System and method for proximity based networked mobile communication

ABSTRACT

Communication between users of mobile devices is provided based on proximities between the users. Users are given unique identifiers, which are stored on a server, and mobile devices with the unique identifiers broadcast transmissions with their unique identifiers. The mobile devices listen for incoming identifiers from other mobile devices, and devices are detected directly or through an external radio communication device or hotspot. Additionally, indirect detection through another mobile device or hotspot is used to linking the first mobile device and the second mobile device. The detection is used to form a group of two or more mobile devices, providing at least a subset of profile information associated with the list of users in the group to the first mobile device to form proximity groups.

RELATED APPLICATION(S)

The present disclosure claims priority to Provisional Patent ApplicationNo. 62/152,838 filed Apr. 25, 2015, Provisional Patent Application No.62/218,487 filed Sep. 14, 2015 and Provisional Patent Application No.62/260,593 filed Nov. 29, 2015, which are filed by the inventors hereofand the entirety of which are incorporated by reference herein.

BACKGROUND

Field

The present disclosure relates generally to digital communicationsystems and methods and more specifically to digital communicationsystems and methods for proximity based networked mobile communication.

Background

Users of mobile communication devices are able to connect with oneanother through the use of social networking platforms in conjunctionwith applications on the mobile communication devices using acommunication protocol. The communication protocol can be cellular orwireless based. In order to connect with a member of a social networkingplatform, a user of a mobile communication device must first registerwith the social networking platform and have some knowledge of themember to whom the connection is desired. The knowledge of the memberallows the user of the mobile communication device to send a connectionrequest to the member.

Normally, acceptance of the connection request by the member is requiredfor the user of the mobile communication device to communicate directlywith the member. Without information identifying or related to a memberof a social networking platform, the user of the mobile communicationdevice is seemingly a stranger and has no way of communicating with themember.

In the case of people within proximity to one another, there may befurther reason to connect while using a wireless device, for example, ifface-to-face communication is impractical or socially awkward. It iswithin the aforementioned context that a need for the disclosedtechnology has arisen. Thus, there is a need to provide a way ofestablishing wireless communication based at least in part on proximityof users to each other.

SUMMARY

Communications are provided between users of mobile devices based onproximities between the users. The users are registered on one or moreservers. A unique identifier is generated for each user, is stored onone or more servers, and providing the unique identifier to therespective mobile devices to be stored on the respective mobile devices,and a user profile us associated with each unique identifier. At least aplurality of the mobile devices broadcast transmissions with theirunique identifiers, and at least a plurality of the mobile deviceslisten for incoming identifiers from other mobile devices. In the caseof a first mobile device detecting a second mobile device, the firstmobile device receives the a unique identifier associated with thesecond mobile device.

The unique identifiers of the first and second mobile devices are usedto establish detection. The detection comprises detections made directlybetween two devices, detection between two devices through an externalradio communication device or hotspot, or indirect detection throughanother mobile device or devices linking the first mobile device and thesecond mobile device. The established detection is used to form a groupof two or more mobile devices. A list of users or an updated list ofusers in the group. If the first mobile device does not have the profileinformation regarding users associated with other mobile devices in thegroup, at least a subset of profile information associated with the listof users in the group to the first mobile device is provided.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a schematic diagram illustrating a system for proximity basednetworked mobile communication according to the present disclosure.

FIGS. 2A-2C are schematic diagrams illustrating a system for proximitybased networked mobile communications in various environments. FIG. 2Aillustrates a system for proximity based networked mobile communicationin which at least one mobile device is outside of Wi-Fi range. FIG. 2Billustrates a system for proximity based networked mobile communicationcommunicating with users within Wi-Fi range of each other. FIG. 2Cillustrates a system for proximity based networked mobile communicationused to communicate with a fixed station.

FIGS. 3A and 3B are schematic flow charts showing downloading,installation and registration of a mobile device. FIG. 3A illustrates amobile application process according to the present disclosure. FIG. 3Billustrates a mobile application process according to the presentdisclosure.

FIG. 4 is a schematic block diagram illustrating a server systemaccording to the present disclosure.

FIG. 5 is a schematic diagram illustrating a user interface scenarioaccording to the present disclosure.

FIG. 6 is a schematic diagram illustrating an exemplary computerarchitecture for use with the present disclosure.

FIGS. 7A and 7B are schematic diagrams showing the operation of thesystem without and with an ability to respond when a mobile device is inan “inactive” mode. FIG. 7A shows a configuration in which “inactivemode” response is not enabled. FIG. 7B shows what a proximity-basedsystem in accordance with the mobile device able to respond when in an“inactive” state.

FIG. 8 is a schematic diagram of a group of mobile devices associatedwith users in proximity to each other and in proximity to a Wi-Fi hotspot.

FIG. 9 is a schematic block diagram showing the communication used toestablish groups.

FIGS. 10A-10C are representations of mobile device displays of contactsor other users to provide a proximity display. FIG. 10A depicts astarting page. FIG. 10B depicts a similar page obtained by removingmessage information.

FIGS. 11A and 11B are schematic diagrams depicting a Presence GroupAggregation System platform in its functional aspect. FIG. 11A showsestablishing proximity. FIG. 11B is a three ring model, based on thediagram of FIG. 11A, based on a user's nearby user experience.

DETAILED DESCRIPTION Overview

Various aspects of methods and systems for proximity based networkedmobile communication can be found in exemplary configurations of thedisclosed technology. References are made in detail to theconfigurations of the disclosed technology, non-limiting examples ofwhich are illustrated in the accompanying drawings. While the disclosedtechnology will be described in conjunction with the disclosedconfigurations, it will be understood that they are not intended tolimit the disclosed technology to these configurations. On the contrary,the disclosed technology is intended to cover alternatives,modifications and equivalents, which may be included within the spiritand scope of the disclosed technology as defined by the appended claims.Furthermore, in the following detailed description, numerous specificdetails are set forth to provide a thorough understanding of thedisclosed technology, which can be practiced by one of ordinary skill inthe art without these specific details. In other instances, well-knownmethods, procedures, components, and circuits have not been described indetail as to not unnecessarily obscure aspects of the presentdisclosure.

In a first configuration, a plurality of users each associated with amobile computing device is within proximity of a wireless frequencyrange including Wi-Fi and/or Bluetooth (registered trademark ofBluetooth Special Interest Group of Kirkland, Wash.). A mobileapplication on a registered mobile computing device causes the mobilecomputing device to advertise and listen to unique user identifiers viawireless including Bluetooth frequencies. In this context, “advertise”refers to broadcast of data so that other devices within range maybecome aware of the presence of the device broadcasting the data.Detected unique identification phone data from the advertisementscomprising Unique User Identification (UUID) such as Bluetooth LowEnergy UUID &/or Randomly Generated Identifier from 0 to 4294967295, MACaddress and SSID information are transmitted in a query to the serversystem and cross referenced with registered member information. By theuse of unique identifiers, obtained as either direct deviceidentification (e.g., MAC address) or assigned identifiers (e.g., UUID),positive matches of registered members are displayed on the mobilecomputing device and communication between the mobile computing deviceand mobile computing devices associated with registered members isenabled. The use of a UUID has particular advantages, in that the UUIDis intended for broadcast transmission, whereas some other identifiers,such as MAC addresses, are not always available for security or otherreasons.

While specific examples of communication protocols are described, it iscontemplated that other communication protocols may be used inaccordance with the present disclosure.

