Communicating information describing activity of computer system users among computer system users

ABSTRACT

A computer-implemented method receiving receives information describing a current or future activity from a user of a computing system via a mobile device. The current activity is an activity occurring at a current time when the information is received, while the future activity is an activity occurring at a future time relative to a time when the information is received. The method transmits the information describing the current or future activity to a backend database coupled to the Internet and remote from the mobile device. The information describing the current or future activity is accessible to at least one recipient having access privilege to information associated with the user and describing the current or future activity via the Internet.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of application Ser. No. 13/213,906,filed Aug. 19, 2011, which is a continuation of application Ser. No.12/910,185, filed Oct. 22, 2010, now U.S. Pat. No. 8,005,911, which is acontinuation of application Ser. No. 11/871,190, filed Oct. 12, 2007,now U.S. Pat. No. 7,822,823, which is a continuation of application Ser.No. 10/149,203, filed Sep. 11, 2002, now U.S. Pat. No. 7,284,033, whichwas the National Stage of International Application No. PCT/IB00/01995,filed Dec. 13, 2000, and which claims priority from Application No.60/170,844, filed Dec. 14, 1999, each of which are incorporated byreference and from which priority is claimed.

BACKGROUND OF THE INVENTION

The present invention relates to systems and methods for facilitatingcommunication between mobile Internet users and for facilitatingelectronic commerce that is tailored to the communicated information.More particularly, the present invention relates to techniques forallowing users of Internet-capable mobile devices to communicate in amanner that takes into account user identity and profile, user status,user present and future/intended activity, user present andfuture/intended location, and time duration and for allowing merchantsto promote goods and services in a more effective manner based on theuser's communicated information and behavior profile. As the Internetbecomes more accepted and useful, there has been a tremendous amount ofinterest in endowing mobile devices, such as cellular phones, laptopcomputers, personal digital assistants (PDAs), pagers, and the like,with wireless Internet capability. Emails and access to web searchengines are often cited as the two Internet applications that users wishto have access to while being away from their desktop Internet terminal.As manufacturers turn their attention to the wireless Internet market,consortiums and standards have evolved for bringing the power of theInternet to the wireless and miniaturized world of mobile devices. Byway of example, technical proposals such as the Wireless ApplicationProtocol (WAP) and mobile Internet (mobile IP) have received muchattention in the press as of late.

As the wireless mobile Internet area is in its infancy and marketpenetration has been rather low, much of the current attention isdirected toward issues involved in achieving an acceptable, datatransmission rate, data security, and reliability via the wirelessmedium and in bringing desktop-type applications, which the users havelong enjoyed on their desktop terminals, to the small screen of thetypical mobile device. However, there has been less attention to otherimportant implications of wireless Internet access, particularlyimplications that do not apply to stationary, desk-bound Internet users.

It is reasoned by the inventor herein that one implication of wirelessInternet computing is that the mobile user's location may dynamicallychange with time as the mobile user moves about during his day. Sincehis Internet access is through a portable mobile device, the mobile useressentially carries the whole Internet with him from location tolocation. Accordingly, wireless mobile Internet access is capable of awhole range of applications vastly different from those applicable tostationary, desktop Internet access. With convenient mobile Internetaccess, the user may readily update his information to the Internet aswell as utilize the Internet to search for information pertaining toother users, for example. For mobile Internet users, time and locationbecome very important dimensions of the communication experience.

Furthermore, it is expected that mobile users will utilize wirelessInternet access in a manner that is more integrated with their dailyroutines than their deskbound counterparts. Because of the small size,convenience, and portability of the portable Internet access devices, itis expected that mobile users will integrate Internet technology intotheir daily activities in ways that are simply not possible before. Byway of example, a user employing an Internet-capable cellular phone mayhave Internet access while shopping, commuting, dining, strolling abouttown, and the like. It is expected that mobile Internet users willaccess the Internet to receive information, to communicate, to engage inelectronic commerce, and the like while moving about handling theirday-to-day chores. In contrast, deskbound users, because of the lack ofmobility of their Internet access, are typically restricted to accessingthe Internet only when at home, in the office, or at a location whereInternet access through a desktop terminal may be found.

Two of the most challenging but potentially useful areas in wirelessmobile Internet access involve mobile user coordination and electroniccommerce. Mobile user coordination refers to time-dependent,activity-dependent and/or location-dependent coordination amongindividual mobile Internet users to enable them to coordinate in orderto participate in a certain activity or accomplish a certain goal,either in the present time or at some future point in time. By way ofexample, a mobile Internet user may wish to coordinate an impromptugathering with selected friends and may wish to use the Internet to bothgather information about the friends' availability, current location,and/or current/planned activities and to invite the friends to meet at aspecified location at a specified time. As another example, a mobileInternet user may indicate that he intends to be at some particularplace in the future and invite/instruct others to meet at the sameplace. As yet another example, a mobile Internet user may be interestedin a certain activity (e.g., shopping, playing tennis) at some specifiedlocation at some specified time (either in the immediate future or atsome specified time in the future) and may employ the Internet topublish his intention to invite either selected others or anyoneinterested to participate.

Electronic commerce based on user location and activity information isanother area that merchants are highly interested in. If the user past,current, and future activity and location are known, such information inconjunction with the user's behavioral and/or purchasing profile mayallow a merchant to more precisely tailor the offering of their productsor services and communicate such offering to the user to maximize thechance of purchase.

In the current art, users may attempt to employ emails to inform othersof his coordination effort. However, even if emails become widelyaccessible by mobile Internet users, there are drawbacks to using emailsfor mobile user coordination purposes. For one, emails owes itpopularity partly to the fact that it allows the user to attend to theemails only when convenient. The rest of the time, the received emailssit patiently in the receiver's mailbox, waiting to be read. However,this manner of use is incompatible with mobile user coordination ofevents that are location-dependent and are perishable with the passageof time. By the time the recipient gets around to reading his email, thetime for the event may have already passed. Additionally, email is a“push” medium, which intrudes into the recipient's daily routine. Thisis particularly disadvantageous to mobile phone users who may wish to benotified with an audible warning (such as a ring) as soon as an emailarrives.

Furthermore, email communication is intrusive in that it presumes thatthe recipients wish to receive and review the information sent by thesenders. In fact, most Internet users nowadays are deluged with emails,most of them may even be well-intentioned, all of which require an undueamount of time every day to review and respond. Users resent this andfor many users, the response has been to filter emails, either manuallyor automatically, so that only the urgent emails (e.g., those fromsuperiors, loved ones, or work-related) are attended to right away andthe rest ignored until a convenient time (such as at the end of the dayor on weekends). Again, this manner of use is also incompatible with theneeds of mobile user coordination pertaining to events which may belocation-specific and time-sensitive.

Furthermore, unless a user sends out an email or responds to one, emailcommunication does not allow others to query for one's availability,current location, mood, intended activity, location in the future, etc.without being intrusive. By way of example, a user cannot readilyinquire about the current location or availability of another userwithout sending an email and requesting a reply or in some mannerrequire a response from the other user, who may be busy or simplyuninterested in the reason for the inquiry.

Additionally, email content tends to be free-form and is thus difficultfor merchants to easily utilize the information contained therein forthe purpose of determining the user's location, present and intendedactivity, and the like. Since such information is of great interest tomerchants, the difficulty of ascertaining such information fromfree-form email communication is a drawback. Additionally, the free-formnature of email also renders it less convenient as a communication toolfor mobile Internet users. This is because most mobile Internet usersloath to enter free-form data on the miniaturized keyboard/handwritingrecognition pad that are furnished with most mobile Internet devicestoday.

With regard to the need to furnish time-relevant location informationfor mobile Internet users, it has been proposed that the user's currentlocation can be tracked using location-finding technologies such asGlobal Positioning System (GPS). In fact, it has been proposed that GPScircuitries be incorporated into mobile Internet devices in the future.However, there are drawbacks to such a proposal. For one, GPS trackingseriously threatens the privacy of the user of the GPS-enabled mobileInternet device since it renders it possible to track the user at everyinstant. For most users, this is the equivalent of being followedthroughout the day and is simply an unwelcomed intrusion. Theintegration of GPS technology into mobile Internet devices also involvesadditional power requirement, complex circuitries and costs, both forthe mobile Internet devices and for the transmission networks thathandle them. As the majority of mobile Internet devices, as well astheir support infrastructures, are not GPS-enabled today, it is also notpossible to offer services based on GPS technology until a sufficientnumber of users and service providers have upgraded their equipment towork with GPS.

