System and Method for Image Matching Using Networked Mobile Communication

ABSTRACT

Communication is established between a plurality of users through mobile computing devices. A server communicates with the mobile computing devices. Unique User Identifiers (UUIDs) are registered on the server through a network, and a database connected to the server stores the uploaded UUIDs and associated data. The server receives and sends communications to and from the mobile computing devices, receives UUIDs and associated data from mobile computing devices, and sends UUIDs and associated data to one or more mobile computing devices. The user&#39;s mobile computing device is used to identify an image and to determine an image resemblance measured with facial recognition algorithms that represent deviations in facial features and dimensions.

RELATED APPLICATIONS

The present disclosure is a Continuation Application of U.S. patentapplication Ser. No. 17/141,553, filed Jan. 5. 2021, now U.S. Pat. No.11,582,817, issued Feb. 14, 2023. U.S. patent application Ser. No.17/141,553 is a Continuation Application of U.S. patent application Ser.No. 16/552,834, filed Aug. 27, 2018, now U.S. Pat. No. 10,887,937,issued Jan. 5, 2021. U.S. patent application Ser. No. 16/552,834 is aContinuation Application of U.S. patent application Ser. No. 15/846,972,filed Dec. 19, 2017, now U.S. Pat. No. 10,397,971, issued Aug. 27, 2019.U.S. patent application Ser. No. 15/846,972 claims priority to U.S.patent application Ser. No. 15/132,868, filed Apr. 19, 2016, now U.S.Pat. No. 9,854,616. U.S. patent application Ser. No. 15/132,868 claimspriority to Provisional Patent Application No. 62/152,838 filed Apr. 25,2015, Provisional Patent Application No. 62/218,487 filed Sep. 14, 2015and Provisional Patent Application No. 62/260,593 filed Nov. 29, 2015,which are filed by the inventors hereof and the entirety of which areincorporated by reference herein.

BACKGROUND Field

The present disclosure relates generally to digital communicationsystems and methods and more specifically to digital communicationsystems and methods for image matching.

Background

Users of mobile communication devices are able to connect with oneanother through the use of social networking platforms in conjunctionwith applications on the mobile communication devices using acommunication protocol. The communication protocol can be cellular orwireless based. In order to connect with a member of a social networkingplatform, a user of a mobile communication device must first registerwith the social networking platform and have some knowledge of themember to whom the connection is desired. The knowledge of the memberallows the user of the mobile communication device to send a connectionrequest to the member.

Normally, acceptance of the connection request by the member is requiredfor the user of the mobile communication device to communicate directlywith the member. Without information identifying or related to a memberof a social networking platform, the user of the mobile communicationdevice is seemingly a stranger and has no way of communicating with themember.

In the case of people within proximity to one another, there may befurther reason to connect while using a wireless device, for example, ifface-to-face communication is impractical or socially awkward. It iswithin the aforementioned context that a need for the disclosedtechnology has arisen. Thus, there is a need to provide a way ofestablishing wireless communication based at least in part on proximityof users to each other.

SUMMARY

Communications are established between a plurality of users having amobile computing devices. A server communicates with a plurality ofmobile computing devices, each mobile computing device associated withone or more Unique User Identifiers (UUIDs). The devices have means forconnecting the mobile computing devices to the server and registeringthe UUIDs on said server through a network; and a database connected tothe server and comprising the uploaded UUIDs and associated data. Theserver receives and sends communications to and from the mobilecomputing devices, receives UUIDs and associated data from mobilecomputing devices, and sends UUIDs and associated data to one or moremobile computing devices. The user's mobile computing device is used toidentify an image and to determine an image resemblance measured withfacial recognition algorithms that represent deviations in facialfeatures and dimensions.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a schematic diagram illustrating a system for proximity basednetworked mobile communication according to the present disclosure.

FIGS. 2A-2C are schematic diagrams illustrating a system for proximitybased networked mobile communications in various environments. FIG. 2Aillustrates a system for proximity based networked mobile communicationin which at least one mobile device is outside of Wi-Fi range. FIG. 2Billustrates a system for proximity based networked mobile communicationcommunicating with users within Wi-Fi range of each other. FIG. 2Cillustrates a system for proximity based networked mobile communicationused to communicate with a fixed station.

FIGS. 3A and 3B are schematic flow charts showing downloading,installation and registration of a mobile device. FIG. 3A illustrates amobile application process according to the present disclosure. FIG. 3Billustrates a mobile application process according to the presentdisclosure.

FIG. 4 is a schematic block diagram illustrating a server systemaccording to the present disclosure.

FIG. 5 is a schematic diagram illustrating a user interface scenarioaccording to the present disclosure.

FIG. 6 is a schematic diagram illustrating an exemplary computerarchitecture for use with the present disclosure.

FIGS. 7A and 7B are schematic diagrams showing the operation of thesystem without and with an ability to respond when a mobile device is inan “inactive” mode. FIG. 7A shows a configuration in which “inactivemode” response is not enabled. FIG. 7B shows what a proximity-basedsystem in accordance with the mobile device able to respond when in an“inactive” state.

FIG. 8 is a schematic diagram of a group of mobile devices associatedwith users in proximity to each other and in proximity to a Wi-Fi hotspot.

FIG. 9 is a schematic block diagram showing the communication used toestablish groups.

FIGS. 10A-10C are representations of mobile device displays of contactsor other users to provide a proximity display. FIG. 10A depicts astarting page. FIG. 10B depicts a similar page obtained by removingmessage information.

FIGS. 11A and 11B are schematic diagrams depicting a Presence GroupAggregation System platform in its functional aspect. FIG. 11A showsestablishing proximity. FIG. 11B is a three ring model, based on thediagram of FIG. 11A, based on a user's nearby user experience.

DETAILED DESCRIPTION

Overview

Various aspects of methods and systems for proximity based networkedmobile communication can be found in exemplary configurations of thedisclosed technology. References are made in detail to theconfigurations of the disclosed technology, non-limiting examples ofwhich are illustrated in the accompanying drawings. While the disclosedtechnology will be described in conjunction with the disclosedconfigurations, it will be understood that they are not intended tolimit the disclosed technology to these configurations. On the contrary,the disclosed technology is intended to cover alternatives,modifications and equivalents, which may be included within the spiritand scope of the disclosed technology as defined by the appended claims.Furthermore, in the following detailed description, numerous specificdetails are set forth to provide a thorough understanding of thedisclosed technology, which can be practiced by one of ordinary skill inthe art without these specific details. In other instances, well-knownmethods, procedures, components, and circuits have not been described indetail as to not unnecessarily obscure aspects of the presentdisclosure.

In a first configuration, a plurality of users each associated with amobile computing device is within proximity of a wireless frequencyrange including Wi-Fi and/or Bluetooth (registered trademark ofBluetooth Special Interest Group of Kirkland, Wash.). A mobileapplication on a registered mobile computing device causes the mobilecomputing device to advertise and listen to unique user identifiers viawireless including Bluetooth frequencies. In this context, “advertise”refers to broadcast of data so that other devices within range maybecome aware of the presence of the device broadcasting the data.Detected unique identification phone data from the advertisementscomprising Unique User Identification (UUID) such as Bluetooth LowEnergy UUID &/or Randomly Generated Identifier from 0 to 4294967295, MACaddress and SSID information are transmitted in a query to the serversystem and cross referenced with registered member information. By theuse of unique identifiers, obtained as either direct deviceidentification (e.g., MAC address) or assigned identifiers (e.g., UUID),positive matches of registered members are displayed on the mobilecomputing device and communication between the mobile computing deviceand mobile computing devices associated with registered members isenabled. The use of a UUID has particular advantages, in that the UUIDis intended for broadcast transmission, whereas some other identifiers,such as MAC addresses, are not always available for security or otherreasons.

