Contact information social exchange method and system

ABSTRACT

Methods, systems, and computer storage media for a wearable device are presented. The wearable device includes a wearable device with a wearable housing configured as a ring, the wearable housing being wearable on a finger. A transceiver embedded in a band portion of the ring and configured to communicate a plurality of data items with a base station to initiate a transaction, the transceiver being associated with unique identification information, the plurality of data items being storable in memory.

RELATED APPLICATIONS

This application is a continuation of and claims priority to U.S.application Ser. No. 16/522,315, filed on Jul. 25, 2019, and entitled“CONTACT INFORMATION SOCIAL EXCHANGE METHOD AND SYSTEM”, which is aContinuation of and claims priority to U.S. application Ser. No.15/959,044, filed Apr. 20, 2018 and now U.S. Pat. No. 10,412,558, whichis a Continuation of and claims priority to Ser. No. 15/096,116, filedon Apr. 11, 2016 and now U.S. Pat. No. 10,264,415, is a Continuation ofand claims priority to U.S. application Ser. No. 13/730,063, filed Dec.28, 2012 and now U.S. Pat. No. 9,313,609. This application claims thebenefit of the above-identified applications, and the disclosure of theabove-identified applications are hereby incorporated by reference inits entirety as if set forth herein in full.

BACKGROUND

Networking for business or other social purposes traditionally involvedmeeting in person and exchanging business cards or contact informationwritten on a piece of paper or cocktail napkin. Social networking sitessuch as Facebook and LinkedIn provided individuals with an electronicmeans of making new contacts or maintaining contact and otherinformation about old contacts without being physically present.

Further, as mobile phones and other mobile devices became moreubiquitous, contact information could be manually entered into andstored by a phone during an in-person meeting. However, such manualentry results in an awkward pause in the social interaction and canintroduce errors into the contact information. Applications developedthat enable a business card or bar code information to be scanned into amobile phone, but such an approach still introduces an awkward pause inthe social interaction and is rendered less effective or even useless ifone or both of the participants run out of business cards.

SUMMARY

The following presents a simplified summary of the disclosure in orderto provide a basic understanding to the reader. This summary is not anextensive overview of the disclosure and it does not identifykey/critical elements or delineate the scope of the specification. Itssole purpose is to present a selection of concepts disclosed herein in asimplified form as a prelude to the more detailed description that ispresented later.

In one embodiment, a wireless communications enabled device is worn by auser. When the device detects the presence of a compatible device (e.g.,another device worn by a second user), the device initiates atransaction in which the device receives contact information from thecompatible device and/or sends the user's contact information to thecompatible device. Contact information can include a phone number, ane-mail address, a mailing address, a website, a user name or useridentifier for an online service (e.g., a social networking site),information usable to obtain contact information online, or any otherinformation that is usable to contact a user.

In one embodiment, the wireless communications enabled device is a ring.A wireless communications unit, or transceiver, is embedded, enclosed,or substantially enclosed within the band portion of the ring. Inanother embodiment, a wireless communications unit is within, below, orotherwise associated with a decorative portion of a ring. The decorativeportion may include a stone, metal or other material and can be purelydecorative or indicative of association with some organization (e.g., aclass ring, a fraternity, sorority or other society ring, etc.). In oneembodiment, the decorative portion including the wireless unit isdetachable from the band portion of the ring and is configured to beattachable to any of a plurality of rings of different sizes anddifferent materials.

In one embodiment, the wireless communications enabled device is abracelet. A wireless communications unit, or transceiver, is embedded,enclosed, or substantially enclosed within the band portion of thebracelet. In another embodiment, a wireless communications unit iswithin, below, or otherwise associated with a decorative portion of abracelet such as a charm or any other decorative portion. The decorativeportion may include a stone, metal or other material and can be purelydecorative or indicative of association with some organization (e.g., aclass school and/or year identifier, a fraternity, sorority or othersociety identifier, etc.). In one embodiment, the decorative portionincluding the wireless unit is detachable from the band portion of thebracelet and is configured to be attachable to any of a plurality ofbracelets, rings, necklaces or other worn items of different sizes anddifferent materials. It should be understood that in variousembodiments, the wireless communication enabled device can be part of orattached to a necklace, ear ring, piercing, or any other type ofwearable item.

In one embodiment, the communicative range of the wireless device isshort enough that close proximity (e.g., less than a foot or some numberof inches, such that a handshake between two users wearing wirelesscommunications enabled rings on their shaking hands to come within rangeof each other, but two users merely standing near each other areunlikely to have their rings come within range of each other) isnecessary for communication to take place. In other embodiment, awireless device is able to initiate communication with another deviceand exchange contact information with that other device in less timethan it takes to complete a typical handshake (e.g., a few seconds). Inone embodiment, the wireless device is a radio frequency identification(RFID) device. On other embodiments, the wireless device is any othersuitable wireless device, including but not limited to an infra-reddevice, a sonic device, or a radio device. In one embodiment, thetransceiver is connected to the ring's band and uses the band as anantenna for receiving, transmitting, and/or receiving inductive energy.In another embodiment, the transceiver's antenna is included on a chipor board of the transceiver.