According to the present disclosure, a registered user of the proximitybased networked communication system can communicate with otherregistered users purely based on proximity rather than prior knowledgeof the registered users. A registered user of the proximity basednetworked communication system can broadcast a message, view profiles ofnearby users, comment on photos, and anonymously and non-anonymouslychoose “Gifts” to post next to the picture, call and/or video conferenceto other registered users who are within proximity of the registereduser. Examples of such a scenario include social scenarios as well aslaw-enforcement scenarios such as Amber alerts (information regardingmissing children).

In addition to the above-referenced functionalities, the system can showboth users each other as soon as the first user sees the second user.The system does not wait for B to identify A; it already shows A on B'sdisplay screen as soon as B is shown on A's screen. The system alsoshows A what is on C's Screen. By way of non-limiting example, A sees Band C but does not see D, either because D is too far away or because itjust has not processed the information concerning D yet. So long assomeone else sees D, then A will see D as well. For example, if either Bor C sees D, then A will see D as well. In this manner, there are nocommunication delays because users can observe each other at differenttimes, in some cases with minute differentials. As soon as one person inthe room picks up, everyone else gets up to speed.

The users' phone number database can also be integrated such that thesystem provides a warning that someone in their phone book contacts iswithin a user's “proximity zone”. The system may create special statusfor people that the user wishes to see or avoid. The special status forpeople that the user wishes to see can include, by way of non-limitingexample, best friends or crushes, so that one can observe which of theirsocial media contacts, friends and friends of friends are within theproximity. The special status for people that the user wishes to avoidcan include former partners, people restricted by restraining orders,parents, friends and relatives. The system also has a capability ofusing a sex offender database to warn parents that that a possible sexoffender is within the Wi-Fi-“danger” zone or proximity.

The system can cross reference phone numbers and social media storedwithin the phone. The system may also be integrated with socialnetworking and professional social networking profiles with thisapplication for business conferences.

Integration of Tinder and similar dating and/or a features allows usersto indicate dating and/or business interest in other nearby users, andwhich will only notify the other users if the other user also indicatedthis same interest. This system will be highly effective and efficientin matchmaking between people within conferences, nightclubs and bars.As an adjunct to this, the system can link to niche dating sites andother special interest groups, so that users who so-desire can identifyother users who are in the proximity and who share the same commoninterests. The system can further filter such associations according tosubscriber status, provided that the site permits such information to beaccessed. According to one non-limiting configuration, informationconcerning special interests is provided only if the user is alsosubscribed to or identified with the special interest. According toanother configuration, the user can select whether to limit disclosureof the special interest.

Integration with point of sale systems such as Google Wallet, ApplePayand Paypal may be obtained. Integration with social media sites (e.g.,Facebook) can be used to allow members to send invites and to revealtheir social media links and their mutual friends when in social venueswhere they would like to share that information. In differentnon-limiting configurations, payment can be made through the system,externally, or according to the user's choice.

The disclosed technology will additionally provide a peer-to-peer ridesharing platform which will allow users to send ride requests byselecting their destination and choosing their own price that they arewilling to pay. All nearby users of the disclosed technology willreceive this ride request and they will have the ability to agree or tosend a counter offer. The close range network will be ideal in providingthe user with individuals who are in the immediate vicinity and thusimmediately ready to initiate the requested journey. The Paymentprocessing system will require users to scan a credit card and will holda deposit in order to only allow prepaid users to send ride requests.

Instant Food Delivery Service: The disclosed technology will alsoprovide users the ability to request food at the click of a button.Utilizing a proximity nearby user that represents the nearby foodproduction services, for example the nearby restaurants will be able tojoin the network using a special commercial account, and this will allowusers to instantly make orders by clicking on the Profiles of thesenearby options. This will provide the advantage of exclusively providingits own food delivery services to nearby users.

Face Recognition Database of Similarities in People

The disclosed technology is useful, when coupled with facial images, toassociate these individuals with profiles of individuals in proximity tothe user, receiving, from the mobile device an image of a person. Facialrecognition can be used to determine if a match exists between the imageand a user detected in proximity to the device providing the image ofthe person. This is useful for identification of people who a user mayrecognize but not know their name and for assisting people withprosopagnosia.

If a user provides an image of a person to the server, the server canuse facial recognition to determine if a match exists between the imageand a user in proximity to the user providing the image.

The disclosed technology will additionally have the ability to provideusers with other individuals in the database that most resemble thatindividual. Resemblance is measured with facial recognition algorithmsthat represent deviations in facial features and dimensions. Thisservice provides entertainment value as well as the service of givingpeople “another chance” at romance with their specific taste. Indifferent non-limiting configurations, the face recognition can beperformed by the user's mobile device or by face recognition software ona server.

Technique

FIG. 1 is a schematic diagram illustrating a system for proximity basednetworked mobile communication 100 according to the present disclosure.In FIG. 1, proximity based networked mobile communication system 100comprises a first mobile device 101 having a first mobile computingdevice 102 communicably coupled via internet/communication network 107to server system 108. The system 100 further comprises a second mobiledevice 103 having a second mobile computing device 104 communicablycoupled via internet/communication network 107 to server system 108.Internet/communication network 107 can be any communication network thatallows data to be communicated or transferred from one point to another.Such a network might be wired or wireless as deemed necessary to beconsistent with the spirit and scope of the present disclosure.

In FIG. 1, the first mobile device 101 can utilize a mobile application(not shown here) on mobile computing device 102 to access server system108 to register with server system 108 to become a member of theproximity based networked mobile communication system. The second mobiledevice 103 can utilize a mobile application (not shown here) on mobilecomputing device 104 to access server system 108 to register with serversystem 108 to also become a member of the proximity based networkedmobile communication system. The first mobile device 101 and secondmobile device 103 utilize the mobile application on their respectivedevices (102, 104) to communicate with each other while their devicesare both within a wireless frequency range including Wi-Fi and/orBluetooth 105. Wireless frequency range including Wi-Fi and/or Bluetooth105 is associated with internet router 106; that is, in the presentconfiguration, internet router 106 is either Bluetooth enabled and/orhas Wi-Fi capability.

Router 106 receives data from internet/communication network. Router 106is a Wi-Fi router capable of receiving data from the internet and thatis compliant with 802.11 standards or with other appropriate standards.Router 106, as mentioned, is capable of receiving data frominternet/communication network 107. Router 106 is also/or Bluetoothcapable, operating in the unlicensed industrial, scientific and medical(ISM) band at 2.4 to 2.485 GHz, using a spread spectrum, frequencyhopping, full-duplex signal at a nominal rate of 1600 hops/sec. It willbe appreciated that, while the present disclosure depicts mobilecomputing device as smartphones, any mobile computing device with thecomputing and communication capabilities to perform the functionalitiesdescribed herein are within the scope of the present disclosure.

The first mobile device 101 and second mobile device 103 can thenperform functionalities related to proximity based networked mobilecommunication consistent with the spirit and scope of the presentdisclosure. Although not shown, further descriptions of variousconfigurations of the disclosed technology will be described withreference to the following figures.

FIGS. 2A-2C are schematic diagrams illustrating a system for proximitybased networked mobile communications in various environments. FIG. 2Aillustrates a system for proximity based networked mobile communicationin which at least one mobile device is outside of Wi-Fi range. FIG. 2Billustrates a system for proximity based networked mobile communicationcommunicating with users within Wi-Fi range of each other. FIG. 2Cillustrates a system for proximity based networked mobile communicationused to communicate with a fixed station.

