at least one Proximate Device of potential exposure to a virus or disease; share the Virus Identification Date of the Affected User; share the Exposure Date of the Affected User; and share the Source Device's Tracing Data; Exchange by said Source Device of its DIK and an Exposure Alert with the at least one Proximate Device (“Exposed Device”) for which the Tracing Device of the Affected User has stored a Shared Identifier; Exchange by the Source Device of Exposure Alert Data with the at least one Exposed Device; If and when an Exposed Device receives an Exposure Alert from at least one Source Device, generate and store on the Exposed Device a random exposure key (“Exposure Identifier Key” or “EIK”) for the Exposed Device; For each Exposure Alert received by an Exposed Device, compile and store on the Exposed Device Tracing Data regarding at least one Proximate Device (a “Secondary-Exposure Device”) from which the Exposed Device received an RPI on or after the date (“Notice Date”) either (i) determined in a manner mandated or recommended by applicable public health authorities, or in the absence of such a date, (ii) the earliest of the following events to occur: the Virus Identification Date referenced in the Exposure Alert Data; the Exposure Date referenced in the Exposure Alert Data; and the date of the Exposure Alert sent by the Source Device; Exchange by the Exposed Device of its EIK and potential-exposure alert with at least one Secondary-Exposure Device; Exchange by the Exposed Device of the Notice Date and relevant Tracing Data with the at least one Secondary-Exposure Device; If and when a Secondary-Exposure Device receives a potential exposure alert from at least one Exposed Device, generate and store on the Secondary Exposure Device a random exposure key (“Secondary-Exposure Identifier” or “SEIK”) for said Secondary-Exposure Device; For each Exposure Identifier received by a Secondary-Exposure Device, compile and store on the Secondary-Exposure Device Tracing Data (“Secondary-Exposure Tracing Data”) regarding at least one Proximate Device (“Tertiary-Exposure Device”) from which the Secondary-Exposure Device received an RPI on or after the Notice Date; and Exchange by the Secondary-Exposure Device with at least one Tertiary-Exposure Device of at least one of the following data groups: a potential-exposure alert; the Notice Date; its SEIK; and relevant Secondary-Exposure Tracing Data.
 7. A new privacy-preserving Bluetooth method for implementing exposure notification, contact tracing, and movement tracking measures contact tracing by using the Bluetooth LE (Low Energy) contact detection service for proximity detection of nearby smartphones, and for the data exchange mechanism to alert participants of possible exposure to someone who they have recently been in contact with, and who has subsequently been positively or potentially diagnosed as having a novel coronavirus or other highly contagious disease, the method comprising: For each smartphone or other mobile device (“Tracing Device”) equipped with either Bluetooth Low Energy (BLE) or Bluetooth Smart contact detection service (BCDS), generation of a random or dynamically changing unique device identifier (“Tracing Key”) that is derived from at least one item from a set comprised of at least one of the following identifiers associated with the Tracing Device (including its software and firmware): a one-time tracing key, a randomly generated one-time tracing key, operating system software, MAC address, IP address, local area network, wide area network, cloud network, cloud account, serial number, other device identifying information, attribute, interest, preference, activity, service message, tag, token, vendor device identifier, advertising device identifier, other datum, other data set, and other variable identification information; Using a client application (herein, a sixth-sense client or, “SS Client”) on the Tracing Device to conduct at least one of the following functions: detect the Tracing Key stored on at least one other Tracing Device (“Other Tracing Device”) and authenticate at least one Other Tracing Device based on its Tracing Key; and Using the SS Client on the at least one Other Tracing Device to authenticate the first Tracing Device or any Other Tracing Device based on its Tracing Key.