In one embodiment, the wireless device includes a memory unit whichstores contact information of a user. Typically, the user is the wearerof the ring, however the contact information could be for a user otherthan the wearer (e.g., a department within a corporation, a politicalcampaign, a business, etc.).

In one embodiment, the wireless device includes a battery. The batteryis used to periodically transmit a signal announcing the wirelessdevice's presence or to transmit other information. The battery may alsobe used to detect and receive signals from other devices and/or to storeinformation in memory. However, receipt of signals may be a passiveactivity, powered by induction or other means using the energy of thesignals being received. In one embodiment, the battery is rechargeableby any suitable recharging method, including but not limited toinduction (e.g., from a charging station or from ambient electromagneticradiation), direct current form a charging station, photovoltaic orsolar devices, or a motion to electricity device.

In one embodiment, the wireless device can communicate with a basestation. The base station can be a mobile phone or other mobile device,a computer (e.g., laptop, desktop, tablet, etc.). The wireless devicecan upload to the base station any contact information received by thewireless device. In one embodiment, the contact information is anidentifier. The base station contacts a service provider to obtain thecontact information associated with the identifier. The user can thenadd the contact information to a user's contacts list or otherwise storethe contact information for later retrieval.

In one embodiment, the base station searches for schedule information ofthe user. The schedule information can be events in an electroniccalendar (e.g., a Microsoft Outlook Calendar, a Microsoft Live Calendar,a Google Calendar, etc.) or from a social networking site (e.g., aFacebook event). The base station presents one or more scheduled eventsto the user and the user is able to associate one or more contacts witha scheduled event (e.g., an alumni mixer, an association's dinner, afundraising event, a trade show, a conference, etc.). Further, in oneembodiment, the user can add additional notes to the contactinformation.

In one embodiment, the wireless communications enabled device isequipped with an on/off mechanism (e.g., a switch, a button, a ring bandpresence sensor, a finger presence sensor, etc.). In another embodiment,the wireless communications enabled device includes a contact receiptindicator. In one embodiment the indicator is any visual indicator,audible indicator, or tactile indicator, including but not limited to alight emitting diode (LED) or a vibration device. In one embodiment, theindicator activates upon receipt of contact information and remainsactive a pre-set amount of time. In another embodiment, the indicatoractivates upon receipt of contact information and remains active untildeactivated manually.

Many of the attendant features will be more readily appreciated as thesame becomes better understood by reference to the following detaileddescription considered in connection with the accompanying drawings.

DESCRIPTION OF THE DRAWINGS

The present description will be better understood from the followingdetailed description read in light of the accompanying drawings,wherein:

FIG. 1 is a block diagram of a wireless communications enabled ring inaccordance with one embodiment;

FIG. 2 is a block diagram of a wireless communications enabled ringhaving a decorative portion in accordance with one embodiment;

FIG. 3 is a flow diagram of the process of two users exchanging contactinformation in accordance with one embodiment;

FIG. 4A is a portion of a flow diagram of the operation of a wirelesscommunications enabled device in accordance with one embodiment; FIG. 4Bis a portion of a flow diagram of the operation of a wirelesscommunications enabled device in accordance with one embodiment;

FIG. 5 is a flow diagram of the operation of a base station inaccordance with one embodiment;

FIG. 6 illustrates a representation of a contact information exchangedevice's memory in accordance with one embodiment;

FIG. 7 illustrates an exemplary computing-based device in whichembodiments of a base station may be implemented.

Like reference numerals are used to designate like parts in theaccompanying drawings.

DETAILED DESCRIPTION

The detailed description provided below in connection with the appendeddrawings is intended as a description of the present examples and is notintended to represent the only forms in which the present example may beconstructed or utilized. The description sets forth the functions of theexample and the sequence of steps for constructing and operating theexample. However, the same or equivalent functions and sequences may beaccomplished by different examples. Further, various illustrated ordescribed portions of processes may be re-ordered or executed inparallel in various different embodiments.

Although the present examples are described and illustrated herein asbeing implemented in a wireless communications enabled ring, the systemdescribed is provided as an example and not a limitation. As thoseskilled in the art will appreciate, the present examples are suitablefor application in a variety of different types of wearable wirelesscommunications enabled devices.