While specific examples of communication protocols are described, it iscontemplated that other communication protocols may be used inaccordance with the present disclosure.

According to the present disclosure, a registered user of the proximitybased networked communication system can communicate with otherregistered users purely based on proximity rather than prior knowledgeof the registered users. A registered user of the proximity basednetworked communication system can broadcast a message, view profiles ofnearby users, comment on photos, and anonymously and non-anonymouslychoose “Gifts” to post next to the picture, call and/or video conferenceto other registered users who are within proximity of the registereduser. Examples of such a scenario include social scenarios as well aslaw-enforcement scenarios such as Amber alerts (information regardingmissing children).

In addition to the above-referenced functionalities, the system can showboth users each other as soon as the first user sees the second user.The system does not wait for B to identify A; it already shows A on B'sdisplay screen as soon as B is shown on A's screen. The system alsoshows A what is on C's Screen. By way of non-limiting example, A sees Band C but does not see D, either because D is too far away or because itjust has not processed the information concerning D yet. So long assomeone else sees D, then A will see D as well. For example, if either Bor C sees D, then A will see D as well. In this manner, there are nocommunication delays because users can observe each other at differenttimes, in some cases with minute differentials. As soon as one person inthe room picks up, everyone else gets up to speed.

The users' phone number database can also be integrated such that thesystem provides a warning that someone in their phone book contacts iswithin a user's “proximity zone”. The system may create special statusfor people that the user wishes to see or avoid. The special status forpeople that the user wishes to see can include, by way of non-limitingexample, best friends or crushes, so that one can observe which of theirsocial media contacts, friends and friends of friends are within theproximity. The special status for people that the user wishes to avoidcan include former partners, people restricted by restraining orders,parents, friends and relatives. The system also has a capability ofusing a sex offender database to warn parents that that a possible sexoffender is within the Wi-Fi-“danger” zone or proximity.

The system can cross reference phone numbers and social media storedwithin the phone. The system may also be integrated with socialnetworking and professional social networking profiles with thisapplication for business conferences.

Integration of Tinder and similar dating and/or a features allows usersto indicate dating and/or business interest in other nearby users, andwhich will only notify the other users if the other user also indicatedthis same interest. This system will be highly effective and efficientin matchmaking between people within conferences, nightclubs and bars.As an adjunct to this, the system can link to niche dating sites andother special interest groups, so that users who so-desire can identifyother users who are in the proximity and who share the same commoninterests. The system can further filter such associations according tosubscriber status, provided that the site permits such information to beaccessed. According to one non-limiting configuration, informationconcerning special interests is provided only if the user is alsosubscribed to or identified with the special interest. According toanother configuration, the user can select whether to limit disclosureof the special interest.

Integration with point of sale systems such as Google Wallet, ApplePayand Paypal may be obtained. Integration with social media sites (e.g.,Facebook) can be used to allow members to send invites and to revealtheir social media links and their mutual friends when in social venueswhere they would like to share that information. In differentnon-limiting configurations, payment can be made through the system,externally, or according to the user's choice.

The disclosed technology will additionally provide a peer-to-peer ridesharing platform which will allow users to send ride requests byselecting their destination and choosing their own price that they arewilling to pay. All nearby users of the disclosed technology willreceive this ride request and they will have the ability to agree or tosend a counter offer. The close range network will be ideal in providingthe user with individuals who are in the immediate vicinity and thusimmediately ready to initiate the requested journey. The Paymentprocessing system will require users to scan a credit card and will holda deposit in order to only allow prepaid users to send ride requests.

Instant Food Delivery Service: The disclosed technology will alsoprovide users the ability to request food at the click of a button.Utilizing a proximity nearby user that represents the nearby foodproduction services, for example the nearby restaurants will be able tojoin the network using a special commercial account, and this will allowusers to instantly make orders by clicking on the Profiles of thesenearby options. This will provide the the advantage of exclusivelyproviding its own food delivery services to nearby users.

Face Recognition Database of Similarities in People

The disclosed technology is useful, when coupled with facial images, toassociate these individuals with profiles of individuals in proximity tothe user, receiving, from the mobile device an image of a person. Facialrecognition can be used to determine if a match exists between the imageand a user detected in proximity to the device providing the image ofthe person. This is useful for identification of people who a user mayrecognize but not know their name and for assisting people withprosopagnosia.

If a user provides an image of a person to the server, the server canuse facial recognition to determine if a match exists between the imageand a user in proximity to the user providing the image.

The disclosed technology will additionally have the ability to provideusers with other individuals in the database that most resemble thatindividual. Resemblance is measured with facial recognition algorithmsthat represent deviations in facial features and dimensions. Thisservice provides entertainment value as well as the service of givingpeople “another chance” at romance with their specific taste. Indifferent non-limiting configurations, the face recognition can beperformed by the user's mobile device or by face recognition software ona server.

Technique

FIG. 1 is a schematic diagram illustrating a system for proximity basednetworked mobile communication 100 according to the present disclosure.In FIG. 1 , proximity based networked mobile communication system 100comprises a first mobile device 101 having a first mobile computingdevice 102 communicably coupled via internet/communication network 107to server system 108. The system 100 further comprises a second mobiledevice 103 having a second mobile computing device 104 communicablycoupled via internet/communication network 107 to server system 108.Internet/communication network 107 can be any communication network thatallows data to be communicated or transferred from one point to another.Such a network might be wired or wireless as deemed necessary to beconsistent with the spirit and scope of the present disclosure.

In FIG. 1 , the first mobile device 101 can utilize a mobile application(not shown here) on mobile computing device 102 to access server system108 to register with server system 108 to become a member of theproximity based networked mobile communication system. The second mobiledevice 103 can utilize a mobile application (not shown here) on mobilecomputing device 104 to access server system 108 to register with serversystem 108 to also become a member of the proximity based networkedmobile communication system. The first mobile device 101 and secondmobile device 103 utilize the mobile application on their respectivedevices (102, 104) to communicate with each other while their devicesare both within a wireless frequency range including Wi-Fi and/orBluetooth 105. Wireless frequency range including Wi-Fi and/or Bluetooth105 is associated with internet router 106; that is, in the presentconfiguration, internet router 106 is either Bluetooth enabled and/orhas Wi-Fi capability.

Router 106 receives data from internet/communication network. Router 106is a Wi-Fi router capable of receiving data from the internet and thatis compliant with 802.11 standards or with other appropriate standards.Router 106, as mentioned, is capable of receiving data frominternet/communication network 107. Router 106 is also/or Bluetoothcapable, operating in the unlicensed industrial, scientific and medical(ISM) band at 2.4 to 2.485 GHz, using a spread spectrum, frequencyhopping, full-duplex signal at a nominal rate of 1600 hops/sec. It willbe appreciated that, while the present disclosure depicts mobilecomputing device as smartphones, any mobile computing device with thecomputing and communication capabilities to perform the functionalitiesdescribed herein are within the scope of the present disclosure.

The first mobile device 101 and second mobile device 103 can thenperform functionalities related to proximity based networked mobilecommunication consistent with the spirit and scope of the presentdisclosure. Although not shown, further descriptions of variousconfigurations of the disclosed technology will be described withreference to the following figures.

