Creation and consumption of transient user profiles

ABSTRACT

Transient user profiles are generated and broadcast to nearby recipient devices. In some implementations, a transient user profile is generated from a master user profile that includes user information. The master user profile can be stored in encrypted form on the user&#39;s mobile device or on a network-based computer system where it can be accessed upon authentication. The master user profile can include information provided by the user or retrieved from other network-based computer systems. The master user profile can include information that is labeled with security tags that indicate the class of users that may receive the user information. From the master user profile, a transient user profile can be generated in response to a sharing event and broadcast to other nearby recipient devices.

TECHNICAL FIELD

This disclosure relates generally to peer-to-peer communications.

BACKGROUND

There are situations in which a person may wish to share informationabout themselves with others who they may or may not know personally.For example, in business situations a person may wish to share their joband contact information with colleagues within or outside of theircompany through the use of vCards or traditional business cards. Thereare other situations in which the person may desire to shareinformation, such as school groups, social clubs and the like. Dependingon the context and the identity of the recipient to whom the informationis to be shared, there can be different requirements for whatinformation would be appropriate to share and of interest to therecipient. In situations where the information to be shared is secure orprivate, such information should only be accessible by the intendedrecipient.

SUMMARY

Transient user profiles are generated and broadcast to nearby recipientdevices. In some implementations, a transient user profile is generatedfrom a master user profile that includes user information. The masteruser profile can be stored in encrypted form on the user's mobile deviceor on a network-based computer system where it can be accessed uponauthentication. The master user profile can include information providedby the user or retrieved from other network-based computer systems. Themaster user profile can include user information that is labeled withsecurity tags that indicate a class of recipients that may receive theuser information. From the master user profile, a transient user profilecan be generated in response to a sharing event and broadcast to othernearby recipient devices.

The sharing event can be triggered based on user input or based on theuser's current location. In response to a sharing event, a transientuser profile is generated from user information contained in the masteruser profile that is relevant to the sharing event. The transient userprofile can be configured to expire after a period of time or inresponse to termination of the sharing event. In some implementations, asharing event terminates when the user crosses a geofenced boundary ordestroys the transient user profile. Additionally, the user can specifywhether some or all of the information in the transient user profilewill persist on a recipient device or network-based storage. Informationin the transient user profile that persists can retain its security tag,if any, so that only a certain class of recipients can receive andretain the security tagged information.

In some implementations, a user can specify templates for generatingtransient user profiles that include pre-populated fields. The user canspecify for a given profile template a minimum or maximum geographicdistance from a recipient device before the transient user profile canbe shared with the recipient device. In some implementations, the usercan specify for a given profile template whether some, or all, of theuser information contained in the transient user profile can be sharedby the recipient device with other devices, directly or indirectly, overa network.

In some implementations, a view of received transient user profiles canbe presented on a recipient's mobile device sorted by distance inascending or descending order. The user can operate a graphical userinterface (GUI) element on the recipient device to increase or decreasethe distance of a geofenced boundary. The view can be updated when asending device enters or exits the geofenced boundary.

In some implementations, transient user profiles can be presented on arecipient device in a camera view. The user of a recipient device canscan the environment with their camera and each individual captured inthe camera view will have their image augmented with their transientuser profile, allowing the user of the recipient device to visuallymatch an individual with their respective transient user profile.

In some implementations, a method comprises: determining, by a mobiledevice, a sharing event; generating a transient user profile based onthe sharing event; and broadcasting the transient user profile to one ormore recipient devices in communication range of the mobile device.

In some implementations, a method comprises: receiving, by a mobiledevice, multiple transient user profiles from sending devices incommunication range of the mobile device; sorting the transient profilesbased on distance from the mobile device; and displaying the transientuser profiles on the mobile device in sorted order.

Other implementations are directed to systems, devices andnon-transitory, computer-readable storage mediums. Particularimplementations disclosed herein provide one or more of the followingadvantages. Users can generate a transient user profile on their mobiledevice that includes user information that is selected from a masteruser profile and then broadcast the transient user profile to aspecified class of recipients, thus insuring that contextually relevantuser information is broadcast to individuals who have interest inreceiving the user information and/or keeping the user informationconfidential and secure. Pre-populated template user profiles facilitatethe generation of transient user profiles from the master user profile.GUI views enable a recipient device to present multiple transient userprofiles from different users in order by distance, including a userinterface element for dynamically adjusting the number of transient userprofiles that can be displayed in the GUI.

The details of the disclosed implementations are set forth in theaccompanying drawings and the description below. Other features, objectsand advantages are apparent from the description, drawings and claims.

DESCRIPTION OF DRAWINGS

FIG. 1 illustrates an operating environment for creating and consumingtransient user profiles.

FIG. 2A illustrates a graphical user interface presenting a listing viewof transient user profiles.

FIG. 2B illustrates a graphical user interface presenting a camera viewof transient user profiles.

