Device, System, and Method of Enhancing User Privacy and Security Within a Location-Based Virtual Social Networking Context

ABSTRACT

Via a graphical user interface on a first mobile computing device of a first user, the first user is prompted to upload a first electronic photograph representing an appearance of the first user who is a participant of a virtual social network. Via the graphical user interface, the first electronic photograph uploaded by the first user is received. From a second user who is also a participant of the virtual social network, an electronic voucher is received. The electronic voucher is redeemable for a merchandise item that is offered by a physical venue, the physical venue corresponds to the virtual social network. A screen is generated that contains both the electronic voucher and the first electronic photograph. An electronic scan of the electronic voucher is detected. An electronic transaction is completed, in which the merchandise item is redeemed in response to the electronic scan of the electronic voucher.

PRIORITY DATA

The present application is a continuation-in-part patent application ofU.S. patent application Ser. No. 14/492,151, filed on Sep. 12, 2014,entitled “Device, System, and Method of Enhancing User Privacy andSecurity Within a Location-Based Virtual Social Networking Context”,which is a utility patent application of provisional U.S. patentapplication No. 61/882,616, filed on Sep. 25, 2013, entitled “MobileSocial Electronic Commerce Application”, the content of each of which ishereby incorporated by reference in their respective entireties.

BACKGROUND

1. Technical Field

The present disclosure generally relates to using mobile computingdevices to engage in social networking.

2. Related Art

In recent years, the rapid advances in computer technology and broadbandtelecommunications have enhanced the popularity of mobile computingdevices such as smartphones and tablet computers. Among other things,these mobile computing devices can be used to browse the web, playgames, music, or videos, take pictures, send/receive emails, etc.However, the capabilities of these mobile computing devices have notbeen fully explored within a social networking context. For example,users with these mobile computing devices have not been fully able totake advantage of the abilities of the mobile electronic devices' toconduct telecommunications display visual objects, and make payments,within the social networking context.

Therefore, while existing mobile computing devices have been generallyadequate for their intended purposes, they have not been entirelysatisfactory in every aspect.

SUMMARY

One aspect of the present disclosure is directed to a mobile electronicdevice. The mobile electronic device includes: a screen configured todisplay visual content; a computer memory storage module configured tostore executable computer programming code; and a computer processormodule operatively coupled to the computer memory storage module,wherein the computer processor module is configured to execute thecomputer programming code to perform the following steps: receiving arequest from a user to participate in an electronic social network;prompting, in response to the receiving of the request, a user to uploada digital picture that is representative of the user; receiving anuploaded digital picture in response to the prompting; scanning theuploaded digital picture of the user for human faces; prompting the userto upload a different digital picture that is representative of the userif the scanning indicates that the uploaded digital picture contains nohuman faces; and prompting the user to identify the human race belongingto the user if the scanning indicates that the uploaded digital picturecontains a plurality of human faces.

Another aspect of the present disclosure is directed to a method. Themethod includes: receiving a request from a user to participate in anelectronic social network; prompting, in response to the receiving ofthe request, a user to upload a digital picture that is representativeof the user; receiving an uploaded digital picture in response to theprompting; scanning the uploaded digital picture of the user for humanfaces; prompting the user to upload a different digital picture that isrepresentative of the user if the scanning indicates that the uploadeddigital picture contains no human faces; and prompting the user toidentify the human face belonging to the user if the scanning indicatesthat the uploaded digital picture contains a plurality of human faces.

Another aspect of the present disclosure is directed to a method. Themethod includes: receiving a request from a user to participate in anelectronic social network, wherein the request is received from a mobilecomputing device of the user; prompting, via the mobile computing deviceand in response to receiving of the request, a user to upload a digitalprofile picture; receiving an uploaded digital profile picture inresponse to the prompting, wherein the receiving of the uploaded digitalprofile picture comprises one of: receiving a user selection from anexisting digital picture album of the user or taking a digital pictureof the user via a camera module of the mobile computing device;electronically examining the uploaded digital profile picture;determining, based on the electronically examining, whether one or morehuman faces are present in the digital profile picture; prompting theuser to upload a different digital profile picture if it has beendetermined that the uploaded digital profile picture contains no humanfaces; and prompting the user to identify the human face belonging tothe user if it has been determined that the uploaded digital picturecontains multiple human faces.

Another aspect of the present disclosure is directed to a mobileelectronic device. The mobile electronic device includes: a screenconfigured to display visual content; a computer memory storage moduleconfigured to store executable computer programming code; and a computerprocessor module operatively coupled to the computer memory storagemodule, wherein the computer processor module is configured to executethe computer programming code to perform the following steps; performinga digital check-in to a venue that is within a predefined proximity ofthe mobile computing device, wherein a plurality of users have alreadydigitally checked into the venue via their respective mobile computingdevices; displaying, on the screen of the mobile computing device,respective digital profiles of a first subset of the users; designating,in response to input from an operator of the mobile computing device,rate or more users who are within the first subset of the users asfavorite users; and displaying, on the screen of the mobile computingdevice, respective digital profiles of a second subset of the users,wherein the second subset of the users includes the designated favoriteuser and users who are not within the first subset.

Another aspect of the present disclosure is directed to a method. Themethod includes: performing, via a mobile computing device of a firstuser, a digital check-in to a venue that is within a predefinedproximity of the first user, wherein a plurality of other users havealready digitally checked into the venue; displaying, on a screen of themobile computing device of the first user, respective digital profilesof a first subset of the other users; designating, in response to inputfrom the first user, one or more second users who are within the firstsubset of the other users as favorite users; and displaying, on thescreen of the mobile computing device of the first user, respectivedigital profiles of a second subset of the other users, wherein thesecond subset of the other users include the designated favorite userand users who are not within the first subset.

Another aspect of the present disclosure is directed to a method. Themethod includes: establishing, at least in part via a radio component ofa mobile computing device of a first user, a wireless link with a venuethat is within a predefined proximity of the first user, wherein thevenue has a plurality of wireless links established with a plurality ofsecond users; obtaining, from the first user, a preferred gender for thesecond users for viewing on the screen of the mobile computing device;displaying, on a screen of the mobile computing device of the firstuser, respective digital pictures of a first group of the second usersbelonging to the preferred gender, selecting one or more favorite usersfrom the second users in response to input from the first user;displaying a symbol on, or adjacent to, the digital picture of each ofthe one or more favorite users; displaying, on the screen of the mobilecomputing device of the first user, respective digital pictures of theone or more favorite users and a second group of the second usersbelonging to the preferred gender, wherein non of the second users inthe second group belong to the first group; and displaying, on thescreen of the mobile computing device of the first user, the digitalpictures of only the one or more favorite users.

Another aspect of the present disclosure is directed to a mobileelectronic device. The mobile electronic device includes: a screenconfigured to display visual content; a computer memory storage module,configured to store executable computer programming code: and a computerprocessor module operatively coupled to the computer memory storagemodule, wherein the computer processor module is configured to executethe computer programming code to performing the following steps:performing a digital check-in to a venue that is within a physicalproximity of a first user of the mobile computing device; accessing,after the digital check-in, a digital menu that contains a list ofdrinks available at the venue; displaying the digital menu to the firstuser via the screen; designating, in response to selection from thefirst user, one or more drinks from the digital menu as preferred drinksof the first user; and electronically communicating the first user'spreference of the one or more drinks to another electronic device.

Another aspect of the present disclosure is directed to a method. Themethod includes: performing, via a mobile computing device of a firstuser, a digital check-in to a venue that is within a physical proximityof the first user; accessing, after the digital check-in, a digital menuthat contains a list of drinks available at the venue; displaying thedigital menu to the first user via a screen of the mobile computingdevice; designating, in response to selection from the first user, oneor more drinks from the digital menu as preferred drinks of the firstuser; and electronically communicating the first user's preference ofthe one or more drinks to another electronic device.

Another aspect of the present disclosure is directed to a method. Themethod includes: detecting, from a first mobile computing device of afirst user, a digital check-in to a venue that is within proximity ofthe first user, wherein the venue offers a digital menu that includes alist of available drinks; receiving, from the first mobile computingdevice, one or more preferred drinks from the first user, the one ormore preferred drinks being a subset of the list of available drinks;electronically associating the one or more preferred drinks with thefirst user; detecting, from a second mobile computing device of a seconduser, a request from the second user to electronically communicate withthe first user; and causing, in response to the request, the one or morepreferred drinks to be displayed with graphical emphasis on a screen ofthe second mobile computing device.

Another aspect of the present disclosure is directed to a mobileelectronic device. The mobile electronic device includes: a radiocomponent configured to conduct telecommunications with externaldevices; a screen configured to display visual content; a computermemory storage module configured to store executable computerprogramming code; and a computer processor module operatively coupled tothe computer memory storage module, wherein the computer processormodule is configured to execute the computer programming code to performthe following steps: receiving a request from a first user of the mobilecomputing device to participate in a location-based virtual socialnetwork; detecting, at least in part via the radio component, one ormore venues within proximity of the first user, wherein each venueincludes a host of a respective virtual social network; selecting, inresponse to input from the first user, one of the venues in which toparticipate in the virtual social network; establishing, at least inpart via the radio component, a wireless connection with the virtualsocial network at the selected venue; conducting electroniccommunications with one or more second users at the selected venue whoare also participants of the virtual social network via their respectivemobile computing devices; thereafter detecting a departure of the firstuser from the selected venue; and erasing from the first mobilecomputing device, in response to the detected departure, electronicrecords pertaining to the conducted electronic communications with theone or more second users.

Another aspect of the present disclosure is directed to a method. Themethod includes: receiving, via a first mobile computing device of afirst user, a request from the first user to participate in alocation-based virtual social network; detecting, at least in part via aradio component of the first mobile computing device, one or more venueswithin proximity of the first mobile computing device, wherein eachvenue includes a host of a respective virtual social network; selecting,in response to input from the first user, one of the venues in which toparticipate in the virtual social network; establishing, at least in panvia the radio component of the first mobile computing device, a wirelessconnection with the virtual social network at the selected venue;conducting electronic communications with one or more second users atthe selected venue who are also participants of the virtual socialnetwork via their respective mobile computing devices; thereafterdetecting a departure of the first user from the selected venue; anderasing from the first mobile computing device, in response to thedetected departure, electronic records pertaining to the conductedelectronic communications with the one or more second users.

Another aspect of the present disclosure is directed to a method. Themethod includes: receiving, via a first mobile computing device of afirst user, a request from the first user to participate in alocation-based virtual social network; detecting, at least in part via aradio component of the first mobile computing device, one or more venueswithin proximity of the first mobile computing device, wherein eachvenue includes a host of a respective virtual social network; selecting,in response to input from the first user, one of the venues in which toparticipate in the virtual social network; wirelessly connecting, atleast in part via the radio component of the first mobile computingdevice, with the virtual social network at the selected venue;conducting electronic communication with a plurality of second users atthe selected venue who are also participants of the virtual socialnetwork via their respective mobile computing devices, wherein theelectronic communication comprises: making a digital profile of thefirst user available for viewing on respective mobile computing devicesof the second users; placing one of the second users in a blacklist inresponse to a request from the first user; and thereafter causing thedigital profile of the first user to be unviewable on the mobilecomputing device of the second user in the blacklist; thereafterdetecting one of the following: a departure of the first user from theselected venue, or an excessive period of time in which the first mobilecomputing device has maintained the wireless connection with the virtualsocial network at the selected venue; and erasing from the first mobilecomputing device, in response to the detecting, electronic recordspertaining to the conducted electronic communications with the one ormore second users.

BRIEF DESCRIPTION OF THE DRAWINGS

FIGS. 1-44 are diagrammatic views of one or more example mobilecomputing devices at various stages of participation with an electronicvirtual social network according to various aspects of the presentdisclosure.

FIGS. 45-49 are flowcharts illustrating various example methods forusing the mobile computing device to facilitate a user's participationon the electronic virtual social network according to various aspects ofthe present disclosure.

FIG. 50 is a simplified block diagram of an example mobile computingdevice for performing one or more of the processes of FIGS. 1-49according to various aspects of the present disclosure.

FIG. 51 is a simplified block diagram of an example system forperforming one or more of the processes of FIGS. 1-49 according tovarious aspects of the present disclosure.

FIGS. 52-57 are diagrammatic views of one or more example mobilecomputing devices at various stages of participation with an electronicvirtual social network according to various aspects of the presentdisclosure.

FIG. 58 is an example physical or electronic ticket according to variousaspects of the present disclosure.

FIGS. 59-60 are flowcharts illustrating various example methods forusing the mobile computing device to facilitate a user's participationon the electronic virtual social network according to various aspects ofthe present disclosure.

DETAILED DESCRIPTION

It is to be understood that the following disclosure provides manydifferent embodiments, or examples, for implementing different featuresof the present disclosure. Specific examples of components andarrangements are described below to simplify the present disclosure.These are, of course, merely examples and are not intended to belimiting. Various features may be arbitrarily drawn in different scalesfor simplicity and clarity. In addition, the present disclosure mayrepeat reference numerals and/or letters in the various examples. Thisrepetition is for the purpose of simplicity and clarity and does not initself dictate a relationship between the various embodiments and/orconfigurations discussed

As used herein, the term “about” refers to a +/−5% variation from thenominal value. As used herein, the term “and/or” includes any and allcombinations of one or more of the associated listed items. As usedherein, the singular forms “a”, “an”, and “the” are intended to includethe plurality forms as well, unless the context clearly and specificallyindicates otherwise. In addition, unless defined otherwise all technicaland scientific terms used herein have the same meaning as commonlyunderstood by one of ordinary skill in the art to which this disclosurebelongs.