FIGS. 2A-2C are schematic diagrams illustrating a system for proximitybased networked mobile communications in various environments. FIG. 2Aillustrates a system for proximity based networked mobile communicationin which at least one mobile device is outside of Wi-Fi range. FIG. 2Billustrates a system for proximity based networked mobile communicationcommunicating with users within Wi-Fi range of each other. FIG. 2Cillustrates a system for proximity based networked mobile communicationused to communicate with a fixed station.

In FIG. 2A, internet router 206 provides for wireless frequenciesincluding wireless frequency range including Wi-Fi and/or Bluetooth 205.Users 201, 203, 209, and 211 each have respective mobile computingdevices 202, 204, 210, and 212 and all of them are within wirelessfrequency range including Wi-Fi and/or Bluetooth 205.

Because all of the users 201, 203, 209, and 211 and their respectivemobile computing devices 202, 204, 210, and 212 are within wirelessfrequency range including Wi-Fi and/or Bluetooth 205, and because theyare all registered members of the proximity based networked mobilecommunication system, they can all communicate with each other.

In FIG. 2A, a user 215 having mobile computing device 216, is not withinthe wireless frequency range including Wi-Fi and/or Bluetooth 205.Regardless of whether user 215 is registered with the proximity basednetworked mobile communication system, because user 215 is outside ofthe wireless frequency range including Wi-Fi and/or Bluetooth 205, theusers and their mobile computing devices within the wireless frequencyrange including Wi-Fi and/or Bluetooth cannot communicate with user 215through the system.

Optionally, each of the users 201, 203, 209, and 211 may use theirrespective mobile computing devices 202, 204, 210, and 212 while withinwireless frequency range including Wi-Fi and/or Bluetooth 205 to requesta social networking connection with any of the other devices. Socialnetworking can include Facebook, Twitter, Instagram, and the like, aswell as specialized and professional social networking services.

FIG. 2B illustrates a system for proximity based networked mobilecommunication 220 according to the present disclosure. In FIG. 2B,internet router 206 provides for a wireless frequency range includingWi-Fi and/or Bluetooth 205. Users 201, 203, 209, and 211 each haverespective mobile computing devices 202, 204, 210, and 212 and all ofthem are within wireless frequency range including Wi-Fi and/orBluetooth 205.

In FIG. 2B, all of the users 201, 203, 209, and 211 and their respectivemobile computing devices 202, 204, 210, and 212 are within wirelessfrequency range including Wi-Fi and/or Bluetooth 205. Because they areall registered members of the proximity based networked mobilecommunication system, user 203 can broadcast a message, call and/orvideo conference and view/comment/“gift” photos using mobile computingdevice 204 to the other users 209, 201, 211 and their devices 210, 202,212.

FIG. 2C illustrates a system for proximity based networked mobilecommunication 240 according to the present disclosure. In FIG. 2C,internet router 206 provides for a wireless frequency range includingWi-Fi and/or Bluetooth 205. Users 201, 203, and 213 each have respectivemobile computing devices 202, 204, and 214 and all of them are withinwireless frequency range including Wi-Fi and/or Bluetooth 205.Alternatively, it is possible to provide one or more devices, such asdevice 214, which is wire-connected, provided it can communicate, albeitindirectly, with the wireless network 205. In linking a wire-connecteddevice, it may be desired to identify the location of the wire-connecteddevice. This can be done by inference, in that the device is connectedto a communication device with a known location, by manual input oflocation or by matching the location of the wire-connected device tothat of a wireless device.

In FIG. 2C, user 213 provides a service or product desired by users 201and 203. All of the users 201, 203, and 213 and their respective mobilecomputing devices 202, 204, and 214 are within wireless frequency rangeincluding Wi-Fi and/or Bluetooth 205. They are all registered members ofthe proximity based networked mobile communication system. As a result,users 203 and 201 can use their respective devices 204 and 202 totransmit order requests to user 213's computing device 214. Further,users 203 and 201 can use their respective devices 204 and 202 tocomplete payment for their orders via payment processing with computingdevice 214 and a third party payment service.

FIGS. 3A and 3B are schematic flow chart showing the installation andoperation of a mobile application process onto a mobile device. FIG. 3Aillustrates the mobile application process according to the presentdisclosure. FIG. 3B illustrates a mobile application process accordingto the present disclosure. The mobile application enables the mobilecomputing device to communicate on the networked communication systemaccording to the present disclosure.

In FIG. 3A, a user having a mobile computing device downloads andinstalls a mobile application (step 301) onto the device. The mobileapplication causes the mobile computing device to connect to a remoteserver (step 302). Through the mobile application, the user registerswith the remote server (step 303). As part of registration, profilecomponents are transmitted from the mobile computing device to theserver (step 304). Profile components can include the user's name and adigital photograph of the user, as well as any other information theuser would like to include in the profile.

In FIG. 3A, the mobile application further causes the mobile computingdevice to transmit the device's Unique Identifiers, including but notlimited to a randomly generated identifier, Unique User Identification(UUID) such as Bluetooth Low Energy UUID &/or Randomly GeneratedIdentifier from 0 to 4294967295, MAC address (step 305) to the server aswell as an SSID (step 306).

In FIG. 3B, a mobile application causes a mobile computing device tobroadcast an “advertisement hotspot” (step 307) for a predefined periodof time. The predefined period of time can be based on proximity andfrequency of user input or stimuli. Within this context, “advertising”refers to signaling the presence of a mobile device, such as bytransmitting a radio beacon.

The mobile application further causes the mobile computing device toscan “listen” for Wi-Fi and Bluetooth advertisements, for example byusing a Bluetooth LE Advertising Capability, or hotspots (step 308). Themobile computing device transmits the detected unique identificationhotspot information to the remote server system (step 309). Uponcomparison by the remote server system of the hotspot information andunique identifier for example UUID or MAC addresses, the mobilecomputing device receives user information from the server (step 310).

In FIG. 3B, the mobile application displays the received userinformation (step 311), thereby displaying registered users withinproximity of the mobile computing device. Finally, communication isenabled (step 312) between the mobile computing device and any of theregistered users within proximity of the mobile computing device.According to one configuration, communication between the mobilecomputing device and the registered users within proximity of the mobilecomputing device only continues as long as the mobile computing deviceand devices associated with the registered users remain within proximityof the mobile computing device.

FIG. 4 is a schematic block diagram illustrating a server system 108according to the present disclosure. In FIG. 4 , server system 108includes application server 404. Application server 404 controls allnetworked communication capabilities accessible by members of thenetwork. Mobile computing devices associated with members of the systemtransmit information to the server system 108. The information isprocessed by a hotspot (Unique Identifier Advertisement) and userinformation retrieval module 406. Server 108 is communicably coupled todatabase 418, in which information for all registered users and hotspotsand device information is stored.

FIG. 5 is a schematic diagram illustrating a user interface scenarioaccording to the present disclosure. In FIG. 5 , a wireless frequencyrange including Wi-Fi and/or Bluetooth 105 includes a plurality of usersin its proximity. Users A, B, and C are within proximity of wirelessfrequency range including Wi-Fi and/or Bluetooth 105, and their presenceis indicated on the user interfaces of mobile computing devices of otherusers in wireless frequency range including Wi-Fi and/or Bluetooth 105.User D, who has recently left the wireless frequency range includingWi-Fi and/or Bluetooth , is also displayed as such.