FIG. 3A is a flow diagram of example process for creating transient userprofiles.

FIG. 3B is a flow diagram of an example process for consuming transientuser profiles.

FIG. 4 is a block diagram of example client device architecture forimplementing the features and processes described in reference to FIGS.1-3.

FIG. 5 is a block diagram of example server computer architecture forimplementing the features and processes described in reference to FIGS.1-3.

The same reference symbol used in various drawings indicates likeelements.

DETAILED DESCRIPTION Example Operating Environment

FIG. 1 illustrates an operating environment 100 for creating andconsuming transient user profiles. In some implementations, operatingenvironment 100 can include mobile devices 102, 104 (e.g., smart phone,tablet computer, laptop, wearable computer), which are configured tocommunicate with each other over a short range communication link 106(e.g., Bluetooth, Near Field Communication (NFC)) and with server 124through access point 116 (e.g., a WiFi router) and network 122 (e.g.,the Internet) or cell tower 118 (e.g., 3G, 4G), gateway 120 and network122. Server 124 can be coupled to database 126, which stores master userprofiles 128.

When mobile devices 102, 104 are in communication range of each othermobile devices 102, 104 broadcast respective transient user profiles108, 112 over short range communication link 106. Transient profiles108, 112 are displayed on respective graphical user interfaces (GUIs)110, 114 of mobile devices 102, 104. Transient user profiles 108, 112can be generated from master user profiles 128. The display of transientuser profiles 108, 112 on a recipient device is described further withrespect to FIG. 2.

In some implementations, a master user profile includes one or morefiles that contain information about the user that the user wouldpotentially want to share with others in a transient user profile. Themaster user profile can be stored in encrypted form directly on theuser's mobile device and/or on a network-based computer system. Themaster profile can be accessed using one or more authentication methods,including but not limited to a password, hardware dongle/key orbiometrics. The master profile can include information entered by theuser through an input device (e.g., computer, smartphone) orautomatically retrieved from other network-based computer systems, suchas corporate human resource records, medical records, school records,financial records and the like. Automatic retrieval would only occurafter the user has opted in to sharing such personal information.

In some implementations, the master profile can be a database table thatincludes fields for storing personal information. The fields can belabeled with security tags specifying one or more classes of recipientsthat may receive certain user information in a transient user profile.For example, in a work context, user information can disclose projectsthat the user is currently working on for her employer and the class ofrecipients can be other employees who are disclosed on the projects andauthorized by the employer to receive the project information. In amedical context, the user information can disclose medical records andthe class of recipients can be close relatives or health careprofessionals. This health class can be useful in emergency situationswhere a medical responder receives a transient user profile on theirmobile device that is broadcast from an injured person's mobile deviceand the transient user profile includes critical medical information(e.g., current prescriptions, existing medical conditions, allergies).In a social context, user information can disclose a user's interest(e.g., hobbies, sports, likes/dislikes, dating preferences) and theclass of recipients can include friends or other individuals whom sharethe interests of the user.

In some implementations, a transient user profile is generated from themaster user profile and broadcast to nearby recipient devices during asharing event. A sharing event is any event where the user's mobiledevice is in communication range of at least one recipient device andother specified criteria defining a specific sharing context are met.For example, the sharing context can be input from the user ordetermined from the user's current location, which can be determinedusing one or more positioning technologies, such as WiFi, cell tower,Global Navigation Satellite Systems (GNSS), such as Global PositioningSystem (GPS) and radio frequency (RF) beacons (e.g., Bluetooth lowenergy beacons).

Based on the context, a transient user profile may be configured to havea limited time-to-live. For example, a transient user profile can beconfigured to expire (e.g., destroy itself) for a user specified periodof time (e.g., 1 minute, 1 hour, 1 day). The transient user profile canbe configured to expire when the broadcasting mobile device exits ageofenced boundary specified by the user or until the user deliberatelydestroys the profile (e.g., deletes the profile from their mobiledevice). In some implementations, the user can specify whether some orall the user information contained in a transient user profile willpersist on a recipient device or other storage location (e.g.,network-based storage system). In some implementations, the userinformation may include security tagging so that only recipients who aremembers of the specified class may receive all or portions of the userinformation.

In some implementations, a user can specify template user profiles forgenerating transient user profiles with pre-populated data fields. Forexample, templates can be generated for professional, dating, medical,school, etc. Users can also define geographic distances (e.g., radialdistances) associated with given profile templates. For example, a usercan broadcast a give transient user profile only to recipient devicesthat are 1 foot, 10 feet or 1 mile away from the sending device. Inaddition to be shared by proximity, users can also specify whichtemplate user profiles can be shared with other individuals over, forexample, corporate intranets, social networks or other network-basedcomputing systems. If a transient user profile is to be shared, anysecurity tags associated with the transient user profile can be carriedwith the transient user profile to ensure that only the class ofrecipients designated by the security tag can receive the transient userprofile and access the secure or private user information.