In recent years, the rapid advances in computer technology and broadbandtelecommunications have led the growing popularity of mobile computingdevices such as tablet computers and mobile telephones. A user of thesemobile computing devices can perform a plurality of tasks on thesemobile computing devices, for example tasks that previously required aconventional desktop or laptop computer. Among other things, a user canplay movies/videos, browse the web, play games, view photographs, listento digital music, read e-books, receive navigational instructions, sendand receive emails, conduct audio or video telephone calls, perform wordprocessing/spreadsheet calculation/ presentation management tasks, ortake advantage of additional functionalities offered by applications(apps) that can be downloaded from online app stores.

However, the capabilities of these mobile computing deuces have not beenfully explored within a social networking context. For example, userswith these mobile computing devices nave not been able to take advantageof the abilities of the mobile electronic devices' to conducttelecommunications display visual objects, and make payments, within thesocial networking context.

To overcome the problems discussed above, the present disclosure isdirected to a mobile computing device with custom software implementedthereon to facilitate social networking electronically, as discussed ingreater detail below.

Referring to FIG. 1, a simplified diagrammatic view of a mobilecomputing device 100 is illustrated. In some embodiments, the mobilecomputing device 100 may be a smartphone (for example, APPLE's® IPHONE®,an ANDROID® phone, a WINDOWS® phone, or a BLACKBERRY®), a tabletcomputer (for example, APPLE's® IPAD®, an ANDROID® tablet, a WINDOWS® atpowered tablet, or a BLACKBERRY® tablet), or a laptop-tablet hybrid.

In some embodiments, the mobile computing device 100 may include ascreen 110 for displaying visual information. The screen 110 may betouch-sensitive. A user may interactively engage with objects shown onthe screen 110 by touching the objects with a finger, a stylus, or byhovering over the object. In some embodiment, the user may engage withthe objects shown on the screen 110 even while wearing gloves or otherclothing.

Visual content may be displayed on the screen 110 once the screen 110 isactivated. The visual content may include a plurality of icons, forexamples icons 120 that are arranged into rows and columns. Each ofthese icons 120 may represent an application (app) that can be executedto perform a particular function. These apps 120 may be electronicallydownloaded from an apps store, as such APPLE's® APP STORE® or GOOGLE's®GOOGLE PLAY®, etc.

One of these apps 120A is the app that includes the custom software thatcan be executed to facilitate social networking electronically. Anexample name for the app 120A is ‘icebreaker’ which signifies the app120A's ability to help the user of the mobile computing device 100 meetor “break the ice” with other users. The user of the mobile computingdevice 100 may click on the app 120A to launch it. For purposes of thepresent disclosure, the application 120A may be interchangeably referredto as an electronic (or virtual) social networking game/application oras the icebreaker game/application.

Referring now to FIG. 2, the screen 110 shows the visual content that isdisplayed to the user when the app 120A is launched. An example logo 130(e.g., I/B) may be displayed along with text instructions “Would youlike to play the Icebreaker game?” The user may click a “yes” button tocontinue playing the game, or a “no” button to exit the game and returnto the previous screen.

Referring now to FIG. 3, if the user clicked “yes” (on the previousscreen) to continue playing the game, existing users will be prompted toenter a username and a password, and first time users will be promptedto register before proceeding further.

FIG. 4 illustrates an example registration screen (also referred to as aprofile screen) for a first time user according to one embodiment. As anexample, the user herein is a male. He selects a username “AverageJoe”and an appropriate password. He also indicates that he is a “man”seeking a “woman.” Optionally, the user may also be allowed to specifyone or more of his favorite drinks (such as Scotch and beer) or to sayanything else about himself that he would like other users to know. Theuser may also be allowed to upload one or more pictures of himself byclicking on a link.

FIG. 5 illustrates an example registration screen according to anotherembodiment. The embodiments shown in FIGS. 4 and 5 are similar, exceptthat the user may also be able to specify a “handle.” The handle may bedifferent from the username and may be changed dynamically each time theuser plays the game (or even during the game). The handle is what theuser will be known as to the other participants or the icebreaker game.Thus, allowing the user to specify a handle that is different from theuser name and that can be dynamically changed offers the user moreprivacy and security. For example, a changeable handle reduces thelikelihood of the user being stalked by other users.

FIG. 6 shows an example picture upload screen in response to the userclicking on the link to upload a picture. The user can select a picturefrom an existing photo gallery on his mobile computing device 100, or hecan take a picture of him using the mobile computing device, which isequipped with a digital camera. The user may be able to crop a digitalpicture, or add special effects to it, such as turning a color pictureinto a black and white picture, etc.

Referring now to FIG. 7, regardless of how the selection is made (i.e.,from an existing photo album or from a digital camera), the user selectsa digital picture representative of himself to upload. The user will bereminded that this is the digital picture that will appear as hisprofile picture when the game is played.

Requiring users to upload one or more digital pictures to represent theuser is not uncommon in the electronic social networking context.However, one problem for existing social networking applications is thatthey do not actively monitor or regulate the digital pictures uploadedby its participant users. As a result, some users may choose to uploadan inanimate object (such as a building, a mountain, a lake, a car,etc.) to represent themselves.

An example of this is illustrated in FIG. 8, where the user has uploadeda building as his profile picture. Having an inanimate object as one'sprofile picture may be acceptable in some social network contexts, butwithin the context of the social networking context described in thepresent application, it is important for the user's digital profilepicture be an accurate representation of himself/herself. Using aninanimate object such as a building of a landmark as a user's profilepicture within the context of the present application will causeconfusion and likely dissatisfaction for other users in the electronicsocial network.

To remedy this issue, the mobile computing device 100 will perform anelectronic scan or examination of the digital picture uploaded by theuser to detect whether or not the uploaded digital picture contains ahuman face. In some embodiments, the detection of a human face isperformed by scanning the digital picture for objects that resemblehuman eyes, for example a pair of closely located objects that representa pair of human eyes. Of course, the electronic scan may also employother algorithms to detect a human face, for example algorithms thatlook for other human facial features such as nose, mouth, ears, or hair.If the result of the scan indicate that no human face is present in theuploaded digital picture, the user will be notified that he/she hasuploaded a picture with no people in it, and he/she will be prompted toupload a different picture.

In some embodiments, the user may be given the option of identifyinghis/her face in the digital picture in case the face detection scanincorrectly determines that no human face is present, when a human faceis in face present. For example, referring to FIG. 9, the userAverageJoe has uploaded a picture with his face in it, but theelectronic scan has incorrectly determined that the uploaded picturesdoes not contain a human face. Thus, the user may use his finger or astylus to touch or pinpoint a region of the digital picture where he islocated. This region will be marked and remembered. When the profilepicture is eventually displayed on other mobile computing devices(belonging to other risers participating in the electronic socialnetwork), the user AverageJoe's handle will be displayed alongside it.By doing so, other users will have a clear idea of who the userAverageJoe is and what he looks like, which will help other users decideon whether or not in (or how to) engage with the user AverageJoe withinthe context of the electronic social networking game.

FIG. 10 illustrates another similar example problem that occursfrequently in existing electronic social networking contexts, where auser uploads a profile picture that contains multiple people. As aresult, other participants of the electronic social network may getconfused as to which person the user actually is. This may prevent otherparticipants from proactively engaging with the user, and even when theydo, they may engage the user under false assumptions (i.e., they maythink that the user is someone else in the uploaded digital profilepicture).

To address this problem, the mobile computing device 100 will perform anelectronic scan or examination of the digital picture uploaded by theuser to detect how many human faces the uploaded digital pictureactually contains. Again, the detection of the human face may beaccomplished by electronically scanning the digital picture for objectsthat resemble human eyes, or other easily recognized facial features ona human face. If the results of the scan indicate that the uploadeddigital profile picture contains multiple people, for example threepeople as shown in the embodiment of FIG. 10, the user will be promptedto either identify himself or upload a different picture. Once again,the user may identify himself by touching (e.g., via a finger or astylus) the region of the uploaded digital picture where the user islocated. This region will be marked accordingly, and the user's handlewill be displayed on or adjacent to this region when the digital profilepicture of the user is eventually displayed to other participants of theelectronic social network. Once again, this will help other usersunderstand who the user AverageJoe is and what he looks like, therebymaking it easier for these other participants to decide whether or notto (or how to) engage with the user AverageJoe within the context of theelectronic social networking game.

In some embodiments, the user will not be allowed to proceed furtherwith the icebreaker game until he/she has supplied a digital profilepicture that contains one and only one human face, presumably the faceof the user himself/herself.

Referring now to FIG. 11, once the user has supplied a satisfactorydigital profile picture, he/she is allowed to proceed as a participanton the virtual social network (i.e., icebreaker herein). A tutorial maybe optionally displayed to help the user understand how the virtualsocial network operates.

Referring now to FIG. 12, after the user agrees to participate on thevirtual social network, the mobile computing device 100 may conduct anelectronic search for venues within range of the mobile computing device100 (and thus within range of the user). For example, the mobilecomputing device 100 may be equipped with a radio component thatcontains one or more transceivers, such us a Wi-Fi transceiver. Thus, insome embodiments, the search may be performed at least in part via theWi-Fi transceiver, which is used by the mobile computing device 100 tosearch for Wi-Fi networks within range. Alternatively, the search may bedone via a global positioning system (GPS) device implemented on themobile computing device. The GPS device can triangulate the geographicalposition/location of the mobile computing device 100. The mobilecomputing device 100 may also have access to electronic map data such asGoogle Maps or Apple Maps. Based on the triangulated position of themobile computing device 100, and based on the electronic map data thatincludes which businesses are nearby the triangulated position of themobile computing device 100, the mobile computing device 100 can displayone nr more of the venues that are nearby.

In the context of the present disclosure, each of the venues is a bar, aclub, a restaurant, or another suitable place of providingentertainment, and/or serving food/drinks for its patrons. In someembodiments, all venues fitting in the above description may bedisplayed on the screen 110 as a result of the search by the mobilecomputing device. In some other embodiments, only the venues that areactually participating in the virtual social network (as a host thereof)will be displayed as a result of the search by the mobile computingdevice 100. For example, if and when a venue is ready to participate inthe virtual social network as a host, it may send an electronic messageto a remote server that, among other things, keeps track of which venuesare hosts of the virtual social network. The mobile computing device 100is also telecommunicatively coupled to the remote server. When themobile computing device 100 performs the search, the remote server maythen help the user of the mobile computing device 100 narrow down whichvenues are actually venues of interest (i.e., venues that are actuallyparticipating in the virtual social network). Otherwise, the user maybecome overwhelmed by a large list of venues returned by the search,where many (if not most) of them are not actual participants of thevirtual social network and is therefore of no interest to the user.

In any case, the list of venues discovered as a result of the electronicsearch by the mobile computing device may be shown on the screen in amap 150, or in a text box 160, or both. The map 150 may display alocation 170 of the user relative to the locations of the participatingvenues. This helps the user orient himself/herself and understand howfar he/she may be from any particular venue. The text box 160 includesdetails regarding the name of each venue. In some embodiments, the textbox 160 also displays, next to the name of each venue, the number ofparticipants of the virtual social network at each venue (i.e., thenumber of “icebreaker” users herein). The number of participants of thevirtual social network at each venue may be supplied by each venue tothe mobile computing device 100 directly in response to the searchrequest issued by the mobile computing device 100. Alternatively, eachvenue may supply this information to the remote server discussed above.The remote server may then electronically send the information(regarding number of participants at each venue) to the mobile computingdevice 100.

Knowing the number of participants at each venue may be helpful for theuser. In more detail, in a social networking context, the userexperience is typically enhanced as the number of participants on thesocial network increases, at least up to a certain point. At theminimum, there needs to be a critical mass of participants for thesocial network to be enjoyable. As such, if a venue herein only has 4 or5 participants, the user may not wish to go to that venue, because asocial network having only 4 or 5 user may not be sufficient to providea satisfactory user experience. Thus, by listing the number ofparticipants of the virtual social network alongside each venue, theuser may get a snapshot of the venues around him/her and determine whichvenue is likely to be a “hotspot” for the virtual social network. Theuser may then base his/her decision on which venue to visit accordingly.

Once the user has decided on the venue to visit, he/she may digitally“check-in” to the venue. In some embodiments, a digital check-in at thevenue means that the user (via the mobile computing device 100) hasagreed to log on to, or establish a wireless link or telecommunicationsconnection with the virtual social network at the venue. In someembodiments, the wireless link may he established between the mobilecomputing device 100 and a computer (i.e., a desktop or a laptopcomputer) or a portable handheld electronic device (e.g., a smartphoneor a tablet computer) of the venue. In other embodiments, the wirelesslink may be established between the mobile computing device 100 and anetwork router at the venue. For example, the mobile computing device100 may simply log on to the Wi-Fi network provided by the venue bydigitally checking into the venue. In the embodiment shown, the venuethat is selected for the digital check-in is highlighted.

Referring now to FIG. 13, once the user has digitally checked into avenue (e.g., “Gingerman” in this embodiment, which is a bar), he may beoptionally prompted to view a digital menu of items offered at thevenue. Since the venue herein is a bar, the digital menu is a drinkmenu. The user may decline and go straight to the virtual social networkgame, or he/she may decide to view the digital menu.

Referring now to FIG. 14, if the user decides to take a look at thedigital menu, he/she will be presented with a list of hems (e.g.,drinks) offered by the venue. In some embodiments, the entire list ofavailable items may be shown in the form of a scrollable list. In otherembodiments, only a subset of the available items may be shown, forexample the top 10 or 20 most popular items at the venue. The user mayspecify which items are his favorite or preferred. In this example, theuser chooses Jack and Coke as his favorite drink.

