Device, system, and method of enhancing user privacy and security within a location-based virtual social networking context

ABSTRACT

A first mobile computing device of a first user receives a request to participate in a location-based virtual social network. A radio component of the first mobile computing device detects venues within proximity of the first mobile computing device. Each venue includes a host of a respective virtual social network. One of the venues is selected by the user for participation in the virtual social network. A wireless connection with the virtual social network is established at the selected venue. Electronic communications with second users are conducted at the selected venue. The second users are also participants of the virtual social network. A departure of the first user from the selected venue is detected. In response to the detected departure, electronic records pertaining to the conducted electronic communications with the one or more second users are erased from the first mobile computing device.

PRIORITY DATA

The present application is a utility patent application of provisionalU.S. patent application No. 61/882,616, filed on Sep. 25, 2013, entitled“Mobile Social Electronic Commerce Application”, the content of which ishereby incorporated by reference in its entirety.

BACKGROUND

1. Technical Field

The present disclosure generally relates to using mobile computingdevices to engage in social networking.

2. Related Art

In recent years, the rapid advances in computer technology and broadbandtelecommunications have enhanced the popularity of mobile computingdevices such as smartphones and tablet computers. Among other things,these mobile computing devices can be used to browse the web, playgames, music, or videos, take pictures, send/receive emails, etc.However, the capabilities of these mobile computing devices have notbeen fully explored within a social networking context. For example,users with these mobile computing devices have not been fully able totake advantage of the abilities of the mobile electronic devices' toconduct telecommunications display visual objects, and make payments,within the social networking context.

Therefore, while existing mobile computing devices have been generallyadequate for their intended purposes, they have not been entirelysatisfactory in every aspect.

SUMMARY

One aspect of the present disclosure is directed to a mobile electronicdevice. The mobile electronic device includes: a screen configured todisplay visual content; a computer memory storage module configured tostore executable computer programming code; and a computer processormodule operatively coupled to the computer memory storage module,wherein the computer processor module is configured to execute thecomputer programming code to perform the following steps: receiving arequest from a user to participate in an electronic social network;prompting, in response to the receiving of the request, a user to uploada digital picture that is representative of the user; receiving anuploaded digital picture in response to the prompting; scanning theuploaded digital picture of the user for human faces; prompting the userto upload a different digital picture that is representative of the userif the scanning indicates that the uploaded digital picture contains nohuman faces; and prompting the user to identify the human face belongingto the user if the scanning indicates that the uploaded digital picturecontains a plurality of human faces.

Another aspect of the present disclosure is directed to a method. Themethod includes: receiving a request from a user to participate in anelectronic social network; prompting, in response to the receiving ofthe request, a user to upload a digital picture that is representativeof the user; receiving an uploaded digital picture in response to theprompting; scanning the uploaded digital picture of the user for humanfaces; prompting the user to upload a different digital picture that isrepresentative of the user if the scanning indicates that the uploadeddigital picture contains no human faces; and prompting the user toidentify the human face belonging to the user if the scanning indicatesthat the uploaded digital picture contains a plurality of human faces.

Another aspect of the present disclosure is directed to a method. Themethod includes: receiving a request from a user to participate in anelectronic social network, wherein the request is received from a mobilecomputing device of the user; prompting, via the mobile computing deviceand in response to receiving of the request, a user to upload a digitalprofile picture; receiving an uploaded digital profile picture inresponse to the prompting, wherein the receiving of the uploaded digitalprofile picture comprises one of: receiving a user selection from anexisting digital picture album of the user or taking a digital pictureof the user via a camera module of the mobile computing device;electronically examining the uploaded digital profile picture;determining, based on the electronically examining, whether one or morehuman faces are present in the digital profile picture; prompting theuser to upload a different digital profile picture if it has beendetermined that the uploaded digital profile picture contains no humanfaces; and prompting the user to identify the human face belonging tothe user if it has been determined that the uploaded digital picturecontains multiple human faces.

Another aspect of the present disclosure is directed to a mobileelectronic device. The mobile electronic device includes: a screenconfigured to display visual content; a computer memory storage moduleconfigured to store executable computer programming code; and a computerprocessor module operatively coupled to the computer memory storagemodule, wherein the computer processor module is configured to executethe computer programming code to perform the following steps: performinga digital check-in to a venue that is within a predefined proximity ofthe mobile computing device, wherein a plurality of users have alreadydigitally checked into the venue via their respective mobile computingdevices; displaying, on the screen of the mobile computing device,respective digital profiles of a first subset of the users; designating,in response to input from an operator of the mobile computing device,one or more users who are within the first subset of the users asfavorite users; and displaying, on the screen of the mobile computingdevice, respective digital profiles of a second subset of the users,wherein the second subset of the users includes the designated favoriteuser and users who are not within the first subset.

Another aspect of the present disclosure is directed to a method. Themethod includes: performing, via a mobile computing device of a firstuser, a digital check-in to a venue that is within a predefinedproximity of the first user, wherein a plurality of other users havealready digitally checked into the venue; displaying, on a screen of themobile computing device of the first user, respective digital profilesof a first subset of the other users; designating, in response to inputfrom the first user, one or more second users who are within the firstsubset of the other users as favorite users; and displaying, on thescreen of the mobile computing device of the first user, respectivedigital profiles of a second subset of the other users, wherein thesecond subset of the other users include the designated favorite userand users who are not within the first subset.

Another aspect of the present disclosure is directed to a method. Themethod includes: establishing, at least in part via a radio component ofa mobile computing device of a first user, a wireless link with a venuethat is within a predefined proximity of the first user, wherein thevenue has a plurality of wireless links established with a plurality ofsecond users; obtaining, from the first user, a preferred gender for thesecond users for viewing on the screen of the mobile computing device;displaying, on a screen of the mobile computing device of the firstuser, respective digital pictures of a first group of the second usersbelonging to the preferred gender; selecting one or more favorite usersfrom the second users in response to input from the first user;displaying a symbol on, or adjacent to, the digital picture of each ofthe one or more favorite users; displaying, on the screen of the mobilecomputing device of the first user, respective digital pictures of theone or more favorite users and a second group of the second usersbelonging to the preferred gender, wherein none of the second users inthe second group belong to the first group; and displaying, on thescreen of the mobile computing device of the first user, the digitalpictures of only the one or more favorite users.

Another aspect of the present disclosure is directed to a mobileelectronic device. The mobile electronic device includes: a screenconfigured to display visual content; a computer memory storage moduleconfigured to store executable computer programming code; and a computerprocessor module operatively coupled to the computer memory storagemodule, wherein the computer processor module is configured to executethe computer programming code to perform the following steps: performinga digital check-in to a venue that is within a physical proximity of afirst user of the mobile computing device; accessing, after the digitalcheck-in, a digital menu that contains a list of drinks available at thevenue; displaying the digital menu to the first user via the screen;designating, in response to selection from the first user, one or moredrinks from the digital menu as preferred drinks of the first user; andelectronically communicating the first user's preference of the one ormore drinks to another electronic device.

Another aspect of the present disclosure is directed to a method. Themethod includes: performing, via a mobile computing device of a firstuser, a digital check-in to a venue that is within a physical proximityof the first user; accessing, after the digital check-in, a digital menuthat contains a list of drinks available at the venue; displaying thedigital menu to the first user via a screen of the mobile computingdevice; designating, in response to selection from the first user, oneor more drinks from the digital menu as preferred drinks of the firstuser; and electronically communicating the first user's preference ofthe one or more drinks to another electronic device.

Another aspect of the present disclosure is directed to a method. Themethod includes: detecting, from a first mobile computing device of afirst user, a digital check-in to a venue that is within proximity ofthe first user, wherein the venue offers a digital menu that includes alist of available drinks; receiving, from the first mobile computingdevice, one or more preferred drinks from the first user, the one ormore preferred drinks being a subset of the list of available drinks;electronically associating the one or more preferred drinks with thefirst user; detecting, from a second mobile computing device of a seconduser, a request from the second user to electronically communicate withthe first user; and causing, in response to the request, the one or morepreferred drinks to be displayed with graphical emphasis on a screen ofthe second mobile computing device.

Another aspect of the present disclosure is directed to a mobileelectronic device. The mobile electronic device includes: a radiocomponent configured to conduct telecommunications with externaldevices; a screen configured to display visual content; a computermemory storage module configured to store executable computerprogramming code; and a computer processor module operatively coupled tothe computer memory storage module, wherein the computer processormodule is configured to execute the computer programming code to performthe following steps: receiving a request from a first user of the mobilecomputing device to participate in a location-based virtual socialnetwork; detecting, at least in part via the radio component, one ormore venues within proximity of the first user, wherein each venueincludes a host of a respective virtual social network; selecting, inresponse to input from the first user, one of the venues in which toparticipate in the virtual social network; establishing, at least inpart via the radio component, a wireless connection with the virtualsocial network at the selected venue; conducting electroniccommunications with one or more second users at the selected venue whoare also participants of the virtual social network via their respectivemobile computing devices; thereafter detecting a departure of the firstuser from the selected venue; and erasing from the first mobilecomputing device, in response to the detected departure, electronicrecords pertaining to the conducted electronic communications with theone or more second users.

Another aspect of the present disclosure is directed to a method. Themethod includes: receiving, via a first mobile computing device of afirst user, a request from the first user to participate in alocation-based virtual social network; detecting, at least in part via aradio component of the first mobile computing device, one or more venueswithin proximity of the first mobile computing device, wherein eachvenue includes a host of a respective virtual social network; selecting,in response to input from the first user, one of the venues in which toparticipate in the virtual social network; establishing, at least inpart via the radio component of the first mobile computing device, awireless connection with the virtual social network at the selectedvenue; conducting electronic communications with one or more secondusers at the selected venue who are also participants of the virtualsocial network via their respective mobile computing devices; thereafterdetecting a departure of the first user from the selected venue; anderasing from the first mobile computing device, in response to thedetected departure, electronic records pertaining to the conductedelectronic communications with the one or more second users.

