Proximity based entitlement sharing

ABSTRACT

Systems and methods for sharing protected media content are provided. Protected media content can be shared when at least a first and second user are proximately located. The first and second user can be bound or paired based on one or more identification indicia associated with first and second user devices utilized, owned, or operated by the first and second users, respectively. Upon pairing, media content from the first and second users&#39; media content libraries can be shared. Additionally, proximate location can be leveraged to surface media content to other users, giving such other users the opportunity to discover new media content, and otherwise engage in transactions involving the new media content. Further still, the most popular media content associated with the second user or group of users proximate to the first user can be determined and used to prompt further interaction or display information regarding such popular media content.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims the benefit of U.S. Provisional PatentApplication No. 62/129,217 filed on Mar. 6, 2015, which is incorporatedherein by reference in its entirety.

TECHNICAL FIELD

The present disclosure relates generally to accessing protected mediacontent.

DESCRIPTION OF THE RELATED ART

Broadcasting can refer to the distribution of media content (e.g.,audio, video, etc.) to a dispersed audience via some mass communicationsmedium. The mass communications medium may be a cable network, a datanetwork, radio waves, and the like. Digital distribution can refer tothe delivery of media content without the use of physical media. Digitaldistribution has become popular due to advances in computer networkingand communication technologies.

BRIEF SUMMARY OF THE DISCLOSURE

In accordance with a first embodiment, a computer-implemented method,comprises determining whether a first user is proximate to a seconduser. The method further comprises allowing at least one of the firstand second user to access one or more media contents from a mediacontent library associated with the other of the first and second users.

In accordance with a second embodiment, a system comprises a first userdevice, a second user device, and a content provider. The contentprovider provides to a second user identified via the second userdevice, access to one or more protected media contents from a firstmedia content library associated with a first user identified via thefirst user device upon a determination that the first and second usersare proximate to each other.

In accordance with a third embodiment, a system, comprises a first userdevice and a second user device. Furthermore, the system comprises afirst content provider providing a first set of one or more protectedmedia contents to a first user associated with the first user device,and a second content provider providing a second set of one or moreprotected media contents to a second user associated with the seconduser device. Further still, the system comprises a server adapted toallow temporary access by the second user to the first set of the one ormore protected media contents and allow temporary access by the firstuser to the second set of the one or more protected media contents upona determination that the first and second user devices are proximate toeach other.

BRIEF DESCRIPTION OF THE DRAWINGS

The present disclosure, in accordance with one or more variousembodiments, is described in detail with reference to the followingfigures. The figures are provided for purposes of illustration only andmerely depict typical or example embodiments.

FIG. 1 illustrates an example environment in which various embodimentsmay be implemented.

FIG. 2 illustrates an example graphical user interface (GUI) used forselecting media content displayed in based upon proximity basedentitlement sharing in accordance with various embodiments.

FIG. 3 illustrates an example communications system with which variousembodiments may be implemented.

FIG. 4 is an operational flow diagram illustrating an example processfor proximity based entitlement sharing in accordance with variousembodiments.

FIG. 5 is an operational flow diagram illustrating an example processfor determining media content popularity in accordance with variousembodiments.

FIG. 6 illustrates an example GUI used for interacting with popularmedia content in accordance with various embodiments.

FIG. 7 is an example computing module that may be used to implementvarious features of embodiments described in the present disclosure.

The figures are not exhaustive and do not limit the present disclosureto the precise form disclosed.

DETAILED DESCRIPTION

In traditional broadcasting, such as television broadcasting or radiobroadcasting, the audience has no control over what is being broadcastor when “linear” content can be consumed. Accordingly, a televisionprogram must be watched at a scheduled time and on a channel set by thetelevision program provider. “Non-linear” content, on the other hand,can refer to particular media content that can be selected by a consumerfor viewing at a time of their choice.

As previously discussed, digital distribution has become popular due toadvances in computer networking and communication technologies. Oneexample of digital distribution involves a server downloading orstreaming non-linear media content to a user device over a data network,such as the Internet. Streaming media access or downloadable mediacontent can be provided by traditional broadcasting entities,third-party media content providers, studios that create and/or producemedia content, etc. In some instances, a user may pay a monthly fee fora subscription to a media content service provided by a media contentprovider. The subscriber may then access media content in the mediacontent provider's media content library to download or stream to a userdevice. For example, the subscriber can utilize a client media player,media presentation application, web browser, etc. that can connect toand access desired media content from, e.g., a server hosted by themedia content provider.

Alternatively, a consumer may rent media content by paying a fee toaccess the desired media content from a media content provider for somepredetermined amount of time. Additionally still, a consumer maypurchase the media content outright for a fee. The consumer may thenhave access to the purchased media content for an indefinite amount oftime via a media content service, or may “unlock” downloaded mediacontent for consumption via a consumer's own media presentation device,application, etc. To that end, a subscriber may have the ability tocreate or generate his/her own library of media content. It should benoted that media content in accordance with various embodiments mayinclude, but is not limited to digital music, movies, TV shows,pictures, eBooks, audio books, video games, etc. Although variousembodiments disclosed herein are directed to media content that isprovided by some content provider such as a broadcasting entity, mediacontent can also be provided by users, e.g., digital photographs takenby users themselves.

In order to ensure that media content is accessible only to subscribers,paying consumers, or in the case of, e.g., personal photographs, otherusers or entities to which the photograph-taking user wishes to provideaccess, media content may be protected by some form of digital rightsmanagement (DRM) or entitlement mechanism. For example, an entitlementcorresponding to media content can be issued (in accordance with one ormore relevant entitlement records) to allow a subscriber, consumer, orother user access to streaming or downloaded media content.

However, conventional systems and methods of digitally distributingprotected media content are premised upon a single user, subscriber, orentity having access to the protected media content. That is, only theuser that is issued the proper entitlement may view or consume thatprotected media content. Although such restrictions are desirable incertain contexts, it may be desirable to “relax” these restrictions inother scenarios. For example, the ability to demonstrate a consumer'staste in media or provide media-based entertainment to others throughthe use of a DVD or Blu-ray disc library may be lost in the context ofdigitally distributed media content. Sharing of digitally distributedmedia content can be achieved by revealing a user's account informationand/or password to another user, linking a second user's accountsubsequent to a first user providing one or more types of identifyinginformation or data, etc. However, the exchange of such sensitiveinformation may be undesirable and subject to abuse. To this end,various embodiments described herein provide systems and methods forproximity based entitlement sharing between two or more users.Accordingly, when two (or more) users are proximate to each other, theusers may be associated, “bound” or paired together such that one orboth users may be granted temporary access to the other user's protecteddigital media content.