In FIG. 2A, internet router 206 provides for wireless frequenciesincluding wireless frequency range including Wi-Fi and/or Bluetooth 205.Users 201, 203, 209, and 211 each have respective mobile computingdevices 202, 204, 210, and 212 and all of them are within wirelessfrequency range including Wi-Fi and/or Bluetooth 205.

Because all of the users 201, 203, 209, and 211 and their respectivemobile computing devices 202, 204, 210, and 212 are within wirelessfrequency range including Wi-Fi and/or Bluetooth 205, and because theyare all registered members of the proximity based networked mobilecommunication system, they can all communicate with each other.

In FIG. 2A, a user 215 having mobile computing device 216, is not withinthe wireless frequency range including Wi-Fi and/or Bluetooth 205.Regardless of whether user 215 is registered with the proximity basednetworked mobile communication system, because user 215 is outside ofthe wireless frequency range including Wi-Fi and/or Bluetooth 205, theusers and their mobile computing devices within the wireless frequencyrange including Wi-Fi and/or Bluetooth cannot communicate with user 215through the system.

Optionally, each of the users 201, 203, 209, and 211 may use theirrespective mobile computing devices 202, 204, 210, and 212 while withinwireless frequency range including Wi-Fi and/or Bluetooth 205 to requesta social networking connection with any of the other devices. Socialnetworking can include Facebook, Twitter, Instagram, and the like, aswell as specialized and professional social networking services.

FIG. 2B illustrates a system for proximity based networked mobilecommunication 220 according to the present disclosure. In FIG. 2B,internet router 206 provides for a wireless frequency range includingWi-Fi and/or Bluetooth 205. Users 201, 203, 209, and 211 each haverespective mobile computing devices 202, 204, 210, and 212 and all ofthem are within wireless frequency range including Wi-Fi and/orBluetooth 205.

In FIG. 2B, all of the users 201, 203, 209, and 211 and their respectivemobile computing devices 202, 204, 210, and 212 are within wirelessfrequency range including Wi-Fi and/or Bluetooth 205. Because they areall registered members of the proximity based networked mobilecommunication system, user 203 can broadcast a message, call and/orvideo conference and view/comment/“gift” photos using mobile computingdevice 204 to the other users 209, 201, 211 and their devices 210, 202,212.

FIG. 2C illustrates a system for proximity based networked mobilecommunication 240 according to the present disclosure. In FIG. 2C,internet router 206 provides for a wireless frequency range includingWi-Fi and/or Bluetooth 205. Users 201, 203, and 213 each have respectivemobile computing devices 202, 204, and 214 and all of them are withinwireless frequency range including Wi-Fi and/or Bluetooth 205.Alternatively, it is possible to provide one or more devices, such asdevice 214, which is wire-connected, provided it can communicate, albeitindirectly, with the wireless network 205. In linking a wire-connecteddevice, it may be desired to identify the location of the wire-connecteddevice. This can be done by inference, in that the device is connectedto a communication device with a known location, by manual input oflocation or by matching the location of the wire-connected device tothat of a wireless device.

In FIG. 2C, user 213 provides a service or product desired by users 201and 203. All of the users 201, 203, and 213 and their respective mobilecomputing devices 202, 204, and 214 are within wireless frequency rangeincluding Wi-Fi and/or Bluetooth 205. They are all registered members ofthe proximity based networked mobile communication system. As a result,users 203 and 201 can use their respective devices 204 and 202 totransmit order requests to user 213's computing device 214. Further,users 203 and 201 can use their respective devices 204 and 202 tocomplete payment for their orders via payment processing with computingdevice 214 and a third party payment service.

FIGS. 3A and 3B are schematic flow chart showing the installation andoperation of a mobile application process onto a mobile device. FIG. 3Aillustrates the mobile application process according to the presentdisclosure. FIG. 3B illustrates a mobile application process accordingto the present disclosure. The mobile application enables the mobilecomputing device to communicate on the networked communication systemaccording to the present disclosure.

In FIG. 3A, a user having a mobile computing device downloads andinstalls a mobile application (step 301) onto the device. The mobileapplication causes the mobile computing device to connect to a remoteserver (step 302). Through the mobile application, the user registerswith the remote server (step 303). As part of registration, profilecomponents are transmitted from the mobile computing device to theserver (step 304). Profile components can include the user's name and adigital photograph of the user, as well as any other information theuser would like to include in the profile.

In FIG. 3A, the mobile application further causes the mobile computingdevice to transmit the device's Unique Identifiers, including but notlimited to a randomly generated identifier, Unique User Identification(UUID) such as Bluetooth Low Energy UUID &/or Randomly GeneratedIdentifier from 0 to 4294967295, MAC address (step 305) to the server aswell as an SSID (step 306).

In FIG. 3B, a mobile application causes a mobile computing device tobroadcast an “advertisement hotspot” (step 307) for a predefined periodof time. The predefined period of time can be based on proximity andfrequency of user input or stimuli. Within this context, “advertising”refers to signaling the presence of a mobile device, such as bytransmitting a radio beacon.

The mobile application further causes the mobile computing device toscan “listen” for Wi-Fi and Bluetooth advertisements, for example byusing a Bluetooth LE Advertising Capability, or hotspots (step 308). Themobile computing device transmits the detected unique identificationhotspot information to the remote server system (step 309). Uponcomparison by the remote server system of the hotspot information andunique identifier for example UUID or MAC addresses, the mobilecomputing device receives user information from the server (step 310).

In FIG. 3B, the mobile application displays the received userinformation (step 311), thereby displaying registered users withinproximity of the mobile computing device. Finally, communication isenabled (step 312) between the mobile computing device and any of theregistered users within proximity of the mobile computing device.According to one configuration, communication between the mobilecomputing device and the registered users within proximity of the mobilecomputing device only continues as long as the mobile computing deviceand devices associated with the registered users remain within proximityof the mobile computing device.

FIG. 4 is a schematic block diagram illustrating a server system 108according to the present disclosure. In FIG. 4, server system 108includes application server 404. Application server 404 controls allnetworked communication capabilities accessible by members of thenetwork. Mobile computing devices associated with members of the systemtransmit information to the server system 108. The information isprocessed by a hotspot (Unique Identifier Advertisement) and userinformation retrieval module 406. Server 108 is communicably coupled todatabase 418, in which information for all registered users and hotspotsand device information is stored.

FIG. 5 is a schematic diagram illustrating a user interface scenarioaccording to the present disclosure. In FIG. 5, a wireless frequencyrange including Wi-Fi and/or Bluetooth 105 includes a plurality of usersin its proximity. Users A, B, and C are within proximity of wirelessfrequency range including Wi-Fi and/or Bluetooth 105, and their presenceis indicated on the user interfaces of mobile computing devices of otherusers in wireless frequency range including Wi-Fi and/or Bluetooth 105.User D, who has recently left the wireless frequency range includingWi-Fi and/or Bluetooth, is also displayed as such.