Another aspect of the present disclosure is directed to a method. Themethod includes: receiving, via a first mobile computing device of afirst user, a request from the first user to participate in alocation-based virtual social network; detecting, at least in part via aradio component of the first mobile computing device, one or more venueswithin proximity of the first mobile computing device, wherein eachvenue includes a host of a respective virtual social network; selecting,in response to input from the first user, one of the venues in which toparticipate in the virtual social network; wirelessly connecting, atleast in part via the radio component of the first mobile computingdevice, with the virtual social network at the selected venue;conducting electronic communications with a plurality of second users atthe selected venue who are also participants of the virtual socialnetwork via their respective mobile computing devices, wherein theelectronic communication comprises: making a digital profile of thefirst user available for viewing on respective mobile computing devicesof the second users; placing one of the second users in a blacklist inresponse to a request from the first user; and thereafter causing thedigital profile of the first user to be unviewable on the mobilecomputing device of the second user in the blacklist; thereafterdetecting one of the following: a departure of the first user from theselected venue, or an excessive period of time in which the first mobilecomputing device has maintained the wireless connection with the virtualsocial network at the selected venue; and erasing from the first mobilecomputing device, in response to the detecting, electronic recordspertaining to the conducted electronic communications with the one ormore second users.

BRIEF DESCRIPTION OF THE DRAWINGS

FIGS. 1-44 are diagrammatic views of one or more example mobilecomputing devices at various stages of participation with an electronicvirtual social network according to various aspects of the presentdisclosure.

FIGS. 45-49 are flowcharts illustrating various example methods forusing the mobile computing device to facilitate a user's participationon the electronic virtual social network according to various aspects ofthe present disclosure.

FIG. 50 is a simplified block diagram of an example mobile computingdevice for performing one or more of the processes of FIGS. 1-49according to various aspects of the present disclosure.

FIG. 51 is a simplified block diagram of an example system forperforming one or more of the processes of FIGS. 1-49 according tovarious aspects of the present disclosure.

DETAILED DESCRIPTION

It is to be understood that the following disclosure provides manydifferent embodiments, or examples, for implementing different featuresof the present disclosure. Specific examples of components andarrangements are described below to simplify the present disclosure.These are, of course, merely examples and are not intended to belimiting. Various features may be arbitrarily drawn in different scalesfor simplicity and clarity. In addition, the present disclosure mayrepeat reference numerals and/or letters in the various examples. Thisrepetition is for the purpose of simplicity and clarity and does not initself dictate a relationship between the various embodiments and/orconfigurations discussed

As used herein, the term “about” refers to a +/−5% variation from thenominal value. As used herein, the term “and/or” includes any and allcombinations of one or more of the associated listed items. As usedherein, the singular forms “a”, “an”, and “the” are intended to includethe plurality forms as well, unless the context clearly and specificallyindicates otherwise. In addition, unless defined otherwise, alltechnical and scientific terms used herein have the same meaning ascommonly understood by one of ordinary skill in the art to which thisdisclosure belongs.

In recent years, the rapid advances in computer technology and broadbandtelecommunications have led the growing popularity of mobile computingdevices such as tablet computers and mobile telephones. A user of thesemobile computing devices can perform a plurality of tasks on thesemobile computing devices, for example tasks that previously required aconventional desktop or laptop computer. Among other things, a user canplay movies/videos, browse the web, play games, view photographs, listento digital music, read e-books, receive navigational instructions, sendand receive emails, conduct audio or video telephone calls, perform wordprocessing/spreadsheet calculation/presentation management tasks, ortake advantage of additional functionalities offered by applications(apps) that can be downloaded from online app stores.

However, the capabilities of these mobile computing devices have notbeen fully explored within a social networking context. For example,users with these mobile computing devices have not been fully able totake advantage of the abilities of the mobile electronic devices' toconduct telecommunications display visual objects, and make payments,within the social networking context.

To overcome the problems discussed above, the present disclosure isdirected to a mobile computing device with custom software implementedthereon to facilitate social networking electronically, as discussed ingreater detail below.

Referring to FIG. 1, a simplified diagrammatic view of a mobilecomputing device 100 is illustrated. In some embodiments, the mobilecomputing device 100 may be a smartphone (for example, APPLE's® IPHONE®,an ANDROID® phone, a WINDOWS® phone, or a BLACKBERRY®), a tabletcomputer (for example, APPLE's® IPAD®, an ANDROID® tablet, a WINDOWS®powered tablet, or a BLACKBERRY® tablet), or a laptop-tablet hybrid.

In some embodiments, the mobile computing device 100 may include ascreen 110 for displaying visual information. The screen 110 may betouch-sensitive. A user may interactively engage with objects shown onthe screen 110 by touching the objects with a finger, a stylus, or byhovering over the object. In some embodiments, the user may engage withthe objects shown on the screen 110 even while wearing gloves or otherclothing.

Visual content may be displayed on the screen 110 once the screen 110 isactivated. The visual content may include a plurality of icons, forexamples icons 120 that are arranged into rows and columns. Each ofthese icons 120 may represent an application (app) that can be executedto perform a particular function. These apps 120 may be electronicallydownloaded from an apps store, as such APPLE's® APP STORE® or GOOGLE's®GOOGLE PLAY®, etc.

One of these apps 120A is the app that includes the custom software thatcan be executed to facilitate social networking electronically. Anexample name for the app 120A is “icebreaker,” which signifies the app120A's ability to help the user of the mobile computing device 100 meetor “break the ice” with other users. The user of the mobile computingdevice 100 may click on the app 120A to launch it. For purposes of thepresent disclosure, the application 120A may be interchangeably referredto as an electronic (or virtual) social networking game/application oras the icebreaker game/application.

Referring now to FIG. 2, the screen 110 shows the visual content that isdisplayed to the user when the app 120A is launched. An example logo 130(e.g., I/B) may be displayed along with text instructions “Would youlike to play the Icebreaker game?” The user may click a “yes” button tocontinue playing the game, or a “no” button to exit the game and returnto the previous screen.

Referring now to FIG. 3, if the user clicked “yes” (on the previousscreen) to continue playing the game, existing users will be prompted toenter a username and a password, and first time users will be promptedto register before proceeding further.

FIG. 4 illustrates an example registration screen (also referred to as aprofile screen) for a first time user according to one embodiment. As anexample, the user herein is a male. He selects a username “AverageJoe”and an appropriate password. He also indicates that he is a “man”seeking a “woman.” Optionally, the user may also be allowed to specifyone or more of his favorite drinks (such as Scotch and beer) or to sayanything else about himself that he would like other users to know. Theuser may also be allowed to upload one or more pictures of himself byclicking on a link.

FIG. 5 illustrates an example registration screen according to anotherembodiment. The embodiments shown in FIGS. 4 and 5 are similar, exceptthat the user may also be able to specify a “handle.” The handle may bedifferent from the username and may be changed dynamically each time theuser plays the game (or even during the game). The handle is what theuser will be known as to the other participants of the icebreaker game.Thus, allowing the user to specify a handle that is different from theuser name and that can be dynamically changed offers the user moreprivacy and security. For example, a changeable handle reduces thelikelihood of the user being stalked by other users.

FIG. 6 shows an example picture upload screen in response to the userclicking on the link to upload a picture. The user can select a picturefrom an existing photo gallery on his mobile computing device 100, or hecan take a picture of him using the mobile computing device, which isequipped with a digital camera. The user may be able to crop a digitalpicture, or add special effects to it, such as turning a color pictureinto a black and white picture, etc.

Referring now to FIG. 7, regardless of how the selection is made (i.e.,from an existing photo album or from a digital camera), the user selectsa digital picture representative of himself to upload. The user will bereminded that this is the digital picture that will appear as hisprofile picture when the game is played.

Requiring users to upload one or more digital pictures to represent theuser is not uncommon in the electronic social networking context.However, one problem for existing social networking applications is thatthey do not actively monitor or regulate the digital pictures uploadedby its participant users. As a result, some users may choose to uploadan inanimate object (such as a building, a mountain, a lake, a car,etc.) to represent themselves.

An example of this is illustrated in FIG. 8, where the user has uploadeda building as his profile picture. Having an inanimate object as one'sprofile picture may be acceptable in some social network contexts, butwithin the context of the social networking context described in thepresent application, it is important for the user's digital profilepicture be an accurate representation of himself/herself. Using aninanimate object such as a building or a landmark as a user's profilepicture within the context of the present application will causeconfusion and likely dissatisfaction for other users in the electronicsocial network.

To remedy this issue, the mobile computing device 100 will perform anelectronic scan or examination of the digital picture uploaded by theuser to detect whether or not the uploaded digital picture contains ahuman face. In some embodiments, the detection of a human face isperformed by scanning the digital picture for objects that resemblehuman eyes, for example a pair of closely located objects that representa pair of human eyes. Of course, the electronic scan may also employother algorithms to detect a human face, for example algorithms thatlook for other human facial features such as nose, mouth, ears, or hair.If the results of the scan indicate that no human face is present in theuploaded digital picture, the user will be notified that he/she hasuploaded a picture with no people in it, and he/she will be prompted toupload a different picture.

In some embodiments, the user may be given the option of identifyinghis/her face in the digital picture in case the face detection scanincorrectly determines that no human face is present, when a human faceis in fact present. For example, referring to FIG. 9, the userAverageJoe has uploaded a picture with his face in it, but theelectronic scan has incorrectly determined that the uploaded picturedoes not contain a human face. Thus, the user may use his finger or astylus to touch or pinpoint a region of the digital picture where he islocated. This region will be marked and remembered. When the profilepicture is eventually displayed on other mobile computing devices(belonging to other users participating in the electronic socialnetwork), the user AverageJoe's handle will be displayed alongside it.By doing so, other users will have a clear idea of who the userAverageJoe is and what he looks like, which will help other users decideon whether or not to (or how to) engage with the user AverageJoe withinthe context of the electronic social networking game.

FIG. 10 illustrates another similar example problem that occursfrequently in existing electronic social networking contexts, where auser uploads a profile picture that contains multiple people. As aresult, other participants of the electronic social network may getconfused as to which person the user actually is. This may prevent otherparticipants from proactively engaging with the user, and even when theydo, they may engage the user under false assumptions (i.e., they maythink that the user is someone else in the uploaded digital profilepicture).

To address this problem, the mobile computing device 100 will perform anelectronic scan or examination of the digital picture uploaded by theuser to detect how many human faces the uploaded digital pictureactually contains. Again, the detection of the human face may beaccomplished by electronically scanning the digital picture for objectsthat resemble human eyes, or other easily recognized facial features ona human face. If the results of the scan indicate that the uploadeddigital profile picture contains multiple people, for example threepeople as shown in the embodiment of FIG. 10, the user will be promptedto either identify himself or upload a different picture. Once again,the user may identify himself by touching (e.g., via a finger or astylus) the region of the uploaded digital picture where the user islocated. This region will be marked accordingly, and the user's handlewill be displayed on or adjacent to this region when the digital profilepicture of the user is eventually displayed to other participants of theelectronic social network. Once again, this will help other usersunderstand who the user AverageJoe is and what he looks like, therebymaking it easier for these other participants to decide whether or notto (or how to) engage with the user AverageJoe within the context of theelectronic social networking game.