FIG. 1 is a diagram illustrating an example environment in which variousembodiments can be implemented. FIG. 1 illustrates a system 100 forobtaining and consuming media content via proximity based entitlementsharing in accordance with various embodiments. As illustrated in FIG.1, system 100 can include a first user device 102A. First user device102A may include a processor 104A, a memory unit 106A, a display 108A,and can be configured to store downloaded digital media content, streamdigital media content, etc. for presentation on display 108A or aseparate or stand-alone display, e.g., display 108C. First user device102A may be a DVR, a cable/satellite/internet protocol television (IPTV)set-top box, a gaming console, a tablet personal computer (PC), a smartphone, a laptop PC, etc. Display 108C may be a TV, monitor, or otherpresentation/media content consumption apparatus.

System 100 can also include a second user device 102B. Like first userdevice 102A, second user device 102B may include a processor 104B, amemory unit 106B, a display 108B, and can be configured to storedownloaded digital media content, stream digital media content, etc. forpresentation on display 108B or a separate display, e.g., display 108C.Second user device 102B may be a digital video recorder (DVR), acable/satellite/internet protocol television (IPTV) set-top box, agaming console, a tablet personal computer (PC), a smart phone, a laptopPC, etc.

As will be described in greater detail below, in some embodiments, oneor more of user devices 102A or 102B may be a wearable identificationdevice, such as a watch, an ID band, etc. In some embodiments, the userdevices 102A or 102B may belong to a user, i.e., the user's personaldevice, or may be provided by some other entity, such as a media contentprovider. It should be noted that first and second user devices 102A and102B need not be the same type of device. That is, and in accordancewith one example scenario, first user device 102A may be a smartphone,and second user device 102B may be a wearable identification device.

System 100 may further include one or more media content providers 112,which may be a broadcast entity, such as a television broadcast networkentity (e.g., ABC), a cable provider (e.g., COMCAST®), or any otherdigital media content distributor, such as Amazon®, iTunes®, Netflix® orother third-party distributor of media content. Content provider 112 mayinclude a content server 114 on which digital media content 116 can bestored, along with any required entitlements, other entitlementinformation, DRM licenses, etc. which can be maintained in entitlementdatabase 118.

As described previously, some embodiments contemplate providingproximity based entitlement sharing in a provider-agnostic manner. Thatis, user devices 102A and 102B may be used for or associated withdifferent media content providers or services. Therefore, system 100, inaccordance with some embodiments, may further include a central server120 that can act as a unifying entity that can bind or associate usersacross providers, networks, etc., such as multiple media contentproviders. That is, central server 120 can provide proximity basedentitlement sharing between, e.g., two or more distinct contentproviders. For example, users need not subscribe to the same mediacontent provider service in order to engage in proximity basedentitlement sharing in accordance with various embodiments.

It should be noted that one or more licenses or temporary licenses canbe created, utilized, and/or transferred to the appropriate entities inaccordance with various embodiments. Such licenses can be configured toaccount for varying levels of access and/or distribution, time limits,usage limits, and can be partitioned if need be. For example, inaccordance with one of the aforementioned scenarios, media contentprovider 112 may provide a temporary license to an instance of mediacontent. In this way, a viewer is allowed to rent the media content forviewing, as previously alluded to.

Network 110 may be any communications network such as a cellular or datanetwork, a satellite network, an intranet, an extranet, a virtualprivate network (VPN), a local area network (LAN), a wireless LAN(WLAN), a wide area network (WAN), a personal area network (PAN), aportion of the Internet, a portion of the Public Switched TelephoneNetwork (PSTN), or any combination thereof. Accordingly, network 110 mayemploy various communication media, such as a coaxial cable, fiber opticcable system, Ethernet, radio waves, etc. Further still, network 110 maybe one or more combinations of any of the aforementioned networks.

It should be noted that proximity based entitlement sharing differs fromconventional sharing technologies that merely allow unprotected contentto be shared if multiple users are logged into or reside on, e.g., thesame network. Still other existing technologies may tie entitlement to aparticular physical medium, such as a flash drive on which media contentis encoded. The authorization needed to unlock the encoded media contentmay be “portable” in the sense that the flash drive may be connected toa display device, and the display device may provide connectivity to anauthorization server in order to allow authorization to be obtained.Nevertheless, the media content can still only be consumed via the flashdrive.

Rather, users that share media content via proximity based entitlementsharing are able to share media content that is protected by someform(s) of authorization requirement(s), e.g., DRM, licenserestrictions, or some other form of entitlement requirement(s).Moreover, media content that is shared via proximity based entitlementsharing need not be bound by infrastructure/networks, publishers/serviceproviders, distribution channels, physical media/devices, etc. that insome way inhibit content sharing using traditional techniques and/ormechanisms.

For example, two users may be subscribers to the same media contentservice, where media content can be accessed via a media content serviceapplication. Based upon the proximity of the two users or their locationrelative to each other, the two users can be bound with respect to eachof their media content libraries based upon the users' respective mediacontent service application IDs. As a result, the media content serviceapplication running on one device of a first user recognizes a seconduser proximately located to the first user and vice versa. The mediacontent service application may then allow each user in 2-way sharing(or only one user in 1-way sharing) to access and consume media contentbelonging to, rented by, or otherwise associated with the other user. Ifthe first and second users separate, e.g., the first user leaves thesecond user's location, consumption of the second user's media contentcan be stopped, an alternative ad-supported version of the second user'smedia content can be presented to the first user, or some other changein content access or sharing may occur.

In one embodiment, in order to share media content, neither the firstnor the second user is required to exchange or divulge any account orother identifying information with each other. The first and secondusers in some embodiments may have no existing relationship or knowledgeof one or the other user's account prior to sharing their respectivelibraries of media content with each other. It is by virtue of theirproximity to each other that triggers media content sharing inaccordance with the technology disclosed herein. That is, a user'spresence is effectively acting as the authorization.

In some embodiments, a super-distribution system may exist where usersmay have access to or may have downloaded one or more instances of mediacontent. However, consumption of the media content is predicated uponproximity to another user that has the authorization, e.g., entitlement,token, key, etc. for that particular instance of media content.Additionally still, media content need not be tied or bound to aparticular medium, and access need not be limited to or through aparticular network, infrastructure, service, publisher, provider, etc.In this way, temporary access can be granted to users withouttraditional authorization to consume media content. Moreover, users'entire libraries can be made portable and shareable in an anonymousmanner, and the users' libraries need not be maintained or obtainedthrough the same service or provider.

Further to the above, it should be noted that one or more usage rulesand/or constraints can be associated with the proximity basedentitlement sharing of media content. As described above, proximitybased entitlement sharing can provide temporary authorization, such thatonce the requisite proximity to an “originally-authorized” user is lost,consumption of the media content may be stopped or otherwise limited.For example, consumption of the media content may continue for a certainperiod of time subsequent to the requisite proximity being lost. Inanother example, if an instance of media content is currently beingconsumed, and the requisite proximity is lost, that instance may belocked so that other users cannot consume the media content. Still otherusage rules or constraints can be configured to determine what contentcan be consumed, how the content can be consumed, and/or who can consumethe content.