After the user selects his/her favorite or preferred drink (or if he/shenever saw the digital menu and instead elected to proceed to the virtualsocial network game right away in the first place), the user may bepresented with a list of digital profiles of a subset of theparticipants of the virtual social network at the venue. The subset ofthe participants is determined by the user selection of which gender ofparticipants he/she is interested in interacting with at the userprofile setup screen (FIGS. 4 or 5). For example, in this example, theuser AverageJoe is a man seeking a woman, so only digital profiles ofwomen participants may be displayed on the screen 110 of the mobilecomputing device 100 of the user AverageJoe.

In the embodiment shown in FIG. 13, the digital profiles of the womenparticipants are displayed as a scrollable grid on the screen 110 of themobile computing device 100. Again, these women are all physicallylocated at (or at least near) the venue that is hosting the virtualsocial network (the venue being Gingerman in this example). These women,have previously digitally checked into the venue using a process similarto the user AverageJoe's digital check-in process discussed above.Again, by checking in to the venue, each participant agrees to havetheir digital profiles discoverable or viewable by other participants ofthe virtual social network at the venue.

Using the grid shown in FIG. 15, the user herein may determine which oneof the other participants (females for the user AverageJoe) he wouldlike to interact with. A click or tap on the digital profile of any ofthe other participants will trigger the display of a more detailedprofile of such participant, as shown in FIG. 16. For example, as shownin FIG. 16, the detailed profile of a participant may include theparticipant's favorite or preferred drinks, food items, what she doesfor a living, her likes and dislikes, etc. In addition, the detailedprofile of the participant also allows the user (e.g., user AverageJoe)to send her a chat request, buy her a drink, or send her virtual orphysical gifts, designate her as a favorite participant, or blacklisther, as discussed in more detail below.

Meanwhile, a long press of on the digital profile of the participantshown. In FIG. 15 (or in FIG. 16) may trigger the display of a menu 200containing a plurality of options, such as “Invite to chat”, “Send adrink”, “Send a gift”, “Add to favorite”, and “Blacklist.” These optionsare also available in the detailed profile of a participant, for exampleas shown in FIG. 10. Generally, an invitation for a chat means that theuser sending the chat would like to electronically chat with therecipient of the chat request.

An offer to buy a drink means that the user would like to buy a drinkfor the recipient, where the drink is in the form of a digitalvoucher/coupon (such as a QR code or a barcode discussed below).

An offer to send a gift means that the user would like to send a virtualor a physical gift to the recipient. The virtual gifts may be animationsor pictures, or digital currency such as virtual coins, or store creditsuch as ITUNEs credit. The physical gift may be a coupon for a physicalmerchandise item.

Adding a participant as a favorite participant means that the favoritedparticipant is someone whom the user is interested in and may desirefurther interaction therewith. In some embodiments, if the user decidesto add another participant (participant with the handle “Flirt” in theembodiment shown herein) as a favorite, a symbol such as a heart may bedisplayed on or adjacent to the digital profile picture of the favoritedparticipant.

Blacklisting a participant means that the user is uninterested in theparticipant and does not wish to be contacted by, or even seen by theblacklisted participant. In some embodiments, once a user hasblacklisted a participant, the user's digital profile will no longer beaccessible by the mobile computing device of the blacklistedparticipant. For example, the user's digital profile may disappear fromthe list of available participants on the mobile computing device of theblacklisted participant. The blacklisted participant may not be awarethat he/she has been blacklisted, and he/she may or may not even knowthat the user who has blacklisted him/her is in the same venueparticipating in the same virtual social network.

It is understood that alternative mechanisms may be employed to triggerthe display of a detailed participant profile, or to trigger the displayof the menu 200 containing options, for example, the single click andlong press may be reserved (i.e., single click will trigger the displayof the menu 200 containing a plurality of options, whereas a long presswill trigger the display of a detailed participant profile), or a doubleclick may be used to replace or supplement the functionalities of thesingle click or lone press.

Referring now to FIG. 17, a new picture grid is displayed on the screen110 of the mobile computing device 100 in response to user engagement.For example, the user may “swipe” up or down on the screen 110 to bringup a new grid of digital profiles of women participants. Alternatively,the user may “swipe” left or right on the screen 110 to bring up the newgrid of digital profiles of women participants. In addition to, orinstead of “swiping” up/down/left/right, the user may also click anddrag on a portion of the screen toward a given direction in order to getstew digital profile pictures displayed.

FIGS. 15-17 illustrate an example embodiment in which a user may browsethrough the digital profiles of the other participants of the virtualsocial network at the venue. FIGS. 18-19 illustrate an alternativeembodiment of visually providing a list of participants of the virtualsocial network that can be browsed through. In more detail, theembodiment shown in FIGS. 18-19 is similar to the embodiment discussedabove with reference to FIGS. 15-17 but with an added functionality.

Referring to FIG. 18, supposed the user AverageJoe has designated theparticipant with the handle “Flirt” as a favorite participant. A symbolsuch as a heart may be displayed on the digital profile of Flirt'sprofile picture. Referring now to FIG. 19, as the user scrolls throughthe list of available women participants, the digital profiles of therest of the participants are replaced by digital profiles of otherparticipants not shown in FIG. 18, with the exception of Flirt's digitalprofile. Alternatively stated, as the user brings up the display of anew grid of digital profiles of participants, the new grid shown in FIG.19 and the previous god shown in FIG. 18 overlap or share the digitalprofile of the favorited participant Flirt. In some embodiments, thedigital profile of the favorited user occupies substantially the sameposition in both the new grid and in the previous grid. In theembodiment shown herein, Flirt's digital profile picture is located atthe middle left position in both the previous grid shown in FIG. 18 andin the new grid shown in FIG. 19.

For reasons of simplicity, additional grids are not shown, but it isunderstood that the digital profile of Flirt will remain fixed in theadditional new grids as the user AverageJoe continues with the browsingof digital profiles of other participants. Keeping the digital profileof the favorited participant in the new grid while the user browsesthrough the digital profiles of other participants is helpful for theuser. For example, in the embodiment shown in FIGS. 15-17, suppose theuser AverageJoe has designated Flirt as a favorite participant in afirst grid. As he scrolls through the rest of the participants in newgrids, the digital profile picture of Flirt is not displayed in thesenew grids, and he may have forgotten what Flirt looks like. Therefore,the user AverageJoe would have to scroll back up to the initial gridwhere Flirt's digital profile picture was displayed to remind himself ofwhat she looks like. This process may be time consuming and isinefficient for the user's browsing of other participants. This problemis exacerabated if the user has designated multiple favoriteparticipants in different grids, which may entail the user having toscroll back and forth multiple times to see who the favoritedparticipants are.

In comparison, the embodiment shown in FIGS. 18-19 obviates this problembecause the digital profiles of the favorited participants will alwaysremain in the current grid of digital profiles. In this manner, the userneed not scroll back and forth to find the favorited users, since theyare all currently displayed on the screen 110 even as the user browsesthrough the list of participants.

It is understood that although a grid is used herein to illustrate anexample approach of displaying the digital profiles of participants ofthe virtual social network, a scrollable list may be used instead of thegrid. For example, referring to FIG. 20, a scrollable list may bedisplayed on the screen 110 of the mobile computing device 100. Eachlist entry corresponds to a particular participant of the virtual socialnetwork. Each list entry includes the participant's profile picture anda text box displayed alongside the profile picture. Among other things,text box may specify which drinks the participant prefers. Optionally,the text box may also include information regarding the participant'slikes and dislikes, hobbies, or what she is looking for in a man, etc.Again, the user may be able to designate any of the participants as afavorite, or interact with her by sending her a drink, a gift, a chatrequest, or put her on the blacklist, as discussed in greater detailbelow. Furthermore, the favorited users may also remain displayed (forexample in the same position on the list) in the scrollable list as theuser continues to scroll through the list.

FIGS. 21-23 illustrate yet another embodiment of allowing the user tobrowse through available participants at a target venue. Referring toFIG. 21, rather than being presented with a scrollable grid of digitalprofiles of participants, the digital profiles of two of the availableparticipants are randomly selected and displayed on the screen 110 ofthe mobile computing device 100. Based on the two digital profiles, theuser is prompted to select the participant with whom he would be moreinterested in interacting. The user may be able to swipe away thedigital profile of the participant with whom he is less interested ininteracting. For example, the user is less interested in the participantshown at the bottom, so he may swipe her digital profile to the left orright.

Referring now to FIG. 22, as the digital profile of the participant onthe bottom is swiped away, it is replaced by a digital profile ofanother randomly selected participant. Again, the user may select theparticipant that he is more interested in, and swipe away the digitalprofile of the participant with whom he has less interest. For the sakeof continuing with the example, the user is less interested in theparticipant shown at the top this time, so he may swipe her digitalprofile to the left or right.

Referring now to FIG. 23, as the digital profile of the participant onthe top is swiped away, it is replaced by a digital profile of yetanother randomly selected participant. This comparison and selectionprocess may continue for as long as the user wishes. During thecomparison and selection process, the user may also be able to click ortap on a digital profile of any of the participants to view a moredetailed profile (e.g., as shown in FIG. 16), and the user may also beable to long press on a digital profile of any of the participants tobring up the same menu 200 discussed above with reference to FIG. 15.For example, the user may decide to designate either of the two (orboth) participants shown on the screen 110 as a favorite participant.

Once the user has selected one or more favorite participants, he mayclick on a favorite button 210 to display, on the screen 110, thedigital profiles of the participants who have been designated asfavorite participants of the user, for example as shown in FIG. 24. Fromthis list of favorite participants, the user may also choose to viewtheir detailed profile or to trigger the menu 200 in a similar manner asdiscussed above.

Alongside the button 210, a plurality of a profile button 220, a messagebutton 230, a home 240, and a blacklist button 230 are displayed. Thelist of buttons 210-250 are displayed throughout the application andallows the riser to navigate through the application as desired. Theprofile button 220 allows the user to return to his/her own profilescreen, for example the profile screen as shown in FIGS. 4 or 5, so thatthe user can dynamically change his/her handle, speedy the differenttypes of drinks he/she prefers, or just edit things he/she would like toshare with the other participants when the view the profile of the user.The message button 230 allows the user to view a list of incoming andoutgoing messages within the context of the virtual social network, asdiscussed below in more detail with reference to FIG. 37. The homebutton 240 allows the user to return back to the “grid” style display ofthe digital profiles of other participants, such as shown in FIGS.15-10, or the “list” style display of the digital profiles of otherparticipants, such as shown in FIG. 20, or the side-by-side styledisplay of the digital profiles of other participants, such as shown inFIGS. 21-23.

The blacklist button 250 displays a list of the participants who havebeen blacklisted by the user, for example as shown in FIG. 25. Theblacklist option is particularly helpful for female users, who mayoccasionally be harassed by one or more male participants on the virtualsocial network. For example, if participants with the handles “DaBomb”and “RoofyMagic” have made user “Flirt” feel uncomfortable, she mayblacklist “DaBomb” and “RoofyMagic.” Alternatively, if Flirt has nointerest in engaging them or wanting to be engaged by them, she mayblacklist DaBomb and Roofy Magic as well. Once the DaBomb and RoofyMagicare blacklisted by Flirt, Flirt's digital profile will no longer beaccessible by either DaBomb or RoofyMagic via their respective mobilecomputing devices. In some embodiments, the digital profile of Flirtwill disappear from the screen of the mobile computing devices of DaBomband RoofyMagic. Thus, from DaBomb and RoofyMagic's point of view, theparticipant Flirt may have left the venue, or decided to exit thevirtual social network, or they may never even know she existed or wasat the venue in the first place. In other words, the blacklisted usersare not specifically notified of their blacklisting by otherparticipants, and as such they may not be aware of them being put onanyone's blacklist.

Once in the blacklisted participants screen as shown in FIG. 25, theuser may unblacklist a particular participant (thereby returning him to“normal” status), or report the participant to the venue, which will bediscussed in more detail later. Similarly, the user may also unfavoritea participant who has been previously favorited, thereby also returningsaid participant to normal status. Additionally, the user may also exitthe virtual social network via the click of a logout button 260.

Suppose that the user AverageJoe would like to send a drink to one ofhis favorited participants. This may be done either by triggering themenu 200 (e.g., shown in FIGS. 15, 23, or 24) or going to the detaileddigital profile of the participant (i.e., the target drink recipient)such as the profile shown in FIG. 16. When the user clicks on thecorresponding button to send/buy a drink for the target recipient,digital menu of the venue may be displayed on the screen 110 of themobile computing device 100 of the user (i.e., the sender of the drink),as shown in FIG. 26. Again, a drink menu is provided in the exampleprovided herein, but it is understood that food or other merchandiseitems may also apply in other embodiments. The user may browse throughthe digital drink menu and select one or more drinks to send to thetarget recipient, for example Flirt. This is advantageous overconventional social settings where the buyer of the drink usually doesnot know what drinks are preferred by the target recipient. As such, thebuyer may end up buying a drink that the recipient does not like at all,thereby diminishing chances of using the drink as an icebreaker betweenthe buyer and the recipient. In comparison, the present disclosureallows users such as Flirt to indicated her favorite/preferred drinks(e.g., cosmopolitan) and make that information available for otherparticipants of the virtual social network. Consequently, the userAverageJoe may buy and send a drink such as cosmopolitan to Flirt withmore confidence knowing that she will like the drink.