In some embodiments, the user will not be allowed to proceed furtherwith the icebreaker game until he/she has supplied a digital profilepicture that contains one and only one human face, presumably the faceof the user himself/herself.

Referring now to FIG. 11, once the user has supplied a satisfactorydigital profile picture, he/she is allowed to proceed as a participanton the virtual social network (i.e., icebreaker herein). A tutorial maybe optionally displayed to help the user understand how the virtualsocial network operates.

Referring now to FIG. 12, after the user agrees to participate on thevirtual social network, the mobile computing device 100 may conduct anelectronic search for venues within range of the mobile computing device100 (and thus within range of the user). For example, the mobilecomputing device 100 may be equipped with a radio component thatcontains one or more transceivers, such as a Wi-Fi transceiver. Thus, insome embodiments, the search may be performed at least in part via theWi-Fi transceiver, which is used by the mobile computing device 100 tosearch for Wi-Fi networks within range. Alternatively, the search may bedone via a global positioning system (GPS) device implemented on themobile computing device. The GPS device can triangulate the geographicalposition/location of the mobile computing device 100. The mobilecomputing device 100 may also have access to electronic map data such asGoogle Maps or Apple Maps. Based on the triangulated position of themobile computing device 100, and based on the electronic map data thatincludes which businesses are nearby the triangulated position of themobile computing device 100, the mobile computing device 100 can displayone or more of the venues that are nearby.

In the context of the present disclosure, each of the venues is a bar, aclub, a restaurant, or another suitable place of providing entertainmentand/or serving food/drinks for its patrons. In some embodiments, allvenues fitting in the above description may be displayed on the screen110 as a result of the search by the mobile computing device. In someother embodiments, only the venues that are actually participating inthe virtual social network (as a host thereof) will be displayed as aresult of the search by the mobile computing device 100. For example, ifand when a venue is ready to participate in the virtual social networkas a host, it may send an electronic message to a remote server that,among other things, keeps track of which venues are hosts of the virtualsocial network. The mobile computing device 100 is alsotelecommunicatively coupled to the remote server. When the mobilecomputing device 100 performs the search, the remote server may thenhelp the user of the mobile computing device 100 narrow down whichvenues are actually venues of interest (i.e., venues that are actuallyparticipating in the virtual social network). Otherwise, the user maybecome overwhelmed by a large list of venues returned by the search,where many (if not most) of them are not actual participants of thevirtual social network and is therefore of no interest to the user.

In any case, the list of venues discovered as a result of the electronicsearch by the mobile computing device may be shown on the screen in amap 150, or in a text box 160, or both. The map 150 may display alocation 170 of the user relative to the locations of the participatingvenues. This helps the user orient himself/herself and understand howfar he/she may be from any particular venue. The text box 160 includesdetails regarding the name of each venue. In some embodiments, the textbox 160 also displays, next to the name of each venue, the number ofparticipants of the virtual social network at each venue (i.e., thenumber of “icebreaker” users herein). The number of participants of thevirtual social network at each venue may be supplied by each venue tothe mobile computing device 100 directly in response to the searchrequest issued by the mobile computing device 100. Alternatively, eachvenue may supply this information to the remote server discussed above.The remote server may then electronically send the information(regarding number of participants at each venue) to the mobile computingdevice 100.

Knowing the number of participants at each venue may be helpful for theuser. In more detail, in a social networking context, the userexperience is typically enhanced as the number of participants on thesocial network increases, at least up to a certain point. At theminimum, there needs to be a critical mass of participants for thesocial network to be enjoyable. As such, if a venue herein only has 4 or5 participants, the user may not wish to go to that venue, because asocial network having only 4 or 5 users may not be sufficient to providea satisfactory user experience. Thus, by listing the number ofparticipants of the virtual social network alongside each venue, theuser may get a snapshot of the venues around him/her and determine whichvenue is likely to be a “hotspot” for the virtual social network. Theuser may then base his/her decision on which venue to visit accordingly.

Once the user has decided on the venue to visit, he/she may digitally“check-in” to the venue. In some embodiments, a digital check-in at thevenue means that the user (via the mobile computing device 100) hasagreed to log on to, or establish a wireless link or telecommunicationsconnection with the virtual social network at the venue. In someembodiments, the wireless link may be established between the mobilecomputing device 100 and a computer (i.e., a desktop or a laptopcomputer) or a portable handheld electronic device (e.g., a smartphoneor a tablet computer) of the venue. In other embodiments, the wirelesslink may be established between the mobile computing device 100 and anetwork router at the venue. For example, the mobile computing device100 may simply log on to the Wi-Fi network provided by the venue bydigitally checking into the venue. In the embodiment shown, the venuethat is selected for the digital check-in is highlighted.

Referring now to FIG. 13, once the user has digitally checked into avenue (e.g., “Gingerman” in this embodiment, which is a bar), he may beoptionally prompted to view a digital menu of items offered at thevenue. Since the venue herein is a bar, the digital menu is a drinkmenu. The user may decline and go straight to the virtual social networkgame, or he/she may decide to view the digital menu.

Referring now to FIG. 14, if the user decides to take a look at thedigital menu, he/she will be presented with a list of items (e.g.,drinks) offered by the venue. In some embodiments, the entire list ofavailable items may be shown in the form of a scrollable list. In otherembodiments, only a subset of the available items may be shown, forexample the top 10 or 20 most popular items at the venue. The user mayspecify which items are his favorite or preferred. In this example, theuser chooses Jack and Coke as his favorite drink.

After the user selects his/her favorite or preferred drink (or if he/shenever saw the digital menu and instead elected to proceed to the virtualsocial network game right away in the first place), the user may bepresented with a list of digital profiles of a subset of theparticipants of the virtual social network at the venue. The subset ofthe participants is determined by the user selection of which gender ofparticipants he/she is interested in interacting with at the userprofile setup screen (FIG. 4 or 5). For example, in this example, theuser AverageJoe is a man seeking a woman, so only digital profiles ofwomen participants may be displayed on the screen 110 of the mobilecomputing device 100 of the user AverageJoe.

In the embodiment shown in FIG. 15, the digital profiles of the womenparticipants are displayed as a scrollable grid on the screen 110 of themobile computing device 100. Again, these women are all physicallylocated at (or at least near) the venue that is hosting the virtualsocial network (the venue being Gingerman in this example). These womenhave previously digitally checked into the venue using a process similarto the user AverageJoe's digital check-in process discussed above.Again, by checking in to the venue, each participant agrees to havetheir digital profiles discoverable or viewable by other participants ofthe virtual social network at the venue.

Using the grid shown in FIG. 15, the user herein may determine which oneof the other participants (females for the user AverageJoe) he wouldlike to interact with. A click or tap on the digital profile of any ofthe other participants will trigger the display of a more detailedprofile of such participant, as shown in FIG. 16. For example, as shownin FIG. 16, the detailed profile of a participant may include theparticipant's favorite or preferred drinks, food items, what she doesfor a living, her likes and dislikes, etc. In addition, the detailedprofile of the participant also allows the user (e.g., user AverageJoe)to send her a chat request, buy her a drink, or send her virtual orphysical gifts, designate her as a favorite participant, or blacklisther, as discussed in more detail below.

Meanwhile, a long press of on the digital profile of the participantshown in FIG. 15 (or in FIG. 16) may trigger the display of a menu 200containing a plurality of options, such as “Invite to chat”, “Send adrink”, “Send a gift”, “Add to favorite”, and “Blacklist.” These optionsare also available in the detailed profile of a participant, for exampleas shown in FIG. 16. Generally, an invitation for a chat means that theuser sending the chat would like to electronically chat with therecipient of the chat request.

An offer to buy a drink means that the user would like to buy a drinkfor the recipient, where the drink is in the form of a digitalvoucher/coupon (such as a QR code or a barcode discussed below).

An offer to send a gift means that the user would like to send a virtualor a physical gift to the recipient. The virtual gifts may be animationsor pictures, or digital currency such as virtual coins, or store creditsuch as ITUNEs credit. The physical gift may be a coupon for a physicalmerchandise item.

Adding a participant as a favorite participant means that the favoritedparticipant is someone whom the user is interested in and may desirefurther interaction therewith. In some embodiments, if the user decidesto add another participant (participant with the handle “Flirt” in theembodiment shown herein) as a favorite, a symbol such as a heart may bedisplayed on or adjacent to the digital profile picture of the favoritedparticipant.

Blacklisting a participant means that the user is uninterested in theparticipant and does not wish to be contacted by, or even seen by theblacklisted participant. In some embodiments, once a user hasblacklisted a participant, the user's digital profile will no longer beaccessible by the mobile computing device of the blacklistedparticipant. For example, the user's digital profile may disappear fromthe list of available participants on the mobile computing device of theblacklisted participant. The blacklisted participant may not be awarethat he/she has been blacklisted, and he/she may or may not even knowthat the user who has blacklisted him/her is in the same venueparticipating in the same virtual social network.

It is understood that alternative mechanisms may be employed to triggerthe display of a detailed participant profile, or to trigger the displayof the menu 200 containing options. For example, the single click andlong press may be reversed (i.e., single click will trigger the displayof the menu 200 containing a plurality of options, whereas a long presswill trigger the display of a detailed participant profile), or a doubleclick may be used to replace or supplement the functionalities of thesingle click or long press.

Referring now to FIG. 17, a new picture grid is displayed on the screen110 of the mobile computing device 100 in response to user engagement.For example, the user may “swipe” up or down on the screen 110 to bringup a new grid of digital profiles of women participants. Alternatively,the user may “swipe” left or right on the screen 110 to bring up the newgrid of digital profiles of women participants. In addition to, orinstead of “swiping” up/down/left/right, the user may also click anddrag on a portion of the screen toward a given direction in order to getnew digital profile pictures displayed.

FIGS. 15-17 illustrate an example embodiment in which a user may browsethrough the digital profiles of the other participants of the virtualsocial network at the venue. FIGS. 18-19 illustrate an alternativeembodiment of visually providing a list of participants of the virtualsocial network that can be browsed through. In more detail, theembodiment shown in FIGS. 18-19 is similar to the embodiment discussedabove with reference to FIGS. 15-17 but with an added functionality.