If multiple users are authorized to consume some particular mediacontent, authorizations may be aggregated such that a desired number ofentitlements can be made available if so desired. As discussed above,proximity based entitlement sharing can result in users that have nopre-existing relationship having temporary access to each other'scontent. However, limitations can be placed on the access of content ifdesired. Such limitations can be user-determined, producer orprovider-determined, etc.

Referring back to FIG. 1, in operation, system 100 may effectuateproximity based entitlement sharing as follows. First user device 102Amay be associated with a first user, where the first user has asubscription or account with a media content service through which mediacontent can be provided by content provider 112. The first user may havepurchased, rented, or subscribed to one or more media content. Thus, thefirst user may have a first media content library comprising thatpurchased, rented, or subscribed media content. Second user device 102Bmay be associated with a second user, where the second user may have asubscription or account with the same media content service. The seconduser may have his/her own library of media content that the second userhas subscribed to, purchased, or rented from content provider 112.

Upon the first user and the second user coming into close proximity witheach other, the first and second users may be bound or paired. Forexample, both the first and second users may be logged into theirrespective media content service accounts. Upon coming into closeproximity to each other, the first and second user devices 102A and 102Bmay exchange the first and second user's respective media contentservice IDs, where the respective IDs are associated with media contentservice applications running on the first and second user devices 102Aand 102B. This can occur, for example, if the first user visits thesecond user's home, and the first user device 102A may receive a messageor indication broadcast by the second user device 102B containing thesecond user's media service application user ID. It should be understoodthat the first user device 102A may be engaged in a commensuratescanning operation to receive the broadcast message or indication. Thiscan be achieved using some form of discovery protocol or schema.

It should also be understood that although various embodiments aredescribed in the context of a media content service ID exchange ordiscovery, pairing can be accomplished based on, but not limited to thefollowing: recognizing the first and/or second user's known InternetProtocol (IP) address(es) associated with his/her device; a recognitionthat at least some media content within the first and second user'smedia content library overlaps; and an application ID identifying theinstance of the media content service application that is running on theusers' devices. Moreover, the exchange of the first and second user'srespective media content service IDs can occur at the media contentprovider 112 and/or central server 120. That is, user device 102A anduser device 102B do not have to be involved in this exchange, and theexchange can be performed without a priori knowledge of accounts,identities, etc., on the part of the first and second users.

Ultimately, the first and second users may be bound with regard to theirrespective media content libraries. That is, the first user may accessand consume one or more instances of media content in the second user'smedia content library and vice versa.

It should be noted that such access can vary in accordance with a user'spreference(s). That is, the first user may configure his/her mediacontent library to be accessible to other users pursuant to a successfulbinding, whereas the second user may not. In this case, the second usermay access the first user's media content library, but the first usermay not necessarily have access to the second user's media contentlibrary. Further still, either the first or second user may not wish toengage in proximity based entitlement sharing in which case, even thoughthe first and second users may be determined to be proximate to eachother, sharing may be denied or prevented or limited to one of the firstor second user accessing the other's media content library.

It should be noted that the degree of proximity required for binding thefirst and second users may also vary. The requisite proximity may beachieved, as alluded to above, by virtue of the first user visiting thesecond user's home and the first and second user devices 102A and 102Brecognizing the first and second user's respective media serviceapplication IDs. Hence, a proximity determination may be based on somegeneral geographic location or range. For example, first user device102A may be the first user's smartphone, while device 102B may be thesecond user's set-top box, home PC, network-connected media system, etc.In other embodiments, as will be described in greater detail below, therequisite proximity may be based upon a more restrictive or lessrestrictive degree of proximity. For example, in one embodiment, wherethe first and second user devices 102A and 102B are both smartphones,the requisite proximity may be achieved upon the first and second userdevices 102A and 102B touching (e.g., by virtue of the user devices'respective near field communication (NFC) functionality, such as viaBluetooth® or WiFi). The proximity may be limited by a communicationtechnology such as Wi-Fi or Bluetooth, or set by a system operator to be20 feet for example.

In accordance with some embodiments, the requisite proximity may bebased upon solely temporal and geographic proximity rather than anysignal exchange as in NFC communications. For example, sensors residentwithin each of the first and second user devices 102A and 102B maysimply report their respective locations back to the central server 120.Content provider 112 may then recognize that first and second userdevices 102A and 102B are co-located at the same point in time, andinitiate proximity based entitlement sharing. Still other ways thatproximity based entitlement sharing can be initiated may include, e.g.,bio-sensing.

The aforementioned binding or pairing can occur over network 110, whichprovides connectivity between content provider 112 and the first andsecond user devices 102A and 102B, respectively. For example, contentprovider 112 may become aware that two users of its media serviceapplication are in close proximity to each other, and the contentprovider 112 can allow the first and second user's media contentlibraries to be bound, and therefore accessible by one another.Entitlement information may then be shared by or between first andsecond user devices 102A and 102B. That is, entitlements normallyassociated with first user device 102A may also be provided to seconduser device 102B and vice versa.

In one embodiment, pointers associated with instances of media contentmay be temporarily updated to point to another user(s) profile(s) uponthose users being paired. Consider, for example, a scenario where firstand second user devices 102A and 102B are paired as previouslydescribed. Upon pairing, the first user of first user device 102A mayattempt to access a particular instance of media content normally onlyaccessible by the second user. However, due to the pairing, entitlementdatabase 118 may discover that the appropriate entitlement recordassociated with the particular instance of media content is linked witha pointer that points to the user profile or account associated with thefirst user. Accordingly, entitlement database 118 can provide the userprofile or account associated with the first user with the requisiteentitlement record or license to access the desired media contentnormally associated with the second user.

Once the first and second users are no longer proximate to one another,access to the second user's media content library by the first userand/or access to the first user's media content library by the seconduser can be denied. That is, the shared entitlement may cease to exist,and the requisite entitlements provided via entitlement database 118,for example, may no longer be provided to the users. This can result inimmediately halting the playback or consumption of the media content.Alternatively, the user with whom media content was being shared mayfinish consumption of that particular media content, or the mediacontent (which is, e.g., being streamed) may be substituted with anad-supported version of the media content rather than an ad-freeversion. In such an instance, embedded timecodes within differentversions of media content can be accessed and synchronized to allow anad-free version to continue playing from a point in time where thepairing is no longer valid or lost or to limit the ability of a user toreplay or restart shared media content. In accordance with anotherembodiment, at the conclusion of a “paired session,” the user consumingthe shared media content may be presented with one or more options forpurchasing or renting his/her own instance of the shared media content,related media content, etc. Still other constraints can be placed on thetemporarily linked media content, such as limiting the number of shares,limiting the number of views, instituting a minimum geographicalproximity, or other limitation or constraint.

It should be further noted that in accordance with some embodiments, theaforementioned proximity determination may occur once, and thereafter,paired users may access each other's media content/media contentlibraries until the requisite proximity is lost. In accordance withother embodiments, proximity based entitlement sharing can be providedfor some predetermined time limit (either a default or variable timeperiod set by media content provider 100, a time period set by the userwhose media content library is being shared, etc.). Moreover, proximitycan be periodically or aperiodically checked or verified depending onhow strictly content provider 112 or a user (e.g., a first or seconduser) wishes to control media content access. Further still, the sharingof media content can begin immediately upon user ID discovery, upon afirst playback of media content, etc.