FIG. 27 illustrates another embodiment of the digital drink menudisplayed to the user when he is ready to buy a drink for a targetrecipient. Suppose the target recipient Flirt has already selectedcosmopolitan and screwdriver as her favorite drinks at some point fromthe digital menu (for example when she registered to participate withthe virtual social network) as shown in FIG. 14. The selection ofFlirt's favorite drinks may be displayed with graphical emphasis on thescreen 110 of AverageJoe's mobile computing device 100 when the userAverageJoe is ready to buy Flirt a drink. For example, Flirt's favoritedrinks cosmopolitan and screwdriver may be highlighted so that theystand out from the rest of the drinks on the menu. The display of thetarget recipient's favorite drinks with graphical emphasis helps thebuyer remember what drinks he needs to buy. This is especially true whenthe drink menu is fairly extensive, and even if the buyer remembers whatthe target recipient's favorite drinks are, he will have to comb throughthe entire menu to identify the drinks of interest. This is a timeconsuming process and may frustrate the buyer. However, if the drinks ofinterest are displayed with graphical emphasis, the buyer may be able toeasily find them and complete the transaction, which saves time andprovides a more pleasant user experience.

FIG. 28 illustrates yet another embodiment of the digital drink menudisplayed to the user when he is ready to buy a drink for a targetrecipient. In this embodiment, the only drinks displayed are the drinksthat have been specified as favorite drinks by the target recipient. Inother words, the graphical emphasis of the target recipient's favoritedrinks is manifested as the only drinks being displayed, while the restof the drinks on the menu are hidden. This may make it even easier forthe buyer to choose the drink to send to the recipient.

It is understood that in both the embodiments shown in FIGS. 27-28, thedrinks displayed with graphical emphasis or by themselves may varydepending on the target recipient. In other words, Flirt may prefercosmopolitan and screw driver, and as such these drinks are displayedwith graphical emphasis in the embodiment of FIG. 27 and FIG. 28.However, had the user been trying to send a drink to another participantBarfly, then the drink displayed with graphical emphasis would have beenmojito, since Barfly has selected mojito as her preferred drink.

In some embodiments, each participant's selection of preferred drinks istransmitted to, and stored on, a remote server via the mobile computingdevice of said participant. When another user tries to send a drink tosaid participant, the remote server sends the recipient's selection ofpreferred drinks to the mobile computing device of the buyer's mobilecomputing device, so that the buyer's mobile computing device may beable to display the target recipient's preferred drinks with graphicalemphasis. Alternatively, such preferred drink selection for all theparticipants of the virtual social network may be automaticallydownloaded to each participants mobile computing device, for examplewhen the participant initially checks-in or joins the virtual socialnetwork. This information may also be periodically updated as newparticipants check-in to the virtual social network and as existingparticipants leave. When any user is ready to send a drink to another,the mobile computing device of the buyer user may already have thepreferred drink information for the target recipient available. In yetanother alternative embodiment, the preferred drink information for thetarget recipient is automatically sent to the mobile computing device ofthe buyer in response to the buyer initiating a “send drink” request tothe target recipient.

Referring now to FIG. 29, the user may send a gift to a target recipientinstead of, or in addition to, one or more drinks. Such gifts mayinclude, as examples, virtual stuffed animals, virtual flowers, or ananimation sequence, etc. The purchase of these gifts cost virtual coins,which the user may purchase. Alternatively, the user may also send anactual gift such as a digital gift card to the recipient.

Referring now to FIG. 30, regardless of how the user decides to initiatean “icebreaker” request (e.g., just a chat request, or a chat requestaccompanied by an offer to buy a drink, or a chat request accompanied bya gift), once the request is sent, a timer starts. Initially, the usermay be given a certain number of icebreaker requests, for example 3.Once he sends a request to someone, he now has only two requests left.The timer counts down from a predefined number (e.g., 10 minutes). Whenthe timer counts down to 0 (i.e., 10 minutes have passed), then, a newrequest is made available. Thus, the user may be given a new icebreakerrequest every 10 minutes, though, he cannot go above the initial number(e.g., 3) of requests initially assigned to him. In this example, if theuser has used up all 3 requests within a 10-minute span, then he may notbe able to send another icebreaker request to a target recipient untilthe timer has finished counting down to zero.

Limiting each user to a certain number of icebreaker request may bebeneficial in at least two aspects. One, this prevents the user fromindiscriminately sending icebreaker requests to all participants at thevenue, which would overwhelm and annoy them. Two, psychologically,people tend to treasure things that are of limited quantity. Since auser only has a certain number of icebreaker requests available, he islikely to take each request more seriously and therefore become morevested in his participation of the virtual social network, which wouldlikely enhance his and everyone else's user experience.

FIG. 31 illustrates a screen 310 of a mobile computing device 300 of thetarget recipient of user AverageJoe's chat request. In this case theparticipant with the handle “Flirt.” The screen 310 displays an incomingmessage from user AverageJoe who initiated the chat request. Theincoming message includes a digital profile picture 320 of AverageJoe.Flirt has an option to either accept the chat request or decline it byclicking on the “Accept” or “Decline” buttons.

FIG. 32 illustrates an example of what is displayed on the screen 310when the user AverageJoe had sent the chat request along with an offerto buy Flirt a drink. In this case, along with the digital profilepicture 320 of the sender—AverageJoe—the recipient Flirt may also see agraphical icon 330 representing a drink being displayed on the screen310. The graphical icon 330, along with the text of the message, informsthe recipient that a drink has been sent her way. The recipient Flirtmay “Accept chat with drink”, “Accept chat, but decline drink” or“Decline chat and drink” by clicking on the corresponding buttons.

FIG. 33 illustrates an example of a digital voucher or codes displayedon the screen 310 if Flirt decides to accept the chat request with onedrink. In more detail, the drink that is purchased for the recipientFlirt is in the form of a digital voucher/coupon that can be redeemed atthe venue for the corresponding drink. In the embodiment illustrated,the digital voucher may be either a quick response (QR) code 340, abarcode 350, or both. The QR code 340 or the barcode 350 may he scannedor electronically read by a scanner (for example a smartphone or atablet computer) to redeem the corresponding drink. In some embodiments,the QR code 340 or the barcode 350 are each generated dynamically inresponse to a drink request being sent. Each drink for a targetrecipient has a uniquely generated QR code 340 or barcode 350 associatedtherewith, so as to prevent using the same QR code 340 or barcode 350 toredeem multiple drinks.

Here, AverageJoe has sent a cosmopolitan to Flirt in the form of the QRcode 340 or the barcode 350, and thus Flirt may go to the bar and havethe bartender scan either of these codes 340/350 with his/her smartphoneor tablet computer to redeem, an order of cosmopolitan. This whole drinkordering process is convenient because AverageJoe knows exactly whatFlirt prefers to drink and thus sends her the drink of her choice. Flirtmay get the drink without having to talk to AverageJoe in person (i.e.,she merely has agreed to chat with him via their mobile computingdevices). This is also safe because Flirt gets the drink herself, andshe can make sure that no one has put any drugs in her drink.

FIG. 34 illustrates an example of what is displayed on the screen 310when the user AverageJoe had sent the chat request along with a gift. Inthis case, along with digital profile picture 320 of thesender—AverageJoe—the recipient Flirt may also see a graphical icon 360representing a gift displayed on the screen 310. The graphical icon 360,along with the text of the message, informs the recipient that a gifthas been sent her way. The recipient Flirt may “Accept chat with gift”,“Accept chat but decline gift”, or “Decline chat and gift” by clickingon the corresponding buttons.

In some embodiments, the gift may be a virtual gift, such as a virtualhug, a virtual teddy bear, a virtual kiss, or a suitable image oranimation sequence. In other embodiments, the gift may be of real value,for example a code that can be used to redeem purchases at physicalstores such as Starbucks or online stores such as ITUNES.

FIG. 35 illustrates an example of what is being displayed on the screens110 and 310 of both of the users AverageJoe and Flirt, respectively,once a chat request has been accepted. In addition to having the profilepictures of Flirt and AverageJoe displayed on the other person's mobilecomputing device's screen, a chat window 400 is displayed, whereAverageJoe and Flirt may send electronic messages back and forth.

FIG. 36 illustrates an example of what each chat participant may send tothe other party during the chat. For example, the user AverageJoe mayclick on the “+” button, which will trigger the display of a list ofitems available For sending to Flirt, such as a drink, a virtual teddybear, a virtual flower, etc.

FIG. 37 illustrates an example message inbox on the screen 110 ofAverageJoe's mobile computing device 100. He may get to this messageinbox by clicking on the message button 230 at any time. The messageinbox shows a list of active or inactive chats with various otherparticipants. In the example shown herein, AverageJoe has establishedactive chats with the participants Flirt and Barfly, but TalkToMe hasnot accepted AverageJoe's invitation to chat. In some embodiments, theinactive chats (e.g., the chat, with TalkToMe herein) may be visuallydistinguished from the active chats (e.g., the chats with Flirt andBarfly), for example the inactive chat may be grayed out.

Flirt may also decline AverageJoe's chat request. And if AverageJoe (orany other user) consistently harasses Flirt and makes her feeluncomfortable, she may report that user to a manager or other personnel(hereinafter collectively referred to as the manager) at the venue. Thisis illustrated in FIG. 38, where the user Flirt is asked to confirmwhether or not she wishes to proceed with the reporting. She is alsogiven the option of continuing with the reporting with or without a copyof the chat transcript (or at least a portion thereof, for example themost recent messages within the last 30 minutes or the last 20messages). If she chooses to send the report, the digital profilepicture (and optionally the handle) of the offending user may be sent toan electronic device of the manager at the venue. In some embodiments,the user Flirt may report another offensive user anonymously. She canalso elect to simply put the offending user on the blacklist instead ofreporting him.

Referring now to FIG. 39, in some embodiments, if Flirt elects to notinclude a copy of the chat transcript, she will be prompted to specifythe issue in a text box. The more specific she can describe the issue,the better equipped the manager at the venue may be to deal with theoffending user.

FIG. 40 displays a screen 410 of an example mobile computing device 400of the manager at the venue after a report regarding an offensive userhas been received. In this embodiment, the reporting user has chosen notto include a copy of the chat transcript, and therefore the manager ofthe venue may only receive an alert saying that the user AverageJoe hasbeen reported, along with a picture and/or a handle of the reporteduser. In embodiments where the reporting is done anonymously, thereporting user's identity is not revealed to the manager. In response tothe report, the manager may elect to send the reported user a warningmessage, or to kick him out of the virtual social network.

FIG. 41 displays a screen 410 of another example mobile computing device400 of the manager at the venue after a report regarding an offensiveuser has been received. In this embodiment, the reporting user haschosen to include a copy of the chat transcript 430, as well as anexplanation 440 of why the reported user made her feel uncomfortable.Again, the manager may elect to send the reported user a warningmessage, or to kick him out of the virtual social network in response tothe report. In some severe situations, the manager may have the bouncerat the venue physically locate and remove the offending user from thevenue. It is understood that although FIGS. 40-41 illustrate mobilecomputing devices such as smartphones or tablet computers as exampleelectronic devices used by the manager at the venue to receive thereport, the electronic devices may also be desktop or laptop computersin alternative embodiments.

FIG. 42 displays the screen 110 of the user who has been reported nowreceiving a warning message from the venue in response to the reporting.He may receive a pop-up message 450 saying that he has been reported asbeing abusive and that he needs to behave. The user may then be given anoption to respond to tell his side of the story if he wishes.

FIG. 43 displays the screen 110 of the user who has been reported nowbeing kicked out of the virtual social network. He may receive anotification 460 from the venue that his icebreaker session has beenterminated due to uncivilized behavior, and that he needs to wait acertain period of time before being allowed to rejoin. This will takehim back to the home screen on the mobile computing device 100.

It is understood that although the embodiments discussed above use themanager at the venue as an example of receiving the reports/complaintsfrom the alleged harassment victims and warning or disciplining thealleged offensive users, these tasks may be alternatively performed by aremote server as well.

The ability to electronically report offensive and creepy users isbeneficially for participants of the social network, especially forfemale participants. Often times, a woman may be offended by thebehavior of another person (typically a male) who is attempting toengage with her. In a real world physical setting, though she may findsuch behavior offensive, she may not feel comfortable enough to actuallyalert the bar manager or bouncer, because she does not want to “make abig deal out of it.” Also, without any witnesses or hard evidence, itmay be a “he said” “she said” issue. In other words, the bar manager maynot take her complaint seriously because he may feel that her story mayis one sided.

In comparison, the electronic reporting or complaint of anotheroffensive user in the context of the present disclosure is convenientand does not require the reporting user to actually explain in person tothe bar manager what is bothering her. Thus, she may feel morecomfortable reporting offensive behavior. Furthermore, with the abilityto include a digital picture of the offending user and the chattranscript, she can show the manager exactly who and what made her feeluncomfortable. This also lends more credence to her story, and the barmanager may be able to take corrective actions with more confidence. Asa result, the overall social environment at the bar may be improved.

FIG. 44 illustrates an example logout screen when the user chooses toexit the virtual social network. To protect the user's privacy, the userwill be alerted that the electronic chat records produced as a result ofthe user's participation in the virtual social network will he erased bydefault. In this manner, the user may be saved from being reminded withembarrassing messages later on, particularly if his/her mobile computingdevice gets into the wrong hands.

In some embodiments, even if the user forgot to logout of the virtualsocial network, the mobile computing device 100 may still erase theelectronic records related to the user's participation on the virtualsocial network by automatically detecting that the user has departedfrom the venue that was hosting the virtual social network. For example,the mobile computing device 100 may detect, via a GPS sensor implementedthereon, that the user has moved from the venue by a distance exceedinga predetermined threshold, for instance more than half a mile or aquarter of a mile from the geographical location of the venue.

Alternatively, the mobile computing device 100 may detect a break withthe Wi-Fi signal at the venue. Based on the occurrence of these events,the mobile computing device 100 may determine that the user has moved onfrom the venue, and thus the mobile computing device 100 will force anexit from the virtual social network and wipe out the electronic recordspertaining to the session from the mobile computing device 100 itself,even though he/she did not specifically choose to exit the virtualsocial network.