Example Graphical User Interface

FIG. 2A illustrates a GUI 202 presenting a listing view of transientuser profiles on mobile device 200. In normal operation, GUI 202 (e.g.,a scroll panel) is dynamically updated with transient user profiles 206a-206 c each time a sending device enters a geofenced boundary aroundmobile device 200. For example, the user can be standing in the middleof a room filled with people each of which is broadcasting a transientuser profile configured with information that the person wants to sharewith other people in the room. The user of mobile device 200 will seeGUI 202 presented on the screen of mobile device 200 with transient userprofiles displayed in ascending (as shown) or descending order based onincreasing or decreasing distance between mobile device 200 and thegiven sending device. In the example shown, John Doe is closest tomobile device 200 (e.g., 6 feet), Jane Doe is the next closest to mobiledevice 200 (e.g., 8 feet) and John Applease is the furthest from mobiledevice 200 (e.g., 12 feet).

As new sending devices enter communication range of mobile device 200,the new transient profiles are added to the listing at the appropriatelocation in the listing according to distance. The distance to a givensending device can be determined by mobile device 200 based on areceived signal strength indication (RSSI) or any other known rangingtechnique. In some implementations, the sending device can send itscurrent location (e.g., computed with a GNSS system) with the transientuser profile. The current location of the sending device can bedifferenced with the current position of mobile device 200 to determinethe distance between the two devices.

In some implementations, GUI 202 includes a control portion 204 thatincludes a search field for searching for transient user profiles bytags. The search field allows the user to search through a number oftransient user profiles received and stored on mobile device 200.Various search queries can be input by the user and a search engine onmobile device 200 can search a data store (e.g., cache memory) on mobiledevice 200 for transient user profiles that meet the search query.

Portion 204 also includes user interface elements (e.g., virtualbuttons) for providing a static view and invisible mode. The static viewelement can be selected by the user to stop or “freeze” the updating ofGUI 202. The invisible element can be selected by the user to stop thereceipt of transient user profiles broadcast by sending devices, thusmaking mobile device 200 “invisible” to sending devices.

In some implementations, transient profiles 206 a-206 c can include oneor more user interface elements 214 for selecting a mode ofcommunication with a sending device, including but not limited to userinterface elements (e.g., virtual buttons) for text messaging, e-mailcommunication and connecting to a social network. In someimplementations, user interface element 208 can indicate (e.g., with anicon) the class of recipients authorized to receive the transient userprofile. In some implementations, user interface element 210 canindicate the distance or direction of a sending device relative tomobile device 200.

In some implementations, a proximity selector 216 can be used todynamically increase or decrease the number of transient user profilesthat are received and displayed in GUI 202. In the example shown,proximity selector 216 can be manipulated by the user to increase ordecrease the radial distance of a geofence boundary around mobile device200 to include more or fewer transient user profiles listed in GUI 202.For example, a sending device within 10 to 30 feet of mobile device 200will have its transient user profile listed in GUI 202. Accordingly, ifthe user is viewing transient user profiles for sending devices within10 feet of mobile device 200, then the list in GUI 202 would be updatedanytime a sending device entered or exited the 10 foot geofencedboundary. Proximity selector 216 can have a minimum and a maximumdistance boundary. The minimum distance boundary can be small (e.g., 5feet) and can be customized by the user in a settings pane or menu. Themaximum distance boundary can be controlled by the number of sendingdevices in the vicinity and received signal strengths from the sendingdevices. For example, the sending device with the weakest receivedsignal strength (e.g., as indicated by RSSI) would likely be the maximumdistance from the recipient device. The distance of that sending devicecan be the maximum distance boundary of proximity selector 216. Theminimum and maximum distances can be labeled on the proximity selector,as shown in FIG. 2A.

FIG. 2B illustrates a graphical user interface presenting camera view218 of transient user profiles using a mobile device with an embeddedcamera. Camera view 218 can be provided by a camera application runningon mobile device 200. For example, camera view 218 can be a live videofeed. While in camera view 218, the user can scan a room full of peoplewith the embedded camera turned on to capture images of the people inthe live video feed with their transient user profiles 220 overlaid andproximate to their images. In camera view 210 the user can visuallymatch a person captured in the video feed with their correspondingtransient user profile received by mobile device 200. In someimplementations, known facial recognition techniques (e.g., PrincipalComponent Analysis using eigenfaces, Linear Discriminate Analysis,Elastic Bunch Graph matching using the Fisherface algorithm, HiddenMarkov Model, Multilinear Subspace Learning using tensor representationand neuronal motivated dynamic link matching) can be used to match facescaptured in live video with digital photos in transient user profiles todetermine where to overlay the transient user profile in the cameraview. In implementations where there are no profile facial imagesavailable, or for some other reason a match is not detected, thetransient user profile can be displayed in the GUI at an angle that issubstantially parallel with a line-of-sight vector from the recipientdevice to the sending device (in two-dimensional screen coordinates)based on a location reported by the sending device over thecommunication link and the current location of the recipient device.Additionally, known face detection algorithms can be used to avoidoverlaying the transient user profile on the image of the individualcaptured in the camera view.

