Undesirable encounter avoidance
First Claim
1. A method of allowing a user to avoid unwanted encounters, the method comprising:
- determining whether an undesirable contact of the user has opted for sharing location information;
in response to determining that the undesirable contact has opted for sharing location information, collecting a location signal from the undesirable contact;
forecasting anticipated locations of the user over a period;
forecasting anticipated locations of the undesirable contact over the period based on the location signal of the undesirable contact;
determining a potential of encounter between the user and the undesirable contact based on analysis of anticipated locations of the user and the anticipated locations of the undesirable contact over the period; and
generating an undesirable encounter avoidance scheme based on the potential of encounter.
1 Assignment
0 Petitions
Accused Products
Abstract
A method disclosed herein for allows users to avoid such undesirable encounters by determining whether an undesirable contact of the user has opted for sharing location information, in response to determining that the undesirable contact has opted for sharing location information, collecting location signal from the undesirable contact, forecasting anticipated locations of the undesirable contact over a period based on the location signal of the undesirable contact, forecasting anticipated locations of the user over the period, determining potential of encounter between the user and the undesirable contact based on analysis of anticipated locations of the user and the anticipated locations of the undesirable contact over the period, generating an undesirable contact avoidance scheme based on the potential of encounter, and optionally notifying the user of the undesirable contact avoidance scheme.
-
Citations
20 Claims
-
1. A method of allowing a user to avoid unwanted encounters, the method comprising:
-
determining whether an undesirable contact of the user has opted for sharing location information; in response to determining that the undesirable contact has opted for sharing location information, collecting a location signal from the undesirable contact; forecasting anticipated locations of the user over a period; forecasting anticipated locations of the undesirable contact over the period based on the location signal of the undesirable contact; determining a potential of encounter between the user and the undesirable contact based on analysis of anticipated locations of the user and the anticipated locations of the undesirable contact over the period; and generating an undesirable encounter avoidance scheme based on the potential of encounter. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A physical article of manufacture including one or more devices encoding computer-executable instructions for executing on a computer system a computer process, the computer process comprising:
-
in response to determining that an undesirable contact has opted for sharing location information, collecting a location signal from the undesirable contact; forecasting anticipated locations of the user over a period; forecasting anticipated locations of the undesirable contact over the period based on the location signal of the undesirable contact; determining a potential of encounter between the user and the undesirable contact based on analysis of anticipated locations of the user and the anticipated locations of the undesirable contact over the period; and generating an undesirable encounter avoidance scheme based on the potential of encounter. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A system for delivering personalized user experience, comprising:
-
memory; one or more processors; one or more computer-executable instructions stored in the memory and executable by the one or more processors to collect location signals from a user and a plurality of undesirable contacts; one or more computer-executable instructions stored in the memory and executable by the one or more processors to determine locations of the user and the plurality of undesirable contacts over a predetermined time period; one or more computer-executable instructions stored in the memory and executable by the one or more processors to collect a location signal from the undesirable contact in response to determining that the undesirable contact has opted for sharing location information; and one or more computer-executable instructions stored in the memory and executable by the one or more processors to determine a potential of encounter between the user and the undesirable contact based on analysis of anticipated locations of the user and the anticipated locations of the undesirable contact over the period and generate an undesirable encounter avoidance scheme based on the potential of encounter. - View Dependent Claims (19, 20)
-
Specification