FIG. 6 is a schematic diagram illustrating an exemplary computerarchitecture 600 for use with the present disclosure. According to oneconfiguration, server system employs architectures similar to thatdepicted in FIG. 6 . The present disclosure comprises various computingentities that may have an architecture according to exemplaryarchitecture 600. One configuration of architecture 600 comprises asystem bus 620 for communicating information, and a processor 610coupled to bus 620 for processing information. Architecture 600 furthercomprises a random access memory (RAM) or other dynamic storage device625, which functions as a main memory, coupled to bus 620 for storinginformation and instructions to be executed by processor 610. Datastorage device 625 also may be used for storing temporary variables orother intermediate information during execution of instructions byprocessor 610. Architecture 600 may also include a read only memory(ROM) and/or other static storage device 626 coupled to bus 620 forstoring static information and instructions used by processor 610.

A data storage device 625 such as a magnetic disk or optical disc andits corresponding drive may also be coupled to architecture 600 forstoring information and instructions. Architecture 600 can also becoupled to a second I/O bus 650 via an I/O interface 630. A plurality ofI/O devices may be coupled to I/O bus 650, including a display device643, an input device (e.g., an alphanumeric input device 642 and/or acursor control device 641).

The communication device 640 allows for access to other computers (e.g.,servers or clients) via a network. The communication device 640 maycomprise one or more modems, network interface cards, wireless networkinterfaces or other interface devices, such as those used for couplingto Ethernet, token ring, or other types of networks.

In addition to the above-referenced functionalities, the system of thepresent disclosure comprises the following systems configuration tooptimize the communication network. Once the first user has received apositive identity of a nearby user; both users will appear on eachother's software modules.

Clustering

FIGS. 7A and 7B are schematic diagrams showing the operation of thesystem without and with an ability to respond when a mobile device is inan “inactive” mode. FIG. 7A shows a configuration of a system 701 inwhich “inactive mode” response is not enabled, whereas FIG. 7B shows aconfiguration of a system 702 in which the “inactive mode” is enabled.Both FIGS. 7A and 7B show clustering server 705, an internet andcommunication network, FIG. 7A shows a configuration in which “inactivemode” response is not enabled. Both FIGS. 7A and 7B show clusteringserver 705, an internet and communication network, represented by cloud707 and multiple mobile devices 711, 712, 713, 714, associated withusers.

As shown, system 701 also includes additional mobile devices namelymobile device 713 and mobile device 714, which are also registered withclustering server 1002. Mobile devices 711, 712, 713, 714 have beenpreviously registered with clustering server 705.

FIG. 7A shows direct communications executed through internet andcommunication network 707 or directly device-to-device between activedevices. Clustering server 705 is also communicably coupled to anothermobile device 712 via internet and communication network 707. FIG. 7Bshows the system operating as a proximity-based system in accordancewith the mobile device able to respond when in an “inactive” state.

Configurations of the disclosed technology aggregates detected clustersof nearby users based on beacon detection. In one configuration, eachuser device includes a BLE (Bluetooth Low Energy) beacon that cantransmit small amounts of data. Typically, transmission via BLE might beup to a distance of >100 meters. A configuration of the disclosedtechnology creates clusters of currently active user groups. In oneconfiguration, clusters are populated by active users within proximityof each other. As an example, an active mobile device 712 might have aninitiated clustering application and an active beacon; a mobile device713 may include an initiated clustering application as well as an activebeacon; and a mobile device 714 may include an initiated clusteringapplication as well as an active beacon. Here, the cluster would bepopulated by mobile device 712 and mobile device 713 and mobile device714.

Additionally, the system is able to be adjusted to provide a lag in thetimeframe that individuals disappear from a user's nearby viewcontroller. This is a critical element in extending the network ofnearby users, so that more individuals will be visible to one another.

The shaded areas around mobile devices 712, 713 and 714 represent theWi-Fi-range of mobile device 712.

Algorithm

The algorithm for aggregating users (i.e. populating user clusters) isbased on periodic detection reports from mobile devices. Each listeningmobile device periodically detect another mobile device and sendinformation about the detected mobile device to the user. Specifically,each mobile device sends not only its identifier to a clustering server(e.g. server system 108) that stores and processes user and clustermembership information, each mobile device also sends the identifiers ofother detected devices.

Mobile device 711 is active, that is, it has an active (advertising)beacon (not shown) and a proximity-based network application (not shown)that is active. Mobile device 712 also has an active beacon (not shown)and a proximity-based network application (not shown) that is active.

In operation, because mobile device 711 is on (active), it can detectand communicate with mobile device 712, which is within proximity (Wi-Fior Bluetooth based communication). Mobile device 712 can similarlycommunicate with mobile device 711 because they are proximal to eachother. Each of mobile device 711 and mobile device 712 can furthercommunicate with clustering server 705 via internet and communicationnetwork 707.

In contrast, mobile device 713 cannot communicate with mobile device 711because mobile device 713 is inactive. No communication occurs as longas mobile device 713 remains inactive even though mobile device 711 isactive. Here, inactive means that mobile device 713 has an activelistening beacon but has a proximity-based network advertisingapplication that is not running. Mobile device 714 also cannotcommunicate with mobile device 711 because mobile device 714 isinactive, having an active beacon and an inactive advertisingproximity-based network application. Further, neither mobile device 713nor mobile device 714 can communicate with clustering server 705 asmobile device 713 and mobile device 714 are inactive.

FIG. 7B shows what a proximity-based system 702 in accordance with themobile device being able to respond when in an “inactive” state. In FIG.7B, proximity-based system 702 includes clustering server 705 that iscommunicably coupled to mobile device 711 via internet and communicationnetwork 707. As shown, system 702 also includes additional mobiledevices including mobile device 712, mobile device 713 and mobile device714, which are have been previously registered with clustering server705.

Mobile device 711 is active, that is, it has an active beacon (notshown) and a proximity-based network application (not shown) that isactive. Mobile device 712, mobile device 713 and mobile device 714 areinactive; they each have a beacon; however, their proximity-basednetwork application (not shown) has not been executed and is inactive.By way of non-limiting example, a mobile device is “inactive” when thedevice's user interface application has been terminated intentionally bythe user “shut down” or been sent to the background whereas. For examplein some iPhones, the phone is “inactive” when the phone is notadvertising Unique Identifiers (e.g., Bluetooth Low Energy UUID &/orRandomly Generated Identifier from 0 to 4294967295) but it is stilllistening to unique identifiers. Each time the mobile device senses aunique identifier advertisement the device immediately transmits thisuser's ID to the server via various methods including currently a webservice call.

In operation, unlike the system 701 of FIG. 7A that requires that twomobile devices be active in order to communicate, in the configurationof FIG. 7B, communication is facilitated with “inactive” devices so longas at least one active advertising mobile device is present. As depictedin FIG. 7B, mobile device 711 is on (active). Once its proximity-basednetwork application is open, mobile device 711 advertises and pings outor transmits signals across using wireless network including Wi-Fi andBluetooth frequencies. Responsive thereof, although inactive, mobiledevices 712, 713 and 714 are listening and do pickup the advertisingsignals from mobile device 711. Each of the listening mobile device 712,713 and 714 then retrieves the Unique Identifier including but notlimited to UUID (Universally Unique Identifier) and/or “randomlygenerated identifier” associated with mobile device 711. Then mobiledevice 712, mobile device 713 and mobile device 714 all separately sendthe retrieved Unique identifier, for example UUID “randomly generatedidentifier”, for 711 as well as each of their own UUIDs to clusteringserver 902.