In one embodiment, a wireless communications enabled device is worn by auser. When the device detects the presence of a compatible device (e.g.,another device worn by a second user), the device initiates atransaction in which the device receives contact information from thecompatible device and/or sends the user's contact information to thecompatible device. Contact information can include a phone number, ane-mail address, a mailing address, a website, a user name or useridentifier for an online service (e.g., a social networking site),information (e.g., a personal identification number (PIN) or otheridentifier) usable to obtain contact information online, or any otherinformation that is usable to contact a user.

In one embodiment, the wireless communications enabled device is a ring.In other embodiment, the wireless communications enabled device is awatch, a bracelet, or any other article wearable on a hand, finger orwrist. A wireless communications unit, or transceiver, is embedded,enclosed, or substantially enclosed within the band portion of the ring.

FIG. 1 is a block diagram of a wireless communications enabled ring inaccordance with one embodiment. The ring includes a band 100. The bandcan be formed from any suitable material, including but not limited toplastic, gold, silver, any metallic alloy or any combination of suitablematerials. A wireless communications unit 110 (e.g., a transceiver, theAT9ORF135602 from Atmel and Innovision Research & Technology, or anyother suitable device) is attached to or embedded in the band 100.

In another embodiment, a wireless communications unit is within, below,or otherwise associated with a decorative portion of a ring. Thedecorative portion may include a stone, metal or other material and canbe purely decorative or indicative of association with some organization(e.g., a class ring, a fraternity, sorority or other society ring,etc.). In one embodiment, the decorative portion including the wirelessunit is detachable from the band portion of the ring and is configuredto be attachable to any of a plurality of rings of different sizes anddifferent materials. In various embodiments, the detachable portion isattachable to a ring band by snapping the detachable portion onto thering band, by lashing the detachable portion to the ring band, byclamping the detachable portion to the ring band, by adhesive, bymagnetism or any other suitable fastening mechanism or technique.Similarly, in other embodiments, a wireless communications enableddevice is included in a detachable unit that is attachable to a watch ora bracelet.

FIG. 2 is a block diagram of a wireless communications enabled ringhaving a decorative portion in accordance with one embodiment. The ringincludes a band 200 and a decorative portion 210. A wirelesscommunications unit is attached to or embedded in the decorative portion210.

In one embodiment, the communicative range of the wireless device isshort enough that close proximity (e.g., less than a yard, a meter, afoot, some number of inches, three to seven centimeters, etc., any otherdistance such that a handshake between two users wearing wirelesscommunications enabled rings on their shaking hands to come within rangeof each other, but two users merely standing near each other areunlikely to have their rings come within range of each other) isnecessary for communication to take place. In another embodiment, awireless device is able to initiate communication with another deviceand exchange contact information with that other device in less timethan it takes to complete a typical handshake (e.g., a few seconds, lessthan one second, etc.).

In other embodiments, the wireless device is able to initiatecommunications with another device and exchange contact information withthat other device in less time than it takes to pass through a door(e.g., when another device operable with the wireless device is placednear a doorway (e.g., within several feet of the door) or along a pathtraversed by individuals attending or entering an event. In oneembodiment, the wireless device is usable to take roll for a meeting. Asattendees traverse a path within range of a device capable ofinteracting with the individuals' wireless devices, their presence isnoted. The presence information can be automatically transmitted to ameeting minutes recorder and/or automatically entered into the minutes.Further, the automatic presence notification can cause the presence of aquorum, as defined by the entity meeting (e.g., a majority of members, amajority of members in good standing, some supermajority of members ormembers in good standing, or any other fraction or percentage or fixednumber of any category of attendee or potential attendee, regardless ofwhether quorum is greater than, equal to, or less than a majority), tobe automatically entered into the minutes or displayed to one or moreindividuals (e.g., the organization meeting's secretary). In anotherembodiment, the same device interacting with the meeting attendees'wireless devices or a separate device can be used to determine whenattendees leave the meeting. Similarly to above, this absence can beautomatically recorded, entered, transmitted or otherwise made known, ascan any resulting loss of quorum or other condition pertinent to therules, constitution, by-laws or any other governing documents of theorganization meeting. In further embodiments, the wireless device andthe one or more other devices can be used to determine the timing and/orduration of an individual's attendance at an event (e.g., a company'sannual employee training session, a continuing legal education class, acontinuing medical education class). An amount of excusable absence maybe defined (e.g., missing some portion of the beginning or the end or aportion of the time between, so long as the total absence doesn't exceeda threshold, the number of absences doesn't exceed a threshold, and/orany one absence doesn't exceed a threshold), and an individualassociated with the wireless device can receive a message (e.g., textmessage, e-mail, phone call, instant message, private message, talkrequest, etc.) if the individual is within a threshold of violating theattendance rules (e.g., a thirty second warning before an individualbreak outside of the meeting would be too long to count the individualas attending the meeting), if the individual has violated the meetingrequirements and won't be counted as attending the meeting will only becounted as attending some portion of the meeting, or if the individualhas satisfied the requirements for attending the meeting.