FIG. 6 is a schematic diagram illustrating an exemplary computerarchitecture 600 for use with the present disclosure. According to oneconfiguration, server system employs architectures similar to thatdepicted in FIG. 6. The present disclosure comprises various computingentities that may have an architecture according to exemplaryarchitecture 600. One configuration of architecture 600 comprises asystem bus 620 for communicating information, and a processor 610coupled to bus 620 for processing information. Architecture 600 furthercomprises a random access memory (RAM) or other dynamic storage device625, which functions as a main memory, coupled to bus 620 for storinginformation and instructions to be executed by processor 610. Datastorage device 625 also may be used for storing temporary variables orother intermediate information during execution of instructions byprocessor 610. Architecture 600 may also include a read only memory(ROM) and/or other static storage device 626 coupled to bus 620 forstoring static information and instructions used by processor 610.

A data storage device 625 such as a magnetic disk or optical disc andits corresponding drive may also be coupled to architecture 600 forstoring information and instructions. Architecture 600 can also becoupled to a second I/O bus 650 via an I/O interface 630. A plurality ofI/O devices may be coupled to I/O bus 650, including a display device643, an input device (e.g., an alphanumeric input device 642 and/or acursor control device 641).

The communication device 640 allows for access to other computers (e.g.,servers or clients) via a network. The communication device 640 maycomprise one or more modems, network interface cards, wireless networkinterfaces or other interface devices, such as those used for couplingto Ethernet, token ring, or other types of networks.

In addition to the above-referenced functionalities, the system of thepresent disclosure comprises the following systems configuration tooptimize the communication network. Once the first user has received apositive identity of a nearby user; both users will appear on eachother's software modules.

Clustering

FIGS. 7A and 7B are schematic diagrams showing the operation of thesystem without and with an ability to respond when a mobile device is inan “inactive” mode. FIG. 7A shows a configuration of a system 701 inwhich “inactive mode” response is not enabled, whereas FIG. 7B shows aconfiguration of a system 702 in which the “inactive mode” is enabled.Both FIGS. 7A and 7B show clustering server 705, an internet andcommunication network, FIG. 7A shows a configuration in which “inactivemode” response is not enabled. Both FIGS. 7A and 7B show clusteringserver 705, an internet and communication network, represented by cloud707 and multiple mobile devices 711, 712, 713, 714, associated withusers.

As shown, system 701 also includes additional mobile devices namelymobile device 713 and mobile device 714, which are also registered withclustering server 1002. Mobile devices 711, 712, 713, 714 have beenpreviously registered with clustering server 705.

FIG. 7A shows direct communications executed through internet andcommunication network 707 or directly device-to-device between activedevices. Clustering server 705 is also communicably coupled to anothermobile device 712 via internet and communication network 707. FIG. 7Bshows the system operating as a proximity-based system in accordancewith the mobile device able to respond when in an “inactive” state.

Configurations of the disclosed technology aggregates detected clustersof nearby users based on beacon detection. In one configuration, eachuser device includes a BLE (Bluetooth Low Energy) beacon that cantransmit small amounts of data. Typically, transmission via BLE might beup to a distance of >100 meters. A configuration of the disclosedtechnology creates clusters of currently active user groups. In oneconfiguration, clusters are populated by active users within proximityof each other. As an example, an active mobile device 712 might have aninitiated clustering application and an active beacon; a mobile device713 may include an initiated clustering application as well as an activebeacon; and a mobile device 714 may include an initiated clusteringapplication as well as an active beacon. Here, the cluster would bepopulated by mobile device 712 and mobile device 713 and mobile device714.

Additionally, the system is able to be adjusted to provide a lag in thetimeframe that individuals disappear from a user's nearby viewcontroller. This is a critical element in extending the network ofnearby users, so that more individuals will be visible to one another.

The shaded areas around mobile devices 712, 713 and 714 represent theWi-Fi-range of mobile device 712.

Algorithm

The algorithm for aggregating users (i.e. populating user clusters) isbased on periodic detection reports from mobile devices. Each listeningmobile device periodically detect another mobile device and sendinformation about the detected mobile device to the user. Specifically,each mobile device sends not only its identifier to a clustering server(e.g. server system 108) that stores and processes user and clustermembership information, each mobile device also sends the identifiers ofother detected devices.

Mobile device 711 is active, that is, it has an active (advertising)beacon (not shown) and a proximity-based network application (not shown)that is active. Mobile device 712 also has an active beacon (not shown)and a proximity-based network application (not shown) that is active.

In operation, because mobile device 711 is on (active), it can detectand communicate with mobile device 712, which is within proximity (Wi-Fior Bluetooth based communication). Mobile device 712 can similarlycommunicate with mobile device 711 because they are proximal to eachother. Each of mobile device 711 and mobile device 712 can furthercommunicate with clustering server 705 via internet and communicationnetwork 707.

In contrast, mobile device 713 cannot communicate with mobile device 711because mobile device 713 is inactive. No communication occurs as longas mobile device 713 remains inactive even though mobile device 711 isactive. Here, inactive means that mobile device 713 has an activelistening beacon but has a proximity-based network advertisingapplication that is not running. Mobile device 714 also cannotcommunicate with mobile device 711 because mobile device 714 isinactive, having an active beacon and an inactive advertisingproximity-based network application. Further, neither mobile device 713nor mobile device 714 can communicate with clustering server 705 asmobile device 713 and mobile device 714 are inactive.

FIG. 7B shows what a proximity-based system 702 in accordance with themobile device being able to respond when in an “inactive” state. In FIG.7B, proximity-based system 702 includes clustering server 705 that iscommunicably coupled to mobile device 711 via internet and communicationnetwork 707. As shown, system 702 also includes additional mobiledevices including mobile device 712, mobile device 713 and mobile device714, which are have been previously registered with clustering server705.

Mobile device 711 is active, that is, it has an active beacon (notshown) and a proximity-based network application (not shown) that isactive. Mobile device 712, mobile device 713 and mobile device 714 areinactive; they each have a beacon; however, their proximity-basednetwork application (not shown) has not been executed and is inactive.By way of non-limiting example, a mobile device is “inactive” when thedevice's user interface application has been terminated intentionally bythe user “shut down” or been sent to the background whereas. For examplein some iPhones, the phone is “inactive” when the phone is notadvertising Unique Identifiers (e.g., Bluetooth Low Energy UUID &/orRandomly Generated Identifier from 0 to 4294967295) but it is stilllistening to unique identifiers. Each time the mobile device senses aunique identifier advertisement the device immediately transmits thisuser's ID to the server via various methods including currently a webservice call.

In operation, unlike the system 701 of FIG. 7A that requires that twomobile devices be active in order to communicate, in the configurationof FIG. 7B, communication is facilitated with “inactive” devices so longas at least one active advertising mobile device is present. As depictedin FIG. 7B, mobile device 711 is on (active). Once its proximity-basednetwork application is open, mobile device 711 advertises and pings outor transmits signals across using wireless network including Wi-Fi andBluetooth frequencies. Responsive thereof, although inactive, mobiledevices 712, 713 and 714 are listening and do pickup the advertisingsignals from mobile device 711. Each of the listening mobile device 712,713 and 714 then retrieves the Unique Identifier including but notlimited to UUID (Universally Unique Identifier) and/or “randomlygenerated identifier” associated with mobile device 711. Then mobiledevice 712, mobile device 713 and mobile device 714 all separately sendthe retrieved Unique identifier, for example UUID “randomly generatedidentifier”, for 711 as well as each of their own UUIDs to clusteringserver 902.