In one configuration, the communication from the mobile devices arriveas separate web service calls; the service calls are then logicallylinked and grouped based on pairs of the mobile device 711's Unique IDand the transmitters ID (UUID). This new user presence group iscommunicated to mobile device 711 and mobile devices 712, 713 and 714and the result is that devices 711, 712, 713 and 714 “the users inproximity” appear as nearby users on the phones of devices 711, 712, 713and 714. Without the assistance of the disclosed technology, the user ofdevice 711 would not be able to see any of devices 712, 713 and 714.Therefore the disclosed technology is revolutionary in terms of itsabilities to create a viable proximity based communication platform.

In a configuration, the clustering server applies the followingalgorithm to group them together:

 1. User A sees User B  2.  Is user B in the system?  3.   No  4.    IsUser A in the system?  5.     No  6.      Create presence group. Adduser A and user B to      presence group  7.     Yes  8.      Add user Bto the presence group of A  9.       Update timestamp of both A and B inuser record 10.   Yes 11.    Is User A in the system? 12.     No 13.     Add user A to the presence group of B 14.      Update timestamp ofboth A and B in user record 15.     Yes 16.      Is A in same presencegroup as B? 17.       Yes 18.        Update timestamps on A and B inuser record 19.       No 20.        Update timestamps on A and B in userrecord 21.        Combine presence groups for A and B 22.        Takeall users from presence group B, move to         presence group A 23.       Delete presence group B

In one configuration, after running through the above algorithm tocreate presence groups, a purge cycle is run. During a purge cycle, allusers that are part of a presence group that have not detected any otheruser in the presence group or have not been detected by any other usersin the presence group in a specified period are purged from theirpresence group. This period referred to as the timeout period may be 60seconds, for example. Users that are grouped by detections will time outand become degrouped after an adjustable amount of seconds of nodetections.

At the end of the above processing, the web service returns the list ofidentifiers for the other users that are in the same presence group asthe user reporting detections.

Control of Clustering

FIG. 8 is a schematic diagram of a group of mobile devices 801-804associated with users in proximity to each other and in proximity to aWi-Fi hot spot 811. In this example, the system populates user clustersthat include no more than one active user, such as mobile device 801,where the rest of the mobile devices 802, 803, 804 can be inactive.Generally, as an example, a user cluster might be populated with anactive mobile device 801, an inactive mobile device 802 and inactivemobile device 803. Active mobile device 801 is a mobile/computing devicethat includes an active advertising beacon and a proximity-based networkapplication developed in accordance with a configuration of thedisclosed technology. Active mobile device 801 starts theproximity-based network application, which then remains active alongwith the beacon.

Inactive mobile device 802 is a mobile/computing device that includes anactive advertising beacon as well as the proximity-based networkapplication of the present configuration. Here, the proximity-basednetwork application is not executed and remains inactive. This occursfor example on iPhones, in which, when the app has been put into thebackground or has been terminated by the user, the app will no longeradvertise its Unique Identifier UUID ‘and/or ‘randomly generatedidentifier’’, and the fact that it stops advertising limits the nearbyusers able to detect it. This is also the permanent case for AndroidDevices 4.3 and higher which do not have Bluetooth LE AdvertisingCapabilities. Therefore the disclosed technology has created a viablesystem to workaround this technological limitation. Similarly, inactivemobile device 803 is a mobile/computing device that includes an activeadvertising beacon and an inactive proximity-based network application.

While mobile device 804 may be considered to be within a desiredproximity to mobile device 801, mobile device 804 is outside of theproximity of Wi-Fi hot spot 811, and also is outside of directcommunication range and Bluetooth LE Advertising Capabilities of mobiledevice 801. Mobile device 804 is, however within direct communicationrange and Bluetooth LE Advertising Capabilities of mobile device 803.Since mobile device 803 is able to relay the UUID and/or “randomlygenerated identifier” of mobile devices 801 and 804, mobile devices 801and 804 are made aware of their mutual proximity.

This configuration also applies to the immediate sharing of secondaryidentified users. For example not only does mobile device 801 not waitfor mobile device 802 to identify mobile device 801, but it alreadyshows mobile device 801 on mobile device 802's display screen as soon asmobile device 802 is shown on mobile device 801's screen.

In one configuration, the system also shows mobile device 801 what is onmobile device 803's screen. For example the user of mobile device 801sees mobile devices 802 and 803 but does not see mobile device 804,either because mobile device 804 is too far away or because it just hasnot processed it yet. In such a configuration, if any other user inproximity: if either mobile device 802 or mobile device 803 detectsmobile device 804, then mobile device 801 will detect mobile device 804as well. In this manner, there are no communication delays which areotherwise caused from users observing each other at different secondintervals between network scans, in some cases with minutedifferentials. As soon as one person in the room picks up, everyone elsegets up to speed.

Determining Proximity and Presence Group Selection

The “degrees of separation” or proximity are useful to control the sizeof the presence group. If the area has few local users, it is likelythat the user would want to engage several degrees of separation untilthe physical proximity becomes too distant. On the other hand, if thereare a large number of eligible users within a small area, then the usermay elect to search for fewer degrees of separation.

Likewise, the user may wish to select according to category of user. Forexample, if the user is in a large gathering of people, the user maywish to select members of the user's university, members of the user'ssocial group or another classification. The user may also wish to limitthe group to people in the user's addressbook or other list of contacts.

FIG. 9 is a schematic block diagram showing the communication used toestablish presence groups. A presence group is a set of other userswithin proximity to the user. The presence group may be established bydirect connection via short range radio communication or through a Wi-Fihotspot. Additionally, the presence group may comprise users who areconnected by degree of separation, as will be described. Within thiscontext, “advertising” refers to signaling the presence of a mobiledevice, such as by transmitting a radio beacon. By way of non-limitingexamples, advertising can be performed via Bluetooth or Wi-Fi hotspots.

To establish a presence group, the user registers on the system (step911). The user's profile is then automatically created via third (step912) by third party application programming interfaces (APIs) such associal media APIs and other networks by which the user is known (step913). It is further possible for the user to establish an identity withthe system itself and use that identity for establishing a profile. Thesystem's server then generates or issues a unique identifier for theuser and links that unique identifier with the user's mobile device(step 914).

Once the unique identifier is generated or issued by the server (step914), subsequent communications from the mobile device use that uniqueidentifier. If the user has multiple mobile devices, the server mayassign the same unique identifier (step 914) to these additionaldevices, much as a username-and-password combination can be used bysomeone to sign on through multiple devices.

The mobile then initiates listening for incoming identifiers from othermobiles.(step 921). The identifier is transmitted using standardcommunication protocols which are available on most Wi-Fi and Bluetoothcommunication systems. In addition to listening (step 921), if themobile has the required hardware, the mobile broadcasts the uniqueidentifier (step 922). This activity is referred to herein as“advertising” in that the wireless device “advertises” its presenceduring radio beacon transmissions.

The wireless device also listens (step 931) for other devices within itsproximity. This is done in both active mode, with the wireless devicehaving full communication and in a quiescent mode, in which the wirelessdevice is not in full operation. If a nearby user is detected (step937), the device sends the detected user's identifier to the server(step 938). The detection is then considered established (step 941).

The established detection (step 941) may be directly from the mobile orindirect from a nearby mobile device, which determines a “degree ofseparation”. The “degree of separation” is similar to a degree ofseparation in a social sense in that a direct detection would be a firstdegree of separation (i.e., outside of the user's device). A seconddegree would be a connection identified as a separate device throughwhich a user is in direct communication. Thus, returning to FIG. 7 , ifmobile device 712 is unable to communicate directly with mobile device704, there must be more than one degree of separation between mobiledevices 712 and 704. If there is a single intervening communicationlink, such as from mobile device 712 to mobile device 714 and thencefrom mobile device 714 to mobile device 704, there would be two degreesof separation between mobile devices 712 and 704.

