Method and system for establishing RF Aware and SST Aware communications networks where network aware devices may detect, discover, authenticate and communicate directly with each other, based on such attributes as interests, proximity, or location within or outside of a specified zone

ABSTRACT

A communications network is provided where devices are assigned either a static or random unique device identifier; where devices may be configured to be in public or private mode; and, where devices are in public mode, they may detect, discover, authenticate and communicate directly with each other, based on such attributes as interests, proximity, or location within or outside a specified zone.

CROSS-REFERENCE TO RELATED APPLICATIONS

The present application is a continuation of co-pending U.S. applicationSer. No. 13/870,456 entitled “Method and system for searching, sensing,discovering, screening, enabling awareness, alerting, sharing, sending,receiving, buying, selling, and otherwise transmitting stories, content,interests, data, goods and services among known and unknown devices in acommunication network”, filed on Apr. 25, 2013 (the “ParentApplication”), which claims the benefit of U.S. Provisional PatentApplication Ser. No. 61/648,212, entitled “1. Communication Methodsbetween, among and to Unknown Devices; 2. Searching, Sending andReceiving Voice, Video and Data between, among and to Unknown Devices;3. Creating Sixth-Sense Technologies for Sharing and Learning Storiesand Interests; and 4. Discovery engine to identify others with whom tocommunicate” and filed on May 17, 2012. The Parent Applicationidentified above is incorporated here by reference in its entirety toprovide continuity of disclosure.

BACKGROUND OF THE INVENTION

1. Field of the Invention

This disclosure relates generally to a method and system for searching,sensing, discovering, screening, enabling awareness, alerting, sharing,sending, receiving, buying, selling, and otherwise transmitting stories,content, interests, data, goods and services among known and unknowndevices in a communication network.

2. Description of Related Art

General background information regarding the related art is set forth inparagraphs [0002] through [0016] of the Parent Application and in theapplicant's Information Disclosure Statement filed with thisContinuation Patent Application, which background is incorporated hereinby reference.

It may be argued that the current inventions are anticipated in part byHeinemann (Andreas Heinemann, Collaboration in Opportunistic Networks(VDM Verlag 2007) (dissertation, Darmstadt University of Technology))(“Heinemann”), because Heinemann may disclose methods for searching,sensing, and discovering attributes, etc. among known and unknowndevices.

A careful review of the Heinemann dissertation, however, reveals thatthe current inventions were not, and are not, anticipated by that priorpublication.

Heinemann described the use of filters and profiles as a means of datadissemination in a collaborative opportunistic network (a “CON”) (pp. v,4, 5, 13-14, 18, 43-44); and also envisioned use of changing networkidentifiers in a collaborative network, by using public key cryptographyand linking public keys to, e.g., email addresses, as a method toauthenticate information items or identity and preserve anonymity in anad hoc mobile network (pp. vi, 14, 48, 49-52, 77-78, 81, 87, 94).

The art taught by and foreseeable from Heinemann's CON has severalcritical limitations, which are conceded by Heinemann. First, his CONsare limited to the dissemination of broadcast-type information to othersusers in close proximity to each other; they do not support any messagerouting functionality (p. 78). Second, his ad hoc networks do notauthenticate the user/device to deliver either user- or device-specificmessages or other content. Third, his CONs do not enable communicationwith devices/users outside or beyond such closely proximate zone. (pp.11, 15, 28, 49-52, 78, 81, 94).

The Applicant's inventions in the Parent Application, including itsClaims in this Continuation Application for RF Aware and SST AwareNetworks, overcome these limitations:

first by solving the problem of how to authenticate devices at both ends(i.e., sending and receiving) of a communication by using variableidentification information, or VII—defined to include one or more of thesearched-for attributes, varying device identifying information, orother datum or data associated with or pertinent to the device(including its software or firmware) or its user, without the use of orreliance on, e.g., public or private cryptography keys, other knowncontact information, or enrollment in a social network;second, by using VII, to route messages to specific devices, thusovercoming Heinemann's limitation of only being able to send the samebroadcast-type information to all devices/users;third, by using VII, to be able to be able to authenticate andcommunicate with devices or users who are not in close proximity to eachother;fourth, by using VII, to maintain communications with devices or userswho move outside of the same proximate location or zone; andfifth, by using VII, to re-authenticate and initiate targetedcommunications with specific devices or users who move outside of thesame proximate location or zone; in each case without the use of orreliance on, e.g., public or private cryptography keys, other knowncontact information, or enrollment in a social network.

Furthermore, the current inventions combine variable identificationinformation with search, detect and functional operations (jointly,“Sixth-Sense Technology”, or simply “SST”) to enable users to conductpersonal and commercial activities in new ways, while giving userscontrol over their privacy and anonymity. These inventions enables forthe first time the sharing of stories and content, and the marketing,sale, purchase, and license of goods and services between or amongintended but unknown devices or their users.

Applicant's inventions are not taught by or foreseeable from Heinemannand other prior art because they disclose and teach the nonobviousfeatures that:

(a) The SST inventions use variable identification information from eachof the first device and the recipient devices to authenticate andmaintain directed communication by and among the first device with therecipient devices(b) The SST inventions describe a new method of communication that doesnot use and is not dependent upon the use of public or privatecryptography keys(c) The SST Inventions describe a new method of communication thatenables authentication of devices to deliver user- or device-specificmessages or other content(d) The SST Inventions describe a new method of communication thatenables communication with devices/users outside or beyond limitedphysical areas or zones(e) By combining these authentication and communications capabilitieswith search and detect functionalities, filters, and user attributes,the Applicant's inventions create new functional operations that enableusers to conduct personal and commercial activities in new ways, whilegiving users control over their privacy and anonymity. The SSTinventions enable for the first time the sharing of directed stories andcontent, and the marketing, sale, purchase, and license of goods andservices between or among intended but unknown devices or their users.None of these features is taught or suggested by Heinemann or the priorart.

Applicant is the first to recognize the advantage of combining variableidentification information for authentication and communication purposeswith search and detect functionalities, filters and user attributes, sothat a new result—not anticipated by Heinemann or the prior art—has beenachieved; that is, devices and users can communicate and share withthose around them—both nearby and around the globe—to enhance theirindividual and social experiences, to connect them with their past andwith each other, to improve their understanding and enjoyment of life,and to conduct and engage in commerce in new ways.

BRIEF SUMMARY OF THE INVENTION RF Aware and SST Aware Networks

The Claims set forth in this Continuation Application do not contain newmatter relative to the Parent Application; the Claims herein areconceived and based entirely on the detailed specification of the ParentApplication—which is repeated and set forth at length as paragraphs[00033] through [00055] below. Specific embodiments of the Claims setforth in this Continuation Application are summarized in paragraphs[0013] through [0016] below:

A communications network is established where devices are assignedeither a static or random unique device identifier; where devices may beconfigured to be in public or private mode; and where devices are inpublic mode, they may detect, discover, authenticate and communicatedirectly with each other, based on such attributes as interests,proximity, or location within a specified zone (such a network herein an“RF Aware Network”, and such devices herein, “RFA Devices”). In certainnetworks (separately herein, an “SST Aware Network”), devices in publicmode may use applicant's sixth-sense technology (as described in theParent Application) to authenticate and communicate with each other(such devices herein, “SSTA Devices”; and RFA Devices and SSTA Devicesjointly herein, “Network Aware Devices”, or simply “NADs”).