Additionally, the binding or pairing described herein can occur onvarying levels. For example, and in accordance with one embodiment,users' media content libraries can be paired, whereas in accordance withanother embodiment, pairing can occur on a user profile or accountlevel. In accordance with still another embodiment, pairing can occur ona device level.

Moreover, although various embodiments describe the binding or pairingof two user devices, profiles, media content libraries, etc., more thantwo user devices, profiles, media content libraries, etc., can be boundor paired.

Further still, pairing can result in entitlements being provided on agroup basis. That is, certain conditions for unlocking media content canbe achieved by virtue of two or more users sharing their respectivemedia content, i.e., the conditions can only be met on a group basisrather than on an individual basis. For example, a first user may haveaccess to a movie, and a second user may have access to that movie'sfirst sequel. Upon engaging in proximity based entitlement sharing, aservice provider may choose to provide both the first and second userswith access to a movie's second sequel (which was not available toeither the first or second user on their own).

FIG. 2 illustrates an example graphical user interface (GUI) that may beutilized in the context of proximity based entitlement sharing inaccordance with various embodiments. FIG. 2 illustrates first userdevice 102A, which in this example may be a tablet PC. Display 108A maypresent a menu to the first user utilizing first user device 102A thatincludes both the media content library of the first user and that ofthe second user upon, e.g., pairing of their respective media contentlibraries. The first user may then select media content from his/her ownmedia content library or from the second user's media content library.As an added benefit, proximity based entitlement can enable contentand/or service discovery.

As previously described, pairing user accounts, media content libraries,etc., can be achieved by a discovery protocol in which a first userdevice broadcasts its IP address, a media content service applicationID, etc. In accordance with other embodiments, pairing can be achievedby other types or forms of NFC functionality resident on users' devices.Still other embodiments may utilize geo-fencing, geo-location, or otherlocation-based services in order to determine users' proximity to eachother to achieve proximity based entitlement sharing.

FIG. 3 is a block diagram illustrating an example communication system300 in which various embodiments may be implemented in accordance withthe present disclosure. Communications system 300 may include aplurality of mobile devices, of which mobile devices 302-308 (one ormore of which may be example embodiments of user devices 102A and 102Bof FIG. 1) are illustrated. Example mobile devices may include a smartphone 302, an identification device, such as an NFC ID band 304, atablet PC 306, and/or a laptop PC 308. Also shown in communicationsystem 300 is a mobile core network 310, a wireless access point (AP)312, a cellular base station (BS) 314, a Bluetooth® emitter 316, an NFCterminal 318, a global navigation satellite system (GNSS) network 320, aplurality of GNSS satellites 322 a-322 n, an internet 330, a locationserver 340, and a satellite reference network (SRN) 350. One or more ofmobile core network 310, wireless AP 312, cellular BS 314, Bluetooth®emitter 316, NFC terminal 318, GNSS network 320, GNSS satellites 322a-322 n, internet 330, location server 340, and/or satellite referencenetwork (SRN) 350 can be used to determine the location of one or moreof the mobile devices 302-308 and/or for determining the location of atleast one user relative to another user. One or more or all of thenetworks illustrated in FIG. 3 may be an embodiment of network 110 ofFIG. 1 or may be additional networks over which the various elements ofFIG. 1 may communicate and/or interact.

Wireless AP 312 may include suitable logic, circuitry, interfaces,and/or code that are operable to provide data services to communicationdevices, such as one or more of the mobile devices 302-308, in adherencewith one or more wireless LAN (WLAN) standards such as, for example,IEEE 802.11, 802.11a, 802.11b, 802.11d, 802.11e, 802.11n, 802.11 ac,802.11v, and/or 802.11u. Wireless AP 312 may communicate with mobilecore network 310 and/or internet 330, via one or more links and/orassociated devices for example. In this manner, wireless AP 312 mayprovide network access to mobile devices 302-308.

Cellular BS 314 may include suitable logic, circuitry, interfaces,and/or code that are operable to provide voice and/or data services tocommunication devices, such as one or more of the mobile devices302-308, in adherence with one or more cellular communication standards.Exemplary cellular communication standards may include Global System forMobile communications (GSM), General Packet Radio Services (GPRS),Universal Mobile Telecommunications System (UMTS), Enhanced Data ratesfor GSM Evolution (EDGE), Enhanced GPRS (EGPRS), and/or 3GPP Long TermEvolution (LTE). Cellular BS 314 may communicate with mobile corenetwork 310 and/or internet 330, via one or more backhaul links and/orassociated devices for example. In this manner, cellular BS 314 mayprovide network access to mobile devices 302-308, enabling a mobiledevice, such as smart phone 302, to communicate with one or moredatabases, services, servers, networks, or interactive media walls asdescribed herein.

Bluetooth® emitter 316 may include suitable logic, circuitry,interfaces, and/or code that are operable to provide Bluetooth® basedconnectivity to communication devices, such as one or more of mobiledevices 302-308, in adherence with various Bluetooth® and/or Bluetooth®Low Energy (BLE) standards. Bluetooth® emitter 316 may communicate withmobile core network 310 and/or internet 330, via one or more backhaullinks and/or associated devices for example. In this manner, Bluetooth®emitter 316 may provide network access to mobile devices 302-308,enabling a mobile device, such as smart phone 302 to communicate withone or more entities of system 300.

NFC terminal 318 may include suitable logic, circuitry, interfaces,and/or code that can provide NFC-based connectivity to communicationdevices, such as one or more of the mobile devices 302-308, in adherencewith various short range communication standards such as the Near FieldCommunications standards. The NFC terminal 318 may communicate with themobile core network 310 and/or the internet 330, via one or morebackhaul links and/or associated devices for example. In this manner,the NFC terminal 318 may provide network access to the mobile devices302-308. Alternatively, NFC functionality may be resident within each ofthe mobile devices 302-308.

Mobile core network 310 may include suitable logic, circuitry,interfaces, and/or code that are operable to provide interfacing and/orconnectivity servicing between access networks, which may be utilized bythe mobile devices 302-308, and external data networks such as packetdata networks (PDNs) and/or internet 330. Mobile core network 310 maycorrespond to one or more service providers that provide, control,and/or manage network accessibility available via mobile devices302-308. In this regard, mobile devices 302-308 may access the mobilecore network 310 via wireless AP 312, cellular BS 314, Bluetooth®emitter 316, and/or NFC terminal 318. Mobile core network 310 maycommunicate various data services, which are provided by external datanetworks, to associated user devices such as, for example, mobiledevices 302-308. In an example aspect of the disclosure, mobile corenetwork 310 may be operable to communicate with location server 340 toobtain location information that can be used to ascertain the relativelocations of mobile devices 302-308.