In one embodiment, the wireless device is a radio frequencyidentification (RFID) device. On other embodiments, the wireless deviceis any other suitable wireless device, including but not limited to aninfra-red device, a sonic device, or a radio device. In one embodiment,the transceiver is connected to the ring's band and uses the band as anantenna for receiving, transmitting, and/or receiving inductive energy.In another embodiment, the transceiver's antenna is included on a chipor board of the transceiver.

In one embodiment, the wireless device includes a memory unit whichstores contact information of a user. Typically, the user is the wearerof the ring, however the contact information could be for a user otherthan the wearer (e.g., a department within a corporation, a politicalcampaign, a business, etc.).

FIG. 3 is a flow diagram of the process of two users exchanging contactinformation in accordance with one embodiment. At block 300, two users,both wearing their own wireless communications enabled rings, start toshake hands. At block 305, a first ring broadcasts its presence. Atblock 310, the second ring detects the first ring's presence andestablishes two-way communications with the first ring. At block 315,the first ring transmits the first user's contact information (e.g., anidentifier or PIN) to the second ring and the second ring transmits thesecond user's contact information to the first ring. At block 320, thefirst ring stores the second user's contact information in its memoryand the second ring stores the first user's contact information in itsmemory.

In one embodiment, the wireless device includes a battery. The batteryis used to power the device to periodically transmit a signal announcingthe wireless device's presence or to transmit other information. Thebattery may also be used to power the device to detect and receivesignals from other devices and/or to store information in memory.However, receipt of signals may be a passive activity, powered byinduction or other means using the energy of the signals being received(e.g., the energy of radio waves). In one embodiment, the battery isrechargeable by any suitable recharging method, including but notlimited to induction (e.g., from a charging station or from ambientelectromagnetic radiation), direct current form a charging station,photovoltaic or solar devices, or a motion to electricity device.

FIG. 4A and FIG. 4B illustrate a flow diagram of the operation of awireless communications enabled device, or a contact informationexchange device, in accordance with one embodiment. At block 400, it isdetermined whether the contact information exchange device receives anevent identifier. If the contact information exchange device receives anevent identifier, at block 405, the event identifier is stored and anypreviously stored event identifier is inactivated and the processcontinues at block 400. In other embodiments, receipt of an eventidentifier does not result in active, previously stored eventidentifiers being inactivated.

If the contact information exchange device does not receive an eventidentifier, at block 410, it is determined whether the contactinformation exchange device receives an event end indicator. If thecontact information exchange device receives an event end indicator, atblock 415, an active event identifier is inactivated and the processrepeats at block 400. In one embodiment, all active previously storedevent identifiers are inactivated. In another embodiment, only a mostrecently stored event identifier is inactivated. In still anotherembodiment, only an event identifier associated with the event endindicator is inactivated. In yet another embodiment, receipt of an endevent indicator inactivates an event identifier associated with that endevent indicator as well as any event indicators associated withsub-events of a larger event associated with the end event indicator(e.g., an end event identifier associated with a multi-day conferenceevent inactivates an event identifier for the multi-day conference eventas well as any event identifiers for meeting events associated with themulti-day conference event).

If the contact information exchange device does not receive an event endindicator, at block 420, it is determined whether a signal from anothercontact information exchange device is received. If a signal fromanother contact information exchange device is received, at block 425,the contact information exchange device establishes a communication linkwith the other contact information exchange device. At block 430, thecontact information exchange device receives contact information fromthe other contact information exchange device. At block 435, the contactinformation exchange device stores the contact information in memory andassociates the contact information with an active event identifier, ifan active event identifier is stored by the contact information exchangedevice. In one embodiment, the contact information is associated withall active event identifiers stored by the contact information exchangedevice. In one embodiment, the contact information exchange device emitsa humanly perceivable indicator (e.g., a light, a color change, a sound,a vibration, or any other humanly perceivable indicator) upon successfulreceipt and storage of contact information. In another embodiment, thecontact information exchange device transmits a confirmation signal toanother device (e.g., a mobile phone of the user wearing the informationexchange device) upon successful receipt and storage of contactinformation. At block 440, the contact information exchange devicetransmits resident contact information to the other contact informationexchange device and the process repeats at block 400. In variousembodiments, the resident contact information is an identifierassociated with the wearer of the contact information exchange device.In one embodiment, the resident contact information uniquely identifiesan individual (e.g., the wearer of the information exchange device). Invarious other embodiments, the resident contact information identifiesan entity or group of individuals (e.g., a business, a group within abusiness, a non-profit group, etc.).