The degrees of separation are applied to forming presence groups. Upondetection a presence group is established (step 946). The results aresent back to the user, as the advertising mobile, to update its list ofnearby presence groups. The updated list is used by the mobile as a newpresence group or updated presence group (step 947). The detectionswithin the presence groups are:

Direct from mobiles broadcasting their identifiers; and

Indirect from mobiles transmitting the unique identifiers of othermobiles.

The system uses these direct and indirect transmissions of mobileidentifiers to list users and the proximities of the users in terms ofdegrees of separation, in order to provide the user with an update ofthe user's presence group.

The server then returns data for each user in the presence group andallows communication between users. This data may be provided for allinstances or provided in response to a request from the user's mobileeither at the request of the user or automatically. Non-limitingexamples of data transferred and communication comprise:

Username or Usernames

User Profile

Messaging

Voice communication

Video conferencing.

-   -   Other functions may be provided, which comprise, by way of        non-limiting example:

Access to nearby drivers and ride sharing

Food on demand

Assistance in miscellaneous tasks (“Can you help me with . . . ?)

Networking

-   -   “Kudos” (called “Gold Gifts”) or other social interaction awards        from other users and user's photographs and other social media        objects.

Additional features can optionally include:

Phone Numbers

Social Media Data

Registered Criminal Databases

Social Networking Services

Restaurant Critiquing Services

Dating Applications

Customer Assistance Requests

Customer Ordering Systems

Payment systems

The system and app have the ability to message, call and video otherusers. In one configuration, this ability is limited to users who withina predetermined proximity to the user. The predetermined proximity canbe defined in terms of physical distance, visual proximity, distance asdetermined by radio signal strength, absolute received radio signalstrength, boundaries stored on a server or any convenient means todefine proximity. In some configurations, the user can limitcommunications through the system to be received from callers within adegree of proximity determined by the user, and in some configurations,the user can separately limit communications through the system to besent to people called within a degree of proximity determined by theuser. In other configurations, communications to or from other users maybe made available for communications with other people selected by theuser.

In addition, media may be broadcast to one or a group of, or all otherusers within a predetermined proximity to the user sending or requestingthe broadcast.

The disclosed technology permits makes proximity via radio signals thedetermining factor if users can communicate with one another in thesystem's network, which itself functions as a social network. Thisfeature can be combined with external social media applications, in thatthe user's communication preferences can be combined with proximity viaradio signals. The combination allows the user to retrieve profiles thatmeet a predetermined combination of proximity via radio signals andidentification of profile links (“Friends”) on social media apps. Afurther configuration of the disclosed technology can disclose socialmedia data, such as but not limited to Facebook. Integrating socialmedia data thereby provides the ability for users to create specialstatus and/or proximity alters of all and/or specific profile links(e.g., Facebook Friends) and/or individuals who have mutual profilelinks.

The disclosed technology is clearly not limited to strictly operating asa messenger; it has the ability to provide advantages over common socialmedia apps in terms of providing a default close range social network.Because the individuals that the user views are the ones around theuser, in the student housing, school and office environments theutility. The disclosed technology allows individual users to view theprofiles of their nearby users including photo albums and personal/workinformation of make comments, start blog and forums, request and acceptfriendships, like pictures, forum postings, etc. Users have the abilityto control their privacy settings to hide their profiles and choose toreveal them to everyone, only friends or on an individual basis.

User Displays Showing Proximity

FIGS. 10A-10C are representations of mobile device displays of contactsor other users to provide a proximity display. FIG. 10A depicts astarting page. FIG. 10B depicts a similar page obtained by removingmessage information (in the case of FIG. 10A incoming text messages).FIG. 10C depicts a selected contact, obtained either from the displayedcontacts, a message, voice call or other action, in which the contact isdepicted in an enlarged format. In this non-limiting example, contactswithin a predetermined range of proximity are displayed as images;however, it is anticipated that individual users may select alternativedisplays, such as text, text and thumbnail image, etc.

Referring to FIG. 10A, the starting page has the ability toautomatically adjust vertically based on the number of nearby users.Therefore when there are no users nearby, the message list will reachthe top of the screen and the user will not need to constantly jump backfrom page to page to check for nearby users. In contrast, the more usersthat appear, the lower the Message Bar will sink down limiting to oneviewable message. Users identified as having social media links with theuser are flagged, as indicated at 1011, 1012.

The disclosed technology includes a logical user interface whichincorporates a control viewer providing users with an adjustablescrolling grid display of all the users nearby; the viewer constantlyadjusts as new nearby users are detected and previously detected usershave left proximity after a predetermined amount of seconds. The NearbyUser display shows users profile picture, User Name and also identifiesif the user is a social network link, such as a Friend or Mutual Friendon Facebook, a Connection or Mutual Connection via Linkedin or any othersocial network that may be integrated into the disclosed technology.

Removal of the message bar is shown in FIG. 10B. Communication with aparticular contact highlights that contact, as shown in FIG. 10C. Theseare the default user settings, which are adjustable by user preferences.

The disclosed technology has the ability to integrate with registeredcriminal databases in partnership with law enforcement agencies in orderto warn parents of potential threats within close proximity.

The disclosed technology provides the ability to display users socialnetworking services, such as but not limited to LinkedIn profiles;naturally this will be most applicable in conferences, retreats andbusiness networking events whereas users will have the ability todisplay their resume and business experience as part of their profile,thereby allowing users to rapidly filter the nearby business contactsand expedite their networking goals by focusing on startingconversations with prescreened business interests.

The disclosed technology provides the ability to integrate restaurantand business critiquing crowd-source review publishers services, such asbut not limited to Yelp, in such way that members of the service will beable to opt-in to the disclosed technology enabling them to identifynearby members within the restaurant and discuss applicable (as well asnon-applicable) feedback and input regarding the restaurants andpotential dishes of interest or promoted by the restaurant.

The disclosed technology provides the ability to integrate withgeo-based dating applications such as but not limited to Tinder;providing a up-close proximity dating application; most applicable in anightclub venue settings whereby users will identify their interest andcreate matches in-close proximity able to instantly communicate inperson; therefore exponentially increasing the effectiveness of theapp's ability to make successful matches.

The disclosed technology provides the ability to integrate customerservice systems in order to facilitate customers requesting assistance.For example customer at Walmart needs help on aisle 4, utilizing thedisclosed technology he can write an SMS to “Walmart Service Reps” andassistance will confirm that they are on their way. Additionallyassistance can rapidly answer geographic based questions regardinglocations of goods, etc.

The disclosed technology provides the ability to integrate orderingsystems: Customers will utilize the disclosed technology in order toplace an order for goods or services; for example ordering meat at thedeli counter at a supermarket. The order is send in an SMS and the orderis confirmed with a responding SMS from the butcher.

The disclosed technology provides the ability to integrate a links topayment systems, such as but not limited to Google Wallet, Apple Pay andPayPal, in order to facilitating purchase to consumers; following theabove example the deli counter at a supermarket, the butcher caninclude, within the order confirmation, a google wallet link enablingthe client to click the link and instantly portal to the appropriategoogle wallet payment screen, thereby further streamlining commerce.

Sustain

The user can set a persistence of presence, by which other users areable to identify that user. Thus, if a user enters an area, other usersare able to identify the user according to the proximity and clusteringcriteria. If the user elects to “sustain” that proximity, the systemwill continue to provide other users with a proximity indication, eventhough the user has left the area. The persistence of the “sustain”function remains until the user's own timeout has expired, or the otheruser clears “sustain” users who are not present. It is further possibleto provide users with an indication as to whether a persistent “sustain”user remains in the area.