Each of mobile devices 302-308 may include suitable logic, circuitry,interfaces, and/or code for implementing various aspects of theembodiments disclosed herein. In this regard, each of mobile devices302-308 may be operable to communicate via a plurality of wired and/orwireless connections. Each of mobile devices 302-308 may be operable,for example, to transmit to and/or receive signals from one or more ofwireless AP 312, cellular BS 314, Bluetooth® emitter 316, NFC terminal318, GNSS network 320, and/or internet 330. Also, each of mobile devices302-308 may be operable to communicate with, and/or receive servicesprovided by internet 330 and/or mobile core network 310. In this regard,mobile devices 302-308 may be operable to effectuate the presentation ofmedia content on an interactive media wall, which can utilize locationserver 340.

GNSS network 320 may include suitable logic, circuitry, interfaces,and/or code that may provide navigation information to land-baseddevices via satellite links. In this regard, GNSS network 320 mayinclude, for example, a plurality of GNSS satellites 322 a-322 n, eachof which is operable to provide satellite transmissions based on a GNSS.Exemplary GNSS systems may include, for example, GPS, GLONASS,Galileo-based satellite system, Beidou and/or Compass systems.Accordingly, GNSS network 320 may be operable to provide positioninginformation via downlink satellite links transmitted from one or more ofthe plurality of GNSS satellites 322 a-322 n to enable land-baseddevices, such as the mobile devices 302-308, to determine theirlocations. The plurality of GNSS satellites 322 a-322 n may directlyprovide positioning information and/or a land-based device may utilizesatellite transmissions from different satellites to determine itslocation using, for example, triangulation based techniques.

SRN 350 may include suitable logic, circuitry, interfaces, and/or codethat are operable to collect and/or distribute data for GNSS satelliteson a continuous basis. SRN 350 may include a plurality of GNSS referencetracking stations located around the world to provide A-GNSS coverageall the time in both a home network and/or any visited network. In thisregard, SRN 350 may utilize satellite signals received from various GNSSconstellations, such as, for example, the plurality of GNSS satellites322 a-322 n of GNSS network 320.

Location server 340 may include suitable logic, circuitry, interfaces,and/or code that are operable to provide and/or support location basedservices. In this regard, location server 340 may be operable to storeand/or process location related information pertaining to communicationdevices in system 300, such as one or more of mobile devices 302-308, aswell as the location of other entities, such as points of interest,merchants, etc. It should be noted that location server 340 may accessand/or communicate with other location servers/services (not shown) forthe purpose of associating a location of communication devices in system300 with known locations of other entities, points of interest, etc. Thelocation information may be stored in a location reference database 342in location server 340. Location server 340 may be operable to collectand/or retrieve location information from communication devices.Location server 340 may also be operable to access additional and/ordedicated entities, such as SRN 350 for example, to collect GNSSsatellite data, and may be operable to utilize the collected GNSSsatellite data to generate GNSS assistance data (A-GNSS data) including,for example, ephemeris data, long term orbit (LTO) data, referencepositions and/or time information. Location server 340 may communicatethe stored location data when requested to do so.

In operation, location server 340 may be utilized to provide locationbased services (LBS) in system 300. Location server 340 may maintain,for example, location reference database 342, which may include elementscorresponding to each of mobile devices 302-308. Location server 340 mayaccess SRN 350 to collect GNSS satellite data, and may utilize thecollected GNSS satellite data to generate GNSS assistance data (A-GNSSdata) pertaining to the mobile devices 302-308. Location server 340 mayalso collect and/or retrieve location information directly from mobiledevices 302-308, and/or from other associated entities that interactwith mobile devices 302-308 in system 300, such as, for example,wireless AP 312, cellular BS 314, Bluetooth® emitter 316, and/or NFCterminal 318. The retrieved location information may be stored inlocation reference database 342 in location server 340. Location server340 may communicate the stored location data, e.g., when requested to doso. Location reference database 342, maintained in location server 340,may be modified, refined, and/or updated using retrieved locationinformation. Location information stored and/or maintained by locationserver 340 may be utilized to augment and/or substitute for locationinformation received and/or generated based on communication with GNSSnetwork 320, for example, when communication with GNSS network 320 isdisturbed.

The location data may also be locally generated, and/or maintainedthereafter by devices and/or entities other than location server 340. Inthis regard, location related data, which typically may be generatedand/or maintained by location server 340, may be locally generated,maintained, and/or used by mobile devices 302-308, and/or by serviceproviders thereof. Accordingly, devices and/or entities that typicallymay be serviced by location server 340, such as mobile devices 302-308,may also perform location related servicing locally. Furthermore,locally generated and/or maintained location related data may beuploaded from mobile devices 302-308, and/or service providers thereof,to location server 340. Uploading the location related data may beperformed periodically, on request, and/or based on the configuration ofthe client devices or entities, and/or location server 340 itself.

The location information stored and/or maintained in location server 340may be utilized to authenticate, for example, one or more of mobiledevices 302-308, users thereof, and/or locations thereof duringoperations performed by mobile devices 302-308. In this regard, serviceproviders, who may provide access servicing to mobile devices 302-308,may contact location server 340 to request that location server 340perform authentication procedures, and/or to obtain informationnecessary for performing the authentication procedures. The serviceproviders may include, for example, cellular, Bluetooth®, WLAN, and/orNFC services providers. For example, a service provider of one of mobiledevices 302-308 may request authenticating the mobile device, its user,and location at a given instance. Location server 340 may then performthe necessary authentication procedures, which may be based on existinginformation in location reference database 342, which is maintained bylocation server 340. Location server 340 may also perform authenticationprocedures based on current information, which may be obtained by, forexample, communicating with the mobile device, to verify its presentlocation and/or connectivity status or parameters. In this regard,location server 340 may communicate with the mobile device using IPpackets that may be communicated via internet 330, which may betransmitted to and/or received by the mobile device via its internetconnectivity, and/or via its network access via wireless AP 312,cellular BS 314, Bluetooth® emitter 316, and/or NFC terminal 318.

Internet 330 may include a system of interconnected networks and/ordevices that enable exchange of information and/or data among aplurality of nodes, based on one or more networking standards,including, for example, Internet Protocol (IP). Internet 330 may enable,for example, connectivity among a plurality of private and public,academic, business, and/or government nodes and/or networks, wherein thephysical connectivity may be provided via the Public Switched TelephoneNetwork (PSTN), utilizing copper wires, fiber-optic cables, wirelessinterfaces, and/or other standards-based interfaces.

Various devices and/or user identification information may be utilizedduring network access and/or communications, which may be structured,allocated, and/or assigned based on the specific wired and/or wirelessprotocols that are used to facilitate any such network access and/orcommunication. For example, in GSM and/or WCDMA based networks,International Mobile Equipment Identity (IMEI) parameters may beutilized to uniquely identify mobiles devices, and these IMEI parametersmay also be used and/or traced back to the mobile devices' users.