If, at block 420, a signal from another contact information exchangedevice is not received, at block 445, it is determined whether adownload request signal is received from a base station associated witha user associated with the contact information exchange device. If adownload request signal is received from a base station associated witha user associated with the contact information exchange device, at block450, the contact information exchange device transmits its storedcontact information to the base station and the process repeats at block400. In one embodiment, transmitting the stored contact informationincludes transmitting information regarding the event indicator or eventindicators associated with the stored contact information. In anotherembodiment, after the contact information exchange device receivesconfirmation of receipts of the stored contact information, the storedcontact information is deleted. In one embodiment, all stored contactinformation is transmitted and/or deleted as a unit. In anotherembodiment, each individual unit of contact information is transmittedand/or deleted separately. In other embodiments, other amounts ofcontact information are transmitted and/or deleted as units.

If a download request signal is not received from a base stationassociated with a user associated with the contact information exchangedevice, at block 455, it is determined whether a threshold amount oftime has passed since the contact information exchange device broadcasta signal indicating its presence. If a threshold amount of time haspassed since the contact information exchange device broadcast a signalindicating its presence, at block 460, the contact information exchangedevice broadcasts a signal indicating its presence and the processrepeats at block 400. If a threshold amount of time has not passed sincethe contact information exchange device broadcast a signal indicatingits presence, the process repeats at block 400.

In one embodiment, the wireless device, or contact information exchangesystem, can communicate with a base station. The base station can be amobile phone or other mobile device, a computer (e.g., laptop, desktop,tablet, etc.), a dedicated peripheral device attachable to a computer ormobile phone (e.g., via a USB port or other wired or wirelessconnection) with software executing on the dedicated peripheral device,the computer or mobile phone, and/or an online service to provide any ofthe various features of the base station. The wireless device can uploadto the base station any contact information received by the wirelessdevice. In one embodiment, the contact information is an identifier. Thebase station contacts a service provider to obtain the contactinformation associated with the identifier. The user can then add thecontact information to a user's contacts list or otherwise store thecontact information for later retrieval.

In one embodiment, the contact information exchange device is equippedwith a hardcoded identifier, the hardcoded identifier being linked to auser and becoming contact information. In another embodiment, thecontact information associated with the wearer is uploaded to thecontact information exchange device.

FIG. 5 is a flow diagram of the operation of a base station inaccordance with one embodiment. At block 500, a connection is initiatedwith the contact information exchange device. The connection can beinitiated as the result of the base station detecting the presence ofthe contact information exchange device (e.g., by receiving a responseto the base station announcing its presence, by detecting the contactinformation exchange device announcing its presence, by a physicalconnection, or by any other suitable detection scheme) or by a usermanually initiating a synchronization action (e.g., utilizing softwarerunning on a computer attached to the base station).

In various embodiments, the connection is a secure connection, requiringthe base station to prove its association with a user or other entity,involving encryption protected transmission of data, and/or involvingdata being encrypted when stored and requiring decryption by anauthorized user associated with the contact information exchange deviceto access the unencrypted contact information captured by the contactinformation exchange device.

At block 510, the base station receives the contact information storedon the contact information exchange device. The contact information isan identifier associated with a user; however, in other embodiments, thecontact information can be a mailing address, a phone number, an e-mailaddress, a screen name, a user name or any other suitable informationuseable to contact someone. At block 520, the base station establishes aconnection with an online service and for each instance of downloadedcontact information, the base station retrieves traditional contactinformation (e.g., a mailing address, a phone number, an e-mail address,a screen name, a user name or any other suitable information useable tocontact someone) associated with that instance. At block 530, the basestation stores the traditional contact information in at least one datastore (e.g., a contacts list in Microsoft Outlook, Gmail, or any otherlocal or online contact data store). At block 540, the base stationinforms the contact information exchange device of receipt of thecontact information and terminates the communication.

In one embodiment, the base station searches for schedule information ofthe user. The schedule information can be events in an electroniccalendar (e.g., a Microsoft Outlook Calendar, a Microsoft Live Calendar,a Google Calendar, etc.) or from a social networking site (e.g., aFacebook event). The base station presents one or more scheduled eventsto the user and the user is able to associate one or more contacts witha scheduled event (e.g., an alumni mixer, an association's dinner, afundraising event, a trade show, a conference, etc.). Further, in oneembodiment, the user can add additional notes to the contactinformation. In another embodiment, the base station (e.g., residing ona mobile phone) transmits an event identifier, an event begins, and/oran event ends signal to the contact information exchange device at orabout the beginning or end of scheduled events. The event identifier caninclude the same number of bits as contact information stored by thecontact information exchange device and be stored in the same memory ascontact information.