In one configuration, the communication from the mobile devices arriveas separate web service calls; the service calls are then logicallylinked and grouped based on pairs of the mobile device 711's Unique IDand the transmitters ID (UUID). This new user presence group iscommunicated to mobile device 711 and mobile devices 712, 713 and 714and the result is that devices 711, 712, 713 and 714 “the users inproximity” appear as nearby users on the phones of devices 711, 712, 713and 714. Without the assistance of the disclosed technology, the user ofdevice 711 would not be able to see any of devices 712, 713 and 714.Therefore the disclosed technology is revolutionary in terms of itsabilities to create a viable proximity based communication platform.

In a configuration, the clustering server applies the followingalgorithm to group them together:

-   -   1. User A sees User B    -   2. Is user B in the system?    -   3. No    -   4. Is User A in the system?    -   5. No    -   6. Create presence group. Add user A and user B to presence        group    -   7. Yes    -   8. Add user B to the presence group of A    -   9. Update timestamp of both A and B in user record    -   10. Yes    -   11. Is User A in the system?    -   12. No    -   13. Add user A to the presence group of B    -   14. Update timestamp of both A and B in user record    -   15. Yes    -   16. Is A in same presence group as B?    -   17. Yes    -   18. Update timestamps on A and B in user record    -   19. No    -   20. Update timestamps on A and B in user record    -   21. Combine presence groups for A and B    -   22. Take all users from presence group B, move to presence group        A    -   23. Delete presence group B

In one configuration, after running through the above algorithm tocreate presence groups, a purge cycle is run. During a purge cycle, allusers that are part of a presence group that have not detected any otheruser in the presence group or have not been detected by any other usersin the presence group in a specified period are purged from theirpresence group. This period referred to as the timeout period may be 60seconds, for example. Users that are grouped by detections will time outand become degrouped after an adjustable amount of seconds of nodetections.

At the end of the above processing, the web service returns the list ofidentifiers for the other users that are in the same presence group asthe user reporting detections.

Control of Clustering

FIG. 8 is a schematic diagram of a group of mobile devices 801-804associated with users in proximity to each other and in proximity to aWi-Fi hot spot 811. In this example, the system populates user clustersthat include no more than one active user, such as mobile device 801,where the rest of the mobile devices 802, 803, 804 can be inactive.Generally, as an example, a user cluster might be populated with anactive mobile device 801, an inactive mobile device 802 and inactivemobile device 803. Active mobile device 801 is a mobile/computing devicethat includes an active advertising beacon and a proximity-based networkapplication developed in accordance with a configuration of thedisclosed technology. Active mobile device 801 starts theproximity-based network application, which then remains active alongwith the beacon.

Inactive mobile device 802 is a mobile/computing device that includes anactive advertising beacon as well as the proximity-based networkapplication of the present configuration. Here, the proximity-basednetwork application is not executed and remains inactive. This occursfor example on iPhones, in which, when the app has been put into thebackground or has been terminated by the user, the app will no longeradvertise its Unique Identifier UUID ‘and/or’ randomly generatedidentifier”, and the fact that it stops advertising limits the nearbyusers able to detect it. This is also the permanent case for AndroidDevices 4.3 and higher which do not have Bluetooth LE AdvertisingCapabilities. Therefore the disclosed technology has created a viablesystem to workaround this technological limitation. Similarly, inactivemobile device 803 is a mobile/computing device that includes an activeadvertising beacon and an inactive proximity-based network application.

While mobile device 804 may be considered to be within a desiredproximity to mobile device 801, mobile device 804 is outside of theproximity of Wi-Fi hot spot 811, and also is outside of directcommunication range and Bluetooth LE Advertising Capabilities of mobiledevice 801. Mobile device 804 is, however within direct communicationrange and Bluetooth LE Advertising Capabilities of mobile device 803.Since mobile device 803 is able to relay the UUID and/or “randomlygenerated identifier” of mobile devices 801 and 804, mobile devices 801and 804 are made aware of their mutual proximity.

This configuration also applies to the immediate sharing of secondaryidentified users. For example not only does mobile device 801 not waitfor mobile device 802 to identify mobile device 801, but it alreadyshows mobile device 801 on mobile device 802's display screen as soon asmobile device 802 is shown on mobile device 801's screen.

In one configuration, the system also shows mobile device 801 what is onmobile device 803's screen. For example the user of mobile device 801sees mobile devices 802 and 803 but does not see mobile device 804,either because mobile device 804 is too far away or because it just hasnot processed it yet. In such a configuration, if any other user inproximity: if either mobile device 802 or mobile device 803 detectsmobile device 804, then mobile device 801 will detect mobile device 804as well. In this manner, there are no communication delays which areotherwise caused from users observing each other at different secondintervals between network scans, in some cases with minutedifferentials. As soon as one person in the room picks up, everyone elsegets up to speed.

Determining Proximity and Presence Group Selection

The “degrees of separation” or proximity are useful to control the sizeof the presence group. If the area has few local users, it is likelythat the user would want to engage several degrees of separation untilthe physical proximity becomes too distant. On the other hand, if thereare a large number of eligible users within a small area, then the usermay elect to search for fewer degrees of separation.

Likewise, the user may wish to select according to category of user. Forexample, if the user is in a large gathering of people, the user maywish to select members of the user's university, members of the user'ssocial group or another classification. The user may also wish to limitthe group to people in the user's address book or other list ofcontacts.

FIG. 9 is a schematic block diagram showing the communication used toestablish presence groups. A presence group is a set of other userswithin proximity to the user. The presence group may be established bydirect connection via short range radio communication or through a Wi-Fihotspot. Additionally, the presence group may comprise users who areconnected by degree of separation, as will be described. Within thiscontext, “advertising” refers to signaling the presence of a mobiledevice, such as by transmitting a radio beacon. By way of non-limitingexamples, advertising can be performed via Bluetooth or Wi-Fi hotspots.

To establish a presence group, the user registers on the system (step911). The user's profile is then automatically created via third (step912) by third party application programming interfaces (APIs) such associal media APIs and other networks by which the user is known (step913). It is further possible for the user to establish an identity withthe system itself and use that identity for establishing a profile. Thesystem's server then generates or issues a unique identifier for theuser and links that unique identifier with the user's mobile device(step 914).

Once the unique identifier is generated or issued by the server (step914), subsequent communications from the mobile device use that uniqueidentifier. If the user has multiple mobile devices, the server mayassign the same unique identifier (step 914) to these additionaldevices, much as a username-and-password combination can be used bysomeone to sign on through multiple devices.

The mobile then initiates listening for incoming identifiers from othermobiles. (step 921). The identifier is transmitted using standardcommunication protocols which are available on most Wi-Fi and Bluetoothcommunication systems. In addition to listening (step 921), if themobile has the required hardware, the mobile broadcasts the uniqueidentifier (step 922). This activity is referred to herein as“advertising” in that the wireless device “advertises” its presenceduring radio beacon transmissions.

The wireless device also listens (step 931) for other devices within itsproximity. This is done in both active mode, with the wireless devicehaving full communication and in a quiescent mode, in which the wirelessdevice is not in full operation. If a nearby user is detected (step937), the device sends the detected user's identifier to the server(step 938). The detection is then considered established (step 941).

