×

Method and system for searching, sensing, discovering, screening, enabling awareness, alerting, sharing, sending, receiving, buying, selling, and otherwise transmitting stories, content, interests, data, goods and services among known and unknown devices in a communication network

  • US 9,374,397 B2
  • Filed: 04/25/2013
  • Issued: 06/21/2016
  • Est. Priority Date: 05/17/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method for communicating beyond fixed known endpoints, that enables searching, detecting, sensing, and discovering attributes, characteristics, parameters or other data among known and unknown devices and their users, authenticating such devices and their users, message routing and directing private or anonymous targeted communications to and with specific devices and their users, and maintaining continuous or initiating repeat communications with and to such specific devices and their users, in each case regardless of initial or continued location of such devices or the proximity of such devices in a limited or designated physical area or zone, the method comprising:

  • launching a client application (herein, a sixth-sense client, or “

    SS Client”

    ) on a first device, which enables searching, detecting, sensing, or discovering (collectively or separately, ‘

    discovering’

    ) attributes, characteristics, interests, preferences, parameters, location (collectively or separately, ‘

    attributes’

    ) associated with other recipient devices or the users of such recipient devices;

    setting the SS Client on the first device to;

    (i) discover the attributes (searched-for attributes) of one or more recipient devices or their users;

    (ii) communicate with other devices whose identification information is unknown; and

    (iii) locate other devices (screened devices'"'"') worldwide or within one or more certain or general geographic location(s) or zone(s) (jointly herein, a “

    zone”

    );

    prompting the SST Client on the first device to obtain and compile on the first device;

    (i) information or data from the screened devices (compiled data'"'"') consisting of one or more of the searched-for attributes associated with the device (including its software or firmware) or its users; and

    (ii) unique device identification information, vendor or advertising IDs, or other device identifying information specific to each screened device (jointly herein, “

    device identifying information”

    , or “

    DII”

    );

    applying one or more filters on the first device to analyze such compiled data or DII to enable the selection of least one screened device (a ‘

    designated screened device’

    ; and

    the compiled data or DII used to enable such selection herein, ‘

    variable identification information’

    , or “

    VII”

    );

    enabling privacy preferences for the first device, wherein the privacy preferences enable the first device to send VII of the first device to a designated screened device;

    enabling the SST Client on the first device to specify whether a service message is a private service message, wherein the private service message is sent only to, and is accessible only by, the designated screened device;

    using VII of the designated screened device for authentication, sending the service message only to the specific designated screened device (herein, the ‘

    recipient device’

    ), where either of the following conditions is also satisfied;

    (a) the contact information (e.g., email address;

    public or private cryptography key;

    IM screen name;

    social media or Internet screen name, handle, alias, or avatar;

    phone number;

    MAC address;

    IP address) (collectively herein “

    Contact Information”

    ) of the recipient device is not previously known to any of;

    the first device, its users, or any business, social or communications network to which the first device or any of its users is a member;

    or(b) the service message is authenticated by or from the first device using such variable identification information, and without using email, public or private cryptography key, instant messaging (IM), text messaging, telephony or any other communications protocol or technique based on fixed endpoints where any of such Contact Information is known to any of;

    the first device, any of its users, or any business, social or communications network of which the first device or any of its users is a member; and

    enabling the SS Client on a recipient device to authenticate, using the VII of the first device, the identity of the first device and to initiate or maintain communications by the recipient device with the first device, regardless of whether either device remains in the in the zone in which initial contact and authentication between the devices was established.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×