Example Processes

FIG. 3A is a flow diagram of example process 300 for creating transientuser profiles. Process 300 can be implemented by the client architecturedescribed in reference to FIG. 4.

In some implementations, process 300 can begin by determining a contextfor sharing a transient user profile (302). The context can be, forexample, based on proximity or distance from one or more recipients thatare candidates for receiving a transient user profile. A recipient is acandidate if the recipient is located within a specified distance (e.g.,radial distance) of the sending device and the recipient is a member ofthe class that is authorized to receive the transient user profile basedon any security tags or other specifications.

Process 300 can continue by generating a transient user profile based onthe determined context (304). For example, the transient user profilecan be generated with user information contained in a master userprofile, which can be encrypted and stored on the sending device or anetwork-based computer system. The transient user profile can be basedon a template user profile with pre-populated data fields. One or moredata fields can be labeled with a security tag that can limit the classof recipients who can receive the transient user profile. The transientuser profile can be configured with a time-to-live, after which time thetransient user profile is destroyed. In some implementations, transientuser profiles received on recipient devices can destroy itself after aperiod of time expires or termination of a sharing event. For example, atransient user profile can be configured to destroy itself when therecipient device is a specified distance from the sending device oroutside a geofenced boundary set by the sending device.

Process 300 can continue by broadcasting the transient user profile tonearby recipient devices (306). The transient user profile can bebroadcast to nearby recipient devices over a wireless communicationslink, such as Bluetooth or NFC.

FIG. 3B is a flow diagram of an example process 308 for consumingtransient user profiles. Process 308 can be implemented by the clientarchitecture described in reference to FIG. 4.

In some implementations, process 308 can begin by receiving transientuser profiles from nearby devices over a wireless communications link(310). For example, a recipient device can receive one or more transientuser profiles from one or more mobile devices that are in communicationrange of the recipient device. The transient user profiles received caninclude security tags and other metadata that determines time-to-live orwhether the transient user profile will persist on the recipient deviceand/or can be shared with other recipient devices.

Process 300 can continue by receiving user input selecting a view (312)and displaying the transient user profiles according to the selectedview (314). In some implementations, users of recipient devices canselect from a number of GUI views for display received transient userprofiles broadcast over a wireless communications link. One example viewcan be listing of transient user profiles in ascending or descendingorder based on distance from the sending device. Another example view iscamera view that allows the user to use an embedded camera on thesending device to capture images of persons in the local environment ina live video feed and augment the images with their respective transientuser profiles.

Example Client Architecture

FIG. 4 is a block diagram of example client device architecture forimplementing the features and processes described in reference to FIGS.1-3.

Architecture 400 may be implemented on a mobile device for implementingthe features and processes described in reference to FIGS. 1-3,including but not limited to portable computers, smart phones, tabletcomputers, game consoles, wearable computers and the like. Architecture400 may include memory interface 402, data processor(s), imageprocessor(s) or central processing unit(s) 404, and peripheralsinterface 406. Memory interface 402, processor(s) 404 or peripheralsinterface 406 may be separate components or may be integrated in one ormore integrated circuits. One or more communication buses or signallines may couple the various components.

Sensors, devices, and subsystems may be coupled to peripherals interface406 to facilitate multiple functionalities. For example, motion sensor410, light sensor 412, and proximity sensor 414 may be coupled toperipherals interface 406 to facilitate orientation, lighting, andproximity functions of the device. For example, in some implementations,light sensor 412 may be utilized to facilitate adjusting the brightnessof touch surface 446. In some implementations, motion sensor 410 (e.g.,an accelerometer, gyros) may be utilized to detect movement andorientation of the device. Accordingly, display objects or media may bepresented according to a detected orientation (e.g., portrait orlandscape).

Other sensors may also be connected to peripherals interface 406, suchas a temperature sensor, a biometric sensor, or other sensing device, tofacilitate related functionalities.

Location processor 415 (e.g., GPS receiver chip) may be connected toperipherals interface 406 to provide geo-referencing. Electronicmagnetometer 416 (e.g., an integrated circuit chip) may also beconnected to peripherals interface 406 to provide data that may be usedto determine the direction of magnetic North. Thus, electronicmagnetometer 416 may be used with an electronic compass application.

Camera subsystem 420 and an optical sensor 422, e.g., a charged coupleddevice (CCD) or a complementary metal-oxide semiconductor (CMOS) opticalsensor, may be utilized to facilitate camera functions, such asrecording photographs and video clips.