In yet another embodiment, the mobile computing device 100 may detectthat it has physically remained at the venue for a period of timeexceeding a predetermined threshold (e.g., longer than 12 hours). Thismay be done either by the GPS sensor on the mobile computing device 100detecting no movement or very little movement of the mobile computingdevice 100 within the past number of hours, or by the mobile computingdevice 100 detecting a continuous connection with the wireless networkat the venue. In response to this detection, the mobile computing device100 may force an exit from the virtual social network automatically andagain erase all the electronic records from itself. This is because thissituation likely indicates that the user has forgotten or lost his/hermobile computing device 100 at the venue. Thus, to prevent authorizedaccess thereto, the mobile computing device 100 will erase theelectronic records pertaining to the user's involvement on the victualsocial network.

In some embodiments, the exiting of a user's session from the virtualsocial network not only erases the electronic records produced by thesession front his/her mobile computing device also causes the electronicrecords to be erased from the mobile computing devices of other userswho have been interacting with the user. For example, when user A logsout of the virtual network (or if her physical departure was detected,etc.), her mobile computing device will erase, from itself all theelectronic records pertaining to her most recent session at the virtualsocial network. In addition, if she had been chatting with a user B,then such chat records will also be erased from user B's mobilecomputing device. This may be accomplished, for example, by having themobile computing device of user A send an electronic signal upon thedetected exit of user A. The signal is received by the mobile computingdevice of User B and is interpreted as a request to erase theappropriate electronic records (e.g., chats) involving user A. Thus, ifuser B had been charting with users A and C, then only the chat recordsinvolving user A will be erased, but user B may still carry on a chatwith user C, that is, until user B or C exits the virtual socialnetwork.

The automatic erasure electronic records affords the users another levelof privacy and security. Conventional text messages have produced manyembarrassing stories and tales, especially after a night ofdrinking/partying at a bar or club. Here, since the chat history andother electronic exchanges between the users are automatically erased,the users may feel more at east interacting with one another, as theyhave less fear or being haunted by an embarrassing message later.

FIG. 45 is a simplified flowchart illustrating a method 2100 forelectronically identifying users via a mobile computing device within anelectronic social networking context discussed above according to someembodiments. In some embodiments, the mobile computing device includes amobile telephone, a tablet computer, a laptop computer, or a smart watchor glass.

The method 2100 includes a step 2110 of receiving a request from a userto participate in an electronic social network. The request is receivedfrom a mobile computing device of the user.

The method 2100 includes a step 2120 of prompting, via the mobilecomputing device and in response to receiving of the request, a user toupload a digital profile picture.

The method 2100 includes a step 2130 of receiving an uploaded digitalprofile picture in response to the prompting. The receiving of theuploaded digital profile picture comprises one of: receiving a userselection from an existing digital picture album of the user or taking adigital picture of the user via a camera module of the mobile computingdevice.

The method 2100 includes a step 2140 of electronically examining theuploaded digital profile picture. In some embodiments, theelectronically examining comprises detecting, in the uploaded digitalpicture, objects that resemble human eyes.

The method 2100 includes a step 2150 of determining, based on theelectronically examining, whether one or more human faces are present inthe digital profile picture. In some embodiments, the determiningcomprises determining that no human faces are present in the digitalprofile picture if no objects resembling human eyes are detected. Insome embodiments, the determining comprises determining that multiplehuman faces are present in the digital profile picture if objectsresembling multiple pairs of human eyes are detected.

The method 2100 includes a step 2160 of prompting the user to upload adifferent digital profile picture if it has been determined that theuploaded digital profile picture contains no human faces.

The method 2100 includes a step 2170 of prompting the user to identifythe human face belonging to the user if it has been determined that theuploaded digital picture contains multiple human faces.

It is understood that unless otherwise specified, the steps 2110-2170 ofthe method 2100 are not necessarily performed in numerical order. It isalso understood that addition steps may be performed before, during, orafter the steps 2110-2170. For example, the method 2100 may include astep of making the digital profile picture of the user available torviewing on a plurality of other mobile computing devices whose users areparticipants of the electronic social network. The method 2100 mayfurther include a step of before the making of the digital profilepicture of the user available for viewing: preventing the user fromparticipating in the electronic social network until it has beendetermined that: the uploaded digital picture contains only one humanface; or the user has identified the human face belonging to the user ifthe uploaded digital picture contains multiple human faces. For reasonsof simplicity, these additional steps are not discussed in detailherein.

FIG. 40 is a simplified flowchart illustrating a method 2200 for viewingand selecting users via a mobile computing device within an electronicsocial networking context discussed above according to some embodiments.In some embodiments, the mobile computing device includes a mobiletelephone, a tablet computer, a laptop computer, or a smart watch orglass.

The method 2200 includes a step 2210 of performing, via a mobilecomputing device of a first user, a digital check-in to a venue that iswithin a predefined proximity of the first user. A plurality of otherusers have already digitally clicked into the venue. In someembodiments, the venue includes a bar, a club, or a restaurant. In someembodiments, the step 2210 of performing the digital, check-in comprisesestablishing a wireless telecommunications connection with a network atthe venue.

The method 2200 includes a step 2220 of displaying, on a screen of themobile computing device of the first user, respective digital profilesof a first subset of the other users.

The method 2200 includes a step 2230 of designating, in response toinput from the first user, one or more second users who are within thefirst subset of the other users as favorite users. In some embodiments,the step 2230 of designating comprises displaying a symbol on, oradjacent to, the digital profile of each of the one or more favoriteusers

The method 2200 includes a step 2240 of displaying, on the screen of themobile computing device of the first user, respective digital profilesof a second subset of the other users. The second subset of the otherusers includes the designated favorite user and users who are not withinthe first subset. In some embodiments, the first and second subsets ofthe plurality of other users have a different gender than the firstuser. In some embodiments, the users in the first and second subsetseach have a gender that is one that is selected by the first user.

In some embodiments, the respective digital profiles of the first subsetof the other users are displayed as a first grid, the respective digitalprofiles of the second subset of the other users are displayed as asecond grid, and the digital profiles of the one or more favorite usersoccupy the same positions in both the first and second grids.

in some embodiments, the digital profiles of the first and secondsubsets of the users are displayed as a scrollable list, and the digitalprofiles of the one or more favorite users remain displayed on thescreen as the list is being scrolled through.

The method 2200 includes a step 2250 of displaying respective digitalprofiles of a group of users consisting of users who have beendesignated as the favorite users.

The method 2200 includes a step 2260 of sending, via the mobilecomputing device of the first user, a request to communicate with one ofthe other users. The request includes a digital chat request and atleast one of: a virtual gift or a Quick Response (QR) code or a Barcodeto redeem a drink at the venue.

It is understood that, unless otherwise specified, the steps 2210-2260of the method 2200 are not necessarily performed in numerical order. Itis also understood that addition steps may be performed before, during,or after the steps 2210-2260. For reasons of simplicity, theseadditional steps are not discussed in detail herein.

FIG. 47 is a simplified flowchart illustrating a method 2300 forselecting, displaying and purchasing favorite drinks for users via amobile computing device within an electronic social networking contextdiscussed above according to some embodiments. In some embodiments, themobile computing device includes a mobile telephone, a tablet computer,a laptop computer, or a smart watch or glass.

The method 2300 includes a step 2310 of performing, via a mobilecomputing device of a first user, a digital check-in to a venue that iswithin a physical proximity of the first user.

The method 2300 includes a step 2320 of accessing, after the digitalcheck-in, a digital menu that contains a list of drinks available at thevenue.

The method 2300 includes a step 2330 of displaying the digital menu tothe first user via a screen of the mobile computing device.

The method 2300 includes a step 2340 of designating, in response toselection from the first user, one or more drinks from the digital menuas preferred drinks of the first user.

The method 2300 includes a step 2350 of electronically communicating thefirst user's preference of the one or more drinks to another electronicdevice. In some embodiments, the step 2350 of electronicallycommunicating comprises sending the first user's preference of the oneor more drinks to a remote computer server. In some embodiments, thestep 2360 of electronically communicating comprises sending the firstuser's preference of the one or more drinks to a mobile computing deviceof a second user

The method 2300 includes a step 2360 of causing the first user'spreference of the one or more drinks to be displayed with graphicalemphasis on a screen of a mobile computing device of a second user whohas also digitally checked into the venue. In some embodiments, thecausing of the first user's preference of the one or more drinks to bedisplayed is performed in response to a request from the second user toelectronically communicate with the first user via their respectivemobile computing devices. In some embodiments, the request from thesecond user comprises a request from the second user to electronicallyorder a drink from the digital menu and send the drink to the first userin a form of a digital coupon that can be used to redeem the drink. Insome embodiments, the graphical emphasis includes one of: highlightingthe one or more drinks on the digital menu; or showing the one or moredrinks while hiding the rest of the drinks on the digital menu.

In some embodiments, the mobile computing device further includes aradio component. The step 2310 of performing of the digital check-incomprises establishing, via the radio component, a wireless connectionwith a network at the venue. The step 2350 of electronicallycommunicating comprises sending the first user's preference of the oneor more drinks to an electronic device on the network.

It is understood that, unless otherwise specified, the steps 2310-2360of the method 2300 are not necessarily performed in numerical order. Itis also understood that addition steps may be performed before, during,or after the steps 2310-2360. For reasons of simplicity, theseadditional steps are not discussed in detail herein.

FIG. 48 is a simplified flowchart illustrating a method 2400 forselecting, displaying and purchasing favorite drinks for users via amobile computing device within an electronic social networking contextdiscussed above according to some embodiments. In some embodiments, themobile computing device includes a mobile telephone, a tablet computer,a laptop computer, or a smart watch or glass.

The method 2400 includes a step 2410 of detecting, from a first mobilecomputing device of a first user, a digital check-in to a venue that iswithin proximity of the first user, wherein the venue offers a digitalmenu that includes a list of available drinks. In some embodiments, thestep 2410 of detecting of the request comprises detecting a request fromthe second user to electronically order a drink from the digital menuand send a digital coupon to the first mobile computing device. Thedigital coupon is redeemable for at least one of the one or morepreferred drinks of the first user.

The method 2400 includes a step 2420 of receiving, from the first mobilecomputing device, one or more preferred drinks from the first user, theone or more preferred drinks being a subset of the list of availabledrinks.

The method 2400 includes a step 2430 of electronically associating theone or more preferred drinks with the first user.

The method 2400 includes a step 2440 of detecting, from a second mobilecomputing device of a second user, a request from the second user toelectronically communicate with the first user.

The method 2400 includes a step 2450 of causing, in response to therequest, the one or more preferred drinks to be displayed with graphicalemphasis on a screen of the second mobile computing device. In someembodiments, the graphical emphasis includes highlighting the one ormore preferred drinks on the digital menu. In some embodiments, thegraphical emphasis include displaying only the one or more preferreddrinks but not the rest of the drinks on the digital menu.

It is understood that, unless otherwise specified, the steps 2410-2450of the method 2400 are not necessarily performed in numerical order. Itis also understood that addition steps may be performed before, during,or after the steps 2410-2450. For reasons of simplicity, theseadditional steps are not discussed in detail herein.

FIG. 49 is a simplified flowchart illustrating a method 2500 enhancinguser privacy and security within a location-based virtual socialnetworking context via a mobile computing device. In some embodiments,the mobile computing device includes a mobile telephone, a tabletcomputer, a laptop computer, or a smart watch or glass.

The method 2500 includes a step 2510 of receiving, via a first mobilecomputing device of a first user, a request from the first user toparticipate in a location-based virtual social network.

The method 2500 includes a step 2520 of detecting, at least in part viaa radio component of the first mobile computing device, one or morevenues within proximity of the first mobile computing device. Each venueincludes a host of a respective virtual social network.

The method 2500 includes a step 2530 of selecting, in response to inputfrom the first user, one of the venues in which to participate in thevirtual social network.

The method 2500 includes a step 2540 of establishing, at least in partvia the radio component of the first mobile computing device, a wirelessconnection with the virtual social network at the selected venue.

The method 2500 includes a step 2550 of conducting electroniccommunications with one or more second users at the selected venue whoare also participants of the virtual social network via their respectivemobile computing devices. In some embodiments, the step 2550 ofconducting the electronic communications comprises one or more of thefollowing: making a digital profile of the first user available Forviewing on respective mobile computing devices of the one or more secondusers; sending chat requests: to the one or more second users; receivingchat requests from the one or more second users; electronically chattingwith the one or more second users; sending, to the one or more secondusers, a digital code that is redeemable for a drink at the selectedvenue; receiving, from the one or more second users, a digital code thatis redeemable for a drink at the selected venue; sending a virtual giftto the one or more second users; and receiving a virtual gift from theone or more second users. In some embodiments, the step 2550 ofconducting the electronic communications further comprises: blacklistinga selected one of the second users in response to a request from thefirst user; and thereafter making the digital profile of the first userunavailable for viewing on the mobile computing device of theblacklisted second user. In some embodiments, the making of the digitalprofile of the first user unavailable for viewing comprises causing thedigital profile of the first user to disappear from the mobile computingdevice of the blacklisted second user. In some embodiments, the step2550 of countering the electronic communications further comprises:reporting a selected one of the second users to the host of the virtualsocial network for harassment. The reporting comprises electronicallysending, to the host, at least a portion of a chat transcript betweenthe first user and the reported second user.

The method 2500 includes a step 2560 of thereafter detecting a departureof the first user from the selected venue.

The method 2500 includes a step 2570 of erasing from the first mobilecomputing device, in response to the detected departure, electronicrecords pertaining to the conducted electronic communications with theone or more second users.