Network Aware Devices can advertise or subscribe to services based onproximity, interests or other attributes. They can indicate theirpreference to detect replies only from closer devices or from all NADsby setting parameters. Publish messages make a service discoverable byother devices in the same cluster. A service can broadcast itsavailability continuously (unsolicited) or only when requested by anactive subscriber (solicited). For example, a RFA-certified printercould broadcast its availability continuously to nearby devices.

Subscribe messages sent to devices in a cluster indicate that thedevices should transmit publish messages when specific criteria are met.Active subscribe messages look for solicited publishers. Passivesubscribe messages look for the continuously broadcast unsolicitedpublishers. By using matching filter parameters, Network Aware Devicescan specify in more detail the services being sought or offered. Also,service response filters enable NADs to respond to each other (or not)based on their static or random service ID or other variableidentification information, and whether they are included or excludedfrom a list defined in attributes.

Applications can follow up with services on other Network Aware Devices.This is how a service or application can determine which people at aconference trigger an alert on a NAD, or whether to display informationabout an exhibit as the NAD passes it in a museum.

Sixth-Sense Technology

This Brief Summary of the SST Invention is the same as set forth inparagraphs [00017] through [00031] of the Parent Application, and thuscontains no new matter.

For wired, wireless and other communications, we have conceived, createdand developed new communications methods for people, businesses andorganizations (“participants”) to search, sense and become aware of whatothers are interested in (and/or with whom they want or are willing tocommunicate) and to connect those people in private and anonymouscommunications based on their shared interests and thoughts.

A shorthand description of this new invention is as follows:

(a) it performs a search/discovery engine function in the fields ofcommunications, thoughts and interests, similar to the followingfamiliar tools: what an Internet search engine does for URL addressesand content; what a telephone directory does for phone numbers; what atelevision guide does for broadcast and cable television;(b) it enables sensing, alerting, and becoming aware of such otherpersons and/or devices;(c) it enables the delivery and completion of the sender'scommunications and stories, privately and anonymously, with unknownrecipients and devices selected by the sender; and(d) the sixth sense discovery invention performs both ‘push” and “pull”functions.

One aspect of the present SST invention relates to creating andproviding people with the ability to search, “sense” and be alerted tounknown third parties with whom they want or are willing to communicate(“recipients”), and engage directly in real-time communications withsuch unknown recipients, without knowing the identity, address, contactinformation or location of the recipients (herein, “unknownrecipients”).

Another aspect of the present SST invention also relates to creating andproviding people with the ability to search, sense and be alerted towhat others are interested in (and/or with whom they want or are willingto communicate) and to connect those people in private (or public) andanonymous communications based on their shared interests and thoughts.

Another aspect of the present SST invention also relates to creating andproviding participants, groups, businesses, organizations and otherparties with the means to search, discover and be alerted to what otherpeople are interested in, and to deliver, share and learn to, with andfrom new and unknown recipients, through the exchange of voice, video,data and multi-media.

A first embodiment—of the single or multi-user push operation for oursixth-sense discovery invention—relates to creating and providing peoplewith the ability to send real-time content to one or more others whomight be interested in a particular topic. An example of this embodimentis where a person or organization wants to direct in real-time content(e.g., in the form of a message or voice alert) to one or more otherswho might be interested in a particular political or social cause. Theperson or organization would use a device and communications networkenhanced by the invention to discover and become aware of who isinterested in receiving such content, and then send the desired content,privately and anonymously, to all unknown recipients chosen by thesender.

A second embodiment—of the single or multi-user pull operation of oursixth-sense discovery invention—relates to creating and providing peoplewith the ability to learn more about a particular topic. An example ofthis embodiment is where a person wants to learn more about “gaymarriage”. While attending a business conference, his device (enhancedwith our invention) senses that a gay rights activist is nearby, andsends him an alert. The participant checks his device; learns that LloydC. Blankfein, the chief of Goldman Sachs and national corporatespokesperson for The Human Rights Campaign (THRC), is sitting across theaisle; texts Mr. Blankfein to set up an inquiry or even a meet andgreet; and then at Mr. Blankfein's request, receives a full report fromTHRC reviewing both sides of the gay marriage debate.

A third embodiment relates to creating and providing new communicationsmethods for people, groups, businesses, organizations and other partiesto search, discover and become aware of what other people are interestedin, and to deliver, share and learn, with and from new and unknownrecipients, through the exchange of voice, video, data and multi-media.An example of this embodiment is where a person desires to find out whatinterests others, inclusive of everyone from the newcomer at school, theperson across town, or someone halfway around the globe. People will geta sense of and be alerted to the other guy's ‘story’, and be able toshare voice, pictures, video and data content based on common interests,creating ties that bind, and bringing people together.

A fourth embodiment relates to creating and providing businesses andpeople, and governments, institutions, and other organizations, with:

-   -   new methods for searching and prospecting for new customers and        contacts,    -   new methods for distributing and selling new and additional        products to existing and new customers,        -   new methods for conducting market research, consumer            surveys, surveys and focus groups for new product features,            new products, product development, and research and            development,        -   new methods for forecasting demand and creating, maintaining            and improving operations and supply-chain management, and    -   new methods for conducting global, supra-national, national,        regional and census, public health and other data-gathering;        public policy development; dissemination of emergency alerts,        public-health news and other information; distribution of        benefits; and political outreach, recruitment, opinion polls,        advocacy and other political activities.

An example of this embodiment is where a businesses or organizationwants to discover, become aware of, and/or engage new customers andprospects for their products, services and causes. Another example ofthis embodiment is where a media content producer would use our newcommunications methods to discover and become aware of which groups ofanonymous consumers are or might be interested in their content; sendthose people a message or alert that their content is available forpurchase, streaming or download; and then complete the delivery of theircontent to such unknown people or devices—without needing to negotiatewith a cable television company or other digital distributor, forexample, terms and conditions, including without limitation such termsas: bundled-service package restrictions and/or other conditions;distribution fees and/or transaction commissions or fees; or digitalrights management restrictions. Freed of such restrictions and costs,vendors will receive the following benefits:

(i) greater adjusted gross margins, which enable both lower consumerprices and greater business reinvestment;(ii) by gaining direct access to customers and prospects: (a) new ideasfor new products, features, and improvements to existing products, and(b) greater customer satisfaction and loyalty;(iii) lower costs resulting from reduced license fees and similarexpenses relating to license/rental of third-party ‘house lists’ andother prospecting databases; and(iv) other benefits resulting from avoidance of competitive restrictionsdictated by third parties who control access to the customer andprospect of the vendor's products, services and/or causes.