FIG. 4 is an operational flow chart illustrating the sharing of mediacontent between proximate users in accordance with various embodiments.At operation 400, a determination regarding whether a first user isproximate to a second user. As described above, this determination canbe made based upon information gleaned from location-based services, adiscovery protocol through which user devices associated with the firstand second users broadcast and/or receive messages or indications of thefirst and second users' media content application ID, user device IPaddress, etc. At operation 402, and upon a determination that the firstuser and the second user are proximate to each other, the first user andthe second user are paired. Pairing of the first and second users mayentail pairing of their respective media content libraries, pairing oftheir respective accounts, pairing of their respective user devices,temporary granting of entitlements, etc. It should be noted thatoperation 402 is optional. For example, as described above, 1-wayproximity based entitlement sharing can be provided, where the first orsecond user may be allowed access to the other user's media contentwithout “pairing” having to occur. At operation 404, at least one of thefirst and second user is allowed access to one or more instances ofmedia content from a media content library associated with the other ofthe first and second users.

It should be noted that although various embodiments disclosed hereinhave been described in the context of users sharing content, users neednot be limited to individual users. For example, proximity basedentitlement sharing can be utilized in an enterprise-to-enterprisecontext, an enterprise-to-user context and vice-versa. Moreover,instances of media content versions, which in the context of movies canbe, for example, 4K/720p/1080p resolutions, director's cut, serviceprovider exclusive cut, etc. can be mixed and matched. That is,authorizations and/or usage rules can be de-coupled from any particularmanifestation of the media content temporarily.

In accordance with another embodiment, proximity can be leveraged todetermine the most popular media content that a nearby user or group ofusers is consuming or has consumed. FIG. 5 illustrates an exampleprocess that may be performed in accordance with this embodiment. Atoperation 500, a system and method may determine the most popular mediacontent associated with a second user or group of users that is within aproximity of a first user. Proximity can be based on some predetermineddistance, a geographic region, some predefined area or common location,etc., such as a zip code, a venue, or building, or an event such as aball game.

For example, the first user can be informed of the second user's mostconsumed media content, such as the second user's favorite (or top 3,top 5, or top 10) songs, albums, TV shows, movies, games, etc. that thesecond user has digital rights to or is entitled to consume. Likewise,the second user can be informed of the first user's most consumed mediacontent. It should be noted that the manner in which the most popularmedia content is determined can vary, as described in greater detailbelow, and either user can opt in or out of having his or her mediacontent (or information related to his or her media content) publicizedor available for others to see.

At operation 502, at least one of (1) information regarding the mostpopular media content of the second user (or group) and (2) atransaction opportunity regarding the most popular media content of thesecond user (or group) may be provided to the first user. That is, andin accordance with this embodiment, providing the first user with accessto one or more media contents (as described with respect to FIG. 4) canentail providing the first user with details relevant to the mostpopular media content, such as the artist of a song or leading actors ina movie, related media content. Additionally, a direct link to atransactional portal that allows the first user to purchase, rent, orotherwise obtain the right/entitlement to consume that most popularmedia content from the second user (or an account to access contentassociated with the second user) may be provided. Yet another examplecan involve providing a recently-viewed activity feed of the second useror group with a visual representation of content consumed to the firstuser, where the first user to whom this information is provided can beallowed to transact for the media content directly without a need toseparately connect to a transactional service at the time of thetransaction.

Regarding transactions, a transaction portal can be provided throughwhich users can directly purchase or rent media content discovered viaproximity based entitlement sharing or surfacing without the need forusers to leave the application, media player, etc. Transactions can bepre-authorized, or authorization can be provided via a GUI (described ingreater detail below and illustrated in FIG. 6).

Although the embodiment described above is presented in the context oftwo users, it should be understood that other embodiments contemplatelarger numbers of users. In fact, for certain applications, the moreusers that are present in a particular geographical region and deemed tobe proximate to each other, the more data can be analyzed to provideuseful information. For example, certain embodiments can be implementedin a large event/venue context, where a determination can be made thatall users located in a concert venue at the same time are proximate toeach other, and data regarding each user's most popular media contentcan be gathered. Such information can be used to determine, for example,that a particular song is the most popular song amongst a group ofconcert-goers. This information may then be leveraged by the concertvenue and/or a performing artist to create a set list or play music thatis targeted to the group of concert-goers. Another context may be aschool setting, wherein each student that passes through an entrance orhallway is polled to determine each student's most popular mediacontent. Each of the students may then be informed about this mostpopular media content.

As described above, determining the most popular media content can beperformed in a variety of ways. Aggregation techniques or algorithms canbe used to determine how often media content is consumed. Additionally,digital media players, for example, enable users to rate or rank theirmedia. Such information can be gleaned as well to determine a mostpopular media content. Further still, determining the most popular mediacontent can be based on the most popular media content per day, month,of all-time, etc. The most popular media content may be the most popularmedia content across all types of media content, across only aparticular type of media content, across a genre, etc. Moreover, themost popular content need not be limited to a singular media content,but may be, e.g., the top three songs that are listened or the top fivemovies that have been watched over the last month. Further still, themost popular content may be the most transacted media content.

In a group setting, simple aggregation can be utilized to determine howmany users consume a particular media content, and the most consumedmedia content can be deemed as being the most popular. However, moresophisticated aggregation techniques may be utilized, where theaggregated data can be weighted. For example, determining the popularityof media content can involve not only simple aggregation, but can alsoinvolve determining the number of times a particular song appears in aplaylist, the frequency of access for a particular group, region, age,gender, or any other relevant metric, etc. That is, weighting can beperformed with contextual identifiers. Although some examples ofaggregation, weighting, and determining popularity are presented herein,other techniques or algorithms may be used in accordance with otherembodiments.

FIG. 6 illustrates an example GUI that may be presented to users inaccordance with various embodiments. FIG. 6 illustrates first userdevice 102A, which in this example may be a smart phone. Display 108Amay present the GUI within a dedicated proximity based entitlementapplication, existing media application, dedicated media player, etc.The GUI can present a proximate second user's most popular content.Options can be provided to view information, view visualrepresentations, consume clips, as well as engage in transactions forthat most popular content. Moreover, the GUI can present an option toview other proximate users' libraries (e.g., a third user's library) asdescribed in previous embodiments, where the other proximate users'libraries may be identified and displayed by virtue of users' havingsimilar tastes or media content in their respective libraries that issimilar, but not present. Accordingly, new media content can bepresented to users, and opportunities for content discovery can beleveraged.

Accordingly, a “searcher” user, through surfacing of random orpreviously unknown (to the user) content, the likes of proximate userscan be identified, content of users with similar likes can bediscovered, or trends can be determined or identified. From a “searchee”user perspective, transactions (that other users engage in based on oridentified due to the searchee user's most popular media content beingsurfaced) can be used to generate credits or points for obtainingadditional media content, increasing a social media ranking or score, orreceiving some percentage of revenue from each transaction attributed tothe searchee user. Such searchee users can be leveraged as targetedmarketing opportunities. It should be noted that although certainembodiments require proximity to be enabled, other embodiments need notrely on proximity. For example, celebrity-based surfacing iscontemplated whereby matches between users' tastes or similar mediacontent with those of a celebrity's can be used as a content discoverytool.