Still furthermore, although location-finding technologies such as GPScan track a given user's current location, no information is availableabout that user's current activity, future activity, intended futurelocation at a specified time, and/or availability/willingness toparticipate. Yet, these are some of the pieces of information that maybe very useful in a mobile user coordination application.

Group calendar programs are another class of desktop applicationprograms that may conceivably be used for coordinating mobile users.However, most group calendar products are directed toward small, closedgroups, i.e., groups whose members are known and/or formed in advance tofurther a particular goal such as employees of a business. The availablegroup calendar products are, for the most part, ill adapted for use viathe Internet wherein the number and identity of users may not be knownin advance and wherein the range of activities proposed may be infinite.By way of example, most group calendar programs are not well adapted forallowing previously unknown users to sign on and perform searches andfor allowing the users to control the privacy settings for individualitems of information about themselves. As another example, groupcalendars tend to work by posting information on calendars of others, aparadigm that is unsuitable when the size of the group that a userwishes to gain expose to may be as large as the Internet communityitself. In fact, most group calendars become unmanageable when the sizeof the group become too large and the sheer volume of calendared eventsoverwhelm most users (giving rise to a problem not unlike the spam emailproblem). This paradigm also tends not to work well on the miniaturizedscreens of most mobile Internet devices, which render it difficult toview a large amount of displayed data.

Additionally, because calendar products tend to be employed by users toplan their day and activities, the majority of which involve privateactivities and typically do not include other users, most of the entriestherein are inapplicable for use in mobile user coordinationapplications (which, by design, are directed toward sharing informationamong mobile users). Also, daily calendar information (versus postedinformation designed to invite participation by others) is typicallyconsidered highly private by most users, and a user tend to be reluctantto disclose such information to others (which partly explains therelative lack of use of such products nowadays and where they are used,only for work-related purposes and work-related entries among small,known group of people). Because most people tend to associate a greaterdegree of privacy with their calendar entries, using calendarinformation for the purpose for promoting goods and services bymerchants may provoke an unduly negative reaction among users.

A case can be made for maintaining multiple calendars, one of whichcould be designated for public/semi-public access so that other userscan review the calendared information for the purpose of decidingwhether they wish to participate. However, such a solution tends to beimpractical as users typically do not want to have to keep track ofwhich calendar to use for which purpose since the goal of using acalendar, after all, is to centralize information in one location forthe purpose of planning one's day.

Furthermore, most group calendar products are not well adapted to theneeds of mobile Internet users, who inherent characteristics isconstantly changing location. This is hardly surprising since groupcalendar products were developed primarily for the desktop Internetusers. Furthermore, most group calendar products also involveunstructured data entry, which tends to be less attractive for mobileInternet users who, as mentioned earlier, have to contend with thelimited screen space and keyboard/handwriting recognition pad of theirmobile Internet devices. Still further, the group calendar productscurrently available, being developed for desktop computers, tend torequire a large amount of memory, permanent storage, and processingpower to run. Most of these programs exist as executable codespermanently stored on the desktop computers. Permanent and random accessmemory, as well as computing power and battery life, are of courselimited resources on mobile Internet devices, thus rendering the currentgeneration of group calendar products unsuitable for use on the mobileInternet devices.

Instant messaging, which is a technology developed when Internet accesswas primarily accomplished via desktop terminals, also suffer many ofthe same deficiencies. Through instant messaging, it is now possible toinform other users of the user's current activity and availability.However, instant messaging as it is currently implemented does notaccount for the mobile nature of users (as would be the case when usersaccess the Internet wirelessly via mobile Internet devices) or thetime-dependent nature of the activities involved. For example, there isno established facility within instant messaging to allow users toinvite others to a planned activity happening at some predefined time inthe future at some predefined location (or allow others to search forthe same). Instant messaging applications also require downloadingexecutable codes, a requirement that is typically unwelcomed by users ofthe mobile Internet devices who are constantly challenged with doingmore with less power consumption, and less computing and memoryresources.

Because of these shortcomings, these technologies, which were developedwhen desktop Internet access were the predominant mode of access, do notadequately serve the needs of the mobile Internet users. As front-endsfor electronic commerce applications, they also have many deficiencies.In view of the foregoing, there are desired improved techniques forallowing mobile Internet users to communicate for the purpose ofcoordinating activities and to allow merchants to employ user identityand behavior/shopping profile, user status, user present andfuture/intended activity, user present and future/intended location,and/or time duration in the promotion of goods and services.

SUMMARY OF THE INVENTION

The invention relates, in one embodiment to a computer-implementedmethod implemented via the Internet for coordinating an activity betweena user of a mobile Internet device and other users communicating throughthe Internet. The method includes receiving activity informationpertaining to the event from the user via the mobile Internet device.The activity pertains to an activity occurring during a time period thatoverlaps the time the activity information is received. The methodfurther includes transmitting the activity information to a backenddatabase coupled to the Internet, the backend database being remote fromthe mobile Internet device. The method further includes rendering theactivity information accessible to at least one recipient via theInternet. The recipient represents a subset of the users coupled to theInternet and having access privilege to information pertaining to theevent involving the user.

The invention also relates, in another embodiment, to acomputer-implemented system for coordinating an activity between a userof a first mobile Internet device and other users communicating throughthe Internet. The computer-implemented system includes a serverarrangement coupled to the Internet. The server arrangement includesfirst codes and second codes. The first codes is configured to implementa first application program using a web-based paradigm on the firstmobile Internet device. The first application program is implementedwith the first codes transmitted from the server arrangement to thefirst mobile Internet device. The first application program isconfigured to receive activity information pertaining to the activityfrom the user. The activity pertains to an activity occurring during thetime period overlapping the time the activity information is received.The computer-implemented system also includes a backend database coupledto the server arrangement. The backend database is configured to be incommunication with the first application program via the Internet. Thebackend database is configured to receive the activity information fromthe first application program. The backend database is remote from thefirst mobile Internet device. The second codes is configured toimplement a second application program using the web-based database on asecond mobile Internet device. The second application program isimplemented with the second codes transmitted from the serverarrangement to the second mobile Internet device. The second applicationprogram is configured to render the activity information to a recipientvia the second mobile Internet device. The recipient represents a subsetof the users coupled to the Internet and having access privilege toinformation pertaining to the event involving the user.

The invention relates, in one embodiment to a computer-implementedmethod implemented via the Internet for coordinating a future eventbetween a user of a mobile Internet device and other users communicatingthrough the Internet. The method includes receiving future activityinformation pertaining to the future event from the user via the mobileInternet device. The future activity pertains to an activity occurringat a future time relative to a time the future activity information isreceived. The method further includes transmitting the future activityinformation to a backend database coupled to the Internet, the backenddatabase being remote from the mobile Internet device. The methodfurther includes rendering the future activity information accessible toat least one recipient via the Internet. The recipient represents asubset of the users coupled to the Internet and having access privilegeto information pertaining to the future event involving the user.

The invention also relates, in another embodiment, to acomputer-implemented system for coordinating a future event between auser of a first mobile Internet device and other users communicatingthrough the Internet. The computer-implemented system includes a serverarrangement coupled to the Internet. The server arrangement includesfirst codes and second codes. The first codes is configured to implementa first application program using a web-based paradigm on the firstmobile Internet device. The first application program is implementedwith the first codes transmitted from the server arrangement to thefirst mobile Internet device. The first application program isconfigured to receive future activity information pertaining to thefuture event from the user. The future activity pertains to an activityoccurring at a future time relative to a time the future activityinformation is received. The computer-implemented system also includes abackend database coupled to the server arrangement. The backend databaseis configured to be in communication with the first application programvia the Internet. The backend database is configured to receive thefuture activity information from the first application program. Thebackend database is remote from the first mobile Internet device. Thesecond codes is configured to implement a second application programusing the web-based database on a second mobile Internet device. Thesecond application program is implemented with the second codestransmitted from the server arrangement to the second mobile Internetdevice. The second application program is configured to render thefuture activity information to a recipient via the second mobileInternet device. The recipient represents a subset of the users coupledto the Internet and having access privilege to information pertaining tothe future event involving the user.