A fifth embodiment relates to creating and providing consumers with newmethods for purchasing products or services. An example of thisembodiment is where an individual wants to remain anonymous throughoutthe entire purchase process, from research and screening, to referralsand recommendations, to closing the deal. Another example of oursearching, sensing, discovery, alerting, and delivery method is where anovice consumer wants to start a reggae musical collection, so she usesour new communications method to identify an industry expert, solicitand procure their recommendations, and purchase selected digital musicdirectly from the artists' mobile website, all privately andanonymously—without needing: (i) an account; (ii) membership fordistributors like iTunes or Spotify; or (iii) searches of websites orInternet URLs.

In some embodiments, a method is disclosed of selectively communicatingwith one or more other devices whose identification information isunknown, the method comprising launching a client application on adevice, wherein the client application enables communication with otherdevices whose identification information is unknown, identifying andlocating other devices listing a searched-for identified attribute (suchas at least one of the user's professional, associational, personal,physical, social, athletic, recreational, hobby and other interests andattributes), or any other data associated with the device or its user,that the second client application compiles; obtaining informationregarding the other devices listing such searched-for attribute;compiling the information regarding the other devices listing thesearched-for attribute to enable selection of at least one device toinitiate communication using service messages, tags or tokens or otheridentifiers (jointly herein, “Variable Identifiers”); displaying aselection of the at least one device from the compiled information ofthe other devices listing such searched-for attribute; enabling privacypreferences for the device, wherein the privacy preferences enable thedevice to provide variable identification information to the at leastone other device; enabling the client application on the device tospecify whether the Variable Identifier is associated with privatecontent, wherein the private content is sent only to the at least oneother device; and sending the private content from the device to the atleast one other device.

In some embodiments, a method is disclosed of selectively communicatingwith one or more other devices whose identification information isunknown, the method comprising launching a client application on adevice, wherein the client application enables communication with otherdevices whose identification information is unknown; identifying anattribute (such as at least one of the user's gender, professional,associational, personal, physical, social, athletic, recreational, hobbyand other interests and attributes), or any other data associated withthe device or its user, that the device or its user wants to make knownto other devices and users whose identification is unknown, whichattribute is compiled by the first client application; identifying atleast one criterion (such as attribute, location, time of day, date,etc) for sharing such attribute with at least one other user or device,which criterion is compiled by the first client application; identifyingand locating other devices based on such one or more criteria; obtaininginformation regarding the other devices meeting such criteria; compilingthe information regarding the other devices meeting such criteria toenable selection of at least one device to initiate communication usingservice messages, tags or tokens or other identifiers (jointly herein,“Variable Identifiers”); displaying a selection of the at least onedevice from the compiled information of the other devices meeting suchcriteria; enabling privacy preferences for the device, wherein theprivacy preferences enable the device to provide variable identificationinformation to the at least one other device; enabling the clientapplication on the device to specify whether the Variable Identifier isassociated with private content, wherein the private content is sentonly to the at least one other device; and sending the private contentfrom the device to the at least one other device.

In some embodiments, a method is disclosed of selectively communicatingwith one or more other devices whose identification information isunknown, the method comprising launching a client application on adevice, wherein the client application enables communication with otherdevices whose identification information is unknown; identifying theother devices based on selected criteria using the client application,wherein the selected criteria comprise both (i) a searched-foridentified attribute (such as at least one of the user's professional,associational, personal, physical, social, athletic, recreational, hobbyand other interests and attributes), or any other data associated withthe device or its user, and (ii) one or more searched-for locations orzones (jointly herein, a “zone”); obtaining attribute and/or other dataand information regarding the other devices located in the searched-forzone; compiling such information regarding the other devices located inthe searched-for zone to enable selection of at least one device toinitiate communication using service messages; displaying a selection ofthe at least one device from the compiled information of the otherdevices located in the searched-for zone; enabling privacy preferencesfor the device, wherein the privacy preferences enable the device toprovide variable identification information to the at least one otherdevice; enabling the client application on the device to specify whetherthe Variable Identifier is associated with private content, wherein theprivate content is sent only to the at least one other device; andsending the private content from the device to the at least one otherdevice.

In some embodiments, a device for selectively communicating with one ormore other devices whose identification information is unknown, thedevice comprising an interface that is configured to communicate withthe one or more other devices, and a client application that isconfigured to communicate with the interface to search for at least oneof the one or more other devices based on selected criteria specified inthe client application and to compile information obtained from the oneor more other devices; the client application further configured to senda message to one or more other devices selected from the compiledinformation, and to enable privacy preferences for the device, whereinthe privacy preferences enable the device to provide variableidentification information to the at least one other device, as well asto enable the client application to specify whether the variableidentification information is associated with private content, so thatthe private content is sent only to the at least one other device; andthe device interface configured to send the private content from thedevice to the at least one other device.

In some embodiments, a method of selectively communicating betweendevices when identification information used to contact a device isunknown, the method comprising receiving, at a remote processing server,registration information from a first device; creating useridentification information for the first device and associating the useridentification information with the registration information;determining attributes and criteria for the first device and associatingthe criteria in the database with the user identification information ofthe first device; receiving, at the remote processing server, a secondregistration from at least one other device; organizing information fromthe first device and the at least one other device in a database on theremote processing server; determining attributes and criteria for the atleast one other device and storing in the database; receiving a servicemessage, at the remote processing server, from the first device, whereinthe service message comprises content and user identificationinformation; searching the database using the criteria selected by thefirst device to locate at least one other device that is withinparameters specified by the first device; obtaining information for theat least one other device and processing the service message to send tothe at least one other device; and sending a processed service messageincluding the content of the service message to the at least one otherdevice.

BRIEF DESCRIPTION OF THE DRAWINGS

This Brief Description of the Drawings is the same as set forth inparagraph [00032] of the Parent Application, and thus contains no newmatter.

FIG. 1 illustrates communications devices that provide searching,discovering, sensing, sharing, sending and receiving stories, content,interests and data among known and unknown people and devices, includingcommunication to and with recipients whose traditional identificationinformation is unknown in accordance with certain embodiments.

A method and system for searching, sensing, discovering, enablingawareness, alerting, screening, sharing, sending, receiving, buying,selling, and otherwise transmitting stories, content, interests, data,goods and services among known and unknown devices in a communicationnetwork.

DETAILED DESCRIPTION

This Detailed Description of the Invention is the same as set forth inparagraphs [00033] through [00055] of the Parent Application, and thuscontains no new matter.

Methods and systems are provided for searching, sensing, discovering,sharing, sending and receiving stories, content, interests and dataamong known and unknown people and devices in a communication network,in accordance with certain embodiments.

Platt et al teach us how to communicate without traditionalidentification information or communication methods, both directlybetween devices, U.S. Pat. No. 8,396,489, and with the aid of a server,U.S. Pat. No. 8,396,490 (the “Related Inventions”).

