Method and system for searching, sensing, discovering, screening, enabling awareness, alerting, sharing, sending, receiving, buying, selling, and otherwise transmitting stories, content, interests, data, goods and services among known and unknown devices in a communication network
First Claim
1. A method for communicating beyond fixed known endpoints, that enables searching, detecting, sensing, and discovering attributes, characteristics, parameters or other data among known and unknown devices and their users, authenticating such devices and their users, message routing and directing private or anonymous targeted communications to and with specific devices and their users, and maintaining continuous or initiating repeat communications with and to such specific devices and their users, in each case regardless of initial or continued location of such devices or the proximity of such devices in a limited or designated physical area or zone, the method comprising:
- launching a client application (herein, a sixth-sense client, or “
SS Client”
) on a first device, which enables searching, detecting, sensing, or discovering (collectively or separately, ‘
discovering’
) attributes, characteristics, interests, preferences, parameters, location (collectively or separately, ‘
attributes’
) associated with other recipient devices or the users of such recipient devices;
setting the SS Client on the first device to;
(i) discover the attributes (searched-for attributes) of one or more recipient devices or their users;
(ii) communicate with other devices whose identification information is unknown; and
(iii) locate other devices (screened devices'"'"') worldwide or within one or more certain or general geographic location(s) or zone(s) (jointly herein, a “
zone”
);
prompting the SST Client on the first device to obtain and compile on the first device;
(i) information or data from the screened devices (compiled data'"'"') consisting of one or more of the searched-for attributes associated with the device (including its software or firmware) or its users; and
(ii) unique device identification information, vendor or advertising IDs, or other device identifying information specific to each screened device (jointly herein, “
device identifying information”
, or “
DII”
);
applying one or more filters on the first device to analyze such compiled data or DII to enable the selection of least one screened device (a ‘
designated screened device’
; and
the compiled data or DII used to enable such selection herein, ‘
variable identification information’
, or “
VII”
);
enabling privacy preferences for the first device, wherein the privacy preferences enable the first device to send VII of the first device to a designated screened device;
enabling the SST Client on the first device to specify whether a service message is a private service message, wherein the private service message is sent only to, and is accessible only by, the designated screened device;
using VII of the designated screened device for authentication, sending the service message only to the specific designated screened device (herein, the ‘
recipient device’
), where either of the following conditions is also satisfied;
(a) the contact information (e.g., email address;
public or private cryptography key;
IM screen name;
social media or Internet screen name, handle, alias, or avatar;
phone number;
MAC address;
IP address) (collectively herein “
Contact Information”
) of the recipient device is not previously known to any of;
the first device, its users, or any business, social or communications network to which the first device or any of its users is a member;
or(b) the service message is authenticated by or from the first device using such variable identification information, and without using email, public or private cryptography key, instant messaging (IM), text messaging, telephony or any other communications protocol or technique based on fixed endpoints where any of such Contact Information is known to any of;
the first device, any of its users, or any business, social or communications network of which the first device or any of its users is a member; and
enabling the SS Client on a recipient device to authenticate, using the VII of the first device, the identity of the first device and to initiate or maintain communications by the recipient device with the first device, regardless of whether either device remains in the in the zone in which initial contact and authentication between the devices was established.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, method and apparatus are provided for searching, sensing, discovering, screening, enabling awareness, alerting, sharing, sending, receiving, buying, selling, and otherwise transmitting stories, content, interests, data, goods and services among known and unknown devices in a communication network. Humans have a core desire to communicate and share with those around them—both nearby and around the globe—to enhance their individual, social and shared experiences. Social networks and related technologies have provided their subscribers with new technologies to share their stories with their friends and certain third-parties, but are limited in two crucial respects: they require prior membership, subscription or enrollment; and, in order to execute communications with friends and certain third parties, social networks require use of both (a) a user'"'"'s existing contact information, and (b) the social network'"'"'s platform. By using improved methods for searching, detecting, sensing, and discovering attributes, characteristics, parameters and other data between devices among known and unknown devices, then people, businesses and organizations will be able to sense, learn and act on the interests, attributes, stories, content and products of others, enabling enhanced forms of communications and new methods of business.