The established detection (step 941) may be directly from the mobile orindirect from a nearby mobile device, which determines a “degree ofseparation”. The “degree of separation” is similar to a degree ofseparation in a social sense in that a direct detection would be a firstdegree of separation (i.e., outside of the user's device). A seconddegree would be a connection identified as a separate device throughwhich a user is in direct communication. Thus, returning to FIG. 7, ifmobile device 712 is unable to communicate directly with mobile device704, there must be more than one degree of separation between mobiledevices 712 and 704. If there is a single intervening communicationlink, such as from mobile device 712 to mobile device 714 and thencefrom mobile device 714 to mobile device 704, there would be two degreesof separation between mobile devices 712 and 704.

The degrees of separation are applied to forming presence groups. Upondetection a presence group is established (step 946). The results aresent back to the user, as the advertising mobile, to update its list ofnearby presence groups. The updated list is used by the mobile as a newpresence group or updated presence group (step 947). The detectionswithin the presence groups are:

Direct from mobiles broadcasting their identifiers; and

Indirect from mobiles transmitting the unique identifiers of othermobiles.

The system uses these direct and indirect transmissions of mobileidentifiers to list users and the proximities of the users in terms ofdegrees of separation, in order to provide the user with an update ofthe user's presence group.

The server then returns data for each user in the presence group andallows communication between users. This data may be provided for allinstances or provided in response to a request from the user's mobileeither at the request of the user or automatically. Non-limitingexamples of data transferred and communication comprise:

-   -   Username or usernames    -   User profile    -   Messaging    -   Voice communication    -   Video conferencing.    -   Other functions may be provided, which comprise, by way of        non-limiting example:    -   Access to nearby drivers and ride sharing    -   Food on demand    -   Assistance in miscellaneous tasks (“Can you help me with . . .        ?)    -   Networking    -   “Kudos” (called “Gold Gifts”) or other social interaction awards        from other users and user's photographs and other social media        objects.

Additional features can optionally include:

Phone Numbers

Social Media Data

Registered Criminal Databases

Social Networking Services

Restaurant Critiquing Services

Dating Applications

Customer Assistance Requests

Customer Ordering Systems

Payment systems

The system and app have the ability to message, call and video otherusers. In one configuration, this ability is limited to users who withina predetermined proximity to the user. The predetermined proximity canbe defined in terms of physical distance, visual proximity, distance asdetermined by radio signal strength, absolute received radio signalstrength, boundaries stored on a server or any convenient means todefine proximity. In some configurations, the user can limitcommunications through the system to be received from callers within adegree of proximity determined by the user, and in some configurations,the user can separately limit communications through the system to besent to people called within a degree of proximity determined by theuser. In other configurations, communications to or from other users maybe made available for communications with other people selected by theuser.

In addition, media may be broadcast to one or a group of, or all otherusers within a predetermined proximity to the user sending or requestingthe broadcast.

The disclosed technology permits makes proximity via radio signals thedetermining factor if users can communicate with one another in thesystem's network, which itself functions as a social network. Thisfeature can be combined with external social media applications, in thatthe user's communication preferences can be combined with proximity viaradio signals. The combination allows the user to retrieve profiles thatmeet a predetermined combination of proximity via radio signals andidentification of profile links (“Friends”) on social media apps. Afurther configuration of the disclosed technology can disclose socialmedia data, such as but not limited to Facebook. Integrating socialmedia data thereby provides the ability for users to create specialstatus and/or proximity alters of all and/or specific profile links(e.g., Facebook Friends) and/or individuals who have mutual profilelinks.

The disclosed technology is clearly not limited to strictly operating asa messenger; it has the ability to provide advantages over common socialmedia apps in terms of providing a default close range social network.Because the individuals that the user views are the ones around theuser, in the student housing, school and office environments theutility. The disclosed technology allows individual users to view theprofiles of their nearby users including photo albums and personal/workinformation of make comments, start blog and forums, request and acceptfriendships, like pictures, forum postings, etc. Users have the abilityto control their privacy settings to hide their profiles and choose toreveal them to everyone, only friends or on an individual basis.

User Displays Showing Proximity

FIGS. 10A-10C are representations of mobile device displays of contactsor other users to provide a proximity display. FIG. 10A depicts astarting page. FIG. 10B depicts a similar page obtained by removingmessage information (in the case of FIG. 10A incoming text messages).FIG. 10C depicts a selected contact, obtained either from the displayedcontacts, a message, voice call or other action, in which the contact isdepicted in an enlarged format. In this non-limiting example, contactswithin a predetermined range of proximity are displayed as images;however, it is anticipated that individual users may select alternativedisplays, such as text, text and thumbnail image, etc.

Referring to FIG. 10A, the starting page has the ability toautomatically adjust vertically based on the number of nearby users.Therefore when there are no users nearby, the message list will reachthe top of the screen and the user will not need to constantly jump backfrom page to page to check for nearby users. In contrast, the more usersthat appear, the lower the Message Bar will sink down limiting to oneviewable message. Users identified as having social media links with theuser are flagged, as indicated at 1011, 1012.

The disclosed technology includes a logical user interface whichincorporates a control viewer providing users with an adjustablescrolling grid display of all the users nearby; the viewer constantlyadjusts as new nearby users are detected and previously detected usershave left proximity after a predetermined amount of seconds. The NearbyUser display shows users profile picture, User Name and also identifiesif the user is a social network link, such as a Friend or Mutual Friendon Facebook, a Connection or Mutual Connection via Linkedin or any othersocial network that may be integrated into the disclosed technology.

Removal of the message bar is shown in FIG. 10B. Communication with aparticular contact highlights that contact, as shown in FIG. 10C. Theseare the default user settings, which are adjustable by user preferences.

The disclosed technology has the ability to integrate with registeredcriminal databases in partnership with law enforcement agencies in orderto warn parents of potential threats within close proximity.

The disclosed technology provides the ability to display users socialnetworking services, such as but not limited to LinkedIn profiles;naturally this will be most applicable in conferences, retreats andbusiness networking events whereas users will have the ability todisplay their resume and business experience as part of their profile,thereby allowing users to rapidly filter the nearby business contactsand expedite their networking goals by focusing on startingconversations with prescreened business interests.

The disclosed technology provides the ability to integrate restaurantand business critiquing crowd-source review publishers services, such asbut not limited to Yelp, in such way that members of the service will beable to opt-in to the disclosed technology enabling them to identifynearby members within the restaurant and discuss applicable (as well asnon-applicable) feedback and input regarding the restaurants andpotential dishes of interest or promoted by the restaurant.

The disclosed technology provides the ability to integrate withgeo-based dating applications such as but not limited to Tinder;providing a up-close proximity dating application; most applicable in anightclub venue settings whereby users will identify their interest andcreate matches in-close proximity able to instantly communicate inperson; therefore exponentially increasing the effectiveness of theapp's ability to make successful matches.

The disclosed technology provides the ability to integrate customerservice systems in order to facilitate customers requesting assistance.For example customer at Walmart needs help on aisle 4, utilizing thedisclosed technology he can write an SMS to “Walmart Service Reps” andassistance will confirm that they are on their way. Additionallyassistance can rapidly answer geographic based questions regardinglocations of goods, etc.

The disclosed technology provides the ability to integrate orderingsystems: Customers will utilize the disclosed technology in order toplace an order for goods or services; for example ordering meat at thedeli counter at a supermarket. The order is send in an SMS and the orderis confirmed with a responding SMS from the butcher.

