PROTOCOL FOR ANONYMOUS WIRELESS COMMUNICATION
First Claim
1. A method for exchange information between one or more applications executing on at least two wireless devices, the method comprising the steps of:
- providing identification information, to the central server, as collected by a first wireless device from a second wireless device via a separate local wireless link between the first and second wireless devices, wherein the information is associated with an identity of a user associated with the second wireless device; and
upon the occurrence of a predetermined event, changing the identification information within a specific application on the second wireless device to enhance the privacy of the identity of the second device.
2 Assignments
0 Petitions
Accused Products
Abstract
Techniques for facilitating the exchange of information and transactions between two entities associated with two wireless devices when the devices are in close proximity to each other. A first device uses a first short range wireless capability to detect an identifier transmitted from a second device in proximity, ideally using existing radio capabilities such as Bluetooth (IEEE802.15.1-2002) or Wi-Fi (IEEE802.11). The detected identifier, being associated with the device, is also associated with an entity. Rather than directly exchanging application data flow between the two devices using the short range wireless capability, a second wireless capability allows for one or more of the devices to communicate with a central server via the internet, and perform the exchange of application data flow. By using a central server to draw on stored information and content associated with the entities the server can broker the exchange of information between the entities and the devices.
97 Citations
18 Claims
-
1. A method for exchange information between one or more applications executing on at least two wireless devices, the method comprising the steps of:
-
providing identification information, to the central server, as collected by a first wireless device from a second wireless device via a separate local wireless link between the first and second wireless devices, wherein the information is associated with an identity of a user associated with the second wireless device; and upon the occurrence of a predetermined event, changing the identification information within a specific application on the second wireless device to enhance the privacy of the identity of the second device. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A server for exchanging information between one or more applications executing on at least two wireless devices, the server comprising:
-
a receiver, for receiving identification information as collected by a first wireless device from a second wireless device via a separate local wireless link between the first and second wireless devices, wherein the information is associated with an identity of a user associated with the second wireless device; and upon the occurrence of a predetermined event, a transmitter, for sending a message to change the identification information within a specific application on the second wireless device to enhance the privacy of the identity of the second device. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A method to manage the anonymity of one or more wireless devices, each having at least a local wireless link and applications executing on each wireless device, the method comprising the steps of:
upon the occurrence of a predetermined event, changing identification information related to the local wireless link on the at least one wireless device to enhance the privacy of the identity of the wireless device. - View Dependent Claims (14, 15, 16, 17, 18)
Specification