Referring to FIG. 18, supposed the user AverageJoe has designated theparticipant with the handle “Flirt” as a favorite participant. A symbolsuch as a heart may be displayed on the digital profile of Flirt'sprofile picture. Referring now to FIG. 19, as the user scrolls throughthe list of available women participants, the digital profiles of therest of the participants are replaced by digital profiles of otherparticipants not shown in FIG. 18, with the exception of Flirt's digitalprofile. Alternatively stated, as the user brings up the display of anew grid of digital profiles of participants, the new grid shown in FIG.19 and the previous grid shown in FIG. 18 overlap or share the digitalprofile of the favorited participant Flirt. In some embodiments, thedigital profile of the favorited user occupies substantially the sameposition in both the new grid and in the previous grid. In theembodiment shown herein, Flirt's digital profile picture is located atthe middle left position in both the previous grid shown in FIG. 18 andin the new grid shown in FIG. 19.

For reasons of simplicity, additional grids are not shown, but it isunderstood that the digital profile of Flirt will remain fixed in theadditional new grids as the user AverageJoe continues with the browsingof digital profiles of other participants. Keeping the digital profileof the favorited participant in the new grid while the user browsesthrough the digital profiles of other participants is helpful for theuser. For example, in the embodiment shown in FIGS. 15-17, suppose theuser AverageJoe has designated Flirt as a favorite participant in afirst grid. As he scrolls through the rest of the participants in newgrids, the digital profile picture of Flirt is not displayed in thesenew grids, and he may have forgotten what Flirt looks like. Therefore,the user AverageJoe would have to scroll back up to the initial gridwhere Flirt's digital profile picture was displayed to remind himself ofwhat she looks like. This process may be time consuming and isinefficient for the user's browsing of other participants. This problemis exacerbated if the user has designated multiple favorite participantsin different grids, which may entail the user having to scroll back andforth multiple times to see who the favorited participants are.

In comparison, the embodiment shown in FIGS. 18-19 obviates this problembecause the digital profiles of the favorited participants will alwaysremain in the current grid of digital profiles. In this manner, the userneed not scroll back and forth to find the favorited users, since theyare all currently displayed on the screen 110 even as the user browsesthrough the list of participants.

It is understood that although a grid is used herein to illustrate anexample approach of displaying the digital profiles of participants ofthe virtual social network, a scrollable list may be used instead of thegrid. For example, referring to FIG. 20, a scrollable list may bedisplayed on the screen 110 of the mobile computing device 100. Eachlist entry corresponds to a particular participant of the virtual socialnetwork. Each list entry includes the participant's profile picture anda text box displayed alongside the profile picture. Among other things,text box may specify which drinks the participant prefers. Optionally,the text box may also include information regarding the participant'slikes and dislikes, hobbies, or what she is looking for in a man, etc.Again, the user may be able to designate any of the participants as afavorite, or interact with her by sending her a drink, a gift, a chatrequest, or put her on the blacklist, as discussed in greater detailbelow. Furthermore, the favorited users may also remain displayed (forexample in the same position on the list) in the scrollable list as theuser continues to scroll through the list.

FIGS. 21-23 illustrate yet another embodiment of allowing the user tobrowse through available participants at a target venue. Referring toFIG. 21, rather than being presented with a scrollable grid of digitalprofiles of participants, the digital profiles of two of the availableparticipants are randomly selected and displayed on the screen 110 ofthe mobile computing device 100. Based on the two digital profiles, theuser is prompted to select the participant with whom he would be moreinterested in interacting. The user may be able to swipe away thedigital profile of the participant with whom he is less interested ininteracting. For example, the user is less interested in the participantshown at the bottom, so he may swipe her digital profile to the left orright.

Referring now to FIG. 22, as the digital profile of the participant onthe bottom is swiped away, it is replaced by a digital profile ofanother randomly selected participant. Again, the user may select theparticipant that he is more interested in, and swipe away the digitalprofile of the participant with whom he has less interest. For the sakeof continuing with the example, the user is less interested in theparticipant shown at the top this time, so he may swipe her digitalprofile to the left or right.

Referring now to FIG. 23, as the digital profile of the participant onthe top is swiped away, it is replaced by a digital profile of yetanother randomly selected participant. This comparison and selectionprocess may continue for as long as the user wishes. During thecomparison and selection process, the user may also be able to click ortap on a digital profile of any of the participants to view a moredetailed profile (e.g., as shown in FIG. 16), and the user may also beable to long press on a digital profile of any of the participants tobring up the same menu 200 discussed above with reference to FIG. 15.For example, the user may decide to designate either of the two (orboth) participants shown on the screen 110 as a favorite participant.

Once the user has selected one or more favorite participants, he mayclick on a favorite button 210 to display, on the screen 110, thedigital profiles of the participants who have been designated asfavorite participants of the user, for example as shown in FIG. 24. Fromthis list of favorite participants, the user may also choose to viewtheir detailed profile or to trigger the menu 200 in a similar manner asdiscussed above.

Alongside the button 210, a plurality of a profile button 220, a messagebutton 230, a home 240, and a blacklist button 250 are displayed. Thelist of buttons 210-250 are displayed throughout the application andallows the user to navigate through the application as desired. Theprofile button 220 allows the user to return to his/her own profilescreen, for example the profile screen as shown in FIG. 4 or 5, so thatthe user can dynamically change his/her handle, specify the differenttypes of drinks he/she prefers, or just edit things he/she would like toshare with the other participants when the view the profile of the user.The message button 230 allows the user to view a list of incoming andoutgoing messages within the context of the virtual social network, asdiscussed below in more detail with reference to FIG. 37. The homebutton 240 allows the user to return back to the “grid” style display ofthe digital profiles of other participants, such as shown in FIGS.15-19, or the “list” style display of the digital profiles of otherparticipants, such as shown in FIG. 20, or the side-by-side styledisplay of the digital profiles of other participants, such as shown inFIGS. 21-23.

The blacklist button 250 displays a list of the participants who havebeen blacklisted by the user, for example as shown in FIG. 25. Theblacklist option is particularly helpful for female users, who mayoccasionally be harassed by one or more male participants on the virtualsocial network. For example, if participants with the handles “DaBomb”and “RoofyMagic” have made user “Flirt” feel uncomfortable, she mayblacklist “DaBomb” and “RoofyMagic.” Alternatively, if Flirt has nointerest in engaging them or wanting to be engaged by them, she mayblacklist DaBomb and RoofyMagic as well. Once the DaBomb and RoofyMagicare blacklisted by Flirt, Flirt's digital profile will no longer beaccessible by either DaBomb or RoofyMagic via their respective mobilecomputing devices. In some embodiments, the digital profile of Flirtwill disappear from the screen of the mobile computing devices of DaBomband RoofyMagic. Thus, from DaBomb and RoofyMagic's point of view, theparticipant Flirt may have left the venue, or decided to exit thevirtual social network, or they may never even know she existed or wasat the venue in the first place. In other words, the blacklisted usersare not specifically notified of their blacklisting by otherparticipants, and as such they may not be aware of them being put onanyone's blacklist.

Once in the blacklisted participants screen as shown in FIG. 25, theuser may unblacklist a particular participant (thereby returning him to“normal” status), or report the participant to the venue, which will bediscussed in more detail later. Similarly, the user may also unfavoritea participant who has been previously favorited, thereby also returningsaid participant to normal status. Additionally, the user may also exitthe virtual social network via the click of a logout button 260.

Suppose that the user AverageJoe would like to send a drink to one ofhis favorited participants. This may be done either by triggering themenu 200 (e.g., shown in FIG. 15, 23, or 24) or going to the detaileddigital profile of the participant (i.e., the target drink recipient)such as the profile shown in FIG. 16. When the user clicks on thecorresponding button to send/buy a drink for the target recipient, adigital menu of the venue may be displayed on the screen 110 of themobile computing device 100 of the user (i.e., the sender of the drink),as shown in FIG. 26. Again, a drink menu is provided in the exampleprovided herein, but it is understood that food or other merchandiseitems may also apply in other embodiments. The user may browse throughthe digital drink menu and select one or more drinks to send to thetarget recipient, for example Flirt. This is advantageous overconventional social settings where the buyer of the drink usually doesnot know what drinks are preferred by the target recipient. As such, thebuyer may end up buying a drink that the recipient does not like at all,thereby diminishing chances of using the drink as an icebreaker betweenthe buyer and the recipient. In comparison, the present disclosureallows users such as Flirt to indicated her favorite/preferred drinks(e.g., cosmopolitan) and make that information available for otherparticipants of the virtual social network. Consequently, the userAverageJoe may buy and send a drink such as cosmopolitan to Flirt withmore confidence knowing that she will like the drink.

FIG. 27 illustrates another embodiment of the digital drink menudisplayed to the user when he is ready to buy a drink for a targetrecipient. Suppose the target recipient Flirt has already selectedcosmopolitan and screwdriver as her favorite drinks at some point fromthe digital menu (for example when she registered to participate withthe virtual social network) as shown in FIG. 14. The selection ofFlirt's favorite drinks may be displayed with graphical emphasis on thescreen 110 of AverageJoe's mobile computing device 100 when the userAverageJoe is ready to buy Flirt a drink. For example, Flirt's favoritedrinks cosmopolitan and screwdriver may be highlighted so that theystand out from the rest of the drinks on the menu. The display of thetarget recipient's favorite drinks with graphical emphasis helps thebuyer remember what drinks he needs to buy. This is especially true whenthe drink menu is fairly extensive, and even if the buyer remembers whatthe target recipient's favorite drinks are, he will have to comb throughthe entire menu to identify the drinks of interest. This is a timeconsuming process and may frustrate the buyer. However, if the drinks ofinterest are displayed with graphical emphasis, the buyer may be able toeasily find them and complete the transaction, which saves time andprovides a more pleasant user experience.

FIG. 28 illustrates yet another embodiment of the digital drink menudisplayed to the user when he is ready to buy a drink for a targetrecipient. In this embodiment, the only drinks displayed are the drinksthat have been specified as favorite drinks by the target recipient. Inother words, the graphical emphasis of the target recipient's favoritedrinks is manifested as the only drinks being displayed, while the restof the drinks on the menu are hidden. This may make it even easier forthe buyer to choose the drink to send to the recipient.

It is understood that in both the embodiments shown in FIGS. 27-28, thedrinks displayed with graphical emphasis or by themselves may varydepending on the target recipient. In other words, Flirt may prefercosmopolitan and screw driver, and as such these drinks are displayedwith graphical emphasis in the embodiment of FIG. 27 and FIG. 28.However, had the user been trying to send a drink to another participantBarfly, then the drink displayed with graphical emphasis would have beenmojito, since Barfly has selected mojito as her preferred drink.