Communication functions may be facilitated through one or morecommunication subsystems 424. Communication subsystem(s) 424 may includeone or more wireless communication subsystems. Wireless communicationsubsystems 424 may include radio frequency receivers and transmittersand/or optical (e.g., infrared) receivers and transmitters. Wiredcommunication system may include a port device, e.g., a Universal SerialBus (USB) port or some other wired port connection that may be used toestablish a wired connection to other computing devices, such as othercommunication devices, network access devices, a personal computer, aprinter, a display screen, or other processing devices capable ofreceiving or transmitting data.

The specific design and implementation of the communication subsystem424 may depend on the communication network(s) or medium(s) over whichthe device is intended to operate. For example, a device may includewireless communication subsystems designed to operate over a globalsystem for mobile communications (GSM) network, a GPRS network, anenhanced data GSM environment (EDGE) network, 802.x communicationnetworks (e.g., WiFi, WiMax), code division multiple access (CDMA)networks, NFC and a Bluetooth™ network. Wireless communicationsubsystems 424 may include hosting protocols such that the device may beconfigured as a base station for other wireless devices. As anotherexample, the communication subsystems may allow the device tosynchronize with a host device using one or more protocols, such as, forexample, the TCP/IP protocol, HTTP protocol, UDP protocol, and any otherknown protocol.

Audio subsystem 426 may be coupled to a speaker 428 and one or moremicrophones 430 to facilitate voice-enabled functions, such as voicerecognition, voice replication, digital recording, and telephonyfunctions.

I/O subsystem 440 may include touch controller 442 and/or other inputcontroller(s) 444. Touch controller 442 may be coupled to a touchsurface 446. Touch surface 446 and touch controller 442 may, forexample, detect contact and movement or break thereof using any of anumber of touch sensitivity technologies, including but not limited tocapacitive, resistive, infrared, and surface acoustic wave technologies,as well as other proximity sensor arrays or other elements fordetermining one or more points of contact with touch surface 446. In oneimplementation, touch surface 446 may display virtual or soft buttonsand a virtual keyboard, which may be used as an input/output device bythe user.

Other input controller(s) 444 may be coupled to other input/controldevices 448, such as one or more buttons, rocker switches, thumb-wheel,infrared port, USB port, and/or a pointer device such as a stylus. Theone or more buttons (not shown) may include an up/down button for volumecontrol of speaker 428 and/or microphone 430.

In some implementations, device 400 may present recorded audio and/orvideo files, such as MP3, AAC, and MPEG video files. In someimplementations, device 400 may include the functionality of an MP3player and may include a pin connector for tethering to other devices.Other input/output and control devices may be used.

Memory interface 402 may be coupled to memory 450. Memory 450 mayinclude high-speed random access memory or non-volatile memory, such asone or more magnetic disk storage devices, one or more optical storagedevices, or flash memory (e.g., NAND, NOR). Memory 450 may storeoperating system 452, such as Darwin, RTXC, LINUX, UNIX, OS X, WINDOWS,or an embedded operating system such as VxWorks. Operating system 452may include instructions for handling basic system services and forperforming hardware dependent tasks. In some implementations, operatingsystem 452 may include a kernel (e.g., UNIX kernel).

Memory 450 may also store communication instructions 454 to facilitatecommunicating with one or more additional devices, one or more computersor servers, including peer-to-peer communications. Communicationinstructions 454 may also be used to select an operational mode orcommunication medium for use by the device, based on a geographiclocation (obtained by the GPS/Navigation instructions 468) of thedevice. Memory 450 may include graphical user interface instructions 456to facilitate graphic user interface processing, including a touch modelfor interpreting touch inputs and gestures; sensor processinginstructions 458 to facilitate sensor-related processing and functions;phone instructions 460 to facilitate phone-related processes andfunctions; electronic messaging instructions 462 to facilitateelectronic-messaging related processes and functions; web browsinginstructions 464 to facilitate web browsing-related processes andfunctions; media processing instructions 466 to facilitate mediaprocessing-related processes and functions; GPS/Navigation instructions468 to facilitate GPS and navigation-related processes; camerainstructions 470 to facilitate camera-related processes and functions;and other instructions 472 for performing some or all of the processes,as described in reference to FIGS. 1-3.

Each of the above identified instructions and applications maycorrespond to a set of instructions for performing one or more functionsdescribed above. These instructions need not be implemented as separatesoftware programs, procedures, or modules. Memory 450 may includeadditional instructions or fewer instructions. Furthermore, variousfunctions of the device may be implemented in hardware and/or insoftware, including in one or more signal processing and/or applicationspecific integrated circuits (ASICs).

Example Server Architecture

FIG. 5 is a block diagram of example server architecture forimplementing the features and processes described in reference to FIGS.1-3. Other architectures are possible, including architectures with moreor fewer components. In some implementations, architecture 500 includesone or more processors 502 (e.g., dual-core Intel® Xeon® Processors),one or more output devices 504 (e.g., LCD), one or more networkinterfaces 506, one or more input devices 508 (e.g., mouse, keyboard,touch-sensitive display) and one or more computer-readable mediums 512a-b (e.g., RAM, ROM, SDRAM, hard disk, optical disk, flash memory,etc.). These components can exchange communications and data over one ormore communication channels 510 (e.g., buses), which can utilize varioushardware and software for facilitating the transfer of data and controlsignals between components.