But the Related Inventions do not teach how to search, discover, sense,share, send and receive stories, content, interests and data among knownand unknown people and devices. For example, you may want to “know thestory” of, or learn something about, an unknown person across thestreet, across the stadium, or on the other side of the world—withoutsending a message and awaiting a response. Another example is where youmay want to purchase a new product or service, but don't know a businessthat sells it—and you don't have access to the Internet or don't havethe time to conduct a web search. Another instance could be wherebusiness may want to find new customers or prospects—without renting orbuying a list of names. A different example could be where an artist orproducer may want to distribute its artistic creation—without using adigital distributor like Comcast or iTunes. In order to provide thistype of communication among and with people, groups, and devices whosetraditional identification information is unknown, various systems,methods, and apparatus are disclosed.

Reference will now be made in detail to embodiments, an example of whichis illustrated in the accompanying drawing. In the following detaileddescription, numerous specific details are set forth in order to providea thorough understanding of the present invention. However, it will beapparent to one of ordinary skill in the art that the present inventionmay be practiced without these specific details. In other instances,methods, procedures, components, and circuits taught by the RelatedInventions—for both (a) communications without traditionalidentification information, and (b) communication methods, both directlybetween devices and with the aid of a server—have not been described indetail so as not to unnecessarily obscure aspects of the embodiments.

FIG. 1 illustrates communications devices that provide searching,discovering, sensing, sharing, sending and receiving stories, content,interests and data among known and unknown people and devices, includingcommunication to and with recipients whose traditional identificationinformation is unknown in accordance with certain embodiments.

FIG. 1 illustrates a portable, mobile or static-location electronicdevice, according to some embodiments of the invention, including, byway of illustration and not limitation, a server, router, switch,personal computer, laptop, notebook, mobile devices such as a tablet,smartphone, and wearable computers such as shoes, glasses, or implantedchips. The device 100 includes a memory 102, a memory controller 104,one or more processing units (CPU's) 106, a peripherals interface 108,RF circuitry 112, audio circuitry 114, a speaker 116, a microphone 118,an input/output (I/O) subsystem 120, a touch screen 126, other input orcontrol devices 128, and an external port 148. These componentscommunicate over the one or more communication buses or signal lines110. The device 100 can be any electronic device, including but notlimited to a desktop or laptop computer, a landline telephone, handheldcomputer, a tablet computer, a mobile phone, a media player, a personaldigital assistant (PDA), or the like, including a combination of two ormore of these items. It should be appreciated that the device 100 isonly one example of an electronic device 100, and that the device 100may have more or fewer components than shown, or a differentconfiguration of components. The various components shown in FIG. 1 maybe implemented in hardware, software or a combination of both hardwareand software, including one or more signal processing and/or applicationspecific integrated circuits.

The memory 102 may include high speed random access memory and may alsoinclude non-volatile memory, such as one or more magnetic disk storagedevices, flash memory devices, or other non-volatile solid state memorydevices. In some embodiments, the memory 102 may further include storageremotely located from the one or more processors 106, for instancenetwork attached storage accessed via the RF circuitry 112 or externalport 148 and a communications network (not shown) such as the Internet,intranet(s), Local Area Networks (LANs), Wide Local Area Networks(WLANs), Storage Area Networks (SANs) and the like, or any suitablecombination thereof. Access to the memory 102 by other components of thedevice 100, such as the CPU 106 and the peripherals interface 108, maybe controlled by the memory controller 104.

The peripherals interface 108 couples the input and output peripheralsof the device to the CPU 106 and the memory 102. The one or moreprocessors 106 run various software programs and/or sets of instructionsstored in the memory 102 to perform various functions for the device 100and to process data.

In some embodiments, the peripherals interface 108, the CPU 106, and thememory controller 104 may be implemented on a single chip, such as achip 111. In some other embodiments, they may be implemented on separatechips.

The RF (radio frequency) circuitry 112 receives and sendselectromagnetic waves. The RF circuitry 112 converts electrical signalsto/from electromagnetic waves and communicates with communicationsnetworks and other communications devices via the electromagnetic waves.The RF circuitry 112 may include well-known circuitry for performingthese functions, including but not limited to an antenna system, an RFtransceiver, one or more amplifiers, a tuner, one or more oscillators, adigital signal processor, a CODEC chipset, a subscriber identity module(SIM) card, memory, and so forth. The RF circuitry 112 may communicatewith the networks, such as the Internet, also referred to as the WorldWide Web (WWW), an Intranet and/or a wireless network, such as acellular telephone network, a wireless local area network (LAN) and/or ametropolitan area network (MAN), and other devices by wirelesscommunication. The wireless communication may use any of a plurality ofcommunications standards, protocols and technologies, including but notlimited to Long Term Evolution (LTE/4G). Global System for MobileCommunications (GSM), Enhanced Data GSM Environment (EDGE), widebandcode division multiple access (W-CDMA), code division multiple access(CDMA), time division multiple access (TDMA), Bluetooth, WirelessFidelity (Wi-Fi) (e.g., IEEE 802.11a, IEEE 802.11b, IEEE 802.11g and/orIEEE 802.11n), voice over Internet Protocol (VoIP), Wi-MAX, a protocolfor email, instant messaging, Short Message Service (SMS) and/orMultimedia Messaging Service (MMS)), or any other suitable communicationprotocol, including communication protocols not yet developed as of thefiling date of this document.

The audio circuitry 114, the speaker 116, and the microphone 118 providean audio interface between a user and the device 100. The audiocircuitry 114 receives audio data from the peripherals interface 108,converts the audio data to an electrical signal, and transmits theelectrical signal to the speaker 116. The speaker converts theelectrical signal to human-audible sound waves. The audio circuitry 114also receives electrical signals converted by the microphone 116 fromsound waves. The audio circuitry 114 converts the electrical signal toaudio data and transmits the audio data to the peripherals interface 108for processing. Audio data may be may be retrieved from and/ortransmitted to the memory 102 and/or the RF circuitry 112 by theperipherals interface 108. In some embodiments, the audio circuitry 114also includes a headset jack (not shown). The headset jack provides aninterface between the audio circuitry 114 and removable audioinput/output peripherals, such as output-only headphones or a headsetwith both output (headphone for one or both ears) and input(microphone).

The I/O subsystem 120 provides the interface between input/outputperipherals on the device 100, such as the touch screen 126 and otherinput/control devices or components, such as device-control sensors 128,and the peripherals interface 108. The I/O subsystem 120 includes atouch-screen controller 122 and one or more input controllers 124 forother input or control devices. The one or more input controllers 124receive/send electrical signals from/to other input or control devices128. The other input/control devices 128 may include physical buttons(e.g., push buttons, rocker buttons, etc.), dials, slider switches,sticks, and so forth.

The touch screen 126 provides both an output interface and an inputinterface between the device and a user. The touch-screen controller 122receives/sends electrical signals from/to the touch screen 126. Thetouch screen 126 displays visual output to the user. The visual outputmay include text, graphics, video, and any combination thereof. Some orall of the visual output may correspond to user-interface objects,further details of which are described below.