 8. A communications method described in claim 7, wherein at least one of the Tracing Devices may be configured to enable at least one of the following tracking, privacy and security capabilities: Encryption of metadata exchanged by the Tracing Device; Configuration of the Tracing Device to enable measurement of the power level of the wireless signal strength and the received signal strength indication between the Tracing Device and at least one Other Tracing Device, in order to more accurately estimate the distance between detected devices; Be in public mode wherein at least one Other Tracing Device can detect on the Tracing Device at least one of the following keys: the Tracing Key of the Tracing Device, all keys (“Derivative Keys”) on the Tracing Device derived from the said Tracing Key, and all keys on the Tracing Device derived from said Derivative Keys; Periodically generate a random Tracing Key (the “Periodic Tracing Key” or “PTK”); Generation of a Rolling Proximity Identifier (“RPI”) derived from the PTK, using keyed-hashing for message authentication or other random number generator for authentication; Configuration of the Tracing Device to enable its user to set location parameters specifying the home region (“Home Base”) of the Tracing Device; Configuration of the Tracing Device to enable its user to enter parameters prescribed or recommended by applicable public health authorities defining a congested area (“Congestion Area”) based on at least one of the following criteria: an identified place of public assembly; other place of public assembly, based on meeting at least one of the following criteria: cruise ship, resort hotels, beach, park, golf course, tennis center, ski area, trail system, public bus, school bus, train, subway, street car, ride sharing, library, school, gymnasium, church, retail store, bar, pub, tavern, restaurant, sports field, sports stadium, sports arena, hockey rink, convention center, conference hall, and hotel dining room; and other hyper-local zones where the density of Tracing Devices per square meter exceeds a maximum level prescribed or recommended by applicable public health authorities; Configuration of the Tracing Device to enable its user to identify, measure and track on the Tracing Device movement (“Tracked Movement”) of the Tracing Device based on one or more of the following criteria: movement of the Tracing Device outside of the Home Base; movement of the Tracing Device into a Congested Area; and duration of time the Tracing Device spends in a Congestion Area; Configuration of the Tracing Device to enable its user to enter time and density thresholds prescribed or recommended by applicable public health authorities for storage (“Stored Tracked Movement”) on the Tracing Device of at least one Tracked Movement in at least one Congested Area; Configuration of the Tracing Device to enable its user to active a feature to correlate and store on the Tracing Device the following data (“Tracked Congestion Data”): at least one Stored Tracked Movement and the RPI of the Tracing Device at the at least one time interval when at least one Stored Tracked Movement occurred; Configuration of the Tracing Device to enable its user to opt-in to a mobile application or messaging service (“Tracking Service”) that collects the Tracked Congestion Data of the Tracing Device; Configuration of the Tracing Device to enable its user to deactivate the Tracking Service; and Configuration of the Tracing Device to enable its user to reactivate the Tracking Service.
 9. A communications method described in claim 7, wherein at least one of the Tracing Devices may be configured to enable at least one of the following alerting, tracing, privacy and security capabilities: Encryption of metadata exchanged by the Tracing Device; Configuration of the Tracing Device to enable measurement of the power level of the wireless signal strength and the received signal strength indication between the Tracing Device and at least one Other Tracing Device, in order to more accurately estimate the distance between detected devices; Be in public mode wherein at least one Other Tracing Device can detect on the Tracing Device at least one of the following keys: the Tracing Key of the Tracing Device, all keys (“Derivative Keys”) on the Tracing Device derived from the said Tracing Key, all keys on the Tracing Device derived from said Derivative Keys, and all random exposure keys on the Tracing Device; Periodically generate a random Tracing Key (the “Periodic Tracing Key” or “PTK”); Generation of a Rolling Proximity Identifier (“RPI”) derived from the PTK, using keyed-hashing for message authentication or other random number generator for authentication; Configuration of the Tracing Device to enable its user to opt-in to a mobile application or messaging service (“Mobile Service”) that will permit said Mobile Service to share the Tracing Device's RPI with at least one nearby Other Tracing Device; Configuration of the Mobile Service or user of the Tracing Device to enable the setting on the Tracing Device of the date (“Virus Identification Date”, or “VID”) of the earliest of the following events to occur: date of the said user's first onset of symptoms of the coronavirus or highly contagious disease; date of the said user's