The term “computer-readable medium” refers to any medium thatparticipates in providing instructions to processor 502 for execution,including without limitation, non-volatile media (e.g., optical ormagnetic disks), volatile media (e.g., memory) and transmission media.Transmission media includes, without limitation, coaxial cables, copperwire and fiber optics.

Computer-readable mediums 512 a-b can further include operating system514 (e.g., Mac OS® server, Windows® NT server), network communicationmodule 516, analytics module 518 and map services module 520. Operatingsystem 514 can be multi-user, multiprocessing, multitasking,multithreading, real time, etc. Operating system 514 performs basictasks, including but not limited to: recognizing input from andproviding output to devices 506, 508; keeping track and managing filesand directories on computer-readable mediums 512 a-b (e.g., memory or astorage device); controlling peripheral devices; and managing traffic onthe one or more communication channels 510. Network communicationsmodule 516 includes various components for establishing and maintainingnetwork connections (e.g., software for implementing communicationprotocols, such as TCP/IP, HTTP, etc.). Transient user profile module518 includes instructions for implementing the features and processesdescribed in reference to FIGS. 1-3. Master user profiles 520 are alsodescribed in reference to FIGS. 1-3.

Architecture 500 can be included in any computer device, including oneor more server computers each having one or more processing cores.Architecture 500 can be implemented in a parallel processing orpeer-to-peer infrastructure or on a single device with one or moreprocessors. Software can include multiple software components or can bea single body of code.

The features described may be implemented in digital electroniccircuitry or in computer hardware, firmware, software, or incombinations of them. The features may be implemented in a computerprogram product tangibly embodied in an information carrier, e.g., in amachine-readable storage device, for execution by a programmableprocessor; and method steps may be performed by a programmable processorexecuting a program of instructions to perform functions of thedescribed implementations by operating on input data and generatingoutput.

The described features may be implemented advantageously in one or morecomputer programs that are executable on a programmable system includingat least one programmable processor coupled to receive data andinstructions from, and to transmit data and instructions to, a datastorage system, at least one input device, and at least one outputdevice. A computer program is a set of instructions that may be used,directly or indirectly, in a computer to perform a certain activity orbring about a certain result. A computer program may be written in anyform of programming language (e.g., Objective-C, Java), includingcompiled or interpreted languages, and it may be deployed in any form,including as a stand-alone program or as a module, component,subroutine, or other unit suitable for use in a computing environment.

Suitable processors for the execution of a program of instructionsinclude, by way of example, both general and special purposemicroprocessors, and the sole processor or one of multiple processors orcores, of any kind of computer. Generally, a processor will receiveinstructions and data from a read-only memory or a random access memoryor both. The essential elements of a computer are a processor forexecuting instructions and one or more memories for storing instructionsand data. Generally, a computer may communicate with mass storagedevices for storing data files. These mass storage devices may includemagnetic disks, such as internal hard disks and removable disks;magneto-optical disks; and optical disks. Storage devices suitable fortangibly embodying computer program instructions and data include allforms of non-volatile memory, including by way of example semiconductormemory devices, such as EPROM, EEPROM, and flash memory devices;magnetic disks such as internal hard disks and removable disks;magneto-optical disks; and CD-ROM and DVD-ROM disks. The processor andthe memory may be supplemented by, or incorporated in, ASICs(application-specific integrated circuits).

To provide for interaction with an author, the features may beimplemented on a computer having a display device such as a CRT (cathoderay tube) or LCD (liquid crystal display) monitor for displayinginformation to the author and a keyboard and a pointing device such as amouse or a trackball by which the author may provide input to thecomputer.

The features may be implemented in a computer system that includes aback-end component, such as a data server or that includes a middlewarecomponent, such as an application server or an Internet server, or thatincludes a front-end component, such as a client computer having agraphical user interface or an Internet browser, or any combination ofthem. The components of the system may be connected by any form ormedium of digital data communication such as a communication network.Examples of communication networks include a LAN, a WAN and thecomputers and networks forming the Internet.

The computer system may include clients and servers. A client and serverare generally remote from each other and typically interact through anetwork. The relationship of client and server arises by virtue ofcomputer programs running on the respective computers and having aclient-server relationship to each other.

One or more features or steps of the disclosed embodiments may beimplemented using an Application Programming Interface (API). An API maydefine on or more parameters that are passed between a callingapplication and other software code (e.g., an operating system, libraryroutine, function) that provides a service, that provides data, or thatperforms an operation or a computation.

The API may be implemented as one or more calls in program code thatsend or receive one or more parameters through a parameter list or otherstructure based on a call convention defined in an API specificationdocument. A parameter may be a constant, a key, a data structure, anobject, an object class, a variable, a data type, a pointer, an array, alist, or another call. API calls and parameters may be implemented inany programming language. The programming language may define thevocabulary and calling convention that a programmer will employ toaccess functions supporting the API.