Another aspect of the present invention is a computer-implemented methodimplemented via the Internet for facilitating commercial offering to auser of a mobile Internet device, said commercial offering pertaining toa product or a service provided by a merchant. The method comprisesreceiving a first set of data pertaining to an activity from said uservia said mobile Internet device, said activity pertaining to an activityoccurring during a time period which overlaps a time that said activityinformation is received, said first set of data including an activitytype and location information. The said first set of data is transmittedto a backend database coupled to said Internet, said backend databasebeing geographically remote from said mobile Internet device. The firstset of data is compared with a second set of data in said backenddatabase, said second set of data including activity and locationinformation received from said merchant prior to said receiving saidfirst set of data from said user. If information in said first set ofdata satisfies conditions specified in said second set of data, thecommercial offering available is rendered to said user via said Internetdevice through said Internet.

Preferably, the second set of data also includes time information,wherein said commercial offering is rendered to said user only if saidtime period also overlaps with a time specified by said timeinformation.

Preferably, the activity type is shopping.

Still preferably, the activity type is eating.

Still preferably, the second set of data includes age information,wherein said commercial offering is rendered to said user only if an ageof said user satisfies conditions specified by said age information.

Still preferably, the commercial offering represents an electroniccoupon to be redeemed at a store operated by said merchant.

Yet another aspect of the present invention is a computer-implementedmethod implemented via the Internet for facilitating commercial offeringto a user of a mobile Internet device, said commercial offeringpertaining to a product or a service provided by a merchant. The methodcomprises receiving a first set of data pertaining to an activity fromsaid user via said mobile Internet device, said activity pertaining toan activity occurring during a time period which overlaps a time thatsaid activity information is received, said first set of data includingan activity type and location information. The first set of data istransmitted to a backend database coupled to said Internet, said backenddatabase being geographically remote from said mobile Internet device.Parameters in a second set of data is compared with a third set of datain said backend database, said second set of data including said firstset of data and data pertaining to an activity entered by another userdifferent from said user, said third set of data including activity andlocation information received from said merchant prior to said receivingsaid first set of data from said user. If information in said second setof data satisfies conditions specified in said third set of data, thecommercial offering available to said user is rendered via said Internetdevice through said Internet.

Preferably, the third set of data also includes time information,wherein said commercial offering is rendered to said user only if saidtime period also overlaps with a time specified by said timeinformation.

Preferably, the third set of data includes age information, wherein saidcommercial offering is rendered to said user only if an age of said usersatisfies conditions specified by said age information.

Still another aspect of the present invention is a computer-implementedmethod implemented via the Internet for facilitating commercial offeringto a user of a mobile Internet device, said commercial offeringpertaining to a product or a service provided by a merchant. The methodcomprises receiving a first set of data pertaining to an activity fromsaid user via said mobile Internet device, said activity pertaining toan activity occurring during a time period which overlaps a time thatsaid activity information is received, said first set of data includingan activity type and location information. The first set of data istransmitted to a backend database coupled to said Internet, said backenddatabase being geographically remote from said mobile Internet device.Parameters in a second set of data are compared with a third set of datain said backend database, said second set of data including said firstset of data and historical purchase history by said user, said third setof data including activity and location information received from saidmerchant prior to said receiving said first set of data from said user.If information in said second set of data satisfies conditions specifiedin said third set of data, rendering said commercial offering availableto said user via said Internet device through said Internet.

Preferably, the purchase history by said user is updated in said backenddatabase if said electronic coupon is redeemed.

Preferably, the first set of data also includes time information,wherein said commercial offering is rendered to said user only if saidtime period also overlaps with a time specified by said timeinformation.

Still preferably, the third set of data includes age information,wherein said commercial offering is rendered to said user only if an ageof said user satisfies conditions specified by said age information.

Further aspects of the present invention include computer programproducts, including computer readable media comprising instructions.These instructions enable one or more computers to perform the methodsdisclosed above.

These and other features of the present invention will be described inmore detail below in the detailed description of the invention and inconjunction with the following figures.

BRIEF DESCRIPTION OF THE DRAWINGS

The present invention is illustrated by way of example, and not by wayof limitation, in the figures of the accompanying drawings and in whichlike reference numerals refer to similar elements and in which:

FIG. 1 is a graphical depiction of one exemplary implementation.

In FIG. 2, three sample views are provided.

In FIG. 3, an explanation of the two modes of operation is provided.

In FIG. 4, an exemplary system architecture is proposed.

In FIG. 5, exemplary registration and log-in procedures are illustrated.

FIG. 6 shows greater details pertaining to one exemplary registrationprocedure.

In FIG. 7, exemplary application flows are illustrated to show how theservice would normally be used.

In FIG. 8, exemplary views of the public mode and the private mode areillustrated.

In FIG. 9, exemplary views of the mates screen and the sign-on screenare shown.

In FIG. 10, exemplary views of e-coupon activity are shown.

DETAILED DESCRIPTION

The present invention will now be described in detail with reference toa few preferred embodiments thereof as illustrated in the accompanyingdrawings. In the following description, numerous specific details areset forth in order to provide a thorough understanding of the presentinvention. It will be apparent, however, to one skilled in the art, thatthe present invention may be practiced without some or all of thesespecific details. In other instances, well known process steps and/orstructures have not been described in detail in order to notunnecessarily obscure the present invention.

In accordance with one aspect of the present invention, there isprovided a communication system implemented over the Internet forallowing users of Internet-capable mobile-devices (herein mobileInternet users) to make available and to control the sharing ofinformation about himself (or other users), availability status forvarious modes of communication (e.g., by phone, by email, and/or pager),activity (present or planned), location (present or planned), and thetime duration valid for such present or planned activity. Since thepostings may include information not only about the user profile,status, and current activity but also about future planned activity,location (current and planned), and the time component, thecommunication system proposed is highly suitable for mobile Internetusage, particularly in the area of mobile user coordination wherein therelevance of the communication is highly dependent on thestatus/activity/location/time information pertaining to various users.Furthermore, the proposed communication system permits a user toannounce his present or future location activity status to multiplepeople at once, who can view it from the system website at the time oftheir choosing. The proposed communication system also increases thelikelihood of chance encounters (through the use of the public mode, forexample) and enables users to communicate simple invitations in anunobtrusive manner, which, if they had been issued via emails, wouldhave been perceived as “spamming.” Furthermore, unlike group calendarswhich work well for planned time but does not work well for unplannedactivities, the proposed communication system works particularly wellfor a user or group of users who want to find others to take advantageof unplanned time or a block of time that has suddenly become available.

Among the first considerations of the proposed communication system isease of data entry for mobile Internet users, reduced resourcerequirements for executing the application, as well as gaining acritical mass of user participation. Ease of data entry is critical formobile Internet users since mobile Internet devices are typicallyseverely limited in its data entry capability (e.g., most do not have afull size keyboard to save space), its display capability (e.g., mosthave a small screen to facilitate portability and to reduce powerusage). To this end, the inventive application employs innovativeinterfaces to reduce the amount of data entry and further to reduce thenumber of screen jumps or scrolling that the user has to perform whileentering data. As will be shown in the exemplary implementation below,extensive use of drop-down lists is employed whenever possible to allowdata entry by the point-and-click (or point-and-tap) method. As oneexample, it is envisioned that location entry may be made by tapping ona map displayed on the screen. It should be noted that the currentlocation status is self-declared. Furthermore, the selectable items inthe drop-down lists are intelligently ordered so that the items mostlikely to be selected will be presented first in order to minimizescrolling. By way of example, locations that the user most frequentlyvisit may be listed in the drop-down list for entered locations. Asanother example, context analysis may be employed to present moreintelligent choices (e.g., presenting time selections of 11:30 AM, noon,and 12:30 PM first when the action relates to lunch instead ofpresenting time selections for the evening).