The touch screen 126 also accepts input from the user based on hapticand/or tactile contact. The touch screen 126 forms a touch-sensitivesurface that accepts user input.

In some embodiments, in addition to the touch screen, the device 100 mayinclude a touchpad (not shown) for activating or deactivating particularfunctions. In some embodiments, the touchpad is a touch-sensitive areaof the device that, unlike the touch screen, does not display visualoutput. The touchpad may be a touch-sensitive surface that is separatefrom the touch screen 126 or an extension of the touch-sensitive surfaceformed by the touch screen 126.

The device 100 also includes a power system 130 for powering the variouscomponents. The power system 130 may include a power management system,one or more power sources (e.g., battery, alternating current (AC)), arecharging system, a power failure detection circuit, a power converteror inverter, a power status indicator (e.g., a light-emitting diode(LED)) and any other components associated with the generation,management and distribution of power in portable devices.

In some embodiments, the software components include an operating system132, a communication module (or set of instructions) 134, acontact/motion module (or set of instructions) 138, a graphics module(or set of instructions) 140, a user interface state module (or set ofinstructions) 144, and one or more applications 146, including a VIIClient 149 and an SST Client (as each term is defined below) 150.

The operating system 132 (e.g., Darwin, RTXC, LINUX, UNIX, OS X, iOS,ANDROID, WINDOWS, or an embedded operating system such as VxWorks)includes various software components and/or drivers for controlling andmanaging general system tasks (e.g., memory management, storage devicecontrol, power management, etc.) and facilitates communication betweenvarious hardware and software components.

The communication module 134 facilitates communication with otherdevices over one or more external ports 148 and also includes (i)various software components for handling data received by the RFcircuitry 112 and/or the external port 148, and (ii) a device interfaceand client application that enable communications with VariableIdentifier information (jointly herein, (a “VII Client”) 149—as taughtby the Related Inventions, in addition to and independently of emailaddresses, telephone numbers, social network or social mediaregistration, or instant messaging handles, aliases or addresses. Theexternal port 148 (e.g., Universal Serial Bus (USB), FIREWIRE, etc.) isadapted for coupling directly to other devices or indirectly over anetwork (e.g., the Internet, wireless LAN, etc.).

The contact/motion module 138 detects contact with the touch screen 126or interaction with other input/control devices 100, in conjunction withthe touch-screen controller 122. The contact/motion module 138 includesvarious software components for performing various operations related todetection of contact with the touch screen 122, such as determining ifcontact has occurred, determining if there is movement of the contactand tracking the movement across the touch screen, and determining ifthe contact has been broken (i.e., if the contact has ceased).Determining movement of the point of contact may include determiningspeed (magnitude), velocity (magnitude and direction), and/or anacceleration (including magnitude and/or direction) of the point ofcontact. In some embodiments, the contact/motion module 126 and thetouch screen controller 122 also detects contact on the touchpad.

The graphics module 140 includes various known software components forrendering and displaying graphics on the touch screen 126. Note that theterm “graphics” includes any object that can be displayed to a user,including without limitation text, web pages, icons (such asuser-interface objects including soft keys), digital images, videos,animations and the like.

The device includes an application deploying sixth-sense technology(SST), known as the SST Client 150, which enables the discovery,alerting, and delivery of all forms (e.g., voice, video, data,multi-media) of global content and commerce among devices and peoplebased on such sixth-sense communications capabilities.

The one or more applications 146 can include any applications installedon the device 100, including without limitation, a VII Client, an SSTClient, a browser, address book, contact list, email, instant messaging,word processing, keyboard emulation, widgets, JAVA-enabled applications,encryption, digital rights management, voice recognition, voicereplication, location determination capability (such as that provided bythe global positioning system (GPS)), a music player (which plays backrecorded music stored in one or more files, such as MP3 or AAC files),etc.

In some embodiments, the device may include a hardware GPS unit 151which determines current location based on current GPS satellitelocations and/or cell-tower positioning.

In some embodiments, the device 100 may include the functionality of anMP3 player, such as an iPod (trademark of Apple Computer, Inc.). In someembodiments, the device 100 is a device where operation of a predefinedset of functions on the device is performed exclusively through thetouch screen 126 and, if included on the device 100, the touchpad.

The predefined set of functions that are performed exclusively throughthe touch screen and the touchpad include navigation between userinterfaces. In some embodiments, the touchpad, when touched by the user,navigates the device 100 to a main, home, or root menu from any userinterface that may be displayed on the device 100. In such embodiments,the touchpad may be referred to as a “menu button.” In some otherembodiments, the menu button may be a physical push button or otherphysical input/control device instead of a touchpad.

User Attributes and User Profiles

The device 100 may have a single or plurality of user attributes anduser profiles. These attributes and user profiles are created, set ormaintained by each of one or more individuals using the device, or bythe device itself applying an algorithm or other software programrunning on or deployed by the device (such individual, individuals ordevice creating, set or maintained the attributes or profile herein, auser) via the SST Client 150. User attributes may include, by way ofexample and not by way of limitation, one or more of the user'sprofessional, associational, personal, physical, social, athletic,recreational, hobby, locational, geospatial, and other interests,preferences, and attributes, or any other data associated with thedevice or its user (collectively herein, “Attributes”). A user might setup one or more user profiles (each of which might contain or prioritizedifferent attributes or topics) (herein, “Profiles”), such as a workprofile, a hobby profile, a family profile, and a social profile. TheseAttributes and Profiles are stored in one or more databases that, usingthe SST Client 150, can be named, indexed, searched for, retrieved,edited, merged, grouped, terminated or otherwise configured by one ormore users who have authorized access to the device and the specific SSTClient.

One embodiment of the present SST invention relates to creating andproviding people (herein, “seekers”) with the ability to search, “sense”and be alerted to unknown third parties with whom they want or arewilling to communicate (“recipients”), wherein both seekers andrecipients are using devices equipped and operating both an SST Clientand a VII Client—and engage directly in real-time communications withsuch unknown recipients, without knowing the identity, address, contactinformation or location of the recipients (herein, “unknownrecipients”).

Using features of an SST Client on the device 100, a user, or ‘seeker’,may search, detect, discover, alert and sense unknown recipients andtheir unknown devices with Attributes lying within specified parametersselected by the user of the first device—which Attributes of the atleast one third-party device 200 might, but are not required to, overlapin whole or in part with the Attributes of the device 100 of the firstuser. The parameters might include, for example, third-party deviceswithin one or more certain or general geographic location(s) or zone(s)(jointly herein, a “zone”) being used by a person with a specified agerange with a professional or academic interest in certain topics orfields.

Seekers can configure the SST Client on their device 100 to search for,identify, alert, and display when it has detected the searched-forattribute(s) and parameters of users, or ‘recipient’ of the at least onethird-party device 200, and, using the VII Client 149 on each device,initiate contact and communications with such third party device, evenwhen its traditional identification information is unknown.