It is understood that, unless otherwise specified, the steps 2510-2570of the method 2500 are not necessarily performed in numerical order. Itis also understood that addition steps may be performed before, during,or after the steps 2510-2570. For example, the method 2500 may include astep of: in response to the detected departure: causing the mobilecomputing devices of the one or more second users to erase electronicrecords pertaining to the conducted electronic communications with thefirst user. As another example, the method 2500 may include a step ofdetermining that the first mobile computing device has maintained thewireless connection with the virtual social network at the selectedvenue for a period of time exceeding a predefined threshold; and erasingfrom the first mobile computing device, in response to the determining,electronic records pertaining to the conducted electronic communicationswith the one or more second users. For reasons of simplicity, additionalsteps are not discussed in detail herein.

FIG. 50 is a simplified clock diagram of an electronic device 3300according to the various aspects of the present disclosure. Theelectronic device 3300 may be implemented as an embodiment of the mobilecomputing device 100 discussed above.

The electronic device 3300 includes a telecommunications module 3310,which may also be referred to as a radio component. Thetelecommunications module 3310 contains various electronic circuitrycomponents configured to conduct telecommunications with one or moreexternal devices. The electronic circuitry components allow thetelecommunications module 3310 to conduct telecommunications in one ormore of the wired or wireless telecommunications protocols, includingcommunications protocols such as IEEE 802.11 (WiFi), IEEE 802.15(Bluetooth), GSM, CDMA, LTE, WIMAX, DLNA, HDMI, etc. In someembodiments, the telecommanications module 3310 includes antennas,filters, low-noise amplifiers, digital-to-analog (DAC) converters,analog-to-digital (ADC) converters, and transceivers. The transceiversmay further include circuitry components such as mixers, amplifiers,oscillators, phase-locked loops (PLLs), and/or filters. Some of theseelectronic circuitry components may be integrated into a single discretedevice or an integrated circuit (IC) chip. By way of these transceivers,the telecommunications module 3310 may be used to establish connectionsto the venues hosting the electronic virtual social networks, orestablish connections with other devices on the electronic virtualsocial network, or establish connections with a remote server.

The telecommunications module 3310 may also include a GPS module 3315.As discussed above, the GPS module 3315 may be used to determine thelocation of the electronic device 3300, or the departure of theelectronic device 3300 from a certain venue, etc.

The electronic device 3300 may include a computer memory storage module3320. The memory storage module 3320 may contain various forms ofdigital memory, such as hard disks, FLASH, SRAM, DRAM, ROM, EPROM,memory chips or cartridges, etc. Computer programming code may bepermanently or temporarily stored in the memory storage module 3320, forexample. In some embodiments, the computer memory storage module 3320may include a cache memory where files can be temporarily stored.

The electronic device 3300 may also include a computer processing module3330. The computer processing module 3330 may contain one or morecentral processing units (CPUs), graphics processing units (GPUs), ordigital signal processors (DSPs), which may each be implemented usingvarious digital circuit blocks (including logic gates such as AND, OR,HAND, NOR, XOR gates, etc) along with certain software code. Thecomputer processing module 3330 may be used to execute the computerprogramming code stored in the memory storage module 3320.

The electronic device 3300 may also include an input/output module 3340,which may serve as a communications interface for the electronic device3300. In some embodiments, the input/output module 3340 may include oneor more touch-sensitive screens, physical and/or virtual buttons (suchas power and volume buttons) on or off the touch-sensitive screen,physical and/or virtual keyboards, mouse, track balls, speakers,microphones, light-sensors, light-emitting diodes (LEDs), communicationsports (such as USB or HDMI ports), joy-sticks, image-capture devices(for example cameras), etc. In some embodiments, the touch-sensitivescreen may be used to display visual objects discussed above, forexample the profile pictures of the users of the virtual social network,or the virtual gifts and digital vouchers. In alternative embodiments, anon-touch screen display may be implemented as a part of theinput/output module 3341).

According to the various aspects of the present disclosure, the virtualsocial network software application may reside in the memory storagemodule 3320. It can be retrieved by the computer processing module 3310for execution. During its execution, it may take command of thetelecommunications module (e.g., the Wi-Fi transceiver or GPS module3315 implemented therein) and/or the input/output module 3340 (e.g., todisplay objects on a screen and receive input from the screen), so as tofacilitate the user's participation of the electronic virtual socialnetwork via the electronic device 3300. In some embodiments, theelectronic device 3300 is equipped to execute the methods 2100-2500described above with reference to FIGS. 45-40, respectively.

FIG. 51 is a simplified diagrammatic view of a system 3400 that may beused to carry out certain aspects of the electronic virtual socialnetwork of the present disclosure discussed above. In some embodiments,the system 3400 may include an electronic device 3410. The electronicdevice 3410 may he implemented as an embodiment of the electronic device3300 of FIG. 50 (and therefore as an embodiment of the mobile computingdevice 100 discussed above). In some embodiments, the electronic device3410 includes a tablet computer, a mobile telephone, a laptop, a smartwatch, or a smart glass.

The system 3400 also includes a remote server 3420. The remote server3420 may be implemented in a “cloud” computing environment and mayinclude one or more databases that store files, for example the variousfiles that can also be stored locally in the electronic device 3410 asdiscussed above. The remote server 3420 may also collect data from theelectronic device 3410 to facilitate the user of the electronic device3410's participation on the electronic virtual social outwork.

The electronic device 3410 and the remote server 3420 may becommunicatively coupled together through a network 3430. The network3430 may include cellular towers, routers, switches, hubs, repeaters,storage units, cabling (such as fiber-optic cabling or telephonecabling), and other suitable devices. The network 3430 may beimplemented using any of the suitable wired or wireless networkingprotocols. The electronic device 3410 and the remote server 3420 mayalso he able to communicate with other devices on the network 3430 andeither carry out instructions received from the network, or sendinstructions through the network to these external devices to be carriedout.

To facilitate user's interaction with the electronic virtual socialnetwork, a service provider (that hosts or operates the remote server3430) may provide a user interface module 3440. The user interfacemodule 3440 may include software programming code and may be installedon the electronic device 3410 (for example in a memory storage module).In some embodiments, the user interface module 440 may include adownloadable “app” for example an app that is downloadable through asuitable service such as APPLE'S® ITUNES®, THE APP STORE® from APPLE®,ANDROID's® PLAY STORE®, AMAZON'S® INSTANT VIDEO®, MICROSOFT's® WINDOWSSTORE®, RESEARCH IN MOTION's® BLACKBERRY APP WORLD®, etc. In theembodiment shown, the user interlace module 3440 includes an instance ofthe “app” that has been downloaded and installed on the electronicdevice 3410. The app may also be used to perform the various aspects ofthe present disclosure discussed above, such as registering andparticipating on the virtual social network, detecting human faces indigital profile photos, browsing through the participants on the virtualsocial network, selecting favorite participants, buying and sendingdrinks and gifts to other participants, and reporting offensiveparticipants, etc.

A user 3450 may internet with the system 3400 by sending instructions tothe electronic device 3410 through the user interface module 3440. Forexample, the user 3450 may be a subscriber of the services offered bythe service provider running/hosting/operating the remote server 3420.The user 3450 may attempt to log in to the remote server 3420 bylaunching the “app” of the user interface 3440. The users logincredentials are electrically sent to the remote server 3420 through thenetwork 3430. After verifying the user login credentials, the remoteserver 3420 may instruct the user interlace module 3440 to display asuitable interface to interact with the user in a suitable manner.

In some embodiments, the system 3400 further includes air electronicdevice 3500 that resides at a venue that is hosting the virtual socialnetwork. The electronic device 3500 may include a smartphone, a tabletcomputer, a desktop computer, a laptop computer, a wireless router, etc.The electronic device 3500 is communicatively coupled to the remoteserver 3420 and to the electronic device 3410 through the network 3430.As such, it may be used to host the virtual social network forparticipant users via their respective mobile computing devices. Theelectronic device 3500 may also be used to receive complaints (such asuser reports) from the users on its virtual social network, as well assend messages to other users, or to discipline other users, for exampleby removing them from the virtual social network.

Another problem that exists in electronic social networking is a scam offraud commonly known as “catfishing.” Generally, catfishing in theelectronic social networking context refers to someone who pretends tobe someone they are not (e.g., by creating false identities or profiles)in order to engage in deceptive activities, for example deceptiveactivities involving romance or dating. The present disclosure alsooffers methods and apparatuses for preventing or discouraging catfishingand other deceptive practices in the electronic or virtual socialnetworking context, as discussed below.

As discussed above with reference to FIGS. 1-51, the app 120A herein maybe implemented as an embodiment of the “icebreaker” app. Specifically,the app 120A may be used by a user X to purchase drinks, food, or othermerchandise items at an entertainment venue. That user X may then sendthe purchased drink or food item to another user Y in the form of ascan-able QR (quick response) code or a barcode. The user Y may redeemthe purchased drinks or ideal items at the entertainment venue byscanning the QR code or barcode. Users X and Y may be participants of anelectronic social network, where they can browse through the profilepictures of other participants (e.g., members of the opposite sex)present at the entertainment venue, for example at a bar. Theseparticipants may message one another via the app 120A installed on theirrespective mobile devices, and use the app 120A to buy and send thedigital drink vouchers (containing the QR codes or barcodes) to oneanother. Frequently, a user X (e.g., a guy) may see a profile picture ofan attractive girl via the app 120A. To facilitate conversation (or to“break the ice”), he may decide to buy her a drink—by sending her thedigital drink voucher containing the QR code or barcode. She may thenaccept the drink voucher and redeem it at the bar for the desired drink.

However, a problem may arise when the person posing as the attractivegirt is not really her. For example, a user (either man or woman) maytake a picture of a random attractive girl (for example a picture of anattractive girl found on the internet) and use that picture as thatuser's own profile picture in order to gain attention from other users.That person may then receive one or more electronic drink vouchers—underthe false pretense that he/she is the attractive girl in the profilepicture—and redeem them for free drinks. This scam artist may choose tonever see or talk to the sender of the drink voucher in person, and thusavoid being spotted as a poser. A similar scenario may occur where auser may use a fake picture of an attractive guy and use that picture asthat user's own profile picture to get free electronic drink vouchersfrom other girls (or gay men) as well. If this type of catfishing occursfrequently, it may reduce the interest of users in participating in thesocial network and/or buying drink/food for other users.

According to the various aspects of the present disclosure, the userreceiving the free drinks must also present a digital copy of theprofile picture that the user has previously uploaded, so as to provethat the person receiving the drink is the same person as the personshown in the profile picture. In an example scenario, a user with theusername “Flirt” is a participant at the virtual social networkdiscussed above, and more specifically, she is at a particular physicalvenue (e.g., a bar or a restaurant) where the virtual social network istaking place. In other words, the user “Flirt” and other users may usethe icebreaker app discussed above to electronically “check-in” to thisvenue, so that they can internet with other users via the app.

An a part of participating in the virtual social network, “flirt” isprompted to electronically upload a profile picture that isrepresentative of a physical appearance of her. This may be done as apart of an initial user registration as discussed above with referenceto FIGS. 3-11. Of course, it is understood that “Flirt” may revise orreplace the profile picture any time after the initial userregistration. In any case, the user “Flirt” uploads an electronicphotograph 4000 as her profile picture 4000 via the icebreaker app inthe embodiment shown in FIG. 52. This uploaded profile picture 4000 issaved in an electronic database, which may either be located remotelyfrom the venue (e.g., a bar), or it may reside locally on the mobilecomputing device (e.g., smartphone) of the user “Flirt”.

As discussed above with reference to FIGS. 15-24, participants of thevirtual social network at the venue who are interested in interactingwith other users will now see the profile picture 4000 as arepresentation of the physical appearance of the user “Flirt”. In otherwords, since the social network at the venue is virtual, participants(i.e., the user's) only see the virtual representation of the otherusers, which is in the form of their user-supplied digital profilepictures. If any other user is interested in interacting with the user“Flirt”, it is presumed that the motivation for the interaction isattributed to the profile picture 4000 uploaded by the user “Flirt”.Stated differently, other users see (e.g., via the app on theirrespective mobile computing devices) the profile picture 4000 of theuser “Flirt”, and they may reasonably assume that the actual physicalappearance of the user “Flirt” is consistent with the person portrayedin the profile picture 4000. Any subsequent interaction between otherusers and the user “Flirt” is perforated under by this assumption.

Suppose that another user “AverageJoe” sees the profile picture 4000 ofthe user “Flirt” and subsequently offers to the user “Flirt” a drink (inthe form of an electronic voucher or coupon discussed above), so as to“break the ice” with “Flirt.” “Flirt” may get a notification similar towhat is shown in FIGS. 31 or 32 and may decide whether to accept thedrink or not. In some embodiments, if the recipient (in this case,“Flirt”) accepts the drink offer, a digital code such as a QR code or abarcode is generated. In other embodiments, the digital code isgenerated as soon as the sender (in this case, “AverageJoe”) offers tobuy the drink for the recipient. Regardless, the generated digital codecontains sufficient information such that an operator of the virtualsocial network will be able to identify the drink that is being offeredto the recipient. This information may be conveyed to appropriatepersonnel at the venue (e.g., a bartender) if necessary, so that thepersonnel can prepare the drink for the user.

According to the various aspects of the present disclosure, once thedigital code is generated, it is presented on the recipient's (i.e.,“Flirt”) mobile computing device alongside the profile picture uploadedby the recipient. One embodiment of this is shown in FIG. 53, where theicebreaker app of displays a screen 310 on the mobile computing deviceof “Flirt.” The screen 310 contains a QR code 340 containing embeddeddigital data (e.g., drink order information), which can be retrieved orread digitally in response to an electronic scan.