In some embodiments, each participant's selection of preferred drinks istransmitted to, and stored on, a remote server via the mobile computingdevice of said participant. When another user tries to send a drink tosaid participant, the remote server sends the recipient's selection ofpreferred drinks to the mobile computing device of the buyer's mobilecomputing device, so that the buyer's mobile computing device may beable to display the target recipient's preferred drinks with graphicalemphasis. Alternatively, such preferred drink selection for all theparticipants of the virtual social network may be automaticallydownloaded to each participant's mobile computing device, for examplewhen the participant initially checks-in or joins the virtual socialnetwork. This information may also be periodically updated as newparticipants check-in to the virtual social network and as existingparticipants leave. When any user is ready to send a drink to another,the mobile computing device of the buyer user may already have thepreferred drink information for the target recipient available. In yetanother alternative embodiment, the preferred drink information for thetarget recipient is automatically sent to the mobile computing device ofthe buyer in response to the buyer initiating a “send drink” request tothe target recipient.

Referring now to FIG. 29, the user may send a gift to a target recipientinstead of, or in addition to, one or more drinks. Such gifts mayinclude, as examples, virtual stuffed animals, virtual flowers, or ananimation sequence, etc. The purchase of these gifts cost virtual coins,which the user may purchase. Alternatively, the user may also send anactual gift such as a digital gift card to the recipient.

Referring now to FIG. 30, regardless of how the user decides to initiatean “icebreaker” request (e.g., just a chat request, or a chat requestaccompanied by an offer to buy a drink, or a chat request accompanied bya gift), once the request is sent, a timer starts. Initially, the usermay be given a certain number of icebreaker requests, for example 3.Once he sends a request to someone, he now has only two requests left.The timer counts down from a predefined number (e.g., 10 minutes). Whenthe timer counts down to 0 (i.e., 10 minutes have passed), then a newrequest is made available. Thus, the user may be given a new icebreakerrequest every 10 minutes, though he cannot go above the initial number(e.g., 3) of requests initially assigned to him. In this example, if theuser has used up all 3 requests within a 10-minute span, then he may notbe able to send another icebreaker request to a target recipient untilthe timer has finished counting down to zero.

Limiting each user to a certain number of icebreaker request may bebeneficial in at least two aspects. One, this prevents the user fromindiscriminately sending icebreaker requests to all participants at thevenue, which would overwhelm and annoy them. Two, psychologically,people tend to treasure things that are of limited quantity. Since auser only has a certain number of icebreaker requests available, he islikely to take each request more seriously and therefore become morevested in his participation of the virtual social network, which wouldlikely enhance his and everyone else's user experience.

FIG. 31 illustrates a screen 310 of a mobile computing device 300 of thetarget recipient of user AverageJoe's chat request, in this case theparticipant with the handle “Flirt.” The screen 310 displays an incomingmessage from user AverageJoe who initiated the chat request. Theincoming message includes a digital profile picture 320 of AverageJoe.Flirt has an option to either accept the chat request or decline it byclicking on the “Accept” or “Decline” buttons.

FIG. 32 illustrates an example of what is displayed on the screen 310when the user AverageJoe had sent the chat request along with an offerto buy Flirt a drink. In this case, along with the digital profilepicture 320 of the sender—AverageJoe—the recipient Flirt may also see agraphical icon 330 representing a drink being displayed on the screen310. The graphical icon 330, along with the text of the message, informsthe recipient that a drink has been sent her way. The recipient Flirtmay “Accept chat with drink”, “Accept chat but decline drink”, or“Decline chat and drink” by clicking on the corresponding buttons.

FIG. 33 illustrates an example of a digital voucher or codes displayedon the screen 310 if Flirt decides to accept the chat request with thedrink. In more detail, the drink that is purchased for the recipientFlirt is in the form of a digital voucher/coupon that can be redeemed atthe venue for the corresponding drink. In the embodiment illustrated,the digital voucher may be either a quick response (QR) code 340, a barcode 350, or both. The QR code 340 or the bar code 350 may be scanned orelectronically read by a scanner (for example a smartphone or a tabletcomputer) to redeem the corresponding drink. In some embodiments, the QRcode 340 or the bar code 350 are each generated dynamically in responseto a drink request being sent. Each drink for a target recipient has auniquely generated QR code 340 or barcode 350 associated therewith, soas to prevent using the same QR code 340 or bar code 350 to redeemmultiple drinks.

Here, AverageJoe has sent a cosmopolitan to Flirt in the form of the QRcode 340 or the bar code 350, and thus Flirt may go to the bar and havethe bartender scan either of these codes 340/350 with his/her smartphoneor tablet computer to redeem an order of cosmopolitan. This whole drinkordering process is convenient because AverageJoe knows exactly whatFlirt prefers to drink and thus sends her the drink of her choice. Flirtmay get the drink without having to talk to AverageJoe in person (i.e.,she merely has agreed to chat with him via their mobile computingdevices). This is also safe because Flirt gets the drink herself, andshe can make sure that no one has put any drugs in her drink.

FIG. 34 illustrates an example of what is displayed on the screen 310when the user AverageJoe had sent the chat request along with a gift. Inthis case, along with the digital profile picture 320 of thesender—AverageJoe—the recipient Flirt may also see a graphical icon 360representing a gift displayed on the screen 310. The graphical icon 360,along with the text of the message, informs the recipient that a gifthas been sent her way. The recipient Flirt may “Accept chat with gift”,“Accept chat but decline gift”, or “Decline chat and gift” by clickingon the corresponding buttons.

In some embodiments, the gift may be a virtual gift, such as a virtualhug, a virtual teddy bear, a virtual kiss, or a suitable image oranimation sequence. In other embodiments, the gift may be of real value,for example a code that can be used to redeem purchases at physicalstores such as Starbucks or online stores such as ITUNES.

FIG. 35 illustrates an example of what is being displayed on the screens110 and 310 of both of the users AverageJoe and Flirt, respectively,once a chat request has been accepted. In addition to having the profilepictures of Flirt and AverageJoe displayed on the other person's mobilecomputing device's screen, a chat window 400 is displayed, whereAverageJoe and Flirt may send electronic messages back and forth.

FIG. 36 illustrates an example of what each chat participant may send tothe other party during the chat. For example, the user AverageJoe mayclick on the “+” button, which will trigger the display of a list ofitems available for sending to Flirt, such as a drink, a virtual teddybear, a virtual flower, etc.

FIG. 37 illustrates an example message inbox on the screen 110 ofAverageJoe's mobile computing device 100. He may get to this messageinbox by clicking on the message button 230 at any time. The messageinbox shows a list of active or inactive chats with various otherparticipants. In the example shown herein, AverageJoe has establishedactive chats with the participants Flirt and Barfly, but TalkToMe hasnot accepted AverageJoe's invitation to chat. In some embodiments, theinactive chats (e.g., the chat with TalkToMe herein) may be visuallydistinguished from the active chats (e.g., the chats with Flirt andBarfly), for example the inactive chat may be grayed out.

Flirt may also decline AverageJoe's chat request. And if AverageJoe (orany other user) consistently harasses Flirt and makes her feeluncomfortable, she may report that user to a manager or other personnel(hereinafter collectively referred to as the manager) at the venue. Thisis illustrated in FIG. 38, where the user Flirt is asked to confirmwhether or not she wishes to proceed with the reporting. She is alsogiven the option of continuing with the reporting with or without a copyof the chat transcript (or at least a portion thereof, for example themost recent messages within the last 30 minutes or the last 20messages). If she chooses to send the report, the digital profilepicture (and optionally the handle) of the offending user may be sent toan electronic device of the manager at the venue. In some embodiments,the user Flirt may report another offensive user anonymously. She canalso elect to simply put the offending user on the blacklist instead ofreporting him.

Referring now to FIG. 39, in some embodiments, if Flirt elects to notinclude a copy of the chat transcript, she will be prompted to specifythe issue in a text box. The more specific she can describe the issue,the better equipped the manager at the venue may be to deal with theoffending user.

FIG. 40 displays a screen 410 of an example mobile computing device 400of the manager at the venue after a report regarding an offensive userhas been received. In this embodiment, the reporting user has chosen notto include a copy of the chat transcript, and therefore the manager ofthe venue may only receive an alert saying that the user AverageJoe hasbeen reported, along with a picture and/or a handle of the reporteduser. In embodiments where the reporting is done anonymously, thereporting user's identity is not revealed to the manager. In response tothe report, the manager may elect to send the reported user a warningmessage, or to kick him out of the virtual social network.

FIG. 41 displays a screen 410 of another example mobile computing device400 of the manager at the venue after a report regarding an offensiveuser has been received. In this embodiment, the reporting user haschosen to include a copy of the chat transcript 430, as well as anexplanation 440 of why the reported user made her feel uncomfortable.Again, the manager may elect to send the reported user a warningmessage, or to kick him out of the virtual social network in response tothe report. In some severe situations, the manager may have the bouncerat the venue physically locate and remove the offending user from thevenue. It is understood that although FIGS. 40-41 illustrate mobilecomputing devices such as smartphones or tablet computers as exampleelectronic devices used by the manager at the venue to receive thereport, the electronic devices may also be desktop or laptop computersin alternative embodiments.

FIG. 42 displays the screen 110 of the user who has been reported nowreceiving a warning message from the venue in response to the reporting.He may receive a pop-up message 450 saying that he has been reported asbeing abusive and that he needs to behave. The user may then be given anoption to respond to tell his side of the story if he wishes.

FIG. 43 displays the screen 110 of the user who has been reported nowbeing kicked out of the virtual social network. He may receive anotification 460 from the venue that his icebreaker session has beenterminated due to uncivilized behavior, and that he needs to wait acertain period of time before being allowed to rejoin. This will takehim back to the home screen on the mobile computing device 100.

It is understood that although the embodiments discussed above use themanager at the venue as an example of receiving the reports/complaintsfrom the alleged harassment victims and warning or disciplining thealleged offensive users, these tasks may be alternatively performed by aremote server as well.

The ability to electronically report offensive and creepy users isbeneficially for participants of the social network, especially forfemale participants. Often times, a woman may be offended by thebehavior of another person (typically a male) who is attempting toengage with her. In a real world physical setting, though she may findsuch behavior offensive, she may not feel comfortable enough to actuallyalert the bar manager or bouncer, because she does not want to “make abig deal out of it.” Also, without any witnesses or hard evidence, itmay be a “he said” “she said” issue. In other words, the bar manager maynot take her complaint seriously because he may feel that her story mayis one sided.