In one embodiment, the contact information exchange device does notdistinguish between contact information and event identifiers. The orderin which contact information and event identifiers are received ispreserved when stored by the contact information exchange device and/orwhen downloaded to a base station. In other embodiments, the number ofbits used for event identifiers can be different from the number of bitsused for contact information and the contact information exchange devicemay treat contact information and event identifiers

In another embodiment, the wireless device is able to receive an eventidentifier (e.g., from a mobile phone having access to the user'sschedule information). The wireless device can save the event identifierand automatically associate all received contact information with theevent identifier until another event identifier is received or until anend event signal is received (e.g., also from the mobile phone). Whenthe contact information is later uploaded via a base station, the eventidentifier can be used to automatically associate the contactinformation with the event associated with the event identifier.

FIG. 6 illustrates a representation of a contact information exchangedevice's memory in accordance with one embodiment. The memory space 600includes a plurality of identifiers stored therein. Identifier 605 is anevent identifier for a conference. Identifier 605 is the first instanceof this event identifier in memory space 600, meaning it represents abegin event point. Until this identifier appears again, indicating anend event point, all contact information stored in the memory space 600is automatically associated with the conference event. In an alternativeembodiment, whether an event identifier represents a beginning point orand ending point is controlled by interaction with a base station. Forexample, a contact information exchange device may upload and clear itsmemory space after a first day of the conference. The identifier for theconference might not appear again in the memory space 600 for anotherday or two, at which point, it would again be the first instance of theidentifier in the memory space, but would represent and be identifiedusing the base station as an end event point upon being uploaded to thebase station.

Identifiers 610 are contact information identifiers. Each of theseidentifiers is associated with contact information for an individual,group or any other identifiable entity, and because they appear afteridentifier 605 and before another instance of that event identifier,they are all associated with the conference event. Identifier 615 is ameeting event identifier, indicating an event begin point. Identifiers620 are contact information identifiers associated with both theconference event and the meeting event. Identifier 625 is a secondinstance of the meeting event identifier appearing as identifier 615,indicating an event end point. Identifiers 630 are contact informationidentifiers which, like identifiers 610, are associated with theconference event but not the meeting event. Identifier 635 is a secondinstance of the conference event identifier appearing as identifier 605,indicating an event end point.

In another embodiment, the base unit automatically sends a connectionrequest (e.g., a friend request on Facebook, a connection request onLinkedIn, etc.) to the contacts uploaded from the wireless device. Instill another embodiment, the base unit provides the user with anopportunity to approve or deny sending the connection request. In oneembodiment, the base unit automatically inserts a reference to the eventassociated with the contact information (e.g., “It was a pleasurespeaking with you at the animal shelter fundraiser last night.”). Instill another embodiment, the user is presented with an opportunity toedit the connection request before it is sent.

In one embodiment, a service is provided (e.g., online) to facilitatecontact using the contact information exchange devices. The servicecollects contact information for users and assigns users uniqueidentifiers. The service can also assign identifiers to events on auser's schedule (e.g., maintained by the service or obtained from anyother source of the user's schedule such as the user's Microsoft OutlookCalendar, Google Calendar, Facebook Events, etc.) either online or usingresident companion software at a base station or other computing deviceaccessible by a user. Event information identifiers can be unique acrossusers, unique only within a specific user, or unique for a user onlywithin a specific time period or number of events (i.e., eventidentifiers could be re-used for one user as different times or fordifferent users at the same time).

The service can also receive an indication of user preferences forreceiving automatic contact requests (e.g., introductory e-mails are okto send automatically, and automatic connection requests are allowed tobe sent to LinkedIn account, but not to the Facebook account), forautomatically accepting contact requests (e.g., any LinkedIn connectionrequest being sent as a result of a contact information exchange deviceinformation exchange, including automatically generated requests andmanually generated requests from a user receiving the contactinformation via the device (such requests would, in various embodiments,indicate the sender's contact information exchange device was involved,but in other embodiments, the service could be granted access to user'saccounts and recognize the requestor as being someone the user acquiredcontact information for using the user's own device and automaticallyaccept the request as a result), are automatically accepted, but G+requests are automatically rejected and Facebook friend requests areleft to be dealt with manually), and for automatically sendingconnection requests. The above preferences can be set uniformly for theuser, or the preferences can differ based upon events associated withthe contact information (e.g., contact information associated with abusiness meeting or conference receives only a LinkedIn request (or isaccepted only on LinkedIn), while contact information associated with aclass reunion or speed dating session receives only a Facebook request(or is accepted only on Facebook). It should be understood that theabove social networking sites and the preference examples are providedas examples only, and that various embodiments interact with any social,business or other networking site, that a user can set any preferenceconfiguration desired and enabled by the system, and that, further, theservice may, itself, be part of or include a social networking site.