The screen 310 also contains a digital copy of the profile picture 4000uploaded by “Flirt”. The digital copy of the profile picture 4000 isdisplayed adjacent to (for example, above, below, to the left or right)of the QR code 340. Note that “adjacent to” as used herein may includeembodiments where the profile picture 4000 and the QR code 340 areseparated by a certain amount of distance, or even by other visualobjects or texts in between. The screen 310 further contains a message4010 informing “Flirt” that the QR code 340 may be scanned at the bar toredeem a drink. In that sense, the QR code 340 represents anelectronic/digital coupon or voucher. It Is also understood that theentire screen 310 may be considered the electronic/digital coupon orvoucher as well. The reason for displaying the OR code 340 on the samescreen as the profile picture 4000 supplied by the recipient of thedrink voucher is to prevent fraud, for example fraud related tocatfishing, which will be discussed below in more detail.

FIG. 54 illustrates an alternative embodiment of the screen 310, wherethe QR code 340 has been replaced with a barcode 350. The barcode 350typically does not contain as much digital information as the QR code340, but the digital information embedded in the barcode 350 may stillbe sufficient to allow drink order information to be extracted inresponse to an electronic scan. The remaining aspects of the screen 310shown in FIG. 54 are similar to the screen 310 shown in FIG. 53. Notethat in the embodiments shown in FIG. 53 or FIG. 54, neither of thescreen 310 displays the personal information of the user “Flirt”. Forexample, her real name is not included on the screen 310 (which is atleast in part due to the fact that she has not supplied thisinformation). Even her username “Flirt” was not displayed in theembodiments of FIGS. 53-54 in order to protect her privacy. However, itis understood that the username may be displayed in alternativeembodiments.

FIG. 55 illustrates an example scenario where the electronic voucherreceived by the user “Flirt” undergoes a redemption process. The personcorresponding to the user “Flirt” presents the screen 310 displayed onthe mobile computing device to a personnel at the venue. As discussedabove, both the QR code 340 and the profile picture 4000 of the user“Flirt” are displayed on the screen a 310, such that the personnel atthe venue can easily see the profile picture 4000.

The electronic voucher redemption process involves the personnel at thevenue scanning the QR code 340 via another mobile device 4200, which maybe a smartphone, a tablet computer, or a custom-made electronic scanner.As shown in FIG. 55, a screen 4210 of the mobile device 4200 displays amessage 4220 prompting the personnel at the venue to verify that theperson who is attempting to redeem the electronic voucher is indeed theperson depicted in the profile picture. For example, the message 4220may read, “Attention! Please verify that the person attempting to redeemthe drink matches up with the picture next to the QR code! Do notproceed if there is no match!”

In response to this message 4220, the personnel at the venue willvisually inspect the physical appearance of the person attempting toredeem the electronic voucher, as well as the profile picture 4000displayed on the screen 310. Now suppose that the person who isattempting to redeem the electronic voucher is catfishing. For example,the person corresponding to the user “Flirt” may actually be a man whodid not accurately represent his gender and did not provide an accurateprofile picture of himself, but who uploaded an electronic photograph ofa pretty girl (e.g., found on the Internet) instead. In essence, the manis pretending to be someone be is not—a pretty girl who is the personshown in the picture 4000. The motivation behind this may be to induceother users (users who may be attracted to the looks of the girl shownin the picture 4000) to buy drinks or other merchandise offered for saleat the venue. Of course, catfishing is not limited to people pretendingto be a member of the opposite sex. It is possible that a female userwho is not the girl shown in the picture 4000 is pretending to be thatgirl, perhaps because the actual female user is not as physicallyattractive as the girl shown in the picture 4000, and she thought thatusing a prettier girl's picture to represent herself will garner moreattention from other users and consequently more free drink vouchers.

It is understood that though the examples above involve male or femaleusers pretending to be an attractive woman, the same may occur with maleor female users pretending to be an attractive man too. In that case,the person shown in the picture 4000 will be a man, while the actualperson who claims to be that man may be a less attractive man or awoman.

Another possible scenario is that a man or a woman may use an outdatedelectronic photograph to represent himself/herself. For example, theperson who is representing herself as the user “Flirt” may have uploadeda picture of herself from 20 or 30 years ago. In other words, the actualperson who is attempting to redeem the electronic voucher may be 20 or30 years older man the girl shown in the picture 4000, even though theyare the same person (just at quite different points in time). As such,the person shown in the picture 4000 is much more attractive than theactual person. As yet another example, the person may have uploaded apicture of herself/himself before that person put on a lot of weight.This also results in a scenario where the person shown in the picture4000 is more attractive than the actual person, even if they are thesame person.

In all of the above examples, the problem is that the electronic voucheris received under false pretenses. The other user—for example,“AverageJoe”—does not know what user “Flirt” actually looks like, so hemakes the reasonable assumption that she looks like the person shown inthe picture 4000. Any action “AverageJoe” takes to facilitate aninteraction, with the “Flirt” is done so at least in part in reliance of“Flirt” looking like the person portrayed in her profile picture 4000.Therefore, “AverageJoe” will be disappointed if he finds out (eitherfrom personal experience or through other information sources) that“Flirt” is not really who “AverageJoe” thought she was based on thepicture 4000. Had “AverageJoe” known what “Flirt” really looked like(e.g., “she” may be a man), “AverageJoe” most likely would have acteddifferently, for example by not sending “Flirt” a free electronic drinkvoucher in the first place.

As a result of Flirt's intentional (or even inadvertent) deception,“AverageJoe” (and other users like him) may be less interested inparticipating in the virtual social network. It can thus be concludedthat, by not accurately representing her true physical appearance viathe uploaded profile picture 4000, “Flirt” unfairly gains economicfavors (e.g., by receiving free electronic drink vouchers) at thedetriment of other users, while hurting the credibility of the virtualsocial network discussed herein. As such, this type of behavior shouldbe disallowed. The present disclosure solves this issue by asking thepersonnel in charge of scanning the electronic voucher to verify thatthe person attempting to redeem the free drink is indeed the personshown in the profile picture 4000. In the various scenarios, discussedabove, if the profile picture of “Flirt” does not match up with thephysical appearance of the actual person who is representing herself as“Flirt”, then the voucher will be denied. In other words, the venue willnot perform an electronic scan of the QR code 340 and will deny her thefree drink (or other types of merchandise item). As such, “Flirt” isdeprived of any economic incentive for perpetrating the fraud ofmisrepresenting her physical appearance with the uploaded profilepicture 4000. Consequently, “Flirt” will either provide a more accurateprofile picture of herself (or himself) or may quit participating in thevirtual social network altogether. Either of these results leads to areduction in fraud and an improvement in the credibility and integrityof the virtual social network, which may attract more honest and moreengaged/interested users.

It is understood that the implementation of displaying the user'sprofile picture alongside the digital code such as the QR code 340 notonly results in greater user satisfaction of the virtual social network,but it also offers an improvement in the system running the virtualsocial network itself. For example, as a result of preventing ordiscouraging scams involving the generation of QR codes, fewer QR codeswill need to be generated, since previously a number of these codeswould have been generated as a result of fraud, and now they are notbeing generated altogether. This reduces the drain on the resources ofthe system, for example resources needed to generate and keep track ofthe QR codes. It also reduces unnecessary data transmission required tosend the QR codes between users. Consequently, the overall systemcapacity and performance is improved due to a reduction in theunnecessary waste of system resources.

If the user “Flirt” has accurately represented her physical appearanceby uploading a profile picture 4000 that does match up with her actuallooks, the personnel at the venue in charge of scanning the electronicvoucher may proceed with the electronic scan. As showing in the screen4210 in FIG. 55, a message 4230 may be displayed to instruct thepersonnel on how to perform the electronic scan. The message 4230 mayread, “Scan the QR code. Make sure the QR code fits within the boxabove.” The mobile device 4200 includes an imaging device 4250, such asa camera, that is configured to perform an electronic scan of the QRcode 340. The screen 4210 displays a box 4280. To perform the scan, thepersonnel at the venue activates the imaging device 4250 and holds themobile device 4200 above the mobile computing device 300. At this point,a portion of the screen 310 is captured by the imaging device 4250 andshown in the box 4280. The personnel at the venue adjusts the positionof the mobile computing device 300 or the position of the mobile device4200 until the QR code 340 is completely displayed within the box 4280.

Once the QR code is completely captured within the box 4280, theelectronic scan of the QR code 4280 either occurs automatically, or itcan be triggered by the personnel by a suitable engagement with themobile device 4200 (e.g., by pressing a physical or virtual button onthe mobile device 4200). When the electronic scan of the QR code 340 iscompleted, the remote server 3420 (shown in FIG. 51) is notified, andthe remote server 3420 processes the electronic transaction in which acorresponding drink (or other merchandise item) is redeemed in responseto the electronic scan of the QR code 340. The personnel at the venue isthen notified of the successful transaction and will give the user“Flirt” the free drink.

FIG. 56 illustrates an embodiment where the digital code being used forthe electronic scan is the barcode 350, instead of the QR code 340. Forreasons of clarity and consistency, the other elements appearing inFIGS. 55 and 56 are labeled the same. Similar to the embodimentdiscussed above in association with FIG. 55, the user Flirt's profilepicture 4000 is displayed adjacent to the barcode 350 on the screen 310.When “Flirt” presents the barcode 350 to be electronically scanned bythe mobile device 4200. the personnel at the venue can visually inspectthe physical appearance of the uers to make sure that it matches up withthe person displayed in the profile picture 4000. The voucher will onlybe redeemed if there is a match, thereby taking away the economicincentive for potential “catfishing.”

In addition to presenting the user's profile picture alongside thedigital code corresponding to the redeemable item, the presentdisclosure further implements other measures to further reduce theperpetration of potential fraud. For example, the mobile computingdevice 300 includes a GPS sensor. The virtual social network islocation-locked to within a predetermined distance of the GPScoordinates of the venue. For any user to be able to electronicallycheck-in to the venue to participate on the social network, the remoteserver 3420 discussed above (or the mobile computing device of the user)will first extract the GPS coordinates of the user's mobile computingdevice, reported by its GPS sensor. The GPS coordinates of the mobilecomputing device are compared with the GPS coordinates of the venue, andif the GPS coordinates of the mobile computing device are within apredetermined radius of the GPS coordinates of the venue, then the useris allowed to check in and begin participating on the virtual socialnetwork.

This is advantageous over conventional virtual social networks where auser is typically allowed to electronically check in and interact withother users even if they are at drastically different physicallocations. In that case, since neither user can see the other user(except their respective virtual profiles provided by themselves), theease and likelihood of perpetrating fraud such as catfishing are muchgreater. In comparison, by restricting the access of the virtual socialnetwork to a particular physical locution, the present disclosure makesit more cumbersome for users to perpetrate fraud, because any user whointend on perpetrating fraud will have to physically visit and stay atthe venue. Furthermore, the user perpetrating the fraud may be moreeasily discovered, since the victims of the fraud are at the samephysical location. This further lessens the incentive for the user toperpetrate the fraud.

In some other embodiments, before the QR code or barcode is generated,the user who accepted the offer will be prompted to take a picture ofhimself/herself via its mobile computing device. An example of this isillustrated in FIG. 57, where the screen 310 of the mobile computingdevice of the user “Flirt” displays a message “Please take a picture ofyour face” after the user “Flirt” has accepted to receive the electronicdrink voucher from the user “AverageJoe.” The user “Flirt” may eithertake a “selfie”, or may ask someone else to take a picture of herself.The resulting picture 4300 is shown in FIG. 57 as an example. Atimestamp from the picture 4300 may be extracted to ensure that thepicture 4300 is indeed recently taken (e.g., within the past hour ofreceiving the drink offer from the sender).

The remote server 3420 or the mobile computing device 300 then comparesthe picture 4300 with the profile picture 4000 previously uploaded bythe user “Flirt.” The comparison may involve breaking down therespective pictures into a plurality of pixels for each picture, andbased on the pixels, identifying facial features such as eyes, eyebrows,hair, nose, mouth, forehead, cheeks, chin, etc. The comparison furtherincludes checking for consistencies (or the lack thereof) between theidentified facial features in the two respective pictures, such asconsistencies in eye color, hair color, eye shape/size, mouthshape/size, nose shape/size, the distance between the eyes as a ratio ofthe size of the eyes, the distance between the nose and mouth as a ratioof the width of the mouth, the distance between the eyes and theeyebrows as a ratio if the distance between the eyes, etc.

The various consistencies or inconsistencies may be used to generate amatching score. For example, there may be a total of 10 differentchecks, and if there is consistency between each check, it results in asub-score of 1. A perfect match for all the 10 checks will result in atotal score of 10, whereas a total mismatch for all the 10 checks willresult in a total score of 0. A match between some of the checks, butnot the others, will result in a total score between 0 and 10. For anyuser, if the total score passes a predetermined threshold score (e.g., 5or higher), then it may be deemed that there is a sufficient matchbetween the profile picture 4000 previously uploaded by that user andthe picture 4300 just taken by the user after receiving the drink offer.A corresponding digital code will be generated only if there is asufficient match. Otherwise, the user may be prompted to retake thepicture and run the comparison a few more times. If a sufficient matchis still not satisfied, then the drink offer will be voided, and thebuyer/sender of the drink will be refunded and notified that therecipient is likely not the person advertised in the profile picture4000.

In the example, illustrated in FIG. 57, the person shown in therecently-taken picture 4300 is clearly not the same person shown in thepreviously uploaded profile picture of the user “Flirt”, and thismismatch will be revealed by the comparison process discussed above. Inother words, it is likely that the person representing herself as“Flirt” is using someone else's picture as her profile picture 4000 toinduce other users to buy items for her. The present disclosure foilsher plan and notifies the sender “Average Joe” as such. Thisimplementation not only identities actual fraud (e.g., by checking forinconsistencies between the previously uploaded profile picture 4000 andthe recently-taken picture 4000), but it also discourages users fromattempting fraud in the first place, since they know that the fraud willlikely be exposed before the free merchandise items can be redeemed, andthey cannot derive any economic benefit from perpetrating the fraud.

