Method and system for establishing RF Aware and SST Aware communications networks where network aware devices may detect, discover, authenticate and communicate directly with each other, based on such attributes as interests, proximity, or location within or outside of a specified zone
First Claim
Patent Images
1. A communications network method enabling communications by, among and to devices in a specified geographic zone, the method comprising:
- For each network device in the specified geographic zone, use of a variable identification information software or firmware client to assign a unique device identifier (ID), selected by using either;
generation of a static ID (“
S-ID”
) based on at least one item from a set comprised of at least one of the following identifiers (“
VII”
) associated with the network device (including its software and firmware);
a MAC address, IP address, serial number, other device identifying information, attribute, service message, tag, token, vendor device identifier, advertising device identifier, other datum, and other variable identification information, orgeneration of a random or dynamically changing ID (“
R-ID”
) based on at least one VII associated with the network device;
Using a sixth-sense (“
SST”
) software or firmware client on a first network device to detect at least one attribute (“
SFA”
) from a set comprised of at least one of the following data associated with a recipient network device (“
recipient device”
);
a searched-for interest, activity, attribute, characteristic, interest, preference, location, parameter, software, firmware, hardware component, promotion, service, product, VII, and other datum;
Using the VII client on the first network device to authenticate, inside or outside the specified geographic zone, the at least one recipient device based on either its S-ID or R-ID; and
Using the VII client on the at least one recipient device to authenticate, inside or outside the specified geographic zone, any other network device based on either its S-ID or R-ID.
1 Assignment
0 Petitions
Accused Products
Abstract
A communications network is provided where devices are assigned either a static or random unique device identifier; where devices may be configured to be in public or private mode; and, where devices are in public mode, they may detect, discover, authenticate and communicate directly with each other, based on such attributes as interests, proximity, or location within or outside a specified zone.
11 Citations
4 Claims
-
1. A communications network method enabling communications by, among and to devices in a specified geographic zone, the method comprising:
-
For each network device in the specified geographic zone, use of a variable identification information software or firmware client to assign a unique device identifier (ID), selected by using either; generation of a static ID (“
S-ID”
) based on at least one item from a set comprised of at least one of the following identifiers (“
VII”
) associated with the network device (including its software and firmware);
a MAC address, IP address, serial number, other device identifying information, attribute, service message, tag, token, vendor device identifier, advertising device identifier, other datum, and other variable identification information, orgeneration of a random or dynamically changing ID (“
R-ID”
) based on at least one VII associated with the network device;Using a sixth-sense (“
SST”
) software or firmware client on a first network device to detect at least one attribute (“
SFA”
) from a set comprised of at least one of the following data associated with a recipient network device (“
recipient device”
);
a searched-for interest, activity, attribute, characteristic, interest, preference, location, parameter, software, firmware, hardware component, promotion, service, product, VII, and other datum;Using the VII client on the first network device to authenticate, inside or outside the specified geographic zone, the at least one recipient device based on either its S-ID or R-ID; and Using the VII client on the at least one recipient device to authenticate, inside or outside the specified geographic zone, any other network device based on either its S-ID or R-ID. - View Dependent Claims (2)
-
-
3. A communications network method for communications by, among and to devices that enables searching and detecting attributes, characteristics, parameters or other data among known and unknown devices and their users, authenticating such devices and their users, message routing and directing private or anonymous targeted communications to and with specific devices and their users, and maintaining continuous or initiating repeat communications with and to such specific devices and their users, in each case regardless of initial or continued location of such devices or the proximity of such devices in a limited or designated physical area or zone, the method comprising:
-
Using a sixth-sense (“
SST”
) software or firmware client on a first device to search for at least one attribute (“
SFA”
) from a set comprised of at least one of the following data associated with a recipient network device (“
recipient device”
);
interest, activity, attribute, characteristic, preference, location, parameter, software, firmware, hardware component, promotion, service, product, service message, tag, token, vendor device identifier, advertising device identifier, other datum, and other variable identification information;Setting the SST client on the first device to enable at least one of the following capabilities; (i) discover at least one SFA of at least one recipient device; (ii) communicate with at least one recipient device whose identification information is unknown; and (iii) screen and locate at least one recipient device worldwide or within at least one geographic location or zone; Enabling the SST client on the first device to obtain and compile on the first device at least one of the following data; (i) at least one item from a set comprised of at least one of the following data associated with at least one recipient device, including its software and firmware;
SFA, information and other data; and(ii) at least one item from a set comprised of at least one of the following identifiers (“
VII”
) associated with at least one recipient device (including its software and firmware);
a MAC address, IP address, serial number or other device identifying information, attribute, service message, tag, token, vendor device identifier, advertising device identifier, other datum, and other variable identification information;Applying at least one filter in the SST client of the first device to enable the first device to select at least one designated screened device, based on an analysis of items from a set comprised of at least one of the following identifiers associated with the at least one screened device;
its SFA, VII and other compiled data;Using a VII client on the first device to assign a unique device identifier (ID) to the at least one designated screened device based on a set comprised of at least one of the following identifiers associated with said designated screened device;
its SFA, VII and other compiled data;Using the VII client of the first device to authenticate and send a service message only to the at least one designated screened device, where either of the following conditions is also satisfied; (i) the email address, public or private cryptography key, IM screen name, social media or Internet screen name, handle, alias, or avatar, phone number, MAC address, IP address or other contact information of the at least one designated screened device is not either known to the user of the first device or previously stored or used by either the first device, or any business, social or communications network to which the first device is registered;
or(ii) the service message is authenticated by and/or from the first device using its VII client based on SFA, VII or compiled data of the at least one designated screened device; and
without using email, public or private cryptography key, instant messaging (IM), text messaging, telephony or any other communications protocol or technique based on fixed endpoints where any of such contact information of the at least one designated screen device is either known to the user of the first device or previously stored or used by any of the first device, or any business, social or communications network to which the first device is registered; andUsing the VII client or the SST client of the at least one designated screened device to authenticate the identity of the first device, based on an identifier from a set comprised of at least one of the ID, SFA, VII and other compiled data associated with the first device, regardless of whether either device remains in the zone in which initial contact and authentication between the devices was established. - View Dependent Claims (4)
-
Specification