LOCATIVE SOCIAL NETWORKING USING A MOBILE DEVICE
First Claim
1. A method, comprising:
- sending, by a system comprising a processor, a first request to a first mobile device connected to a wireless local area network, the first request comprising a first permission to receive first data;
receiving, by the system, the first data based on a first authorization from the first mobile device, the first data comprising first user profile data representing first profile information about a first user identity;
sending, by the system, a second request to a second mobile device connected to the wireless local area network, the second request comprising a second permission to receive second data;
receiving, by the system, the second data based on a second authorization from the second mobile device, the second data comprising second user profile data representing second profile information about a second user identity; and
generating, by the system, a report based on the first data and the second data.
3 Assignments
0 Petitions
Accused Products
Abstract
Technologies are generally described for providing a locative social networking service utilizing wireless access point. In some examples, a method performed under control of a mobile device may include connecting to a wireless local area network, finding at least one other mobile device connected to the wireless local area network and satisfying a predetermined condition, and for each found mobile device, requesting a public user profile associated with the found mobile device, in response to the request, receiving the public user profile associated with the found mobile device, and for each found mobile device from which an associated public user profile is received, transmitting to the found mobile device a public user profile associated with the mobile device.
4 Citations
20 Claims
-
1. A method, comprising:
-
sending, by a system comprising a processor, a first request to a first mobile device connected to a wireless local area network, the first request comprising a first permission to receive first data; receiving, by the system, the first data based on a first authorization from the first mobile device, the first data comprising first user profile data representing first profile information about a first user identity; sending, by the system, a second request to a second mobile device connected to the wireless local area network, the second request comprising a second permission to receive second data; receiving, by the system, the second data based on a second authorization from the second mobile device, the second data comprising second user profile data representing second profile information about a second user identity; and generating, by the system, a report based on the first data and the second data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system, comprising:
-
a memory to store instructions; and a processor, coupled to the memory, to execute or facilitate execution of the instructions to at least transmit a request for data to a mobile device connected to network, receive the data in response to an authorization associated with the mobile device, transmit another request for other data to another mobile device connected to the network, receive the other data in response to another authorization associated with the other mobile device, and generate a report based on the data and the other data, wherein the data comprises user profile data representing profile information relating to a user identity, and the other data comprises other user profile data representing other profile information relating to another user identity. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A non-transitory computer readable storage device comprising executable instructions that, in response to execution, cause a system comprising a processor to perform operations, comprising:
-
transmitting a first request for first profile data to a first mobile device connected to network device of a wireless network, the first profile data representing first profile information regarding a first user identity; receiving the first profile data in response to a first authorization from the first mobile device; transmitting a second request for second profile data to a second mobile device connected to the network device, the second profile data representing second profile information regarding a second user identity; receiving the second profile data in response to a second authorization from the second mobile device; and generating a report based on the first profile data and the second profile data. - View Dependent Claims (19, 20)
-
Specification