Reduced resource requirement is addressed by the innovative methodsdescribed herein, which eliminates the use of exotic and power-hungrytechnologies such as GPS for location determination. As will bediscussed later herein, the invention preferably requests the locationdescription from the user in order to maximize the chance that suchdescription will be understood by the intended recipient and to allowthe user some measure of control over the privacy of the inputinformation. As noted, the location information is self-declared.

Further, unlike prior art group calendar programs, the inventivetechnique preferably requires little, if any, resident executable codes,thus minimizing the need to store such codes permanently in the mobileInternet device and/or the need to download and install such codes. Allthese techniques reduces the processing, memory and/or I/O requirements,which contribute to lower power consumption and render the inventivecommunication system more adaptable for use with mobile Internetdevices.

In one embodiment, the user profiles, status, and posted information formobile user coordination purposes are stored in a backend databasesystem, which is coupled to the Internet and remote from the mobileInternet devices, to reduce the need to store large volumes of datalocally on the mobile Internet devices. The database of user profiles,status, and posted information may then be accessed by the mobileInternet users through their mobile Internet devices using a web-basedparadigm (e.g., by filling out webpages which are served up to the userupon accessing the service's website) in order to reduce the need todownload executable codes or to store executable codes on the mobileInternet devices.

Preferably, updates of user profile and status, as well as posting ofinformation occur through webpage entries to be uploaded to the backendsystem, which resides in the Internet. Likewise, search parameters mayalso be inputted via webpage data entry. To minimize power, memory, andprocessing requirements on the part of the mobile Internet devices,memory and processing-intensive tasks such as database storage, databaseupdates, database searches, and the like preferably occur remotely atthe backend system instead locally on the mobile Internet devices.Communication of search results and other forms of communicatedinformation between the backend system and the individual users alsopreferably occur through webpages. Data entry of user information,profile, and status, as well as searches through the profiles, statusupdates, and posted information associated with other users areaccomplished through the use of web-based forms, which bothminimize/eliminate the need for local executable codes and facilitatecompatibility across different mobile Internet devices.

A critical mass of user participation is required to make anyapplication that rely on users sharing data useful. To address thispoint, innovative methods are described herein to make the service moreconvenient for users, as well as to arouse potential user's desire to bepart of the system for the purpose of communicating with others.

In accordance with one aspect of the invention, privacy is protectedsince the sharing of the posted information is fully controlled by theuser himself. In one embodiment, the location information (presentand/or future) is entered by the user himself through the mobileInternet device, thereby giving him full control of whether to let thesystem (and thus anyone else) know his location information. This is oneimportant advantage of the present invention. As will be discussedlater, even after the user enters his location information, privacyprotection is provided by allowing the user to control the disseminationof the posted information.

Another advantage of this mode of information location entry is that theinformation entered may take any form that may be understood by theintended recipient. The location information can be fully descriptive(e.g., “Restaurant Mikasa on Main Street”) to ensure understanding or ina secret code that is only understood among selected friends (e.g.,“place where we usually meet for lunch”) to provide an additionalmeasure of privacy. The ability to control the content of the locationinformation, which is not available with location-finding technologiessuch as GPS, allows the content to be tailored for improvedunderstanding and/or privacy and is an important benefit of the presentinvention.

Another important benefit of this mode of location information entry isthe ability to include and utilize location information forcommunication purposes in the communication system of the presentinvention without requiring the use of complicated location-findingtechnologies such as GPS, which would increase the power consumption,cost, and complexity of the mobile Internet devices. In this manner, thecommunication system proposed can be implemented today without requiringupdates by users and wireless service providers to GPS technology. Withthe current method of information entry, users can communicate theirlocation information irrespective whether the person posting theinformation or the person accessing the posted information has theability to receive and/or understand GPS information.

Although this method of location information entry may not furnishinstantaneous location updates all the time, such is not an importantissue in most mobile user coordination applications. Because time isanother component of the information entered, other users may readilyascertain, from the data pertaining to when the location information isupdated, the nature of the activity involved, the expiration time and/orcommon sense, whether the posting is still valid. By way of example,location data about a movie (e.g., “watching a movie at the theater on5^(th) Street”) is probably not valid if entered more than six hoursago. As another example, location data about lunch (e.g., meetingfriends for lunch at restaurant Mikasa on Main Street”) is most likelyinvalid if the current time is evening. Of course, if the activitiesentered are accompanied by explicit time duration information (e.g.,watching a movie theater on 5^(th) Street until 8 PM), another useraccessing such information may readily determine whether the posting isstill valid in view of the current time. In one embodiment, expiredactivity entries are either not displayed or clearly marked as such(e.g., “previous known status”) as soon as the current time exceeds theend time of the activity entry.

Although user entry for location information is one advantageous mode ofoperation, it is contemplated that as future automatic location-findingtechnologies are phased into mobile Internet devices, the user may alsoutilize the location finding information to assist in the entry of hiscurrent location information. By way of example, GPS coordinates, thelocation of the wireless transmitter which the user employs for wirelesscommunication, the use of the wireless phone network to determine userlocation, and the like, may be used as a substitute for or a supplementto the current location information entered by the user.

An important aspect of the present invention pertains to the ability tofurnish future location information. For mobile user coordinationapplications, specifically in situations where users try to coordinatean event to happen in the future at some location, this information isof course highly useful. Again, the future location information may beentered by the user in the same way that he enters his current locationinformation, i.e., via the user interface of the mobile Internet device.This is an important advantage since there is no simple way toaccomplish the entry of future location with location-findingtechnologies, such as GPS, since location-finding technologies areuseful only for finding a current location. Although electronicdatabases of locations exist and theoretically could allow a user tolook up the information pertaining to a location other than his currentlocation, this is not easily or conveniently done today due to thelimitations in transmission speed, display screen size, memory and/orstorage of most mobile Internet devices.

The inclusion of the time component, in addition to furnishinginformation about the probable validity of the activity/location posted,also facilitates the posting of information pertaining to a futureplanned event at some future point in time and/or location. This is animportant advantage since it allows users to communicate not only aboutcurrent activity/location but also about intentions or proposalsregarding a future activity and/or location. This has tremendousapplications in the mobile user coordination applications as it allowsthe planning of, invitation to, and/or searching for events that has yetto happen. By way of example, a user may now post information pertainingto a proposed meeting at a certain location at a certain time period andmake the posting accessible to selected users or to the public to allowthem to plan accordingly.

In order for other users or groups of users to access such postedinformation, access privilege needs to be granted by the originalposting user. Access privilege can be granted to individual users, toall users belonging to predefined groups, or even to the entire public(e.g., for information that the original posting user does not deem tobe highly private). Further, different items of information pertainingto a particular user may have different access privilege associatedtherewith. By way of example, a particular user may grant the publicaccess to his name and email address but may withhold from the publicthe privilege to check on his current location and/or email address(which may be made available only to selected friends, for example).

In one embodiment, the Internet-capable mobile devices representInternet-capable cellular phones although, as mentioned earlier, otherdevices including laptop computers, personal digital assistants (PDAs),pagers, and the like, may also employ the techniques disclosed herein.Preferably but not necessarily, the communication system is implementedsuch that the front-end for posting information or reviewing the postedinformation is accessible through a web browser (i.e., an applicationfor accessing websites and webpages). In the case of Internet cellularphones, the front-end may be a manufacturer-specific web browser or onethat adheres to an industry standard, e.g., the Wireless ApplicationProtocol (WAP) standard. Even more preferably, access to the inventivecommunication system for the purpose of posting information and/oraccessing the posted information by others (and/or other communicationvia the inventive communication system) may be accomplished via standardbrowser technologies (e.g., HTML, XML, Java, ActiveX, and/or the like)so that no download or installation is necessary.