The disclosed technology provides the ability to integrate a links topayment systems, such as but not limited to Google Wallet, Apple Pay andPayPal, in order to facilitating purchase to consumers; following theabove example the deli counter at a supermarket, the butcher caninclude, within the order confirmation, a google wallet link enablingthe client to click the link and instantly portal to the appropriategoogle wallet payment screen, thereby further streamlining commerce.

Sustain

The user can set a persistence of presence, by which other users areable to identify that user. Thus, if a user enters an area, other usersare able to identify the user according to the proximity and clusteringcriteria. If the user elects to “sustain” that proximity, the systemwill continue to provide other users with a proximity indication, eventhough the user has left the area. The persistence of the “sustain”function remains until the user's own timeout has expired, or the otheruser clears “sustain” users who are not present. It is further possibleto provide users with an indication as to whether a persistent “sustain”user remains in the area.

The “sustain” function can be set by the user for various amounts oftime according to the user's selection. By way of non-limiting example,the “sustain” function may be set by the user from 1 second to infinite,with an option for no sustain (0 sec). Infinite “sustain” would leavethe duration to other users, who would clear their persistent profileson a regular basis.

The “sustain” function can be useful in circumstances where a userwishes to be available for communication or identification after havingleft the area. Thus, if another user wishes to link a profile to someonewho was in an area, this remains possible even if the user to beidentified has physically left the area.

Situational Awareness

The ability to cluster users and identify users according to othercategories allows users to identify soldiers in the militaryenvironment. T he soldier can use the technology to identify thepresence of members of the soldier's unit within a group, and toidentify the presence of soldiers with a particular identifiedcapability. The two groupings, combined with degree of presence can beused by the soldier to identify available assistance.

Similarly, if a soldier becomes lost or separated from the soldier'sunit, the technology can be used to provide the unit informationregarding the soldier's location, both directly through triangulationand proximity, and indirectly through the soldier's ability to transmitgeographical coordinates. The system can further be used by the soldierto identify the location of others in the unit.

The use in a military situation may require that the data be retained inencrypted format, so that it cannot be used by an enemy. Similar, radiotransmissions must be maintained in a manner which does not lead toenemy units triangulating on the soldier making the transmission. Sincethe proximity information can be controlled by a server, theavailability of the location information can be controlled by themilitary. The ability to store location data on a server allows thesystem to only transmit location data to other users (soldiers) asencrypted data.

Other than the need to protect and encrypt location data, the feature isconfigured in a manner similar to combining proximity with externalsocial media applications, in that the user's communication needs can becombined with proximity via radio signals. The combination allows theuser to retrieve information regarding fellow soldiers that meet apredetermined combination of proximity via radio signals andidentification of skills or unit association.

File Sharing, File Transfer and Media Sharing

The ability for a user to use the disclosed technology to identify otherusers within a proximity facilitates file sharing and media sharing,which may be relevant to the locus of the users or relevant to theindividual users themselves. By way of non-limiting example, this couldrelate to the user commenting on a local event at which the user ispresent. Additionally, a speaker or entertainer can provide access of amedia file to an audience or others nearby. This provides an ability topromote or advertise one's music, including songs, albums and randomizedplaylists to nearby users, additionally creating a community of music.This also allows file transfer to occur using local network facilitiesor directly as peer-to-peer transfers.

Additionally the software will use an algorithmic rating system tocompare and rate users' taste in music in contrast to other nearbyusers. The rating and a comparison with similar media can beaccomplished within the area of proximity defined by the user or byother users.

In addition to the presumed relevance of media files to others within adefined proximity, the ability to share media is based on a concept thatthese people would enjoy getting to know each other based on theirsimilar taste in the media, such as a particular type of music or musicby a particular artist.

API (Configuration)

FIGS. 11A and 11B are schematic diagrams depicting a Presence GroupAggregation System platform in its functional aspect. FIG. 11A showsestablishing proximity. FIG. 11B is a three ring model, based on thediagram of FIG. 11A, based on a user's nearby user experience.

Although an Application Programming Interface (API) is provided herein,one of skill in the art will understand that the API is exemplary andother APIs consistent with the spirit and scope of the disclosedtechnology may be utilized. In a configuration, a request stating thatmobile user with UUID 1 (for example) can see another user with UUID 1and UUID 3; as an example:

An empty array of other_user_identifiers may also be passed up, which isuseful for querying the system to see which other users are detectablevia the aggregation algorithm. Whatever is passed, a successful responsereturns a list of all the aggregated users in proximity like this:

{“identifier”:“6”,“other_user_identifiers”: [“5”,“7”,“9”,“11”]} Timeout

Users that are grouped by detections will time out and become degroupedafter a predetermined amount of time of no detections.

The Presence Group Aggregation System platform provides the requiredframework to create visual proximity “Degrees of Separation” or Rings aswell as a View Controller User Interface to implement thisfunctionality.

This tool is useful when a user is interested in reducing the nearbyuser field into a workable sum, for example just the students in aclassroom. The Presence Group Aggregation creates a nearby user contactlist based on all the direct and indirect user connections available. Inthe figure below, IRY has direct connections to ALY, NERO, OREN andCOOK. IRY has indirect Second Degree Connections with MONKEY and ALB andThird Degree Indirect Connections with Ape and Banana. The Disclosedtechnology provides the users with the ability to filter out Users basedon the degrees of connection: first, second, third, fourth etc. This isnaturally most useful in very highly dense settings.

Rings are Differentiated with the Following Logic—

The Formula for the Logarithm is:

First Ring (Degree of Separation)=This includes users' first degree“DIRECT” Contacts, users that the subject has detected and “INDIRECT”web service calls of the subject as advertiser made by listening onlydevices (Permanent Listening only users=Users with no listening but noadvertising hardware and Temporary Listening Devices=iOS devices wherethe application has cancelled or has stopped running while in thebackground.)

Second Ring (Degree of Separation)=This includes all the results fromthe Peers in subjects First Ring “DIRECT” and “INDIRECT” connectionsexcluding all entry pairs that include the subjects unique identifier.

Third Ring (Degree of Separation)=This includes all the results from thePeers in the subjects Second Ring “DIRECT” and “INDIRECT” connectionsexcluding all the entry pairs that include the subject and all thesubjects First Ring connections.

FIG. 11B shows user IRY's nearby user experience. The Presence GroupAggregation System platform creates a cluster including all of the usersdepicted in FIG. 11A. Within the cluster, Rings are differentiated withthe following logic:

-   -   Ring 1=Direct and webservice UUIDs including user's UUID    -   Ring 2=Direct and webservice of user's First Ring connections,        excluding entries and web calls with user's UUID. (OREN, NERO)    -   Ring 3=Direct and webservice of user's second ring connections,        excluding entries and web calls with user's UUID and First Ring        connections. (MONKEY, ALB)

The Presence Group Aggregation System platform allows the system toprovide users with the ability to reduce and extend their visiblecontacts via “Inherent Rings” representing degrees of separation. Thisreduces a random cluster of nearby users into an immediate group of“first Ring” members. The “first Ring” members can be people within asmall room, such as a classroom or business establishment or otherwisewithin a small area.

A filter button 1031, shown in FIG. 10B can be used to determine whichprofiles and which Rings are presented. The control of the Rings andother proximity controls may be accessed through the “Filter” buttonwhich will be easily accessible one the main user interface screen, bypressing this button, the display will reveal to the user will thefilters, “Rings” or “degrees of separation” that are available to beimplemented.