In some implementations, an API call may report to an application thecapabilities of a device running the application, such as inputcapability, output capability, processing capability, power capability,communications capability, etc.

As described above, some aspects of the subject matter of thisspecification include gathering and use of data available from varioussources to improve services a mobile device can provide to a user. Thepresent disclosure contemplates that in some instances, this gathereddata may identify a particular location or an address based on deviceusage. Such personal information data can include location-based data,addresses, subscriber account identifiers, or other identifyinginformation.

The present disclosure further contemplates that the entitiesresponsible for the collection, analysis, disclosure, transfer, storage,or other use of such personal information data will comply withwell-established privacy policies and/or privacy practices. Inparticular, such entities should implement and consistently use privacypolicies and practices that are generally recognized as meeting orexceeding industry or governmental requirements for maintaining personalinformation data private and secure. For example, personal informationfrom users should be collected for legitimate and reasonable uses of theentity and not shared or sold outside of those legitimate uses. Further,such collection should occur only after receiving the informed consentof the users. Additionally, such entities would take any needed stepsfor safeguarding and securing access to such personal information dataand ensuring that others with access to the personal information dataadhere to their privacy policies and procedures. Further, such entitiescan subject themselves to evaluation by third parties to certify theiradherence to widely accepted privacy policies and practices.

In the case of advertisement delivery services, the present disclosurealso contemplates embodiments in which users selectively block the useof, or access to, personal information data. That is, the presentdisclosure contemplates that hardware and/or software elements can beprovided to prevent or block access to such personal information data.For example, in the case of advertisement delivery services, the presenttechnology can be configured to allow users to select to “opt in” or“opt out” of participation in the collection of personal informationdata during registration for services.

Therefore, although the present disclosure broadly covers use ofpersonal information data to implement one or more various disclosedembodiments, the present disclosure also contemplates that the variousembodiments can also be implemented without the need for accessing suchpersonal information data. That is, the various embodiments of thepresent technology are not rendered inoperable due to the lack of all ora portion of such personal information data. For example, content can beselected and delivered to users by inferring preferences based onnon-personal information data or a bare minimum amount of personalinformation, such as the content being requested by the deviceassociated with a user, other non-personal information available to thecontent delivery services, or publically available information.

A number of implementations have been described. Nevertheless, it willbe understood that various modifications may be made. Elements of one ormore implementations may be combined, deleted, modified, or supplementedto form further implementations. As yet another example, the logic flowsdepicted in the figures do not require the particular order shown, orsequential order, to achieve desirable results. In addition, other stepsmay be provided, or steps may be eliminated, from the described flows,and other components may be added to, or removed from, the describedsystems. Accordingly, other implementations are within the scope of thefollowing claims.