Generally speaking, a user registered with the inventive communicationsystem may use the Internet to access the system for updatinginformation about himself. As mentioned earlier, this informationincludes not only profile information (e.g., name, phone number, emailaddress, hobby, zodiac signs, blood group, favorite movie star, etc.)and availability information (e.g., available for telephone calls,available for chats, available for activity, etc.) but also currentactivity, current location (if applicable) and the duration of suchcurrent activity (if applicable). By way of example, a user may updatehis information to indicate that he is dining at a specific restaurantuntil 9 PM. This information may be made available to selected people towhom the posting user has granted permission earlier. The informationmay be simply updated to the system backend (which includes a webserversubsystem as well as any necessary gateway servers—such as those offeredby cellular service providers—and a database subsystem for storing andaccessing user information) to render them accessible to users havingthe proper access privilege. Alternatively or additionally, the postingof information may cause the posted information (or a notificationpertaining thereto) to be automatically sent to selected users in theform of a link to a webpage or email.

In the mobile user coordination context, an invite facility is providedto permit a user to send invitations to selected other users (or to thepublic) to invite participation in a current or planned event. By way ofexample, a user may invite selected other users to a movie or tennisgame by posting the activity, time and/or location pertaining to theevent and send such information to the backend system for access. Theevent itself need not happen presently or even planned. The invitationmay take the form of a query, for example, to allow the user sending outthe invitation to ascertain the identity, the level of availabilityand/or willingness of the invitees in the proposed activity. Invitationmay be used a way to indicate to a familiar group of users of one'scurrent or proposed activity/location/time to allow others to respondappropriately, or may be used as a way to publish one's current orproposed activity/location/time to users known or unknown to facilitatemeeting new people.

In some context, an invitation may take the form of a request and maycarry the force of a command, depending on the relationship between thesender and the invitee (e.g., an invitation between a boss and asubordinate in the context of work may imply that there is no option asto participation on the part of the invitee/subordinate). This may betrue if the communication is employed to facilitate work coordinationamong employees, for example.

Once the invitation is sent to the backend system, it may be madeavailable for review by those who have been granted the proper accessprivilege. Alternatively or additionally, a message may be sent out tothe invitees to alert them of the presence of the invitation so that amore rapid response can be facilitated. The option to be alerted may bespecified by the sender, may be handled automatically by the system, ormay be specified as an option by the recipient based on some filteringcriteria.

In accordance with one aspect of the present invention, there isprovided a search facility wherein a user may search among all usersand/or posted information (or at least users and/or information to whichthe searcher has access privilege) for postings or users based on somesearch criteria. Since substantially all user profiles and postedinformation are kept in the database subsystem, such data is availableto those having the proper access privilege. By way of example, acertain user may perform a search among selected ones of her friends forthose currently engaged in shopping activities or planning to goshopping. As another example, a certain user may perform a search tocheck on the status, location, or activity pertaining to a specificother user. As another example, a given user may wish to search foranyone in the public who is interested in a particular activity, who maybe in a particular location, or who may have a certain profilecharacteristic of interest. Since many of the items of informationpertaining to user activities are time-sensitive, searches preferablytake into account the time component whenever appropriate (e.g., foractivity currently taking place or proposed in the future). Along withuser profile and activity, the invention permits users to find oneanother based on location and time, as well as having a degree ofcontrol over the privacy of their user profile and posted information.

By implementing the proposed communication system on the web andallowing users to perform searches through the database of userprofile/status/posted information, the present invention facilitatesmeeting people in a way that is simply unattainable before. The factthat the posted information pertains to current activities or proposedactivities of mobile Internet users, and includes both the location andtime dimensions, means that a user looking for partners for activitiesnow has unprecedented exposure and access to an audience that ispotentially as large as the Internet user base itself. By permitting auser to selectively grant/withhold access by other users to theinformation posted, privacy is enhanced. It is contemplated that privacycontrol setting may be provided to allow a given user to control whetheranother user or group of user has access to none, to a part, or to allof the information pertaining to the given user. By way of example, agiven user may decide that some users may be granted access only tocertain types of postings or even only part of the information in thepostings and may set the privacy control setting associated with theseinformation items accordingly. Of course privacy control setting may beassociated with any aspect of the user's profile, status, location,time, etc. and may be set individually for specific users who may wishto access the given user's information (e.g., granting John access tothe user's name and email but not business address). The point is thatprivacy control setting, if desired, can be associated with any item ofinformation pertaining to a particular user to allow that user to finelycontrol access by other users, groups of users, or the public. Forusability reasons, however, groups of information may be groupedtogether and have a common privacy control setting in order to simplifyaccess control.

Exemplary Process Flows

Exemplary process flows for signing up a user, for login, for privatemode and public operations are shown below for users of Internet-enabledcellular phones. It should be noted that the specific process flowsdisclosed below are only exemplary and specific implementations mayvary. Accordingly, it will be apparent to one skilled in the art thatthe present invention may be practiced without some of the specificsteps in the process flows and that not every conventional, minuteprocess step has been described in detail in order to not unnecessarilyobscure the present invention.

1. Sign-Up

1.1. User has been invited (by the computer-implemented mobile usercoordination system or by another user)

-   1.1.1. Clicks on invitation URL (containing the e-mail address to    which the invitation was sent)-   1.1.2. User is welcomed by the welcome screen of the    Internet-enabled cellular phone-   1.1.3. User is shown his mates' status information, else shown    public mode information if no mates' status information is available    (as in the case when, for example, the user is invited by the    computer-implemented system instead of being invited by another    user)-   1.1.4. User is asked to sign-up Yes/No-   1.1.5. If Yes, user is asked to enter phone # (if the e-mail address    doesn't contain the phone number already) and choose a password-   1.1.6. User is asked to save the next screen as a cached page for    future logins if desired-   1.1.7. User is asked to grant privilege to mate (who invited user)-   1.1.8. User is asked to invite 3 mates by entering their e-mail    addresses (makes score=3). This optional step is done to facilitate    fast viral growth of the base of users-   1.1.9. User is asked to enter profile information such as, for    example, age, sex and other profile information. To submit a photo,    he is requested to use the web site, if desired.-   1.1.10. Enjoy! Sign-up is completed.

1.2. User has come in cold (e.g., by entering or clicking on URL onInternet-enabled cellular phone)

-   1.2.1. User enters/clicks on URL-   1.2.2. User is welcomed by the welcome screen of the    Internet-enabled cellular phone-   1.2.3. User is shown public mode information-   1.2.4. User is asked to sign-up Yes/No-   1.2.5. User is asked to enter e-mail address, phone#, password-   1.2.6. System sends out e-mail address verification e-mail (no    response necessary), if desired-   1.2.7. User is asked to save the next screen as cached page for    future logins if desired-   1.2.8. User is asked to invite 3 mates by entering their e-mail    addresses (makes score=3). This optional step is done to facilitate    fast viral growth of the base of users-   1.2.9. User is asked to enter profile information such as, for    example, age, sex and other profile information. To submit a photo,    he is requested to use the web site, if desired.-   1.2.10. Enjoy! Sign-up is completed.

2. Login

2.1. User comes in through the front door (by using the cached page andoptionally with a password procedure)

-   2.1.1. User submits the cached page to the backend server    (containing the e-mail address)-   2.1.2. User is asked to approve “grant privilege” requests. User can    grant privileges and additionally also pre-approve sharing of his    information (by invitee with other users). In case of a group “grant    privilege” request, user can grant privilege to the invitee or to    the entire group.-   2.1.3. User is asked to update status if the last entry has expired-   2.1.4. User is shown last mode used with updated search results-   2.1.5. Enjoy! Login is completed.

2.2. User comes in through the side door (by using bookmark or typingURL)

-   2.2.1. User enters URL-   2.2.2. User is asked to enter e-mail ID and password-   2.2.3. User is asked to approve “grant privilege” requests. User can    grant privileges and additionally also pre-approve sharing of his    information (by invitee with other users). In case of a group “grant    privilege” request, user can grant privilege to the invitee or to    the entire group.-   2.2.4. User is asked to update status if the last entry has expired-   2.2.5. User is shown last mode used with updated search results-   2.2.6. Enjoy! Login is completed.

3. Private Mode 3.1. Check Custom Messages

3.1.1. The “custom message waiting” icon is displayed (custom messagecan be posted for an individual or for an entire group by a user)

-   3.1.2. By clicking on icon, the user is presented with a list of    messages waiting which the user can selectively view. Custom    messages may expire automatically as they become time-irrelevant.