CONCLUSION

While mobile devices have been described and the use of information fromspecific networking services has been described, it is also possible touse other devices and services. For example, desktop devices can be usedto identify Inherent Rings based on information identified throughnetwork connections, as manually designated by the user or as matched bythe user to a particular location of a mobile device (i.e., “Make mylocation the present location of my phone.) It is possible to eitherpermit or not permit the sharing of unique identifiers across multipledevices, and multiple devices can be associated with a single user oruser profile as desired. In that way, multiple devices belonging to auser can be issued separate unique identifiers or can share uniqueidentifiers, and the user can still be uniquely identified acrossmultiple devices. In the case of multiple devices, the user candesignate one or more devices as having a priority on the system, inorder to avoid the use of multiple devices causing duplication ofprofiles displayed on other users' devices.

It will be understood that many additional changes in the details,materials, steps and arrangement of parts, which have been hereindescribed and illustrated to explain the nature of the subject matter,may be made by those skilled in the art within the principle and scopeof the invention as expressed in the appended claims.

What is claimed is:
 1. A method performed by a electronic device forproviding communications between users of mobile devices based onproximities between the users, the method comprising: registering by theelectronic device the users on one or more servers; generating by theelectronic device a unique identifier for each user, and storing theunique identifier on one or more servers, and providing the uniqueidentifier to respective ones of the mobile devices to be stored on therespective mobile devices; associating by the electronic device a userprofile with each unique identifier; causing at least a plurality of themobile devices to broadcast transmissions with their unique identifiers;causing by the electronic device at least a plurality of the mobiledevices to listen for incoming identifiers from other mobile devices; inthe case of a first mobile device detecting a second mobile device,receiving from the second mobile device the a unique identifierassociated with the second mobile device; using the unique identifiersof the first mobile device and the second mobile device to establishdetection, whereby the detection comprises detections made directlybetween two devices, detection between two devices through an externalradio communication device or hotspot, or indirect detection throughanother mobile device or devices linking the first mobile device and thesecond mobile device; using the established detection to form a group oftwo or more mobile devices; transmitting by the electronic device to thefirst mobile device a list of users or an updated list of users in thegroup; and in the case of the first mobile device not having profileinformation regarding users associated with other mobile devices in thegroup, providing at least a subset of profile information associatedwith the list of users in the group to the first mobile device.
 2. Themethod of claim 1, wherein the establishment of the group comprises analgorithm comprising the steps of:
 1. User A sees User B
 2. Is user B inthe system“?”
 3. No
 4. Is User A in the system“?”
 5. No
 6. Create groupAdd user A and user B to group
 7. Yes
 8. Add user B to the group of A 9.Update timestamp of both A and B in user record
 10. Yes
 11. Is User A inthe system“?”
 12. No
 13. Add user A to the group of B
 14. Updatetimestamp of both A and B in user record
 15. Yes
 16. Is A in same groupas B“?”
 17. Yes
 18. Update timestamps on A and B in user record
 19. No20. Update timestamps on A and B in user record
 21. Combine groups for Aand B
 22. Take all users from group B, move to group A
 23. Delete groupB.
 3. The method of claim 1, wherein: the associating of the userprofile with unique identifier comprises: identifying third partyapplication programming interfaces (APIs) containing profileinformation; allowing the user to link the profile information from theAPIs to the unique identifier; and allowing the user to create a profilefor storage on the server.
 4. The method of claim 1, wherein: theassociating of the user profile with unique identifier comprises:identifying third party application programming interfaces (APIs)containing profile information; allowing the user to link the profileinformation from the APIs to the unique identifier; allowing the user tocreate a profile for storage on the server; and in the case of multipleprofiles associated with a unique identifier, allowing the user toselect at least one profile for identifying the user to the group. 5.The method of claim 1, wherein: the causing of at least a plurality ofthe mobile devices to listen for incoming identifiers from other mobiledevices comprises: during a mobile device's quiescent or inactive mode,providing sufficient device resources to listen for incoming signalscarrying unique identifiers from other mobile devices; and in the eventof receiving the incoming signals carrying unique identifiers,transmitting an indication of receipt of the unique identifier.
 6. Themethod of claim 1, further comprising: receiving, from the mobile devicean image of a person; using facial recognition to determine if a matchexists between the image and a user detected in proximity to the deviceproviding the image of the person.
 7. The method of claim 1, furthercomprising: in the case of the second mobile device detecting a thirdmobile device, receiving a unique identifier from the third mobiledevice, relayed through the second mobile device; using the detection ofthe third detected mobile device as a part of a group of the firstmobile device.
 8. The method of claim 7, further comprising: for a givenmobile device, establishing a degree of separation according to minimumnumber of device detections that separate the given mobile device andanother mobile device; and establishing Presence Groups corresponding tothe degrees of separation of mobile devices, with one or more degrees ofseparation defining each Presence Group.
 9. The method of claim 1,further comprising: providing a sustain function, by which a user canselect a time period or degree of physical movement during which theuser will remain in the Presence Groups of other users unless the otheruser clears users who invoked the sustain function.
 10. The method ofclaim 1, further comprising: providing a user selection filter, wherebythe user may filter according to degrees of separation, pre-existingrelationships as established by user profiles and pre-existingrelationships established by a user's address book.
 11. The method ofclaim 1, further comprising: determining proximities to the user ofother detected devices the proximities established by at least one ofthe group consisting of physical distance, visual proximity, distance asdetermined by radio signal strength, absolute received radio signalstrength, boundaries stored on a server and other defined proximitydetermination; establishing degrees of separation based on at least oneof the proximity of the user or a number of communication linksseparating users; establishing at least one Presence Group based on thedegrees of separation; and providing the user with a listing of otherusers based on Presence Groups selected by the user.
 12. The method ofclaim 11, further comprising: establishing at least one Presence Groupcomprising at least one device within a predetermined distance of theuser, the predetermined distance established by at least one of thegroup consisting of physical distance, visual proximity, distance asdetermined by radio signal strength, absolute received radio signalstrength, boundaries stored on a server and other defined proximitydetermination.
 13. A method performed by a electronic device forproviding communications between users of mobile devices based onproximities between the users, the method comprising: identifying by theelectronic device a device location; identifying at least a seconddevice within a predetermined proximity to the user, the predeterminedproximity established by at least one of the group consisting ofphysical distance, visual proximity, distance as determined by radiosignal strength, absolute received radio signal strength, boundariesstored on a server and other defined proximity determination;identifying by the electronic device at least one further device withina predetermined proximity to one of the user and the second device;establishing by the electronic device degrees of separation based on atleast one of the proximity of the user or a number of communicationlinks separating users; establishing by the electronic device at leastone Presence Group based on the degrees of separation; and providing theuser with a listing of other users based on Presence Groups selected bythe user.
 14. The method of claim 13, further comprising: establishingat least one Presence Group comprising at least one device within apredetermined distance of the user, the predetermined distanceestablished by at least one of the group consisting of physicaldistance, visual proximity, distance as determined by radio signalstrength, absolute received radio signal strength, boundaries stored ona server and other defined proximity determination.
 15. The method ofclaim 14, further comprising: the associating of the user with aprofile, the profile comprising an administrative group or military unitand a capability; providing the user with a selection of other userswithin the Presence Groups in accordance with user-selected criteriacomprising profile information from user profiles corresponding to theuser's profile; storing, in the server, location information for theuser, thereby providing other personnel in the administrative group or amilitary entity with an ability to locate the user.