As yet another example for further reducing fraud in the virtual socialnetwork, a user may be required to scan a QR code or a barcode in orderto check in to the venue to participate in the virtual social network.For example, the user requests to check-in to a venue as discussed abovewith reference to FIG. 12. In response to this check-in request receivedfrom the user's mobile computing device, the remote server 3420generates a QR code or a barcode specifically for that user and sendsthat code to the mobile computing device of the user. The user will haveto present this QR code or barcode to a gate keeper at the venue, whouses an electronic scanner such as the mobile device 4200 toelectronically scan the QR code or barcode on the user's mobilecomputing device. A successful scan of the QR code or barcode completesa digital check-in of the user. Compared to determining the user'slocation by GPS, requiring the user to scan the QR code or barcode iseven more restrictive in terms of location accuracy. This ensures thatany user participating in the location-based virtual social network isalmost guaranteed to be at that venue.

In some embodiments, the user's profile picture (if the user has alreadycompleted a user profile registration previously) will be retrieved anddisplayed alongside the QR code or barcode on the user's mobilecomputing device, similar to the embodiments discussed above withreference to FIGS. 53-56. The gate keeper at the venue will not scan theQR code or barcode until he can visually inspect the physical appearanceof the user to ensure that it matches with the physical appearance ofthe user portrayed in the picture displayed adjacent to the QR code orbarcode. Again, this approach achieves the same benefits discussed abovewith respect to reducing catfishing or other fraud-related activities.

Although the example embodiments discussed above focus on the context ofa virtual social network taking place at a physical venue, the variousconcepts discussed above may apply in other contexts as well. Forexample, they may be applied in a ticketing context. Referring to FIG.58, an example ticket 4500 according to an embodiment of the presentdisclosure is illustrated. The ticket 4500 shows a title of thecorresponding event (e.g., “AWESOME EVENT”). The ticket 4500 also showsa QR code 340 and/or a barcode 350. Either of these codes may beelectronically scanned by a gate keeper at the event via a mobilescanning device, such as the mobile device 4200 discussed above. Thescanning of the QR code 340 of the barcode 350 will correspond to aredemption (or use) of the ticket 4500.

The ticket 4500 also shows a picture 4510 of the user (e.g., Jane Doe)who is presenting the ticket. The picture 4510 may be obtained from theuser when the user registered for the event or purchased the ticketelectronically. For example, as a part of the ticket purchasing, theuser may be asked to provide a digital picture 4000 of herself. Theuploaded digital picture may be stored electronically in a server.Later, when the ticket 4500 is issued (either in paper copy or in anelectronic copy, for example displayed as a screen on the mobilecomputing device of the user Jane Doe), the previously uploaded picture4000 is retrieved and now displayed along with the QR code 340 or thebarcode 350. When the user Jane Doe presents the ticket to the gatekeeper, the gate keeper can visually inspect her and compare herphysical appearance to the person portrayed in the picture 4510 to makesure that they match. Admission to the event will be granted only ifthere is a match. This will prevent other users from using Jane Doe'sticket, which may be with or without the user Jane Doe's permission.

FIG. 59 is a simplified flowchart illustrating a method 5000 of reducingfraud in a location-based virtual social network. In some embodiments,the method 5000 is performed by a remote server (e.g., remotely locatedthan the location of the virtual social network). In other embodiments,one or more steps of the method 5000 may be performed by a mobilecomputing device of a user.

The method 5000 includes a step 5010 of prompting, via a graphical userinterface on a first mobile computing device of a first user, the firstuser to upload a first electronic photograph representing an appearanceof the first user who is a participant of a virtual social network. Insome embodiments, the prompting comprises prompting the first user toupload the electronic photograph as a part of a registration of thefirst user to participate in the virtual social network.

The method 5000 includes a step 5020 of receiving, via the graphicaluser interface, the first electronic photograph uploaded by the firstuser.

The method 5000 includes a step 5030 of receiving, from a second userwho is also a participant of the virtual social network, an electronicvoucher redeemable for a merchandise item that is offered by a physicalvenue corresponding to the virtual social network. In some embodiments,the electronic voucher comprises a QR code or a barcode that is digitalassociated with the merchandise item.

The method 5000 includes a step 5040 of generating a screen thatcontains both the electronic voucher and the first electronicphotograph. In some embodiments, the screen is generated to be free ofany name of the first user.

The method 5000 includes a step 5050 of detecting an electronic scan ofthe electronic voucher.

The method 5000 includes a step 5060 of completing an electronictransaction in which the merchandise item is redeemed in response to theelectronic scan of the electronic voucher.

It is understood that, unless otherwise specified, the steps 5010-5060of the method 5000 are not necessarily performed in numerical order. Itis also understood that addition steps may be performed before, during,or after the steps 5010-5060. For example, the method 5000 may include astep of causing instructions to be displayed on a mobile device used toscan the electronic voucher. The instructions prompt a verification thata physical appearance of the first user matches with the firstelectronic photograph displayed on the screen. As another example, themethod 5000 may include a step of detecting, via a global positioningsystem (GPS) sensor on the first mobile computing device, that the firstuser is physically present at the venue. As yet another example, themethod 5000 may include the following steps: prompting, after theelectronic voucher has been received, the first user to take a secondelectronic photograph representing an appearance of the first user viathe first mobile computing device; receiving the second electronicphotograph; digitally comparing the first electronic photograph with thesecond electronic photograph; determining, based on the digitallycomparing, whether the first electronic photograph and the secondelectronic photograph both represent a same person; and denying aredemption of the electronic voucher in response to a determination thatthe first electronic photograph and the second electronic photograph donot represent the same person. And for reasons of simplicity, otheradditional steps are not discussed in detail herein.

FIG. 60 is a simplified flowchart illustrating a method 6000 of reducingfraud in a location-based virtual social network. In some embodiments,the method 6000 is performed by a remote server (e.g., remotely locatedthan the location of the virtual social network). In other embodiments,one or more steps of the method 6000 may be performed by a mobilecomputing device of a user.

The method 6000 includes a step 6010 of causing a profile picture of afirst user to be displayed on a mobile computing device of a seconduser.

The method 6000 includes a step 6020 of receiving an offer from thesecond user to purchase an Item for a first user, the item being offeredat a physical venue. The first user and the second user are participantsof a virtual social network that is geo-fenced to the physical venue.

The method 6000 includes a step 6030 of detecting, from the first user,an acceptance of the offer.

The method 6000 includes a step 6040 of generating, in response to theacceptance of the offer, an electronically scan-able digital code forredeeming the item at the physical venue. In some embodiments, thescan-able digital code includes a barcode or a quick response (QR) code.

The method 6000 includes a step 6050 of displaying, via a mobileelectronic device of the first user, the digital code adjacent to adigital copy of a profile picture uploaded by the first user, theprofile picture being uploaded by the first user prior to the receivingof the offer.

The method 6000 includes a step 6060 of detecting an electronic scan ofthe digital code.

The method 6000 includes a step 6070 of completing an electronictransaction in which the item is redeemed in response to the electronicscan of the digital code.

It is understood that, unless otherwise specified, the steps 6010-6070of the method 6000 are not necessarily performed in numerical order. Itis also understood that addition steps may be performed before, during,or after the steps 6010-6070. For example, the method 6000 may include astep of communicating instructions to a person at the venue in charge ofscanning the digital code to verify that the digital copy of the profilepicture is consistent with a physical appearance of the first user.

It should be appreciated that like reference numerals in the presentdisclosure are used to identify like elements illustrated in one or moreof the figures, wherein these label figures are for purposes ofillustrating embodiments of the present disclosure and not for purposesof limiting the same.

The foregoing disclosure is not intended to limit the present disclosureto the precise forms or particular fields of use disclosed. As such, itis contemplated that various alternate embodiments and/or modificationsto the present disclosure, whether explicitly described or impliedherein, are possible in light of the disclosure. Having thus describedembodiments of the present disclosure, persons of ordinary skill in theart will recognize that changes may be made in form and detail withoutdeparting from the scope of the present disclosure. Thus, the presentdisclosure is limited only by the claims.

What is claimed is:
 1. A system for reducing fraud location-based visualsocial network, comprising: an electronic memory storage configured tostore computer-readable programming instructions; and one or moreelectronic processors configured to execute the computer-readableprogramming instruction to perform operations comprising: prompting, viaa graphical touchscreen user interlace on a first mobile computingdevice of a first user, the first user to upload a first electronicphotograph representing an appearance of the first user who is aparticipant of a virtual social network; receiving, via the graphicaltouchscreen user interface, the first electronic photograph uploaded bythe first user; receiving, from a second user who is also a participantof the virtual social network, an electronic voucher redeemable for amerchandise item that is offered by a physical venue corresponding tothe virtual social network; and generating a screen that contains boththe electronic voucher and the first electronic photograph.
 2. Thesystem of claim 1, wherein the operations further comprise: causinginstructions to be displayed on a mobile device used to scan theelectronic voucher, the instructions prompting a verification that aphysical appearance of the first user matches with the first electronicphotograph displayed on the screen.
 3. The system of claim 1, whereinthe operations further comprise: detecting an electronic scan of theelectronic voucher; and completing an electronic transaction in whichthe merchandise item is redeemed in response to the electronic scan ofthe electronic voucher.
 4. The system of claim 1, wherein the operationsfurther comprise: detecting, via a global positioning system (GPS)sensor on the first mobile computing device, that the first user isphysically present at the venue.
 5. The system of claim 1, wherein theelectronic voucher comprises a QR code or a barcode that is digitallyassociated with the merchandise item.
 6. The system of claim 1, whereinthe screen is generated to contain no name of the first user.
 7. Thesystem of claim 1, wherein the prompting comprises prompting the firstuser to upload the electronic photograph as a part of a registration ofthe first user to participate in the virtual social network.
 8. Thesystem of claim 1, wherein the operations further comprise: prompting,after the electronic voucher has been received, the first user to take asecond electronic photograph representing an appearance of the firstuser via the first mobile computing device; receiving the secondelectronic photograph; digitally comparing the first electronicphotograph with the second electronic photograph; determining, based onthe digitally comparing, whether the first electronic photograph and thesecond electronic photograph both represent a same person; andpreventing the electronic voucher from being redeemed in response to adetermination that the first electronic photograph and the secondelectronic photograph do not represent the same person.
 9. The system ofclaim 1, wherein the electronic memory storage and the one or moreelectronic processors are implemented on one of: a server remotelylocated from the physical venue, or the first mobile computing device.10. A method of reducing fraud in a location-based virtual socialnetwork, comprising: prompting, via a graphical user interface on afirst mobile computing device of a first user, the first user to uploada first electronic photograph representing an appearance of the firstuser who is a participant of a virtual social network; receiving, viathe graphical user interface, the first electronic photograph uploadedby the first user; receiving, from a second user who is also aparticipant of the virtual social network, an electronic voucherredeemable for a merchandise item that is offered by a physical venuecorresponding to the virtual social network; and generating a screenthat contains both the electronic voucher and the first electronicphotograph.
 11. The method of claim 10, further comprising: causinginstructions to be displayed on a mobile device used to scan theelectronic voucher, the instructions prompting a verification that aphysical appearance of the first user matches with the first electronicphotograph displayed on the screen.
 12. The method of claim 10, furthercomprising: detecting an electronic scan of the electronic voucher; andcompleting an electronic transaction in which the merchandise item isredeemed in response to the electronic scan of the electronic voucher.13. The method of claim 10, further comprising: detecting, via a globalpositioning system (GPS) sensor on the first mobile computing device,that the first user is physically present at the venue.
 14. The methodof claim 10, wherein the electronic voucher comprises a QR code or abarcode that is digitally associated with the merchandise item.
 15. Themethod of claim 10, wherein the screen is generated to be free of anyname of the first user.
 16. The method of claim 10, wherein theprompting comprises prompting the first user to upload the electronicphotograph as apart of a registration of the first user to participatein the virtual social network.
 17. The method of claim 10, furthercomprising: prompting, after the electronic voucher has been received,the first user to take a second electronic photograph representing anappearance of the first user via the first mobile computing device;receiving the second electronic photograph; digitally comparing thefirst electronic photograph with the second electronic photograph;determining, based on the digitally comparing, whether the firstelectronic photograph and the second electronic photograph bothrepresent a same person; and denying a redemption of the electronicvoucher in response to a determination that the first electronicphotograph and the second electronic photograph do not represent thesame person.
 18. A method of reducing fraud in a location-based virtualsocial network, comprising: causing a profile picture of a first user tobe displayed on a mobile computing device of a second user; receiving anoffer from the second user to purchase an item for a first user, theitem being offered at a physical venue; detecting, from the first user,an acceptance of the offer; generating, in response to the acceptance ofthe offer, an electronically scan-able digital code for redeeming theitem at the physical venue; and displaying, via a mobile electronicdevice of the first user, the digital code adjacent to a digital copy ofa profile picture uploaded by the first user, the profile picture beinguploaded by the first user prior to the receiving of the offer; whereinthe first user and the second user are participants of a virtual socialnetwork that is geo-fenced to the physical venue.
 19. The method ofclaim 18, wherein the scan-able digital code includes a barcode or aquick response (QR) code.
 20. The method of claim 18, furthercomprising: communicating instructions to a person at the venue incharge of scanning the digital code to verify that the digital copy ofthe profile picture is consistent with a physical appearance of thefirst user.