3.2. Updates Personal Status

-   3.2.1. User selects current “location”, “activity”, “till when” from    the customized options shown (location and activity option choices    may be ordered by frequency and recency, the last options of these    two fields being “custom”, “custom by mate” and “custom by group”.    In case the user selects “custom” or “custom by mate” or “custom by    group”, he is taken to a screen where he can type the custom message    and in case of “custom by mate” or “custom by group”, additionally    select recipient mate(s)/group(s) from the drop-down box. The time    duration choices may be any amount of time, for example, 1, 2, 4 or    12 hours)-   3.2.2. Clicks Go!-   3.2.3. User shown updated screen, “custom message waiting” flags set    for recipients

3.3. Contacts Mate

-   3.3.1. User scrolls and selects one of the mates user wishes to    contact by clicking on the link-   3.3.2. User is shown the full message (in case of a custom    message/custom format) and given the option to call or send e-mail    (without needing to know the number) or to set an “availability    status change” alert (this alert would notify the user by e-mail    when the availability status of the mate changes)

3.4. Conducts a Search

-   3.4.1. User selects one or more of the search criteria (by location,    activity, time, group, mate, freeform) from the drop-down boxes (in    case more than 1 search criteria are chosen, it becomes an AND    failing which an OR search) (contents of the drop-down boxes,    particularly the location and activity boxes, are “current data    dependent”—for example, Shibuya is shown as a choice only if the    system has some data on Shibuya)-   3.4.2. Presses Go!-   3.4.3. System refreshes screen with matching mates information    results (number of results displayed per page is a user-controlled    setting)

3.5. Sends Invitations (by clicking on ‘Mates’)

-   3.5.1. User can enter e-mail address and send invitation as an    individual or a group. User can customize the invitation by entering    name, message greeting or choosing a format (for example, X-mas    format or any other format). Additionally, the user can offer    privileges to his information and also allow pre-approved sharing of    user's information (by the invitee with others) at the same time. In    case of a new user, the new user may be allowed to skip the “invite    3 mates” process in case user doesn't remember the phone numbers at    that time by simply leaving behind names of mates but user may be    asked provide the phone numbers at the time of subsequent logon.-   3.5.2. In case the invitee is not a current user of the system,    system sends out the invitation e-mail and in case the invitee is a    current user of the system, system stores the invitation message to    display it as a dialog-box at subsequent logon-   3.5.3. In case the invitation message to a potential user is not    responded to within 3 days, it is resent (if still not responded to    within 7 days, the inviting party is notified and asked to provide    an alternative e-mail address). In case the invitation message    bounces, the inviting party is notified and asked to provide an    alternate e-mail address.-   3.5.4. After sending the invitation, the user is returned to the    ‘Mates’ screen to allow the user to send out more invitations.

3.6. Modifies Privileges (by clicking on ‘Mates’)

-   3.6.1. The user can select the group (listed by recency and    frequency, the last options being “other”, “unfiled” and “all”) or    the mate (listed by recency and frequency, the last option being    “other”) and for that group/mate, change the privileges (in case the    user selects “other” and clicks Go!, The user is taken to a separate    screen with a full listing of his groups or mates respectively with    a privilege Y/N drop-down box, Edit link, New link in front of each    one of them)-   3.6.2. After user changes mate/group privileges and clicks on Go!,    privileges are updated in the system and the ‘Mates’ screen is shown    again-   3.6.3. User can also create a new group or edit properties of an    existing group—Share Yes/No, Members, Name, Voice Channel On/Off,    Delete (only permitted if he user created that group i.e. is the    group owner)-   3.6.4. User can also create a new mate (takes user back to    invitation section of the ‘Mates' screen’) or edit the properties of    an existing mate—Share Y/N, Crossing Paths Alert On/Off, Voice    Channel On/Off, Name, Phone Number (useful if that mate has not    provided any phone number), Group Affiliation(s), Delete

3.7. Updates Schedule

-   3.7.1. In the Schedule screen, user can create new, edit or delete    future status entries of the format location—activity—time. User can    view this schedule in the day or week view.

3.8. Changes Settings

-   3.8.1. Owner Info: screen name, alternate contact phone number,    alternate contact e-mail address, locations (work/school, home,    play), age, sex, blood group, zodiac sign, profession, hobbies/areas    of interest-   3.8.2. Preferences: Search results per screen (3/4/5), startup mode    (last mode/private mode/public mode), voice channel on/off (for    public mode), alert (via e-mail) when custom message waiting Y/N,    customize public mode search criteria (can select any 2 of age/sex,    blood group, zodiac sign, profession, hobbies), change e-mail    address, change password

3.9. Special Promotions based on activity, location and/or time

-   3.9.1. User is shown specials information for the area-activity-time    zone he is in (optionally matching his hobbies/areas of interest as    gathered from, for example, profile or past activity)-   3.9.2. User has the option of clicking on any of the specials and    calling the merchant in advance-   3.9.3. User also has the option of forwarding an entry in the    specials section to a mate/group as a custom message (clicks on the    “forward” link and is shown a new screen of the format of the bottom    part of the ‘Mates’ screen where the user can select mates/groups to    forward the specials info to)-   3.9.4. The information on the user shopping pattern is recorded by    the system (in the format:    user-location-activity-time-merchant-product)

3.10. Events

-   3.10.1. User is shown public events information for the    area-activity-time zone he is in matching his hobbies/areas of    interest as gathered from, for example, profile or past activity-   3.10.2. User has the option of clicking on any of the events and    calling the event organizer in advance-   3.10.3. User also has the option of forwarding an entry in the    events section to a mate/group as a custom message (clicks on the    “forward” link and is shown a new screen of the format of the bottom    part of the ‘Mates’ screen where the user can select mates/groups to    forward the events info to)-   3.10.4. The information on the user behavior is recorded by the    system (in the format: user-location-activity-time-event    organizer-event)

3.11. Switch Mode

-   3.11.1. User is switched to the other mode

4. Public Mode

4.1. Check Custom Messages (same as Private Mode 3.1)

4.2. Updates Posting

-   4.2.1. User selects desired “location”, “activity”, “from when” from    the customized options shown (location and activity option choices    are ordered by frequency and recency, the last option being    “custom”. In case the user selects “custom”, he is taken to a screen    where he can type the custom message. The time duration choices may    be any duration, for example, 1, 2, 4 or 12 hours in advance)-   4.2.2. Clicks Go!-   4.2.3. Desire registered in the database and user shown updated    screen

4.3. Contacts a Person

-   4.3.1. User scrolls and selects one the persons he wishes to contact    by clicking on the link-   4.3.2. He is shown the full message (in case of a custom    message/custom format) and given the option to view profile and call    or send e-mail (without being shown the number)

4.4. Conducts a Search

-   4.4.1. User selects one or more of the search criteria (by location,    activity, time, freeform and any 2 of age/sex, blood group, zodiac    sign, profession, hobbies) from the drop-down boxes (in case more    than 1 search criteria are chosen, it becomes an AND failing which    an OR search) (contents of the drop-down boxes, particularly the    location and activity boxes, are “current data dependent”—for    example, Shibuya is shown as a choice only if the system has some    data on Shibuya)-   4.4.2. Presses Go!-   4.4.3. System refreshes screen with matching people information    results (number of results displayed per page is a user-controlled    setting)

4.5. Deletes Posting

-   4.5.1. User is shown a list of all his status updates which he then    has the option of selectively editing or deleting (postings are    automatically deleted as time expires)

4.6. Edits Profile

-   4.6.1. User has the option of entering freeform profile information    such as favorites, self-introduction, photo (optional—only through    the web site and only of a fixed dimension, file size and file    type(s))

4.7. Changes Settings (same as Private Mode 3.8)

4.8. Specials (same as Private Mode 3.9)

4.9. Events (same as Private Mode 3.10)

4.10. Switch Mode (same as Private Mode 3.11)

As mentioned earlier, the availability of the user's profile, status,present and future activity, present and future location, and therelevant time facilitates targeted marketing by allowing merchants totarget their products/services in ways that are simply unavailable withcurrent systems. Merchants now have access to the user's past behavior(shopping, click, coupon response, etc.) as well as presentactivity/location (e.g., shopping at a certain mall until 3 PM) as wellas future activity/location (e.g., intend to shop tomorrow on a certainstreet from 5 PM-8 PM) as well as the possible participants as well ashis demographics. With this information, the merchant can tailor theproducts/services most likely desired/purchased/have a chance of beingconsidered by the user (and his group members) and offer these directlyto the user and his group members via the Internet (e.g., direct email,short message, instant message, voice mail, e-coupons, and the like).