potentially positive virus diagnosis; and date of the said user's medically confirmed positive virus diagnosis; Configuration by the Mobile Service or user of the Tracing Device to enable the setting on the Tracing Device of the date (“Exposure Date”) the said user was or may have been exposed to the coronavirus or other highly contagious disease; Configuration by the Mobile Service or user of a first Tracing Device to enable the setting of prescribed parameters to limit collection and storage to the RPI received from at least one Other Tracing Device (“Proximate Device”) detected by the first Tracing Device to meet at least one of the following criteria: the Proximate Device was detected to have been within a prescribed distance of the first Tracing Device; the Proximate Device was detected for a prescribed time duration within a prescribed time interval; and the detection of the Proximate Device occurred within a prescribed number of days after at least one Exposure Date; Configuration by the Mobile Service or user of a first Tracing Device to enable the setting of prescribed parameters for the rolling deletion of the RPI of at least one Proximate Device from storage in the first Tracing Device based on at least one of the following criteria: the passage of a prescribed number of days since receipt of the RPI, and any criterion approved by applicable public health authorities; Configuration by the Mobile Service or user of the Tracing Device to measure the number of days since first and last detection of the at least one Proximate Device; Broadcast of the RPI from the Tracing Device using Bluetooth Low Energy; Exchange its RPI with at least one Proximate Device detected by either the SS Client or BCDS; Store the RPI (“Shared Identifier”) received from the at least one Proximate Device; Keep track and store on the Tracing Device at least one item from a set comprised of the following data (“Tracing Data”): the date, location, proximity and duration of each contact with each of the at least one Proximate Device; and at least one of any Exposure Date; If a user of the Tracing Device is diagnosed positive or as potentially positive (an “Affected User”) for a novel coronavirus or other highly contagious disease, generation on the said Tracing Device of a diagnostic identifier key (“Diagnostic Identifier Key” or “DIK”) derived from the Tracing Key of the Tracing Device using keyed-hashing for message authentication or other random number generator for authentication; Configuration of the Tracing Device (“Source Device”) of the Affected User to enable the Affected User to opt-in to a Mobile Service that will permit said Mobile Service to share data (“Exposure Alert Data”) comprised of at least one of the following data groups: share its DIK with at least one Proximate Device; based on Tracing Data, share an alert (“Exposure Alert”) with at least one Proximate Device of potential exposure to a virus or disease; share the Virus Identification Date of the Affected User; share the Exposure Date of the Affected User; and share the Source Device's Tracing Data; Exchange by said Source Device of its DIK and an Exposure Alert with the at least one Proximate Device (“Exposed Device”) for which the Tracing Device of the Affected User has stored a Shared Identifier; Exchange by the Source Device of Exposure Alert Data with the at least one Exposed Device; If and when an Exposed Device receives an Exposure Alert from at least one Source Device, generate and store on the Exposed Device a random exposure key (“Exposure Identifier Key” or “EIK”) for the Exposed Device; For each Exposure Alert received by an Exposed Device, compile and store on the Exposed Device Tracing Data regarding at least one Proximate Device (a “Secondary-Exposure Device”) from which the Exposed Device received an RPI on or after the date (“Notice Date”) either (i) determined in a manner mandated or recommended by applicable public health authorities, or in the absence of such a date, (ii) the earliest of the following events to occur: the Virus Identification Date referenced in the Exposure Alert Data; the Exposure Date referenced in the Exposure Alert Data; and the date of the Exposure Alert sent by the Source Device; Exchange by the Exposed Device of its EIK and potential-exposure alert with at least one Secondary-Exposure Device; Exchange by the Exposed Device of the Notice Date and relevant Tracing Data with the at least one Secondary-Exposure Device; If and when a Secondary-Exposure Device receives a potential exposure alert from at least one Exposed Device, generate and store on the Secondary Exposure Device a random exposure key (“Secondary-Exposure Identifier” or “SEIK”) for said Secondary-Exposure Device; For each Exposure Identifier received by a Secondary-Exposure Device, compile and store on the Secondary-Exposure Device Tracing Data (“Secondary-Exposure Tracing Data”) regarding at least one Proximate Device (“Tertiary-Exposure Device”) from which the Secondary-Exposure Device received an RPI on or after the Notice Date; and Exchange by the Secondary-Exposure Device with at least one Tertiary-Exposure Device of at least one of the following data groups: a potential-exposure alert; the Notice Date; its SEIK; and relevant Secondary-Exposure Tracing Data. 