FIG. 7 illustrates an example computing module that may be used toimplement various features of the system and methods disclosed herein.

As used herein, the term module might describe a given unit offunctionality that can be performed in accordance with one or moreembodiments of the present application. As used herein, a module mightbe implemented utilizing any form of hardware, software, or acombination thereof. For example, one or more processors, controllers,ASICs, PLAs, PALs, CPLDs, FPGAs, logical components, software routinesor other mechanisms might be implemented to make up a module. Inimplementation, the various modules described herein might beimplemented as discrete modules or the functions and features describedcan be shared in part or in total among one or more modules. In otherwords, as would be apparent to one of ordinary skill in the art afterreading this description, the various features and functionalitydescribed herein may be implemented in any given application and can beimplemented in one or more separate or shared modules in variouscombinations and permutations. Even though various features or elementsof functionality may be individually described or claimed as separatemodules, one of ordinary skill in the art will understand that thesefeatures and functionality can be shared among one or more commonsoftware and hardware elements, and such description shall not requireor imply that separate hardware or software components are used toimplement such features or functionality.

Where components or modules of the application are implemented in wholeor in part using software, in one embodiment, these software elementscan be implemented to operate with a computing or processing modulecapable of carrying out the functionality described with respectthereto. One such example computing module is shown in FIG. 7. Variousembodiments are described in terms of this example-computing module 700.After reading this description, it will become apparent to a personskilled in the relevant art how to implement the application using othercomputing modules or architectures.

Referring now to FIG. 7, computing module 700 may represent, forexample, computing or processing capabilities found within aself-adjusting display, desktop, laptop, notebook, and tablet computers;hand-held computing devices (tablets, PDA's, smart phones, cell phones,palmtops, etc.); workstations or other devices with displays; servers;or any other type of special-purpose or general-purpose computingdevices as may be desirable or appropriate for a given application orenvironment. Computing module 700 might also represent computingcapabilities embedded within or otherwise available to a given device.For example, a computing module might be found in other electronicdevices such as, for example navigation systems, portable computingdevices, and other electronic devices that might include some form ofprocessing capability.

Computing module 700 might include, for example, one or more processors,controllers, control modules, or other processing devices, such as aprocessor 704. Processor 704 might be implemented using ageneral-purpose or special-purpose processing engine such as, forexample, a microprocessor, controller, or other control logic. In theillustrated example, processor 704 is connected to a bus 702, althoughany communication medium can be used to facilitate interaction withother components of computing module 700 or to communicate externally.

Computing module 700 might also include one or more memory modules,simply referred to herein as main memory 708. For example, preferablyrandom access memory (RAM) or other dynamic memory, might be used forstoring information and instructions to be executed by processor 704.Main memory 708 might also be used for storing temporary variables orother intermediate information during execution of instructions to beexecuted by processor 704. Computing module 700 might likewise include aread only memory (“ROM”) or other static storage device coupled to bus702 for storing static information and instructions for processor 704.

The computing module 700 might also include one or more various forms ofinformation storage mechanism 710, which might include, for example, amedia drive 712 and a storage unit interface 720. The media drive 712might include a drive or other mechanism to support fixed or removablestorage media 714. For example, a hard disk drive, a solid state drive,a magnetic tape drive, an optical disk drive, a compact disc (CD) ordigital video disc (DVD) drive (R or RW), or other removable or fixedmedia drive might be provided. Accordingly, storage media 714 mightinclude, for example, a hard disk, an integrated circuit assembly,magnetic tape, cartridge, optical disk, a CD or DVD, or other fixed orremovable medium that is read by, written to or accessed by media drive712. As these examples illustrate, the storage media 714 can include acomputer usable storage medium having stored therein computer softwareor data.

In alternative embodiments, information storage mechanism 710 mightinclude other similar instrumentalities for allowing computer programsor other instructions or data to be loaded into computing module 700.Such instrumentalities might include, for example, a fixed or removablestorage unit 722 and an interface 720. Examples of such storage units722 and interfaces 720 can include a program cartridge and cartridgeinterface, a removable memory (for example, a flash memory or otherremovable memory module) and memory slot, a PCMCIA slot and card, andother fixed or removable storage units 722 and interfaces 720 that allowsoftware and data to be transferred from the storage unit 722 tocomputing module 700.

Computing module 700 might also include a communications interface 724.Communications interface 724 might be used to allow software and data tobe transferred between computing module 700 and external devices.Examples of communications interface 724 might include a modem orsoftmodem, a network interface (such as an Ethernet, network interfacecard, WiMedia, IEEE 802.XX or other interface), a communications port(such as for example, a USB port, IR port, RS232 port Bluetooth®interface, or other port), or other communications interface. Softwareand data transferred via communications interface 724 might typically becarried on signals, which can be electronic, electromagnetic (whichincludes optical) or other signals capable of being exchanged by a givencommunications interface 724. These signals might be provided tocommunications interface 724 via a channel 728. This channel 728 mightcarry signals and might be implemented using a wired or wirelesscommunication medium. Some examples of a channel might include a phoneline, a cellular link, an RF link, an optical link, a network interface,a local or wide area network, and other wired or wireless communicationschannels.

In this document, the terms “computer program medium” and “computerusable medium” are used to generally refer to transitory ornon-transitory media such as, for example, memory 708, storage unit 720,media 714, and channel 728. These and other various forms of computerprogram media or computer usable media may be involved in carrying oneor more sequences of one or more instructions to a processing device forexecution. Such instructions embodied on the medium, are generallyreferred to as “computer program code” or a “computer program product”(which may be grouped in the form of computer programs or othergroupings). When executed, such instructions might enable the computingmodule 700 to perform features or functions of the present applicationas discussed herein.

Although described above in terms of various exemplary embodiments andimplementations, it should be understood that the various features,aspects and functionality described in one or more of the individualembodiments are not limited in their applicability to the particularembodiment with which they are described, but instead can be applied,alone or in various combinations, to one or more of the otherembodiments of the application, whether or not such embodiments aredescribed and whether or not such features are presented as being a partof a described embodiment. Thus, the breadth and scope of the presentapplication should not be limited by any of the above-describedexemplary embodiments.

Terms and phrases used in this document, and variations thereof, unlessotherwise expressly stated, should be construed as open ended as opposedto limiting. As examples of the foregoing: the term “including” shouldbe read as meaning “including, without limitation” or the like; the term“example” is used to provide exemplary instances of the item indiscussion, not an exhaustive or limiting list thereof; the terms “a” or“an” should be read as meaning “at least one,” “one or more” or thelike; and adjectives such as “conventional,” “traditional,” “normal,”“standard,” “known” and terms of similar meaning should not be construedas limiting the item described to a given time period or to an itemavailable as of a given time, but instead should be read to encompassconventional, traditional, normal, or standard technologies that may beavailable or known now or at any time in the future. Likewise, wherethis document refers to technologies that would be apparent or known toone of ordinary skill in the art, such technologies encompass thoseapparent or known to the skilled artisan now or at any time in thefuture.