An exemplary arrangement for offering special promotions based on theuser's profile, status, present and future activity, present and futurelocation, and the relevant time is shown below. Again, it should benoted that the specific process flows disclosed below are only exemplaryand specific implementations may vary. Accordingly, it will be apparentto one skilled in the art that the present invention may be practicedwithout some of the specific steps in the process flows and that notevery conventional, minute process step has been described in detail inorder to not unnecessarily obscure the present invention.

Exemplary Arrangement

1. Merchant goes to a section of the web site to upload his offer. Hecan select his target user profile by adjusting parameters for some orall of the options offered: age, gender, location(s),intention/activity, timeframe, alone/together, past purchases. Themerchant can then define the offer, say “10% off at all purchases atGap” in Harajuku on Sunday evening. The system assigns a uniquepromotion ID to this offer (which is used to later generate thee-coupon#s).

2. User updates his location and status (intention/activity/time)information and is shown search results on his mates. At the same time,he is shown specials and events for that time in that location matchinghis desired activity (shopping/eating, etc.), state (alone/with othermale(s)/with other female), and past response (coupon clicks, andpurchases).

3. At this point the system matches the user to the merchant using thesecriteria, some specified by the merchant and the rest determined by thesystem based on the user's status. In one embodiment, the final list ofevents/specials to be shown to the user may be sorted based on the cpmrate offered by the advertiser.

4. User can click on a special to display the e-coupon which has aunique number valid for that location-activity-time zone. User can showthe displayed coupon to the cashier at the merchant to get the offereddiscount. (The user may also simply copy down the number and show it tothe merchant.) If the merchant prefers, the user can be permitted tosimply tell the merchant “I found your offer by the mobile usercoordination system” in order to obtain the discount or premium. (Other“code-word” systems can be used (e.g., “I like jeans”) or the user could“reserve” a special by telling the retailer his/her name via phone oremail.)

5. The merchant uploads a flat file of coupon numbers to the website toreceive macro-level analysis of the customers who responded to hisoffer. He can then use this information to better target customers forfuture offers.

6. The merchant has the option of giving users who redeemed couponsadditional incentives via future discounts and other promotional offers.This may be done by providing a frequent shopper ID to theuser-purchaser (useable to access a webpage). Or the user can click on alink on the coupon after exercising it to get more offers of that typein the future)

FIGS. 1-9 illustrate an exemplary implementation of the presentinvention for smart phones, i.e., cellular phones that are endowed withInternet capability for accessing web pages and web sites. In theexample of FIGS. 1-9, a service called ImaHima is created to allow usersto register, update information about themselves (which includeidentity, profile, status) and postings (which include current/proposedactivity, current/future location, and/or the relevant time period) andto set access privilege for other users, and to permit users to searchin order to coordinate for activities, meetings, etc.

In FIG. 1, an explanation of the exemplary implementation is provided,along with some illustrative example of how the Imahima service could beused. In FIG. 2, three sample views are provided, which include the homeview on the left (of the private mode in this case). At the top of thepage, the user is shown to be in private mode, engaged in work (otherpossible choices are shown above), and the location. The mates orfriends/acquaintances information of interest is also shown. A “search”button is provided (with search options shown associated therewith byway of further explanation), along with a “Prefs” button for settingpreferences pertaining to selected other users (“mates”), schedule,owner information, and other general settings.

The page view for viewing group information and setting access privilegefor members of the group (center) to control access by those members tothe information of the user “Neeraj”. In this example, the group iscalled “Friends” and access privilege is binary (i.e., yes/no) althougha finer degree of privacy control (e.g., down to control for individualitems of user “Neeraj”) can be provided if desired. As shown in thispage view, the group may be edited and a facility is provided (e.g.,“New”) to allow the creation of new groups.

On the right page view, a page for setting Neeraj's schedule isprovided. The schedule may be employed to automatically update (orupdate upon request by Neeraj) the information pertaining to Neeraj forother properly authorized users to see. In FIG. 3, an explanation of thetwo modes of operation is provided. In FIG. 4, an exemplary systemarchitecture is proposed. Note that the architecture is only exemplaryand quite technology specific. However, variations of the architectureis possible and should be well understood by those skilled in the art.In FIG. 5, exemplary registration and log-in procedures are illustrated.In the exemplary implementation, the newly registered user is requestedto enter the data pertaining to 3 other users to facilitate rapidexpansion of the user base. However, this is optional and not absolutelyrequired although in general, such entry tends to be quite advantageous(and of course the more the better) in expanding the reach andusefulness of the Imahima service. In FIG. 6, greater details pertainingto one exemplary registration procedure is described. In FIG. 7,exemplary application flows are illustrated to show how the servicewould normally be used. In FIG. 8, exemplary views of the public modeand the private mode are illustrated. In FIG. 9, exemplary views of themates screen and the sign-on screen are shown.

Another aspect of the present invention is bar code based e-Coupons.Using the current/future location, current/future activity, thedisclosed system enables a new kind of Just-In-Time Commerce.Advertisers can reach customers who are shopping in the vicinity of thestore, event organizers can reach people with spare time in theneighborhood who may be interested in last minute discounted tickets.These people can see the ad, click on it to get detailed information,download the e-coupon (containing the bar code) and carry it to thestore to get the discount. This is where the bar code based e-couponsbecome effective. They provide a unique and easy means of identifyingthe user of the disclosed system and the particular promotion they havechosen to respond to. By scanning the bar code (part of the e-coupon)digitally displayed on the screen of the mobile device (mobile phones,PDAs . . . ), the clerk at the store location can easily capture thisunique coupon number. Once the e-coupon information has been captured,the applicable discount can be automatically offered to this user. At alater time, by uploading a flat file of these coupon numbers to theserver, merchant can verify promotion effectiveness and go through macroanalysis of the user who responded to the offer. FIG. 10 shows aschematic of how this feature operates.

The bar code can be scanned by a regular scanner available at the cashregister of most stores and provides an easy mechanism for transferringthe e-coupon information from the user to the merchant. The digital barcode enables several new functions:

identification of the user

identification of the coupon and the promotion

identification of discounting information

Once this e-coupon# has been captured by the merchant, a flat file ofthese coupon numbers can be uploaded to the server for further analysis:

promotion effectiveness analysis

macro analysis of the profile of the users that responded to thepromotion

The bar codes on the mobile phones thus close the loop between thesystem, the user and the participating merchant. It becomes possible tofind out not only how many ad impressions we showed and how manyimpressions were clicked on, but also how many actual visitors itgenerated. The disclosed techniques provide a new kind of targetedmarketing vehicle that offers the retailer unprecedented control andefficiency. It is the first system in marketing history that is able totarget qualified individuals by proximity to a store or entertainmentvenue (or intend to be in the vicinity within a particular timeframe)and by current intention. It is like having trained salespeople in thestreet, who are able to spot and qualify prospects by demographic andpsychographic profile, identify their immediate behavioral intentions,and present them with a custom-tailored promotional offer.

The disclosed system and techniques are highly suited to promotions thatare activity/intention-specific, location specific or both. For example,the disclosed system might be used to offer an e-coupon to users who arenear a particular boutique and who are engaged in “shopping” activity.Or it could offer an e-coupon useable at any one of a chain of fast foodrestaurants or drug stores throughout a metropolitan area, but thatwould be targeted by intention or time only (e.g., only users currentlyplanning to eat would receive the coupon.)

This is possible because the disclosed system possesses knowledge ofmore aspects of individual consumer behavior than have been available inthe past. In addition to the usual consumer supplied demographicsobtained during signup, the disclosed system is able to track pastcoupon-response and purchase history, current physical location of user,current/desired activity (shopping/eating/working/etc.), and thepresence of user's friends in the vicinity.