Another embodiment creates and providers users, or seekers, with theability to search, sense and be alerted to what other users (herein, acollaborator) are interested in, and/or with whom they want or arewilling to communicate; and to connect those people in private (orpublic) and anonymous communications based on their shared interests andthoughts—where each device is equipped with and operating an SST Clientand a VII Client.

For example, a collaborator might configure the SST Client on her device100 to specify that she is interested in topics A, B and C; and iswilling to communicate about topics B1 and C2 with other unknown seekerswho are affiliated with the post-secondary academic community in aspecified geographic region. That communication interest would be sensedby the SST Client on the device 200 of a third-party seeker with such anacademic affiliation interested in communication topics B1 and C2, andtrigger an alert on such device. Upon checking the alert and reading therelated display, the seeker would use the SST Client on his device 200to compose and send a private and anonymous email or other message tothe collaborator, notifying her of his interest in communication topicsB1 and C2. From there, the collaborator and seeker would engage in suchfurther communications and exchange of information as they deemsuitable; maintaining such privacy and anonymity as each desires, usingthe communications capabilities of the VII Client, as integrated withthe SST Client.

A third embodiment relates to creating and providing participants,groups, businesses, organizations and other parties with the means tosearch, discover and be alerted to what other people are interested in,and to deliver, share and learn to, with and from new and unknownrecipients, through the exchange of voice, video, data and multi-media.

For example, the product manager (herein, a seeker) of a major snowboardbrand might want to learn what new tricks riders are trying in diverseurban and backwoods environments, and product enhancements and newperformance criteria suggested by rider usage. Random riders (each, aresponder) might configure the SST Client on his device 100 to specifythat she is interested in snowboarding, and is willing to communicateabout new tricks, urban riding, and extreme terrain with unknown personsand businesses interested in snowboarding. That communication interestwould be sensed by the SST Client on the device 200 of the seeker, andtrigger an alert on such device. Upon checking the alert and reading therelated display, the seeker would use the SST Client on his device 200to compose and send a private and anonymous email or other message tothe responder, notifying him of his interest in new snowboarding tricks,urban riding, and extreme terrain. From there, responder and seekerwould engage in such further communications and exchange of informationas they deem suitable, such as the responder sending the seeker a securelink to a private video of his extreme rides down urban sidewalk stepsand down gnarly mountain chutes; maintaining such privacy and anonymityas each desires, using the communications capabilities of the VIIClient, as integrated with the SST Client.

Another example of this embodiment is where a person (user 1) desires tofind out what interests others (user 2 et seq), inclusive of everyonefrom the newcomer at school, the person across town, or someone halfwayaround the globe. Using devices 100/200 equipped with and operating anSST Client and a VII Client, each of user 1 and user 2 configure theirSTT Client selecting to disclose to the public at large certainattributes. The device 100 of user 1 discovers such attributes of User2, and displays them on user 1's device. User 1 thus gets a sense of andbe alerted to the other guy's ‘story’, and be able to share voice,pictures, video and data content based on common interests, creatingties that bind, and bringing people together.

A fourth embodiment—illustrating the push operation of the SSTClient—relates to creating and providing people with the ability to sendreal-time content to one or more others who might be interested in aparticular topic.

An example of this embodiment is where a person or organization (herein,a ‘broadcaster’) wants to direct in real-time content (e.g., in the formof a message or voice alert) to one or more others (“recipients”) whomight be interested in a particular political or social cause. Thedevice (or communications network) of both broadcaster and recipientwould be equipped with and running an SST Client and VII Client. ABroadcaster can configure the SST Client on their device 100 to searchfor, identify, alert, and display specific attribute(s) and parametersin third-party devices. Others users of such third party devices 200/300would configure their respective SST Client indicating various intereststhat they have and any time/place restrictions on communications withothers regarding such interests. The device of the broadcaster discoversthose people and groups who are interested in receiving the searched-forcontent, displays an alert when it has detected the searched-forattribute(s) and parameters of recipient(s) using at least onethird-party device 200, and, using the VII Client 149 on each device,initiates contact and communications with such third party device, andthen send the desired content, privately and anonymously, to all unknownrecipients chosen by the broadcaster.

Another embodiment—illustrating the pull operation of our sixth-sensediscovery invention—relates to creating and providing people with theability to learn more about a particular topic.

An example of this embodiment is where a person (a seeker) wants tolearn more about “gay marriage”. She configures the SST Client on herdevice 100 to indicate that one of her interests is gay marriage, and awillingness to communicate with unknown third parties during businesshours or when she is away from home. Separately, a prominent gay rightsactivist (an Activist) has configured the SST Client on his device 200with comparable settings, together with his official role with anational human rights organization. Both devices are equipped with a VIIClient. While attending a business conference, the seeker's device 100senses that the device 200 of the Activist is nearby, and displays analert. The seeker checks her device; learns that the national corporatespokesperson for The Human Rights Campaign (THRC), is sitting across theaisle; and using the VII Client 149 on each device, sends a text,privately and anonymously, to the Activist, seeking to set up an inquiryor even a meet and greet.

Without exchanging or revealing email addresses, phone numbers or othercontact data, the seeker and Activist are able to exchange messages, andthen, the Activist arranges for THRC to send seeker a full reportreviewing both sides of the gay marriage debate.

A sixth embodiment relates to creating and providing businesses andpeople, and governments, institutions, and other organizations, with:

-   -   new methods for searching and prospecting for new customers or        contacts,    -   new methods for distributing and selling new and additional        products to existing and new customers,        -   new methods for engaging in any or all forms of commercial            transactions, including without limitation sharing, sending,            receiving, procuring, distributing, streaming, purchasing,            subscribing, leasing, renting, borrowing, licensing,            selling, or transmitting products, services or content (all            such commercial transactions collectively, “Commercial            Sale”),        -   new methods for conducting market research, consumer            surveys, surveys and focus groups for new product features,            new products, product development, and research and            development,        -   new methods for forecasting demand and creating, maintaining            and improving operations and supply-chain management, and    -   new methods for conducting global, supra-national, national,        regional and census, public health and other data-gathering;        public policy development; dissemination of emergency alerts,        public-health news and other information; distribution of        benefits; and political outreach, recruitment, opinion polls,        advocacy and other political activities.

An example of this embodiment is where a businesses or organization (abusiness) wants to discover and become aware of, and direct marketingcontent to, new customers and prospects (jointly, a consumer) for theirproducts, services and causes. The business equips its customer-facingstaff with tablets 100 running an SST Client and VII Client. Each staffmember configures their SST Client identifying their expertise inspecific categories of business products; ability to speak one or morelanguages; availability to engage in consumer communications duringvarious intervals throughout the day. Separately, consumers holdingdevices 200/300 running SST and VII Clients configure their SST Clientnoting their interest in certain product categories, and their desire totext or call in Spanish at specified times of day or when present incertain locations (e.g., at home, in-store, or near-store). ASpanish-speaking business staff member with relevant product knowledgereceives an alert on his device 100 of such consumer's interest, and isable, using the VII Client on his device, initiate a private andanonymous communication with such consumer, and then, at the consumer'sconvenience and regardless of location, renew the private and anonymouscommunication with the consumer, through and including the close of thesale. Using this embodiment, businesses will be able to sell direct tothe public, without having to incur distribution costs, for example todistributors and retailers, or to digital distributors (e.g., Amazon).