In comparison, the electronic reporting or complaint of anotheroffensive user in the context of the present disclosure is convenientand does not require the reporting user to actually explain in person tothe bar manager what is bothering her. Thus, she may feel morecomfortable reporting offensive behavior. Furthermore, with the abilityto include a digital picture of the offending user and the chattranscript, she can show the manager exactly who and what made her feeluncomfortable. This also lends more credence to her story, and the barmanager may be able to take corrective actions with more confidence. Asa result, the overall social environment at the bar may be improved.

FIG. 44 illustrates an example logout screen when the user chooses toexit the virtual social network. To protect the user's privacy, the userwill be alerted that the electronic chat records produced as a result ofthe user's participation in the virtual social network will be erased bydefault. In this manner, the user may be saved from being reminded withembarrassing messages later on, particularly if his/her mobile computingdevice gets into the wrong hands.

In some embodiments, even if the user forgot to logout of the virtualsocial network, the mobile computing device 100 may still erase theelectronic records related to the user's participation on the virtualsocial network by automatically detecting that the user has departedfrom the venue that was hosting the virtual social network. For example,the mobile computing device 100 may detect, via a GPS sensor implementedthereon, that the user has moved from the venue by a distance exceedinga predetermined threshold, for instance more than half a mile or aquarter of a mile from the geographical location of the venue.

Alternatively, the mobile computing device 100 may detect a break withthe Wi-Fi signal at the venue. Based on the occurrence of these events,the mobile computing device 100 may determine that the user has moved onfrom the venue, and thus the mobile computing device 100 will force anexit from the virtual social network and wipe out the electronic recordspertaining to the session from the mobile computing device 100 itself,even though he/she did not specifically choose to exit the virtualsocial network.

In yet another embodiment, the mobile computing device 100 may detectthat it has physically remained at the venue for a period of timeexceeding a predetermined threshold (e.g., longer than 12 hours). Thismay be done either by the GPS sensor on the mobile computing device 100detecting no movement or very little movement of the mobile computingdevice 100 within the past number of hours, or by the mobile computingdevice 100 detecting a continuous connection with the wireless networkat the venue. In response to this detection, the mobile computing device100 may force an exit from the virtual social network automatically andagain erase all the electronic records from itself. This is because thissituation likely indicates that the user has forgotten or lost his/hermobile computing device 100 at the venue. Thus, to prevent authorizedaccess thereto, the mobile computing device 100 will erase theelectronic records pertaining to the user's involvement on the virtualsocial network.

In some embodiments, the exiting of a user's session from the virtualsocial network not only erases the electronic records produced by thesession from his/her mobile computing device also causes the electronicrecords to be erased from the mobile computing devices of other userswho have been interacting with the user. For example, when user A logsout of the virtual network (or if her physical departure was detected,etc.), her mobile computing device will erase, from itself, all theelectronic records pertaining to her most recent session at the virtualsocial network. In addition, if she had been chatting with a user B,then such chat records will also be erased from user B's mobilecomputing device. This may be accomplished, for example, by having themobile computing device of user A send an electronic signal upon thedetected exit of user A. The signal is received by the mobile computingdevice of user B and is interpreted as a request to erase theappropriate electronic records (e.g., chats) involving user A. Thus, ifuser B had been chatting with users A and C, then only the chat recordsinvolving user A will be erased, but user B may still carry on a chatwith user C, that is, until user B or C exits the virtual socialnetwork.

The automatic erasure of the electronic records affords the usersanother level of privacy and security. Conventional text messages haveproduced many embarrassing stories and tales, especially after a nightof drinking/partying at a bar or club. Here, since the chat history andother electronic exchanges between the users are automatically erased,the users may feel more at ease interacting with one another, as theyhave less fear or being haunted by an embarrassing message later.

FIG. 45 is a simplified flowchart illustrating a method 2100 forelectronically identifying users via a mobile computing device within anelectronic social networking context discussed above according to someembodiments. In some embodiments, the mobile computing device includes amobile telephone, a tablet computer, a laptop computer, or a smart watchor glass.

The method 2100 includes a step 2110 of receiving a request from a userto participate in an electronic social network. The request is receivedfrom a mobile computing device of the user.

The method 2100 includes a step 2120 of prompting, via the mobilecomputing device and in response to receiving of the request, a user toupload a digital profile picture.

The method 2100 includes a step 2130 of receiving an uploaded digitalprofile picture in response to the prompting. The receiving of theuploaded digital profile picture comprises one of: receiving a userselection from an existing digital picture album of the user or taking adigital picture of the user via a camera module of the mobile computingdevice.

The method 2100 includes a step 2140 of electronically examining theuploaded digital profile picture. In some embodiments, theelectronically examining comprises detecting, in the uploaded digitalpicture, objects that resemble human eyes.

The method 2100 includes a step 2150 of determining, based on theelectronically examining, whether one or more human faces are present inthe digital profile picture. In some embodiments, the determiningcomprises determining that no human faces are present in the digitalprofile picture if no objects resembling human eyes are detected. Insome embodiments, the determining comprises determining that multiplehuman faces are present in the digital profile picture if objectsresembling multiple pairs of human eyes are detected.

The method 2100 includes a step 2160 of prompting the user to upload adifferent digital profile picture if it has been determined that theuploaded digital profile picture contains no human faces.

The method 2100 includes a step 2170 of prompting the user to identifythe human face belonging to the user if it has been determined that theuploaded digital picture contains multiple human faces.

It is understood that, unless otherwise specified, the steps 2110-2170of the method 2100 are not necessarily performed in numerical order. Itis also understood that addition steps may be performed before, during,or after the steps 2110-2170. For example, the method 2100 may include astep of making the digital profile picture of the user available forviewing on a plurality of other mobile computing devices whose users areparticipants of the electronic social network. The method 2100 mayfurther include a step of: before the making of the digital profilepicture of the user available for viewing: preventing the user fromparticipating in the electronic social network until it has beendetermined that: the uploaded digital picture contains only one humanface; or the user has identified the human face belonging to the user ifthe uploaded digital picture contains multiple human faces. For reasonsof simplicity, these additional steps are not discussed in detailherein.

FIG. 46 is a simplified flowchart illustrating a method 2200 for viewingand selecting users via a mobile computing device within an electronicsocial networking context discussed above according to some embodiments.In some embodiments, the mobile computing device includes a mobiletelephone, a tablet computer, a laptop computer, or a smart watch orglass.

The method 2200 includes a step 2210 of performing, via a mobilecomputing device of a first user, a digital check-in to a venue that iswithin a predefined proximity of the first user. A plurality of otherusers have already digitally checked into the venue. In someembodiments, the venue includes a bar, a club, or a restaurant. In someembodiments, the step 2210 of performing the digital check-in comprisesestablishing a wireless telecommunications connection with a network atthe venue.

The method 2200 includes a step 2220 of displaying, on a screen of themobile computing device of the first user, respective digital profilesof a first subset of the other users.

The method 2200 includes a step 2230 of designating, in response toinput from the first user, one or more second users who are within thefirst subset of the other users as favorite users. In some embodiments,the step 2230 of designating comprises displaying a symbol on, oradjacent to, the digital profile of each of the one or more favoriteusers

The method 2200 includes a step 2240 of displaying, on the screen of themobile computing device of the first user, respective digital profilesof a second subset of the other users. The second subset of the otherusers includes the designated favorite user and users who are not withinthe first subset. In some embodiments, the first and second subsets ofthe plurality of other users have a different gender than the firstuser. In some embodiments, the users in the first and second subsetseach have a gender that is one that is selected by the first user.

In some embodiments, the respective digital profiles of the first subsetof the other users are displayed as a first grid, the respective digitalprofiles of the second subset of the other users are displayed as asecond grid, and the digital profiles of the one or more favorite usersoccupy the same positions in both the first and second grids.

In some embodiments, the digital profiles of the first and secondsubsets of the users are displayed as a scrollable list, and the digitalprofiles of the one or more favorite users remain displayed on thescreen as the list is being scrolled through.

The method 2200 includes a step 2250 of displaying respective digitalprofiles of a group of users consisting of users who have beendesignated as the favorite users.

The method 2200 includes a step 2260 of sending, via the mobilecomputing device of the first user, a request to communicate with one ofthe other users. The request includes a digital chat request and atleast one of: a virtual gift or a Quick Response (QR) code or a Bar codeto redeem a drink at the venue.

It is understood that, unless otherwise specified, the steps 2210-2260of the method 2200 are not necessarily performed in numerical order. Itis also understood that addition steps may be performed before, during,or after the steps 2210-2260. For reasons of simplicity, theseadditional steps are not discussed in detail herein.

FIG. 47 is a simplified flowchart illustrating a method 2300 forselecting, displaying and purchasing favorite drinks for users via amobile computing device within an electronic social networking contextdiscussed above according to some embodiments. In some embodiments, themobile computing device includes a mobile telephone, a tablet computer,a laptop computer, or a smart watch or glass.

The method 2300 includes a step 2310 of performing, via a mobilecomputing device of a first user, a digital check-in to a venue that iswithin a physical proximity of the first user.

The method 2300 includes a step 2320 of accessing, after the digitalcheck-in, a digital menu that contains a list of drinks available at thevenue.

The method 2300 includes a step 2330 of displaying the digital menu tothe first user via a screen of the mobile computing device.

The method 2300 includes a step 2340 of designating, in response toselection from the first user, one or more drinks from the digital menuas preferred drinks of the first user.

The method 2300 includes a step 2350 of electronically communicating thefirst user's preference of the one or more drinks to another electronicdevice. In some embodiments, the step 2350 of electronicallycommunicating comprises sending the first user's preference of the oneor more drinks to a remote computer server. In some embodiments, thestep 2360 of electronically communicating comprises sending the firstuser's preference of the one or more drinks to a mobile computing deviceof a second user

The method 2300 includes a step 2360 of causing the first user'spreference of the one or more drinks to be displayed with graphicalemphasis on a screen of a mobile computing device of a second user whohas also digitally checked into the venue. In some embodiments, thecausing of the first user's preference of the one or more drinks to bedisplayed is performed in response to a request from the second user toelectronically communicate with the first user via their respectivemobile computing devices. In some embodiments, the request from thesecond user comprises a request from the second user to electronicallyorder a drink from the digital menu and send the drink to the first userin a form of a digital coupon that can be used to redeem the drink. Insome embodiments, the graphical emphasis includes one of: highlightingthe one or more drinks on the digital menu; or showing the one or moredrinks while hiding the rest of the drinks on the digital menu.