For the consumer, this means receiving messages that are perceived to bevaluable because they are relevant and personalized, accuratelyanticipating and responding to real needs. The delivered messagesdynamically integrate into the current activity and ongoing lifestyle ofthe user. The user is free to click for more information, leadingultimately to the advertiser's website, or to simply accept an e-couponfor a discount.

The following describes how the disclosed system works for targetedintention-specific promotions:

1. Merchant goes to a section of the web site to upload his offer. Hecan select his target user profile by tweaking all of the optionsoffered: age, gender, location(s), intention/activity, timeframe,alone/together, past purchases. The merchant can then define the offer,say “10% off at all purchases at Gap” in Harajuku on Sunday evening. Thesystem assigns a unique promotion ID to this offer (which is used tolater generate the e-coupon#s).

2. User updates his location and status (intention/activity) informationand is shown search results on his mates. At the same time, he is shownspecials and events for that time in that location matching his desiredactivity (shopping/eating, etc.), state (alone/with other male(s)/withother female), and past response (coupon clicks, and purchases).

3. At this point the system matches the user to the merchant using thesecriteria, some specified by the merchant and the rest determined by thesystem based on the user's status. The final list of events/specials tobe shown to the user is sorted based on the cpm rate offered by theadvertiser.

4. User can click on a special to display the e-coupon which has aunique number valid for that location-activity-time zone. User can showthe displayed coupon to the cashier at the merchant to get the offereddiscount. (The user may also simply copy down the number and show it tothe merchant.) If the merchant prefers, the user can be permitted tosimply tell the merchant “I found your offer by the disclosed system” inorder to obtain the discount or premium. (Other “code-word” systems canbe used (e.g., “I like jeans”) or the user could “reserve” a special bytelling the retailer his/her name via phone or email.)

5. The merchant uploads a flat file of coupon numbers to the systemwebsite to receive macro-level analysis of the customers who respondedto his offer. He can then use this information to better targetcustomers for future offers.

6. The merchant has the option of giving users who redeemed couponsadditional incentives via future discounts and other promotional offers.

This may be done by providing a frequent shopper ID to theuser-purchaser (useable to access a webpage). Or the user can click on alink on the coupon after exercising it to get more offers of that typein the future). Apart from systems and methods, computer programproducts are also within the scope of the disclosed teaching. Thesecomputer program products comprise instructions on computer readablemedia that enable a computer to perform the methods disclosed herein.The instructions are not limited, and include but not limited to, sourcecode, object code and executables. The computers on which theinstructions are implemented include, but not limited to, minis, micros,and mainframes. The computer readable medium includes, but not limitedto, floppies, RAMs, ROMs, hard drives, magnetic tapes, cartridges, CDs,DVDs, and internet downloads.

While this invention has been described in terms of several preferredembodiments, there are alterations, permutations, and equivalents whichfall within the scope of this invention. By way of example, although thepoint-and-click and visual interface are discussed throughout, it iscontemplated that user interfaces involving speech recognition (for datainput) and computer-generated voice may also be employed to exchangepresent/future location/activity. Of course other methods of datainput/output may also be employed. It should also be noted that thereare many alternative ways of implementing the methods and apparatuses ofthe present invention. It is therefore intended that the followingappended claims be interpreted as including all such alterations,permutations, and equivalents as fall within the true spirit and scopeof the present invention.

What is claimed is:
 1. A computer-implemented method comprising:receiving, at a server, a message from a mobile computing deviceassociated with a sender, the message including location informationindicating a physical location of the sender at a time when the messagewas sent to the server; determining the sender from the receivedmessage; identifying the physical location of the sender from thereceived message; determining whether access to the physical location ofthe sender has a first type or has a second type; determining one ormore users authorized by the sender to access the physical location ofthe sender if the event is indicated to have the first type; andcommunicating a message to one or more mobile computing devicesassociated with each of the determined one or more users, the messageincluding the physical location of the sender.
 2. Thecomputer-implemented method of claim 1, further comprising: publishingthe physical location of the sender for access to additional users ofthe server if the event is indicated to have the second type.
 3. Thecomputer-implemented method of claim 1, wherein the message includes aninvitation to meet the sender at the physical location of the sender. 4.The computer-implemented method of claim 1, wherein the physicallocation has a name and the sender manually enters the locationinformation indicating the physical location of the sender into themobile computing device associated with the sender by typing the name ofthe physical location via the mobile computing device associated withthe sender.
 5. The computer-implemented method of claim 1, wherein thephysical location has a name and the sender manually enters the locationinformation indicating the physical location of the sender by selectingthe name of the physical location from one or more names associated withphysical locations presented by the mobile computing device associatedwith the sender.
 6. The computer-implemented method of claim 1, whereinthe physical location has a name and the sender manually enters thelocation information indicating the physical location of the sender byselecting the physical location on a map presented by the mobilecomputing device associated with the sender.
 7. The computer-implementedmethod of claim 1, wherein the location information indicating thephysical location of the sender is determined by an automatic locationfinding technology included on the mobile computing device associatedwith the sender.
 8. The computer-implemented method of claim 1, furthercomprising: posting the message on the server for access by thedetermined one or more users.
 9. The computer-implemented method ofclaim 1, wherein the message includes a status associated with thesender, the status determined from the received message from the mobilecomputing device associated with the sender.
 10. Thecomputer-implemented method of claim 1, wherein a message sent to amobile computing device associated with a determined user includesinformation associated with the sender by the server and that thedetermined user is authorized to access by the sender.
 11. Thecomputer-implemented method of claim 1, further comprising:communicating information identifying physical locations received fromone or more additional users that have each authorized the sender toaccess location information associated with an additional user to themobile computing device associated with the sender.
 12. Thecomputer-implemented method of claim 11, wherein the physical locationsreceived from the one or more additional users are within a thresholddistance of the physical location of the sender at the time when themessage was sent to the server.
 13. The computer-implemented method ofclaim 12, wherein the threshold distance is specified by the sender. 14.A computer program product comprising a non-transitory computer readablestorage medium having instructions encoded thereon that, when executedby a processor, cause the processor to: receive, at a server, a messagefrom a mobile computing device associated with a sender, the messageincluding location information indicating a physical location of thesender at a time when the message was sent to the server; determine thesender from the received message; identify the physical location of thesender from the received message; determine whether access to thephysical location of the sender has a first type or has a second type;determine one or more users authorized by the sender to access thephysical location of the sender if the event is indicated to have thefirst type; and communicate a message to one or more mobile computingdevices associated with each of the determined one or more users, themessage including the physical location of the sender.
 15. The computerprogram product of claim 14, wherein the non-transitory computerreadable storage medium further has instructions encoded thereon that,when executed by the processor, cause the processor to: publishing thephysical location of the sender for access to additional users of theserver if the event is indicated to have the second type.
 16. Thecomputer program product of claim 14, wherein the physical location hasa name and the sender manually enters the location informationindicating the physical location of the sender into the mobile computingdevice associated with the sender by typing the name of the physicallocation via the mobile computing device associated with the sender. 17.The computer program product of claim 14, wherein the physical locationhas a name and the sender manually enters the location informationindicating the physical location of the sender by selecting the name ofthe physical location from one or more names associated with physicallocations presented by the mobile computing device associated with thesender.
 18. The computer program product of claim 14, wherein thephysical location has a name and the sender manually enters the locationinformation indicating the physical location of the sender by selectingthe physical location on a map presented by the mobile computing deviceassociated with the sender.
 19. The computer program product of claim14, wherein the location information indicating the physical location ofthe sender is determined by an automatic location finding technologyincluded on the mobile computing device associated with the sender. 20.The computer program product of claim 14 wherein the non-transitorycomputer readable storage medium further has instructions encodedthereon that, when executed by the processor, cause the processor to:communicate information identifying physical locations received from oneor more additional users that have each authorized the sender to accesslocation information associated with an additional user to the mobilecomputing device associated with the sender.
 21. The computer programproduct of claim 20, wherein the physical locations received from theone or more additional users are within a threshold distance of thephysical location of the sender at the time when the message was sent tothe server.