The “sustain” function can be set by the user for various amounts oftime according to the user's selection. By way of non-limiting example,the “sustain” function may be set by the user from 1 second to infinite,with an option for no sustain (0 sec). Infinite “sustain” would leavethe duration to other users, who would clear their persistent profileson a regular basis.

The “sustain” function can be useful in circumstances where a userwishes to be available for communication or identification after havingleft the area. Thus, if another user wishes to link a profile to someonewho was in an area, this remains possible even if the user to beidentified has physically left the area.

Situational Awareness

The ability to cluster users and identify users according to othercategories allows users to identify soldiers in the militaryenvironment. T he soldier can use the technology to identify thepresence of members of the soldier's unit within a group, and toidentify the presence of soldiers with a particular identifiedcapability. The two groupings, combined with degree of presence can beused by the soldier to identify available assistance.

Similarly, if a soldier becomes lost or separated from the soldier'sunit, the technology can be used to provide the unit informationregarding the soldier's location, both directly through triangulationand proximity, and indirectly through the soldier's ability to transmitgeographical coordinates. The system can further be used by the soldierto identify the location of others in the unit.

The use in a military situation may require that the data be retained inencrypted format, so that it cannot be used by an enemy. Similar, radiotransmissions must be maintained in a manner which does not lead toenemy units triangulating on the soldier making the transmission. Sincethe proximity information can be controlled by a server, theavailability of the location information can be controlled by themilitary. The ability to store location data on a server allows thesystem to only transmit location data to other users (soldiers) asencrypted data.

Other than the need to protect and encrypt location data, the feature isconfigured in a manner similar to combining proximity with externalsocial media applications, in that the user's communication needs can becombined with proximity via radio signals. The combination allows theuser to retrieve information regarding fellow soldiers that meet apredetermined combination of proximity via radio signals andidentification of skills or unit association.

File Sharing, File Transfer and Media Sharing

The ability for a user to use the disclosed technology to identify otherusers within a proximity facilitates file sharing and media sharing,which may be relevant to the locus of the users or relevant to theindividual users themselves. By way of non-limiting example, this couldrelate to the user commenting on a local event at which the user ispresent. Additionally, a speaker or entertainer can provide access of amedia file to an audience or others nearby. This provides an ability topromote or advertise one's music, including songs, albums and randomizedplaylists to nearby users, additionally creating a community of music.This also allows file transfer to occur using local network facilitiesor directly as peer-to-peer transfers.

Additionally the software will use an algorithmic rating system tocompare and rate users' taste in music in contrast to other nearbyusers. The rating and a comparison with similar media can beaccomplished within the area of proximity defined by the user or byother users.

In addition to the presumed relevance of media files to others within adefined proximity, the ability to share media is based on a concept thatthese people would enjoy getting to know each other based on theirsimilar taste in the media, such as a particular type of music or musicby a particular artist.

API (Configuration)

FIGS. 11A and 11B are schematic diagrams depicting a Presence GroupAggregation System platform in its functional aspect. FIG. 11A showsestablishing proximity. FIG. 11B is a three ring model, based on thediagram of FIG. 11A, based on a user's nearby user experience.

Although an Application Programming Interface (API)is provided herein,one of skill in the art will understand that the API is exemplary andother APIs consistent with the spirit and scope of the disclosedtechnology may be utilized. In a configuration, a request stating thatmobile user with UUID 1 (for example) can see another user with UUID 1and UUID 3; as an example:

An empty array of other_user_identifiers may also be passed up, which isuseful for querying the system to see which other users are detectablevia the aggregation algorithm. Whatever is passed, a successful responsereturns a list of all the aggregated users in proximity like this:

{“identifier”:“6”,“other_user_identifiers”: [“5”,“7”,“9”,“11”]}

Timeout

Users that are grouped by detections will time out and become degroupedafter a predetermined amount of time of no detections.

The Presence Group Aggregation System platform provides the requiredframework to create visual proximity “Degrees of Separation” or Rings aswell as a View Controller User Interface to implement thisfunctionality.

This tool is useful when a user is interested in reducing the nearbyuser field into a workable sum, for example just the students in aclassroom. The Presence Group Aggregation creates a nearby user contactlist based on all the direct and indirect user connections available. Inthe figure below, IRY has direct connections to ALY, NERO, OREN andCOOK. IRY has indirect Second Degree Connections with MONKEY and ALB andThird Degree Indirect Connections with Ape and Banana. The Disclosedtechnology provides the users with the ability to filter out Users basedon the degrees of connection: first, second, third, fourth etc. This isnaturally most useful in very highly dense settings.

Rings are differentiated with the following logic

The formula for the logarithm is:

First Ring (Degree of Separation)=This includes users' first degree“DIRECT” Contacts, users that the subject has detected and “INDIRECT”web service calls of the subject as advertiser made by listening onlydevices (Permanent Listening only users=Users with no listening but noadvertising hardware and Temporary Listening Devices=iOS devices wherethe application has canceled or has stopped running while in thebackground.)

Second Ring (Degree of Separation)=This includes all the results fromthe Peers in subjects First Ring “DIRECT” and “INDIRECT” connectionsexcluding all entry pairs that include the subjects unique identifier.

Third Ring (Degree of Separation)=This includes all the results from thePeers in the subjects Second Ring “DIRECT” and “INDIRECT” connectionsexcluding all the entry pairs that include the subject and all thesubjects First Ring connections.

FIG. 11B shows user IRY's nearby user experience. The Presence GroupAggregation System platform creates a cluster including all of the usersdepicted in FIG. 11A. Within the cluster, Rings are differentiated withthe following logic:

-   -   Ring 1=Direct and webservice UUIDs including user's UUID    -   Ring 2=Direct and webservice of user's First Ring connections,        excluding entries and web calls with user's UUID. (OREN, NERO)    -   Ring 3=Direct and webservice of user's second ring connections,        excluding entries and web calls with user's UUID and First Ring        connections. (MONKEY, ALB)

The Presence Group Aggregation System platform allows the system toprovide users with the ability to reduce and extend their visiblecontacts via “Inherent Rings” representing degrees of separation. Thisreduces a random cluster of nearby users into an immediate group of“first Ring” members. The “first Ring” members can be people within asmall room, such as a classroom or business establishment or otherwisewithin a small area.

A filter button 1031, shown in FIG. 10B can be used to determine whichprofiles and which Rings are presented. The control of the Rings andother proximity controls may be accessed through the “Filter” buttonwhich will be easily accessible one the main user interface screen, bypressing this button, the display will reveal to the user will thefilters, “Rings” or “degrees of separation” that are available to beimplemented.

Closing Statement

While mobile devices have been described and the use of information fromspecific networking services has been described, it is also possible touse other devices and services. For example, desktop devices can be usedto identify Inherent Rings based on information identified throughnetwork connections, as manually designated by the user or as matched bythe user to a particular location of a mobile device (i.e., “Make mylocation the present location of my phone.) It is possible to eitherpermit or not permit the sharing of unique identifiers across multipledevices, and multiple devices can be associated with a single user oruser profile as desired. In that way, multiple devices belonging to auser can be issued separate unique identifiers or can share uniqueidentifiers, and the user can still be uniquely identified acrossmultiple devices. In the case of multiple devices, the user candesignate one or more devices as having a priority on the system, inorder to avoid the use of multiple devices causing duplication ofprofiles displayed on other users' devices.