In one embodiment, the wireless communications enabled device isequipped with an on/off mechanism (e.g., a switch, a button, a ring bandpresence sensor, a finger presence sensor, etc.). In another embodiment,the wireless communications enabled device includes a contact receiptindicator. In one embodiment the indicator is any visual indicator,audible indicator, or tactile indicator, including but not limited to alight emitting diode (LED) or a vibration device. In one embodiment, theindicator activates upon receipt of contact information and remainsactive a pre-set amount of time. In another embodiment, the indicatoractivates upon receipt of contact information and remains active untildeactivated manually.

FIG. 7 illustrates various components of an exemplary computing-baseddevice 700 which may be implemented as any form of a computing and/orelectronic device, and in which embodiments of a base station or alogging and communications device may be implemented.

Computing-based device 700 comprises one or more processors 702 whichmay be microprocessors, controllers or any other suitable type ofprocessors for processing computer executable instructions to controlthe operation of the device in order to communicate data between movinganimals; or to sense, log and communicate data between moving animals.In some examples, for example where a system on a chip architecture isused, the processors 702 may include one or more fixed function blocks(also referred to as accelerators) which implement a part of the methodof communicating data between moving animals in hardware (rather thansoftware or firmware). Firmware 704 or an operating system or any othersuitable platform software may be provided at the computing-based. Datastore 710 is available to store sensor data log entries, parameters,logging regimes and other data.

The computer executable instructions may be provided using anycomputer-readable media that is accessible by computing based device700. Computer-readable media may include, for example, computer storagemedia such as memory 712 and communications media. Computer storagemedia, such as memory 712, includes volatile and non-volatile, removableand non-removable media implemented in any method or technology forstorage of information such as computer readable instructions, datastructures, program modules or other data. Computer storage mediaincludes, but is not limited to, RAM, ROM, EPROM, EEPROM, flash memoryor other memory technology, CD-ROM, digital versatile disks (DVD) orother optical storage, magnetic cassettes, magnetic tape, magnetic diskstorage or other magnetic storage devices, or any other non-transmissionmedium that can be used to store information for access by a computingdevice. In contrast, communication media may embody computer readableinstructions, data structures, program modules, or other data in amodulated data signal, such as a carrier wave, or other transportmechanism. As defined herein, computer storage media does not includecommunication media. Therefore, a computer storage medium should not beinterpreted to be a propagating signal per se. Propagated signals may bepresent in a computer storage media, but signals per se, propagated orotherwise, are not examples of computer storage media. Although thecomputer storage media (memory 712) is shown within the computing-baseddevice 700 it will be appreciated that the storage may be distributed orlocated remotely and accessed via a network 722 or other communicationlink (e.g. using communication interface 714).

The computing-based device 700 also comprises an input/output controller716 arranged to output display information to a display device 718 whichmay be separate from or integral to the computing-based device 700. Thedisplay information may provide a graphical user interface. Theinput/output controller 716 is also arranged to receive and processinput from one or more devices, such as a user input device 720 (e.g. amouse, keyboard, camera, microphone or other sensor). In some examplesthe user input device 720 may detect voice input, user gestures or otheruser actions and may provide a natural user interface. This user inputmay be used to change parameter settings, view logged data, accesscontrol data from the device such as battery status and for othercontrol of the device. In an embodiment the display device 718 may alsoact as the user input device 720 if it is a touch sensitive displaydevice. The input/output controller 716 may also output data to devicesother than the display device, e.g. a locally connected printing device.

The term ‘computer’ or ‘computing-based device’ is used herein to referto any device with processing capability such that it can executeinstructions. Those skilled in the art will realize that such processingcapabilities are incorporated into many different devices and thereforethe terms ‘computer’ and ‘computing-based device’ each include PCs,servers, mobile telephones (including smart phones), tablet computers,set-top boxes, media players, games consoles, personal digitalassistants and many other devices.

The methods described herein may be performed by software in machinereadable form on a tangible storage medium e.g. in the form of acomputer program comprising computer program code means adapted toperform all the steps of any of the methods described herein when theprogram is run on a computer and where the computer program may beembodied on a computer readable medium. Examples of tangible (ornon-transitory) storage media include computer storage devicescomprising computer-readable media such as disks, thumb drives, memoryetc and do not include propagated signals. Propagated signals may bepresent in a tangible storage media, but propagated signals per se arenot examples of tangible storage media. The software can be suitable forexecution on a parallel processor or a serial processor such that themethod steps may be carried out in any suitable order, orsimultaneously.