What is claimed is:
 1. A method comprising: determining, by a mobiledevice, a sharing event with a set of recipient devices that are inpeer-to-peer wireless communication range of the mobile device;generating, by the mobile device, a transient user profile based on thesharing event, the transient user profile including user profileinformation comprising one or more data fields labeled with a securitytag that defines a subset of recipient devices in the set of recipientdevices that are authorized to receive the user profile information,wherein the transient user profile is configured by the mobile device tobe deleted from a recipient device of the subset of recipient devicesafter the recipient device moves a specified distance from the mobiledevice; and broadcasting, by a wireless transceiver of the mobiledevice, the transient user profile to the subset of recipient devices.2. The method of claim 1, where the sharing event is determined based ona current geographic location of the mobile device.
 3. The method ofclaim 2, where the sharing event is determined by a crossing by themobile device of a geofenced boundary.
 4. The method of claim 1, wheregenerating a transient user profile further comprises: generating thetransient user profile by selecting user information from a master userprofile.
 5. The method of claim 4, where the master user profile isencrypted and stored on the mobile device.
 6. The method of claim 4,where the master user profile is labeled with at least one security tagindicating at least one class of recipients of the selected userinformation.
 7. The method of claim 1, where generating a transient userprofile further comprises: generating the transient user profile from atemplate user profile with at least one pre-populated data field.
 8. Themethod of claim 7, where the user can specify a geofenced boundary forthe template user profile.
 9. The method of claim 1, where the transientuser profile is configured to restrict sharing of the transient userprofile by the one or more recipient devices with other devicesaccording to the security tag carried with the transient user profile.10. The method of claim 1, wherein the transient user profile isadditionally configured by the mobile device to be deleted from arecipient device of the subset of recipient devices after expiration ofa specified period of time or after the recipient device in the subsetof recipient devices moves outside a geofenced boundary set by themobile device.
 11. A method comprising: receiving, by a mobile deviceduring a sharing event, multiple transient user profiles from sendingdevices that are in peer-to-peer wireless communication range of themobile device, at least one of the multiple transient user profilesconfigured to be deleted from storage of the mobile device after themobile device moves a specified distance from a sending device;receiving, by the mobile device, a user input selecting a selected viewfor the multiple transient user profiles; sorting the transient profilesbased at least in part on the user input; displaying, on a display ofthe mobile device, the sorted transient user profiles on the mobiledevice in accordance with the selected view; and displaying, on thedisplay, indicators of distance and direction of the sending devicesrelative to the mobile device.
 12. The method of claim 11, wheredisplaying the sorted transient user profiles on the mobile devicefurther comprises: displaying user selectable graphical user interfaceelements in the transient user profiles for communicating with usersrepresented by the transient user profiles.
 13. The method of claim 11,where displaying the transient user profiles on the mobile devicefurther comprises: displaying a user interface element for dynamicallyincreasing or decreasing a number of transient user profiles displayedon the mobile device.
 14. The method of claim 11, further comprising:capturing, by a camera subsystem of the mobile device, a camera viewincluding images of individuals sending the transient user profiles tothe mobile device; and displaying at least a portion of at least oneparticular transient user profile proximate to the image of anindividual that sent the particular transient user profile to the mobiledevice.
 15. The method of claim 11, wherein at least one of the multipletransient user profiles is configured to be deleted from storage of themobile device after expiration of a specified period of time or afterthe mobile device moves outside of a geofenced boundary set by thesending device.
 16. A system on a mobile device, the system comprising:a wireless transceiver; one or more processors; memory coupled to theone or more processors and configured to store instructions, which, whenexecuted by the one or more processors, causes the one or moreprocessors to perform operations comprising: determining a sharing eventwith a set of recipient devices that are in peer-to-peer wirelesscommunication range of the mobile device; generating, by the mobiledevice, a transient user profile based on the sharing event, thetransient user profile including user profile information comprising oneor more data fields labeled with a security tag that defines a subset ofrecipient devices in the set of recipient devices that are authorized toreceive the user profile information, wherein the transient user profileis configured by the mobile device to be deleted from a recipient deviceof the subset of recipient devices after the recipient device moves aspecified distance from the mobile device; and broadcasting, by thewireless transceiver, the transient user profile to the subset ofrecipient devices.
 17. The system of claim 16, where the sharing eventis determined based on a current geographic location of the system. 18.The system of claim 17, where the sharing event is determined by acrossing by the mobile device of a geofenced boundary.
 19. The system ofclaim 16, where generating a transient user profile further comprises:generating the transient user profile by selecting user information froma master user profile.
 20. The system of claim 19, where the master userprofile is encrypted and stored on the system.
 21. The system of claim19, where the master user profile is labeled with at least one securitytag specifying at least one class of recipients of user information. 22.The system of claim 16, where generating a transient user profilefurther comprises: generating the transient user profile from a templateuser profile with at least one pre-populated data field.
 23. The systemof claim 22, where the user can specify a geofenced boundary for thetemplate user profile.
 24. The system of claim 16, where the transientuser profile is configured to restrict sharing of the transient userprofile by the one or more recipient devices with other devicesaccording to the security tag carried with the transient user profile.25. The system as in claim 16, wherein the transient user profile isadditionally configured by the mobile device to be deleted from arecipient device of the subset of recipient devices after expiration ofa specified period of time or after the recipient device in the subsetof recipient devices moves outside a geofenced boundary set by themobile device.
 26. A system comprising: a display; one or moreprocessors coupled to the display; memory coupled to the one or moreprocessors and configured to store instructions, which, when executed bythe one or more processors, causes the one or more processors to performoperations comprising: receiving, by a mobile device during a sharingevent, multiple transient user profiles from sending devices inpeer-to-peer wireless communication range of the system, at least one ofthe multiple transient user profiles configured to be deleted fromstorage of the system after the mobile device moves a specified distancefrom a sending device; receiving, by the mobile device, a user inputselecting a selected view for the multiple transient user profiles;sorting the transient profiles based at least in part on the user input;displaying, on a display of the mobile device, the sorted transient userprofiles on the mobile device in accordance with the selected view; anddisplaying, on the display, indicators of distance and direction of thesending devices relative to the mobile device.
 27. The system of claim26, where presenting the transient user profiles on the display furthercomprises: displaying graphical user interface elements in the transientuser profiles for communicating with users represented by the transientuser profiles.
 28. The system of claim 26, where presenting thetransient user profiles on the display further comprises: displaying auser interface element for dynamically increasing or decreasing thenumber of transient user profiles presented on the display.
 29. Thesystem of claim 26, further comprising a camera subsystem, where thetransient user profiles are displayed proximate to corresponding imagesof individuals captured in a camera view generated by the camerasubsystem.
 30. The system as in claim 26, wherein at least one of themultiple transient user profiles is configured to be deleted fromstorage of the system after expiration of a specified period of time orafter the mobile device moves outside a geofenced boundary set by thesending device.