In some embodiments, the mobile computing device further includes aradio component. The step 2310 of performing of the digital check-incomprises establishing, via the radio component, a wireless connectionwith a network at the venue. The step 2350 of electronicallycommunicating comprises sending the first user's preference of the oneor more drinks to an electronic device on the network.

It is understood that, unless otherwise specified, the steps 2310-2360of the method 2300 are not necessarily performed in numerical order. Itis also understood that addition steps may be performed before, during,or after the steps 2310-2360. For reasons of simplicity, theseadditional steps are not discussed in detail herein.

FIG. 48 is a simplified flowchart illustrating a method 2400 forselecting, displaying and purchasing favorite drinks for users via amobile computing device within an electronic social networking contextdiscussed above according to some embodiments. In some embodiments, themobile computing device includes a mobile telephone, a tablet computer,a laptop computer, or a smart watch or glass.

The method 2400 includes a step 2410 of detecting, from a first mobilecomputing device of a first user, a digital check-in to a venue that iswithin proximity of the first user, wherein the venue offers a digitalmenu that includes a list of available drinks. In some embodiments, thestep 2410 of detecting of the request comprises detecting a request fromthe second user to electronically order a drink from the digital menuand send a digital coupon to the first mobile computing device. Thedigital coupon is redeemable for at least one of the one or morepreferred drinks of the first user.

The method 2400 includes a step 2420 of receiving, from the first mobilecomputing device, one or more preferred drinks from the first user, theone or more preferred drinks being a subset of the list of availabledrinks.

The method 2400 includes a step 2430 of electronically associating theone or more preferred drinks with the first user.

The method 2400 includes a step 2440 of detecting, from a second mobilecomputing device of a second user, a request from the second user toelectronically communicate with the first user.

The method 2400 includes a step 2450 of causing, in response to therequest, the one or more preferred drinks to be displayed with graphicalemphasis on a screen of the second mobile computing device. In someembodiments, the graphical emphasis includes highlighting the one ormore preferred drinks on the digital menu. In some embodiments, thegraphical emphasis include displaying only the one or more preferreddrinks but not the rest of the drinks on the digital menu.

It is understood that, unless otherwise specified, the steps 2410-2450of the method 2400 are not necessarily performed in numerical order. Itis also understood that addition steps may be performed before, during,or after the steps 2410-2450. For reasons of simplicity, theseadditional steps are not discussed in detail herein.

FIG. 49 is a simplified flowchart illustrating a method 2500 enhancinguser privacy and security within a location-based virtual socialnetworking context via a mobile computing device. In some embodiments,the mobile computing device includes a mobile telephone, a tabletcomputer, a laptop computer, or a smart watch or glass.

The method 2500 includes a step 2510 of receiving, via a first mobilecomputing device of a first user, a request from the first user toparticipate in a location-based virtual social network.

The method 2500 includes a step 2520 of detecting, at least in part viaa radio component of the first mobile computing device, one or morevenues within proximity of the first mobile computing device. Each venueincludes a host of a respective virtual social network.

The method 2500 includes a step 2530 of selecting, in response to inputfrom the first user, one of the venues in which to participate in thevirtual social network.

The method 2500 includes a step 2540 of establishing, at least in partvia the radio component of the first mobile computing device, a wirelessconnection with the virtual social network at the selected venue.

The method 2500 includes a step 2550 of conducting electroniccommunications with one or more second users at the selected venue whoare also participants of the virtual social network via their respectivemobile computing devices. In some embodiments, the step 2550 ofconducting the electronic communications comprises one or more of thefollowing: making a digital profile of the first user available forviewing on respective mobile computing devices of the one or more secondusers; sending chat requests to the one or more second users; receivingchat requests from the one or more second users; electronically chattingwith the one or more second users; sending, to the one or more secondusers, a digital code that is redeemable for a drink at the selectedvenue; receiving, from the one or more second users, a digital code thatis redeemable for a drink at the selected venue; sending a virtual giftto the one or more second users; and receiving a virtual gift from theone or more second users. In some embodiments, the step 2550 ofconducting the electronic communications further comprises: blacklistinga selected one of the second users in response to a request from thefirst user; and thereafter making the digital profile of the first userunavailable for viewing on the mobile computing device of theblacklisted second user. In some embodiments, the making of the digitalprofile of the first user unavailable for viewing comprises causing thedigital profile of the first user to disappear from the mobile computingdevice of the blacklisted second user. In some embodiments, the step2550 of conducting the electronic communications further comprises:reporting a selected one of the second users to the host of the virtualsocial network for harassment. The reporting comprises electronicallysending, to the host, at least a portion of a chat transcript betweenthe first user and the reported second user.

The method 2500 includes a step 2560 of thereafter detecting a departureof the first user from the selected venue.

The method 2500 includes a step 2570 of erasing from the first mobilecomputing device, in response to the detected departure, electronicrecords pertaining to the conducted electronic communications with theone or more second users.

It is understood that, unless otherwise specified, the steps 2510-2570of the method 2500 are not necessarily performed in numerical order. Itis also understood that addition steps may be performed before, during,or after the steps 2510-2570. For example, the method 2500 may include astep of in response to the detected departure: causing the mobilecomputing devices of the one or more second users to erase electronicrecords pertaining to the conducted electronic communications with thefirst user. As another example, the method 2500 may include a step ofdetermining that the first mobile computing device has maintained thewireless connection with the virtual social network at the selectedvenue for a period of time exceeding a predefined threshold; and erasingfrom the first mobile computing device, in response to the determining,electronic records pertaining to the conducted electronic communicationswith the one or more second users. For reasons of simplicity, additionalsteps are not discussed in detail herein.

FIG. 50 is a simplified block diagram of an electronic device 3300according to the various aspects of the present disclosure. Theelectronic device 3300 may be implemented as an embodiment of the mobilecomputing device 100 discussed above.

The electronic device 3300 includes a telecommunications module 3310,which may also be referred to as a radio component. Thetelecommunications module 3310 contains various electronic circuitrycomponents configured to conduct telecommunications with one or moreexternal devices. The electronic circuitry components allow thetelecommunications module 3310 to conduct telecommunications in one ormore of the wired or wireless telecommunications protocols, includingcommunications protocols such as IEEE 802.11 (WiFi), IEEE 802.15(Bluetooth), GSM, CDMA, LTE, WIMAX, DLNA, HDMI, etc. In someembodiments, the telecommunications module 3310 includes antennas,filters, low-noise amplifiers, digital-to-analog (DAC) converters,analog-to-digital (ADC) converters, and transceivers. The transceiversmay further include circuitry components such as mixers, amplifiers,oscillators, phase-locked loops (PLLs), and/or filters. Some of theseelectronic circuitry components may be integrated into a single discretedevice or an integrated circuit (IC) chip. By way of these transceivers,the telecommunications module 3310 may be used to establish connectionsto the venues hosting the electronic virtual social networks, orestablish connections with other devices on the electronic virtualsocial network, or establish connections with a remote server.

The telecommunications module 3310 may also include a GPS module 3315.As discussed above, the GPS module 3315 may be used to determine thelocation of the electronic device 3300, or the departure of theelectronic device 3300 from a certain venue, etc.

The electronic device 3300 may include a computer memory storage module3320. The memory storage module 3320 may contain various forms ofdigital memory, such as hard disks, FLASH, SRAM, DRAM, ROM, EPROM,memory chips or cartridges, etc. Computer programming code may bepermanently or temporarily stored in the memory storage module 3320, forexample. In some embodiments, the computer memory storage module 3320may include a cache memory where files can be temporarily stored.

The electronic device 3300 may also include a computer processing module3330. The computer processing module 3330 may contain one or morecentral processing units (CPUs), graphics processing units (GPUs), ordigital signal processors (DSPs), which may each be implemented usingvarious digital circuit blocks (including logic gates such as AND, OR,NAND, NOR, XOR gates, etc) along with certain software code. Thecomputer processing module 3330 may be used to execute the computerprogramming code stored in the memory storage module 3320.

The electronic device 3300 may also include an input/output module 3340,which may serve as a communications interface for the electronic device3300. In some embodiments, the input/output module 3340 may include oneor more touch-sensitive screens, physical and/or virtual buttons (suchas power and volume buttons) on or off the touch-sensitive screen,physical and/or virtual keyboards, mouse, track balls, speakers,microphones, light-sensors, light-emitting diodes (LEDs), communicationsports (such as USB or HDMI ports), joy-sticks, image-capture devices(for example cameras), etc. In some embodiments, the touch-sensitivescreen may be used to display visual objects discussed above, forexample the profile pictures of the users of the virtual social network,or the virtual gifts and digital vouchers. In alternative embodiments, anon-touch screen display may be implemented as a part of theinput/output module 3340.

According to the various aspects of the present disclosure, the virtualsocial network software application may reside in the memory storagemodule 3320. It can be retrieved by the computer processing module 3330for execution. During its execution, it may take command of thetelecommunications module (e.g., the Wi-Fi transceiver or GPS module3315 implemented therein) and/or the input/output module 3340 (e.g., todisplay objects on a screen and receive input from the screen), so as tofacilitate the user's participation of the electronic virtual socialnetwork via the electronic device 3300. In some embodiments, theelectronic device 3300 is equipped to execute the methods 2100-2500described above with reference to FIGS. 45-49, respectively.

FIG. 51 is a simplified diagrammatic view of a system 3400 that may beused to carry out certain aspects of the electronic virtual socialnetwork of the present disclosure discussed above. In some embodiments,the system 3400 may include an electronic device 3410. The electronicdevice 3410 may be implemented as an embodiment of the electronic device3300 of FIG. 50 (and therefore as an embodiment of the mobile computingdevice 100 discussed above). In some embodiments, the electronic device3410 includes a tablet computer, a mobile telephone, a laptop, a smartwatch, or a smart glass.

The system 3400 also includes a remote server 3420. The remote server3420 may be implemented in a “cloud” computing environment and mayinclude one or more databases that store files, for example the variousfiles that can also be stored locally in the electronic device 3410 asdiscussed above. The remote server 3420 may also collect data from theelectronic device 3410 to facilitate the user of the electronic device3410's participation on the electronic virtual social network.

The electronic device 3410 and the remote server 3420 may becommunicatively coupled together through a network 3430. The network3430 may include cellular towers, routers, switches, hubs, repeaters,storage units, cabling (such as fiber-optic cabling or telephonecabling), and other suitable devices. The network 3430 may beimplemented using any of the suitable wired or wireless networkingprotocols. The electronic device 3410 and the remote server 3420 mayalso be able to communicate with other devices on the network 3430 andeither carry out instructions received from the network, or sendinstructions through the network to these external devices to be carriedout.