This acknowledges that software can be a valuable, separately tradablecommodity. It is intended to encompass software, which runs on orcontrols “dumb” or standard hardware, to carry out the desiredfunctions. It is also intended to encompass software which “describes”or defines the configuration of hardware, such as HDL (hardwaredescription language) software, as is used for designing silicon chips,or for configuring universal programmable chips, to carry out desiredfunctions.

Those skilled in the art will realize that storage devices utilized tostore program instructions can be distributed across a network. Forexample, a remote computer may store an example of the process describedas software. A local or terminal computer may access the remote computerand download a part or all of the software to run the program.Alternatively, the local computer may download pieces of the software asneeded, or execute some software instructions at the local terminal andsome at the remote computer (or computer network). Those skilled in theart will also realize that by utilizing conventional techniques known tothose skilled in the art that all, or a portion of the softwareinstructions may be carried out by a dedicated circuit, such as a DSP,programmable logic array, or the like.

Any range or device value given herein may be extended or alteredwithout losing the effect sought, as will be apparent to the skilledperson.

Although the subject matter has been described in language specific tostructural features and/or methodological acts, it is to be understoodthat the subject matter defined in the appended claims is notnecessarily limited to the specific features or acts described above.Rather, the specific features and acts described above are disclosed asexample forms of implementing the claims.

It will be understood that the benefits and advantages described abovemay relate to one embodiment or may relate to several embodiments. Theembodiments are not limited to those that solve any or all of the statedproblems or those that have any or all of the stated benefits andadvantages. It will further be understood that reference to ‘an’ itemrefers to one or more of those items.

The steps of the methods described herein may be carried out in anysuitable order, or simultaneously where appropriate. Additionally,individual blocks may be deleted from any of the methods withoutdeparting from the spirit and scope of the subject matter describedherein. Aspects of any of the examples described above may be combinedwith aspects of any of the other examples described to form furtherexamples without losing the effect sought.

The term ‘comprising’ is used herein to mean including the method blocksor elements identified, but that such blocks or elements do not comprisean exclusive list and a method or apparatus may contain additionalblocks or elements.

It will be understood that the above description is given by way ofexample only and that various modifications may be made by those skilledin the art. The above specification, examples and data provide acomplete description of the structure and use of exemplary embodiments.Although various embodiments have been described above with a certaindegree of particularity, or with reference to one or more individualembodiments, those skilled in the art could make numerous alterations tothe disclosed embodiments without departing from the spirit or scope ofthis specification.

What is claimed is:
 1. A wearable device comprising: a wearable housingconfigured as a ring, the wearable housing being wearable on a finger; atransceiver embedded in a band portion of the ring and configured tocommunicate a plurality of data items with a base station to initiate atransaction, the transceiver being associated with unique identificationinformation, the plurality of data items being storable in memory. 2.The wearable device of claim 1, the transceiver being enclosed withinthe band portion.
 3. The wearable device of claim 1, further comprisinga visual indicator.
 4. The wearable device of claim 1, the band portionbeing at least partially plastic.
 5. The wearable device of claim 4, theband portion further comprising at least one conductive material.
 6. Thewearable device of claim 5, the at least one conductive materialcomprising one of gold, silver, and a metallic alloy.
 7. The wearabledevice of claim 1, wherein the data comprises personal identifierinformation.
 8. The wearable device of claim 1, wherein the transceiveruses the band portion as an antenna to receive or transmit the data. 9.The wearable device of claim 1, further comprising: a presence sensor sothat the device detects presence to initiate a transaction.
 10. Thewearable device of claim 1, wherein the base station senses, logs, andcommunicates the data between moving individuals.
 11. The wearabledevice of claim 1, wherein the base station communicates with a network.12. The wearable device of claim 1, wherein the base station outputsdisplay information to a display device.
 13. The wearable device ofclaim 1, wherein the base station includes an input/output controllerconfigured to receive and process input.
 14. The wearable device ofclaim 13, wherein the input is communicated from a user input device,the user input device configured to control the base station orauthentication of a user.
 15. The wearable device of claim 14, whereinthe user input device is operable to detect voice input or usergestures.
 16. The wearable device of claim 1, wherein the base stationis a mobile phone or other mobile device.
 17. A wearable device,comprising: a ring comprising a band portion comprising a combination ofplastic and at least one conductive material; and a transceiver embeddedin the band portion and configured to communicate first and second dataitems with a base station to initiate a transaction, the first andsecond data items being storable in memory.
 18. The device of claim 17,the transceiver being substantially enclosed within the band portion.19. The device of claim 17, the first and second data items comprise anidentifier associated with a user of the wearable device, the identifierconfigured to initiate a transaction with the base station, bycommunicating the first and second data items.
 20. The system of claim17, the base station being a mobile phone or other mobile device.