Another example of this embodiment is where a media content producer (aproducer) wants to discover and become aware of which groups ofanonymous consumers (a viewer) are or might be interested in theircontent. The producer equips its server 100 running an SST Client andVII Client, and configures their SST Client listing and indexing theirlibrary of movies, videos and ads, along with other information such asduration, language, and pertinent pricing (if any). Separately, viewersholding devices 200/300 running SST and VII Clients configure their SSTClient noting their interest in certain movie genres, video categories,and ad topics, along with any pertinent time and location parametersrestricting when and where they are willing to receive and view suchcontent. The producer's server 100 receives notice of such viewer'sinterest, and is able, using the VII Client on the server, establish aprivate and anonymous communication with such viewer, informing her thatthe content is available for purchase, streaming or download; and thencomplete the delivery of desired content to the anonymous viewer in aprivate communication.

A seventh embodiment relates to creating and providing consumers withnew methods for purchasing products or services.

An example of this embodiment is where an individual (a driver) wants toremain anonymous throughout the entire process of purchasing a car, fromresearch and screening, to referrals and recommendations, to closing thedeal. Using a smartphone device 100, the driver configures the SSTClient to indicate his interest in buying a new or used car with variousattributes and that is available for inspection, test drive and deliverywithin a designated mileage radius from his place of work. Separately,car dealers, car-search platforms (e.g., Autotrader), and privatesellers (jointly, sellers) configure the SST Clients on their computers200 identifying the attributes (including, e.g., pictures and videos) oftheir inventory of cars for sale; while car-service organizations (e.g.,CarFax; Consumer Reports magazine; Car & Driver magazine; state vehicleregistration bureaus)(jointly, resource groups) configure the SSTClients on their servers 300 to provide access to car reviews, carspecifications, and vehicle information. The driver's phone 100discovers from sellers' computers 200 (using SST and VII Clients) car(s)meeting the driver's criteria and any pertinent available reviews, etcfrom resource groups, and displays an alert on his phone. When he tapson the alert, the SST Client opens and displays links to the sellers'car listings and resource groups' car reviews, etc. From there, thedriver and sellers and/or resource groups would engage in such furthercommunications and exchange of information as they deem suitable;maintaining such privacy and anonymity as each desires, using thecommunications capabilities of the VII Client, as integrated with theSST Client.

Another example of our searching, sensing, discovery, alerting, anddelivery method for purchasing a product or service is where aninexperienced individual (a listener) wants to start a reggae musicalcollection. She configures the SST client on her tablet or MP3 player100 to indicate her reggae interest and solicit names of top reggaeperformers, critics and bloggers. Separately, at least one reggaeperformer, critic or blogger (a specialist) configures the SST Client oneach of his computer 200 and music-storage server 300 identifying: (i)attributes both of reggae music (including any accompanyingrecommendation and referrals) stored on the server and referencingplaylists of various collections comprised of single and multipleartists for first-time reggae followers, and of persons with whom theyare willing to consult (while preserving the privacy of their contactinformation); and any personal temporal, location and other parametersrestrictions on the devices that might sense and communicate with suchspecialist. The listener's device 100 discovers from specialist'scomputer 200 and server 300 (using SST and VII Clients) music and anyrecommendations or referrals meeting the listener's criteria anddisplays an alert on her phone. When she taps on the alert, the SSTClient opens and displays links to the specialist. From there, thelistener and specialist would engage in such further communications andexchange of information as they deem suitable; maintaining such privacyand anonymity as each desires, using the communications capabilities ofthe VII Client, as integrated with the SST Client.

In an eighth embodiment, a user (an initiator) can selectivelycommunicate about desired topics with known or unknown people (arecipient) possessing certain characteristics who are using one or moreother devices whose identification information is unknown. Using device100 configured with an SST Client, the initiator launches the SSTClient, and identifies an attribute or any other data associated withthe device or its user, that he wants to make known to other devices andusers whose identification is unknown, which attribute is compiled bythe SST Client; the VII Client on the first device 100 enablescommunication with other devices 200 (also deploying a VII Client) whoseidentification information is unknown; the SST Client on the firstdevice searches for and identifies at least one criterion (such asattribute, location, time of day, date, etc) for sharing such attributewith at least one other user or device deploying an SST Client, whichcriterion is compiled by the first SST Client; the SST Client running onthe first device identifies and locates other devices based on such oneor more criteria; obtains information regarding the other devicesmeeting such criteria; compiles the information regarding the otherdevices meeting such criteria to enable selection of at least one deviceto initiate communication using the VII Client on the first device; anddisplays a selection of the at least one device from the compiledinformation of the other devices meeting such criteria. Using the SSTClient on the first device 100, the initiator selects the at least oneother device 200 either with which he wants to communicate on a desiredtopic or which is being used by a person with the desiredcharacteristics, and then using privacy preference settings within theSST Client on the first device 100, chooses whether he wants to preservethe privacy of his contact information; reveal his real name orlocation; or open a private 1:1 or public communication with suchselected recipient or device 200; wherein the privacy preferences enablethe device to provide variable identification information to the atleast one other device; enables the VII Client on the first device tospecify whether the Variable Identifier is associated with privatecontent, wherein the private content is sent only to the at least oneother device; and sends the private content from the first device to theat least one other device.

The foregoing description, for purpose of explanation, has beendescribed with reference to specific embodiments. However, theillustrative discussions above are not intended to be exhaustive or tolimit the invention to the precise forms disclosed. Many modificationsand variations are possible in view of the above teachings. Theembodiments were chosen and described in order to best explain theprinciples of the invention and its practical applications, to therebyenable others skilled in the art to best utilize the invention andvarious embodiments with various modifications as are suited to theparticular use contemplated.