The presence of broadening words and phrases such as “one or more,” “atleast,” “but not limited to” or other like phrases in some instancesshall not be read to mean that the narrower case is intended or requiredin instances where such broadening phrases may be absent. The use of theterm “module” does not imply that the components or functionalitydescribed or claimed as part of the module are all configured in acommon package. Indeed, any or all of the various components of amodule, whether control logic or other components, can be combined in asingle package or separately maintained and can further be distributedin multiple groupings or packages or across multiple locations.

Additionally, the various embodiments set forth herein are described interms of exemplary block diagrams, flow charts and other illustrations.As will become apparent to one of ordinary skill in the art afterreading this document, the illustrated embodiments and their variousalternatives can be implemented without confinement to the illustratedexamples. For example, block diagrams and their accompanying descriptionshould not be construed as mandating a particular architecture orconfiguration.

What is claimed is:
 1. A computer-implemented method, comprising:determining whether a first user is proximate to a second user; andallowing at least one of the first and second user to access one or moremedia contents from a media content library associated with the other ofthe first and second users.
 2. The computer-implemented method of claim1, further comprising pairing the first user and the second user upon adetermination that the first user and the second user are proximate toeach other.
 3. The computer-implemented method of claim 1, furthercomprising, presenting the one or more media contents to the at leastone of the first and second user.
 4. The computer-implemented method ofclaim 3, further comprising, upon a determination that the first andsecond users are no longer proximate to each other, at least one ofstopping the presentation of the one or more media contents, continuingthe presentation of the one or more media contents until a conclusion ofthe one or more media contents, and offering an alternative mediacontent presentation.
 5. The computer-implemented method of claim 4,wherein the alternative media content presentation comprises at leastone of presenting an ad-supported version of the one or more mediacontents, presenting an option to obtain non-shared access to the one ormore media contents, and related media content.
 6. Thecomputer-implemented method of claim 1, wherein determining whether thefirst user is proximate to the second user comprises determining thefirst and second users' respective location using at least one oflocation-based services and near field communication (NFC) servicesbased upon a first device associated with the first user and a seconddevice associated with the second user.
 7. The computer-implementedmethod of claim 6, wherein the NFC services comprises a discoveryprotocol through which at least one of the first or second user devicesbroadcasts an identifier and at least one of the other of the first orsecond user devices scans for the identifier.
 8. Thecomputer-implemented method of claim 1, wherein the allowance of the atleast one of the first and second user to access the one or more mediacontents from the media content library associated with the other of thefirst and second users is temporary.
 9. The computer-implemented methodof claim 1, wherein the pairing of the first and second users occurs atone of a user account level, a media service application level, and auser device level.
 10. The computer-implemented method of claim 1,wherein the pairing of the first and second users comprises a temporarygrant or exchange of one or more entitlements associated with the one ormore media contents.
 11. The computer-implemented method of claim 1,wherein the pairing of the first user and the second user comprises aninformation-exchangeless pairing at a user level.
 12. Thecomputer-implemented method of claim 1, further comprising determining amost popular media content associated with the second user or group ofusers proximate to the first user.
 13. The computer-implemented methodof claim 12, wherein the determining of the most popular media contentcomprises determining a number of times at least one of the one or moremedia contents has been consumed.
 14. The computer-implemented method ofclaim 12, wherein the determining of the most popular media contentcomprises determining a number of transactions involving at least one ofthe one or more media contents.
 15. The computer-implemented method ofclaim 12, further comprising aggregating at least one of media contentconsumption and media content transactions amongst a plurality ofadditional users proximate to at least one of the first user and thesecond user or group of users to determine a most popular media contentwithin a defined region and a time period.
 16. The computer-implementedmethod of claim 15, wherein the aggregating further comprises applyingat least one contextual identifier to further characterize the one ormore media contents in order to determine the most popular mediacontent.
 17. The computer-implemented method of claim 12, wherein theaccessing comprises presenting an option to engage in a transactionregarding the one or more media contents.
 18. The computer-implementedmethod of claim 12, wherein the accessing comprises presentinginformation associated with the one or more media contents.
 19. Thecomputer-implemented method of claim 1, further comprising determiningwhether the first user and the second user or group of users havesimilar media contents in their respective media content libraries,wherein the accessing is contingent upon the first user and the seconduser or group of users having similar media contents.
 20. Thecomputer-implemented method of claim 19, further comprising presentingat least one of information associated with the similar media contentsand an option to engage in a transaction for the similar media contents,the similar media contents of the first user being absent from the mediacontent library of the second user or group of users, and the similarmedia contents of the second user or group of users being absent fromthe media content library of the first user.
 21. A system, comprising: afirst user device; a second user device; and a content provider, whereinthe content provider provides to a second user identified via the seconduser device, access to one or more protected media contents from a firstmedia content library associated with a first user identified via thefirst user device upon a determination that the first and second usersare proximate to each other.
 22. The system of claim 21, wherein thecontent provider comprises a media server in which the one or moreprotected media contents are stored.
 23. The system of claim 22, whereinthe content provider further comprises an entitlement databasecontaining entitlement information associated with the one or moreprotected media contents, the entitlement information being shared withthe second user to allow for the access to the one or more protectedmedia contents, the sharing of the entitlement information occurringsuch that the entitlement information is kept hidden from the seconduser.
 24. The system of claim 21, wherein the access to the one or moreprotected media contents is temporary access dependent upon the firstand second users remaining proximate to each other.
 25. The system ofclaim 24, wherein upon a determination that the first and second usersare no longer proximate to each other, the content provider at least oneof stops presentation of the one or more protected media contents,continuing the presentation of the one or more protected media contentsuntil a conclusion of the one or more media contents or until apredetermined time limit has been reached, and offering an alternativemedia content presentation.
 26. A system, comprising: a first userdevice; a second user device; a first content provider providing a firstset of one or more protected media contents to a first user associatedwith the first user device; a second content provider providing a secondset of one or more protected media contents to a second user associatedwith the second user device; and a server adapted to allow temporaryaccess by the second user to the first set of the one or more protectedmedia contents and allow temporary access by the first user to thesecond set of the one or more protected media contents upon adetermination that the first and second user devices are proximate toeach other.
 27. The system of claim 26, wherein each of the first andsecond content providers further comprises an entitlement databasecontaining entitlement information associated with the respective firstand second sets of the one or more protected media contents.
 28. Thesystem of claim 26, wherein the temporary access is achieved by sharingthe entitlement information between the first and second contentproviders while keeping the entitlement information hidden from eitherof the first and second users.
 29. The system of claim 28, wherein upona determination that the first and second users are no longer proximateto each other, the temporary access ceases in accordance with one ormore usage rule constraints.