It will be understood that many additional changes in the details,materials, steps and arrangement of parts, which have been hereindescribed and illustrated to explain the nature of the subject matter,may be made by those skilled in the art within the principle and scopeof the invention as expressed in the appended claims.

What is claimed is:
 1. A method for providing signals broadcast from auser in a mobile network, the method comprising: providingcommunications between users of mobile computing devices; providing anapplication set up on a user's mobile computing device; in a transmitmode: using the application to cause the user's mobile computing deviceto identify a device location; using the application to broadcast amessage, call and/or video transmission to other users' devicesadvertising a presence of the user's mobile computing device as abroadcasting user's mobile computing device; and in a receive mode:using the application to cause the user's mobile computing device toidentify an image and to determine an image resemblance measured withfacial recognition algorithms that represent deviations in facialfeatures and dimensions; using the application to cause the user'smobile computing device to cross reference the identified second devicewith stored data; using the application to cause the user's mobilecomputing device to identify at least one further device; and using theapplication to cause the mobile computing device to provide the userwith an indication of the broadcasting user's mobile computing device.2. The method of claim 1, further comprising: using the application tocause the user's mobile computing device to cross reference theidentified second device with data stored within the user's mobilecomputing device.
 3. The method of claim 2, further comprising:associating the user with a profile, the profile comprising anadministrative group or military unit and a capability; providing theuser with a selection of other users within at least one Presence Groupin accordance with user-selected criteria comprising profile informationfrom user profiles corresponding to the user's profile; and storing, inthe server, location information for the user, thereby providing otherpersonnel in the administrative group or a military entity with anability to locate the user.
 4. The method of claim 1, furthercomprising: establishing at least one Presence Group comprising at leastone device within a predetermined distance of the user, thepredetermined distance established by at least one of the groupconsisting of physical distance, visual proximity, distance asdetermined by radio signal strength, absolute received radio signalstrength and other defined proximity determination.
 5. The method ofclaim 1, further comprising: providing the user with a selection ofreceived messages for user notification, the selection comprising aplurality of: a) messages of a predetermined category from a seconddevice when the messages satisfy a cross reference of the identifiedsecond device with data stored within the user's mobile computingdevice; b) messages of a predetermined category within a definedproximity to the user; and c) all messages of a predetermined categoryreceived by the user; and in the case of a received message meeting thecriteria, providing that message to the user or providing an indicationof the availability of that message to the user.
 6. The method of claim1, further comprising: providing a proximity database on the user'smobile computing device.
 7. The method of claim 1, further comprising:providing a proximity database on the user's mobile computing device;using the application to cause the user's mobile computing device toidentify at least a second device within a predetermined proximity tothe user, the predetermined proximity established by at least one of thegroup consisting of physical distance, visual proximity, distance asdetermined by radio signal strength, absolute received radio signalstrength and other defined proximity determination; using theapplication to cause the user's mobile computing device to crossreference the identified second device with stored data; using theapplication to cause the user's mobile computing device to crossreference the identified second device with stored data; using theapplication to cause the user's mobile computing device to identify atleast one further device within a predetermined proximity to one of theuser and the second device; and using the application to cause themobile computing device to provide the user with an indication of thebroadcasting user's mobile computing device based on the predeterminedproximity.
 8. A method for receiving signals from a user in a mobilenetwork, the method comprising: providing communications between usersof mobile computing devices; using the application to cause the user'smobile computing device to identify an image and to determine an imageresemblance measured with facial recognition algorithms that representdeviations in facial features and dimensions; using the application tocause the user's mobile computing device to identify at least onefurther device according to the identified image; and using theapplication to cause the mobile computing device to provide the userwith an indication of the broadcasting user's mobile computing device.9. The method of claim 8, further comprising: using the application tocause the user's mobile computing device to cross reference theidentified second device with data stored within the user's mobilecomputing device;
 10. The method of claim 9, further comprising: theassociating of the user with a profile, the profile comprising anadministrative group or military unit and a capability; providing theuser with a selection of other users within at least one Presence Groupin accordance with user-selected criteria comprising profile informationfrom user profiles corresponding to the user's profile; and storing, inthe server, location information for the user, thereby providing otherpersonnel in the administrative group or a military entity with anability to locate the user.
 11. The method of claim 8, furthercomprising: establishing at least one Presence Group comprising at leastone device within a predetermined distance of the user, thepredetermined distance established by at least one of the groupconsisting of physical distance, visual proximity, distance asdetermined by radio signal strength, absolute received radio signalstrength, boundaries stored on a server and other defined proximitydetermination.
 12. The method of claim 8, further comprising: providingthe user with a selection of received messages for user notification,the selection comprising a plurality of: a) messages of a predeterminedcategory from a second device when the messages satisfy a crossreference of the identified second device with data stored within theuser's mobile computing device; b) messages of a predetermined categorywithin a defined proximity to the user; and c) all messages of apredetermined category received by the user; and in the case of areceived message meeting the criteria, providing that message to theuser or providing an indication of the availability of that message tothe user.
 13. The method of claim 8, further comprising: providing aproximity database on the user's mobile computing device.
 14. The methodof claim 8, further comprising: providing a proximity database on theuser's mobile computing device. using the application to cause theuser's mobile computing device to identify at least a second devicewithin a predetermined proximity to the user, the predeterminedproximity established by at least one of the group consisting ofphysical distance, visual proximity, distance as determined by radiosignal strength, absolute received radio signal strength and otherdefined proximity determination; using the application to cause theuser's mobile computing device to cross reference the identified seconddevice with stored data; using the application to cause the user'smobile computing device to cross reference the identified second devicewith stored data; using the application to cause the user's mobilecomputing device to identify at least one further device within apredetermined proximity to one of the user and the second device; andusing the application to cause the mobile computing device to providethe user with an indication of the broadcasting user's mobile computingdevice based on the predetermined proximity.
 15. A mobile device capableof sending and receiving broadcast messages to one or more users,comprising: a circuit capable of communication between users of mobilecomputing devices and which: in a transmit mode: causes a user's mobilecomputing device to identify a device location; broadcasts a message,call and/or video transmission to other users' devices advertising apresence of the user's mobile computing device as a broadcasting user'smobile computing device; and in a receive mode: causes the user's mobilecomputing device to identify an image and to determine an imageresemblance measured with facial recognition algorithms that representdeviations in facial features and dimensions; causes the user's mobilecomputing device to cross reference the identified second device withstored data; causes the user's mobile computing device to identify atleast one further device to one of the user and the second device; andcauses the mobile computing device to provide the user with anindication of the broadcasting user's mobile computing device.
 16. Theapparatus of claim 15, further comprising: a proximity database on themobile device storing location information for the user or proximity ofthe user to the other users' mobile computing devices.
 17. The apparatusof claim 15, further comprising: a proximity database on the user'smobile computing device; a circuit or instructions to cause the user'smobile computing device to identify at least a second device within apredetermined proximity to the user, the predetermined proximityestablished by at least one of the group consisting of physicaldistance, visual proximity, distance as determined by radio signalstrength, absolute received radio signal strength and other definedproximity determination; a circuit or instructions to cause the user'smobile computing device to cross reference the identified second devicewith stored data; a circuit or instructions to cause the user's mobilecomputing device to cross reference the identified second device withstored data; a circuit or instructions to cause the user's mobilecomputing device to identify at least one further device within apredetermined proximity to one of the user and the second device; and acircuit or instructions to cause the mobile computing device to providethe user with an indication of the broadcasting user's mobile computingdevice based on the predetermined proximity.