To facilitate user's interaction with the electronic virtual socialnetwork, a service provider (that hosts or operates the remote server3420) may provide a user interface module 3440. The user interfacemodule 3440 may include software programming code and may be installedon the electronic device 3410 (for example in a memory storage module).In some embodiments, the user interface module 440 may include adownloadable “app”, for example an app that is downloadable through asuitable service such as APPLE's® ITUNES®, THE APP STORE® from APPLE®,ANDROID's® PLAY STORE®, AMAZON's® INSTANT VIDEO®, MICROSOFT's® WINDOWSSTORE®, RESEARCH IN MOTION's® BLACKBERRY APP WORLD®, etc. In theembodiment shown, the user interface module 3440 includes an instance ofthe “app” that has been downloaded and installed on the electronicdevice 3410. The app may also be used to perform the various aspects ofthe present disclosure discussed above, such as registering andparticipating on the virtual social network, detecting human faces indigital profile photos, browsing through the participants on the virtualsocial network, selecting favorite participants, buying and sendingdrinks and gifts to other participants, and reporting offensiveparticipants, etc.

A user 3450 may interact with the system 3400 by sending instructions tothe electronic device 3410 through the user interface module 3440. Forexample, the user 3450 may be a subscriber of the services offered bythe service provider running/hosting/operating the remote server 3420.The user 3450 may attempt to log in to the remote server 3420 bylaunching the “app” of the user interface 3440. The user's logincredentials are electrically sent to the remote server 3420 through thenetwork 3430. After verifying the user login credentials, the remoteserver 3420 may instruct the user interface module 3440 to display asuitable interface to interact with the user in a suitable manner.

In some embodiments, the system 3400 further includes an electronicdevice 3500 that resides at a venue that is hosting the virtual socialnetwork. The electronic device 3500 may include a smartphone, a tabletcomputer, a desktop computer, a laptop computer, a wireless router, etc.The electronic device 3500 is communicatively coupled to the remoteserver 3420 and to the electronic device 3410 through the network 3430.As such, it may be used to host the virtual social network forparticipant users via their respective mobile computing devices. Theelectronic device 3500 may also be used to receive complaints (such asuser reports) from the users on its virtual social network, as well assend messages to other users, or to discipline other users, for exampleby removing them from the virtual social network.

It should be appreciated that like reference numerals in the presentdisclosure are used to identify like elements illustrated in one or moreof the figures, wherein these labeled figures are for purposes ofillustrating embodiments of the present disclosure and not for purposesof limiting the same.

The foregoing disclosure is not intended to limit the present disclosureto the precise forms or particular fields of use disclosed. As such, itis contemplated that various alternate embodiments and/or modificationsto the present disclosure, whether explicitly described or impliedherein, are possible in light of the disclosure. Having thus describedembodiments of the present disclosure, persons of ordinary skill in theart will recognize that changes may be made in form and detail withoutdeparting from the scope of the present disclosure. Thus, the presentdisclosure is limited only by the claims.

What is claimed is:
 1. A mobile computing device, comprising: a radiocomponent configured to conduct telecommunications with externaldevices; a screen configured to display visual content; a computermemory storage module configured to store executable computerprogramming code; and a computer processor module operatively coupled tothe computer memory storage module, wherein the computer processormodule is configured to execute the computer programming code to performthe following steps: receiving a request from a first user of the mobilecomputing device to participate in a location-based virtual socialnetwork; detecting, at least in part via the radio component, one ormore venues within proximity of the first user, wherein each venueincludes a host of a respective virtual social network; selecting, inresponse to input from the first user, one of the venues in which toparticipate in the virtual social network; establishing, at least inpart via the radio component, a wireless connection with the virtualsocial network at the selected venue; conducting electroniccommunications with one or more second users at the selected venue whoare also participants of the virtual social network via their respectivemobile computing devices; thereafter detecting a departure of the firstuser from the selected venue; and erasing from the first mobilecomputing device, in response to the detected departure, electronicrecords pertaining to the conducted electronic communications with theone or more second users.
 2. The mobile computing device of claim 1,wherein the conducting of the electronic communications comprises one ormore of the following: making a digital profile of the first useravailable for viewing on respective mobile computing devices of the oneor more second users; sending chat requests to the one or more secondusers; receiving chat requests from the one or more second users;electronically chatting with the one or more second users; sending, tothe one or more second users, a digital code that is redeemable for adrink at the selected venue; receiving, from the one or more secondusers, a digital code that is redeemable for a drink at the selectedvenue; sending a virtual gift to the one or more second users; andreceiving a virtual gift from the one or more second users.
 3. Themobile computing device of claim 2, wherein the conducting of theelectronic communications further comprises: blacklisting a selected oneof the second users in response to a request from the first user; andthereafter making the digital profile of the first user unavailable forviewing on the mobile computing device of the blacklisted second user.4. The mobile computing device of claim 3, wherein the making of thedigital profile of the first user unavailable for viewing comprisescausing the digital profile of the first user to disappear from themobile computing device of the blacklisted second user.
 5. The mobilecomputing device of claim 2, wherein the conducting of the electroniccommunications further comprises: reporting a selected one of the secondusers to the host of the virtual social network for harassment.
 6. Themobile computing device of claim 5, wherein the reporting compriseselectronically sending, to the host, at least a portion of a chattranscript between the first user and the reported second user.
 7. Themobile computing device of claim 1, further comprising, in response tothe detected departure: causing the mobile computing devices of the oneor more second users to erase electronic records pertaining to theconducted electronic communications with the first user.
 8. The mobilecomputing device of claim 1, further comprising: determining that thefirst mobile computing device has maintained the wireless connectionwith the virtual social network at the selected venue for a period oftime exceeding a predefined threshold; and erasing from the first mobilecomputing device, in response to the determining, electronic recordspertaining to the conducted electronic communications with the one ormore second users.
 9. A method, comprising: receiving, via a firstmobile computing device of a first user, a request from the first userto participate in a location-based virtual social network; detecting, atleast in part via a radio component of the first mobile computingdevice, one or more venues within proximity of the first mobilecomputing device, wherein each venue includes a host of a respectivevirtual social network; selecting, in response to input from the firstuser, one of the venues in which to participate in the virtual socialnetwork; establishing, at least in part via the radio component of thefirst mobile computing device, a wireless connection with the virtualsocial network at the selected venue; conducting electroniccommunications with one or more second users at the selected venue whoare also participants of the virtual social network via their respectivemobile computing devices; thereafter detecting a departure of the firstuser from the selected venue; and erasing from the first mobilecomputing device, in response to the detected departure, electronicrecords pertaining to the conducted electronic communications with theone or more second users.
 10. The method of claim 9, wherein theconducting of the electronic communications comprises one or more of thefollowing: making a digital profile of the first user available forviewing on respective mobile computing devices of the one or more secondusers; sending chat requests to the one or more second users; receivingchat requests from the one or more second users; electronically chattingwith the one or more second users; sending, to the one or more secondusers, a digital code that is redeemable for a drink at the selectedvenue; receiving, from the one or more second users, a digital code thatis redeemable for a drink at the selected venue; sending a virtual giftto the one or more second users; and receiving a virtual gift from theone or more second users.
 11. The method of claim 10, wherein theconducting of the electronic communications further comprises:blacklisting a selected one of the second users in response to a requestfrom the first user; and thereafter making the digital profile of thefirst user unavailable for viewing on the mobile computing device of theblacklisted second user.
 12. The method of claim 11, wherein the makingof the digital profile of the first user unavailable for viewingcomprises causing the digital profile of the first user to disappearfrom the mobile computing device of the blacklisted second user.
 13. Themethod of claim 10, wherein the conducting of the electroniccommunications further comprises: reporting a selected one of the secondusers to the host of the virtual social network for harassment.
 14. Themethod of claim 13, wherein the reporting comprises electronicallysending, to the host, at least a portion of a chat transcript betweenthe first user and the reported second user.
 15. The method of claim 10,further comprising, in response to the detected departure: causing themobile computing devices of the one or more second users to eraseelectronic records pertaining to the conducted electronic communicationswith the first user.
 16. The method of claim 10, further comprising:determining that the first mobile computing device has maintained thewireless connection with the virtual social network at the selectedvenue for a period of time exceeding a predefined threshold; and erasingfrom the first mobile computing device, in response to the determining,electronic records pertaining to the conducted electronic communicationswith the one or more second users.
 17. A method, comprising: receiving,via a first mobile computing device of a first user, a request from thefirst user to participate in a location-based virtual social network;detecting, at least in part via a radio component of the first mobilecomputing device, one or more venues within proximity of the firstmobile computing device, wherein each venue includes a host of arespective virtual social network; selecting, in response to input fromthe first user, one of the venues in which to participate in the virtualsocial network; wirelessly connecting, at least in part via the radiocomponent of the first mobile computing device, with the virtual socialnetwork at the selected venue; conducting electronic communications witha plurality of second users at the selected venue who are alsoparticipants of the virtual social network via their respective mobilecomputing devices, wherein the electronic communication comprises:making a digital profile of the first user available for viewing onrespective mobile computing devices of the second users; placing one ofthe second users in a blacklist in response to a request from the firstuser; and thereafter causing the digital profile of the first user to beunviewable on the mobile computing device of the second user in theblacklist; thereafter detecting one of the following: a departure of thefirst user from the selected venue, or an excessive period of time inwhich the first mobile computing device has maintained the wirelessconnection with the virtual social network at the selected venue; anderasing from the first mobile computing device, in response to thedetecting, electronic records pertaining to the conducted electroniccommunications with the one or more second users.
 18. The method ofclaim 17, wherein the conducting of the electronic communicationsfurther comprises one or more of the following: sending chat requests tothe one or more second users; receiving chat requests from the one ormore second users; electronically chatting with the one or more secondusers; sending, to the one or more second users, a digital code that isredeemable for a drink at the selected venue; receiving, from the one ormore second users, a digital code that is redeemable for a drink at theselected venue; sending a virtual gift to the one or more second users;and receiving a virtual gift from the one or more second users.
 19. Themethod of claim 17, wherein the causing of the digital profile of thefirst user to be unviewable comprises causing the digital profile of thefirst user to disappear from the mobile computing device of the seconduser in the blacklist.
 20. The method of claim 17, wherein theconducting of the electronic communications further comprises: reportinga selected one of the second users to the host of the virtual socialnetwork for harassment, wherein the reporting comprises electronicallysending, to the host, at least a portion of a chat transcript betweenthe first user and the reported second user.