We claim:
 1. A communications network (herein, an “RF AWARE NETWORK”)for communications by, among and to devices in a specified geographiczone, comprising: Using a unique device identifier (“Service ID”) foreach device in a specified geographic zone (herein, a “Network Device”)selected either: through use of a standard protocol assigning a staticService ID (herein, a “Static Service ID”, or “SS/ID”) such as a MACaddress or IP address of such device, or through use of a random ServiceID (herein, “Random Service ID”, or RS/ID”) selected by the applicationof one or more filters to variable device identifying information,attributes and other data associated with each such Network Device;Using an SS/ID or RS/ID to detect and discover at least one or moreother Network Devices (herein, “Recipient Network Devices”); Using anSS/ID or RS/ID to authenticate the identity of and communicate with atleast one or more of such Recipient Network Devices; and EnablingRecipient Network Devices to authenticate, using the SS/ID or RS/ID ofat least one or more other Network Devices (herein, “Other NetworkDevices”), the identity of at least one or more Other Network Devicesand to initiate or maintain communications by the Recipient NetworkDevice with such Other Network Devices.
 2. An RF AWARE NETWORK describedin claim 1, wherein the Network Devices may be configured to: Be inpublic mode, wherein they can be detected by, search for and communicatewith other Network Devices (Network Devices in public mode herein “RFAware Devices” or simply “RFA Devices”); Search other RFA Devices forcertain attributes, characteristics, interests, preferences, parameters,location, software applications, hardware components, promotions,services, products or other data (collectively or separately,“searched-for attributes”); Actively search for at least one or moresuch RFA Devices possessing the searched-for attributes (such NetworkDevices herein “Clustered Network Devices”, or simply “CN Devices);Establish a data connection independent of existing telephone, internetprotocol, wi-fi or other networks to share data, using a peer-to-peertechnology or an infrastructure connection; Send or receive an alert toat least one or more such RFA Devices or CN Devices; Send and receivepublic broadcast messages or other communications to at least one ormore such RFA Devices or CN Devices; Send or receive public broadcastmessages or other communications to at least one or more such RFADevices or CN Devices based on one or more specific searched-forattributes (such attributes herein, “Service Broadcast Filters”); Sendor receive private messages or other communications to at least one ormore such RFA Devices or CN Devices; Send or receive private messages orother communications to one at least one or more such RFA Devices or CNDevices based on one or more Service Broadcast Filters; Passivelyreceive public broadcast search inquiries, alerts, messages or othercommunications from at least one or more such RFA Devices or CN Devices;Passively receive private inquiries, alerts, messages or othercommunications either from at least one or more such RFA Devices or CNDevices or from one or more specific RFA Devices or CN Devices based onor more specific searched-for attributes (herein, “Service ResponseFilters”); Be in private mode, wherein their Service ID is notdetectable by other Network Devices (Network Devices in Private Modeherein “Private Mode Devices” or simply “PMDs”).
 3. A communicationsnetwork (herein, an “SST-AWARE NETWORK”, or simply, an “SST-AN”) forcommunications by, among and to devices that enables searching,detecting, sensing, and discovering attributes, characteristics,parameters or other data among known and unknown devices and theirusers, authenticating such devices and their users, message routing anddirecting private or anonymous targeted communications to and withspecific devices and their users, and maintaining continuous orinitiating repeat communications with and to such specific devices andtheir users, in each case regardless of initial or continued location ofsuch devices or the proximity of such devices in a limited or designatedphysical area or zone, the method comprising: launching a clientapplication (herein, a sixth-sense client, or simply, “SS Client”) on afirst device (the first device), which enables searching, detecting,sensing, or discovering (collectively or separately, ‘discovering’ or‘discover’) attributes, characteristics, interests, preferences,parameters, location or other data (collectively or separately,‘attributes’) associated with other recipient devices (recipientdevices), or the users of such recipient devices—such clientapplication, with its capability to discover attributes, herein the “SSClient”; setting the SS Client on the first device to: (i) discover theattributes (searched-for attributes) of one or more recipient devices ortheir users; (ii) communicate with other devices whose identificationinformation is unknown; and (iii) locate other devices (‘screeneddevices’) worldwide or within one or more certain or general geographiclocation(s) or zone(s) (jointly herein, a “zone”); prompting the SSTClient on the first device to obtain and compile on the first device:(i) information or data from the screened devices (‘compiled data’)consisting of one or more of the searched-for attributes, or other datumor data associated with or pertinent to the device (including itssoftware or firmware) or its users; and (ii) unique deviceidentification information, vendor or advertising IDs, or other deviceidentifying information specific to each screened device (jointlyherein, “device identifying information”, or “DII”); applying one ormore filters on the first device to analyze such compiled data or DII toenable the selection of least one screened device (a ‘designatedscreened device’; and the compiled data or DII used to enable suchselection herein, ‘variable identification information’, or “VII”);enabling privacy preferences for the first device, wherein the privacypreferences enable the first device to send VII of the first device to adesignated screened device; enabling the SST Client on the first deviceto specify whether a service message is a private service message,wherein the private service message is sent only to, and is accessibleonly by, the designated screened device; and using VII of the designatedscreened device for authentication, sending the service message only tothe specific designated screened device (herein, the ‘recipientdevice’), where either of the following conditions is also satisfied:(a) the contact information (e.g., email address; public or privatecryptography key; IM screen name; social media or Internet screen name,handle, alias, or avatar; phone number; MAC address; IP address)(collectively herein “Contact Information”) of the recipient device isnot previously known to any of: the first device, its users, or anybusiness, social or communications network to which the first device orany of its users is a member; or (b) the service message isauthenticated by or from the first device using such variableidentification information, and without using email, public or privatecryptography key, instant messaging (IM), text messaging, telephony orany other communications protocol or technique based on fixed endpointswhere any of such Contact Information is known to any of: the firstdevice, any of its users, or any business, social or communicationsnetwork of which the first device or any of its users is a member; andenabling the SS Client on a recipient device to authenticate, using theVII of the first device, the identity of the first device and toinitiate or maintain communications by the recipient device with thefirst device, regardless of whether either device remains in the in thezone in which initial contact and authentication between the devices wasestablished. 4) An SST AWARE NETWORK described in claim 3, wherein theSST Client on the devices on the SST-AN (such devices herein, “SSTNetwork Devices”) may be configured to: Be in public mode, wherein theycan be detected by, search for and communicate with other SST NetworkDevices (such devices in public mode herein “SST Aware Devices” orsimply “SSTA Devices”); Search other SSTA Devices for certainattributes, characteristics, interests, preferences, parameters,location, software applications, hardware components, promotions,services, products or other data (collectively or separately,“searched-for attributes”); Actively search for at least one or moresuch SSTA Devices possessing the searched-for attributes (such NetworkDevices herein “SST Clustered Network Devices”, or simply “SSTCDevices); Establish a data connection independent of existing telephone,internet protocol, wi-fi or other networks to share data, using apeer-to-peer technology or an infrastructure connection; Send or receivean alert to at least one or more such SSTA Devices or SSTC Devices; Sendand receive public broadcast messages or other communications to atleast one or more such SSTA Devices or SSTC Devices; Send or receivepublic broadcast messages or other communications to at least one ormore such SSTA Devices or SSTC Devices based on one or more specificsearched-for attributes (such attributes herein, “Service BroadcastFilters”); Send or receive private messages or other communications toat least one or more such SSTA Devices or SSTC Devices; Send or receiveprivate messages or other communications to one at least one or moresuch SSTA Devices or SSTC Devices based on one or more Service BroadcastFilters; Passively receive public broadcast search inquiries, alerts,messages or other communications from at least one or more such SSTADevices or SSTC Devices; Passively receive private inquiries, alerts,messages or other communications either from at least one or more suchSSTA Devices or SSTC Devices or from one or more specific SSTA Devicesor SSTC Devices based on or more specific searched-for attributes(herein, “Service Response Filters”); Be in private mode, wherein theirService ID is not detectable by other Network Devices (Network Devicesin Private Mode herein “Private Mode Devices” or simply “PMDs”).