-
Citations
6 Claims
-
1. A method for communicating beyond fixed known endpoints, that enables searching, detecting, sensing, and discovering attributes, characteristics, parameters or other data among known and unknown devices and their users, authenticating such devices and their users, message routing and directing private or anonymous targeted communications to and with specific devices and their users, and maintaining continuous or initiating repeat communications with and to such specific devices and their users, in each case regardless of initial or continued location of such devices or the proximity of such devices in a limited or designated physical area or zone, the method comprising:
-
launching a client application (herein, a sixth-sense client, or “
SS Client”
) on a first device, which enables searching, detecting, sensing, or discovering (collectively or separately, ‘
discovering’
) attributes, characteristics, interests, preferences, parameters, location (collectively or separately, ‘
attributes’
) associated with other recipient devices or the users of such recipient devices;setting the SS Client on the first device to; (i) discover the attributes (searched-for attributes) of one or more recipient devices or their users; (ii) communicate with other devices whose identification information is unknown; and (iii) locate other devices (screened devices'"'"') worldwide or within one or more certain or general geographic location(s) or zone(s) (jointly herein, a “
zone”
);prompting the SST Client on the first device to obtain and compile on the first device; (i) information or data from the screened devices (compiled data'"'"') consisting of one or more of the searched-for attributes associated with the device (including its software or firmware) or its users; and (ii) unique device identification information, vendor or advertising IDs, or other device identifying information specific to each screened device (jointly herein, “
device identifying information”
, or “
DII”
);applying one or more filters on the first device to analyze such compiled data or DII to enable the selection of least one screened device (a ‘
designated screened device’
; and
the compiled data or DII used to enable such selection herein, ‘
variable identification information’
, or “
VII”
);enabling privacy preferences for the first device, wherein the privacy preferences enable the first device to send VII of the first device to a designated screened device; enabling the SST Client on the first device to specify whether a service message is a private service message, wherein the private service message is sent only to, and is accessible only by, the designated screened device; using VII of the designated screened device for authentication, sending the service message only to the specific designated screened device (herein, the ‘
recipient device’
), where either of the following conditions is also satisfied;(a) the contact information (e.g., email address;
public or private cryptography key;
IM screen name;
social media or Internet screen name, handle, alias, or avatar;
phone number;
MAC address;
IP address) (collectively herein “
Contact Information”
) of the recipient device is not previously known to any of;
the first device, its users, or any business, social or communications network to which the first device or any of its users is a member;
or(b) the service message is authenticated by or from the first device using such variable identification information, and without using email, public or private cryptography key, instant messaging (IM), text messaging, telephony or any other communications protocol or technique based on fixed endpoints where any of such Contact Information is known to any of;
the first device, any of its users, or any business, social or communications network of which the first device or any of its users is a member; andenabling the SS Client on a recipient device to authenticate, using the VII of the first device, the identity of the first device and to initiate or maintain communications by the recipient device with the first device, regardless of whether either device remains in the in the zone in which initial contact and authentication between the devices was established. - View Dependent Claims (2, 3, 4)
-
-
5. A method for communicating beyond fixed known endpoints, that enables marketing, advertising, delivering product information or other marketing content, soliciting and engaging to and with one or more known or unknown devices or their user(s);
- authenticating such devices and their users;
routing messages, and direct private or anonymous targeted communications, to and with specific devices and their users; and
maintaining continuous or initiating repeat communications with and to such specific devices and their users;
in each case regardless of initial or continued location of such devices or the proximity of such devices in a limited or designated physical area or zone, the method comprising;launching a client application (herein, a sixth-sense client or, “
SS Client”
) on a first device , wherein the client application enables searching, detecting, sensing, or discovering (collectively or separately, ‘
discovering’
) any one or more of the following;(i) attributes, characteristics, interests, or preferences (collectively, attributes), (ii) stories, topics, interests, or preferences (collectively, Stories), (iii) content, products, goods, or services, (collectively, Content), or (iv) Content of a commercial sale of which is being searched, offered, or identified as being of interest or potential interest (such Content, ‘
Topical Content’
) to one or more devices (recipient devices) or the user(s) of the recipient devices,(such attributes, Stories, Content or Topical Content collectively, ‘
searched-for Interests’
associated with one or more of other devices or the users of the other devices);setting the SS Client on the first device to; (i) discover the searched-for Interests of one or more of other devices or their users; (ii) communicate with other devices whose identification information is unknown; and (iii) locate other devices (jointly. ‘
screened devices’
) worldwide or within one or more certain or general geographic location(s) or zone(s) (jointly herein, a “
zone”
);prompting the SST Client on the first device to obtain and compile on the first device; (i) information or data from the screened devices (‘
compiled data’
) consisting of one or more of the searched-for attributes associated with the device (including its software or firmware) or its users; and(ii) unique device identification information, vendor or advertising IDs, or other device identifying information specific to each screened device (jointly herein, “
device identifying information”
, or “
DII”
);applying one or more filters on the first device to analyze such compiled data or DII to enable the selection of least one screened device (a ‘
designated screened device’
; and
the compiled data or DII used to enable such selection herein, ‘
variable identification information’
, or “
VII”
);enabling privacy preferences for the first device, wherein the privacy preferences enable the first device to send VII of the first device to a designated screened device; enabling the SST Client on the first device to specify whether a service message is a private service message, wherein the private service message is sent only to, and is accessible only by, the designated screened device; using VII of the designated screened device for authentication, sending the service message only to the specific designated screened device (herein, the ‘
recipient device’
), where either of the following conditions is also satisfied;(a) the contact information (e.g., email address;
public or private cryptography key;
IM screen name;
social media or Internet screen name, handle, alias, or avatar;
phone number;
MAC address;
IP address) (collectively herein “
Contact Information”
) of the recipient device is not previously known to any of;
the first device, its users, or any business, social or communications network to which the first device or any of its users is a member;
or(b) the service message is authenticated by or from the first device using such variable identification information, and without using email, public or private cryptography key, instant messaging (IM), text messaging, telephony or any other communications protocol or technique based on fixed endpoints where any of such Contact Information is known to any of;
the first device, any of its users, or any business, social or communications network of which the first device or any of its users is a member; andenabling the SS Client on a recipient device to authenticate, using the VII of the first device, the identity of the first device and to initiate or maintain communications by the recipient device with the first device, regardless of whether either device remains in the in the zone in which initial contact and authentication between the devices was established.
- authenticating such devices and their users;
-
6. A method for communicating beyond fixed known endpoints, that enables commercial sales with, to or from one or more known or unknown devices or their users, authenticating such devices and their users, routing messages and directing private or anonymous targeted communications to and with specific devices and their users, and maintaining continuous or initiating repeat communications with and to such specific devices and their users, in each case regardless of initial or continued location of such devices or the proximity of such devices in a limited or designated physical area or zone, the method comprising:
-
launching a client application (herein, a sixth-sense client, or “
SS Client”
) on a first device , wherein the client application enables searching, detecting, sensing, or discovering (collectively or separately, ‘
discovering’
) either(A) (i) content, products, goods, or services (collectively, ‘
content’
),(ii) one or more categories or genres of Content (collectively, ‘
content types’
), or(iii) interest in or preferences for content types, or (B) attributes, characteristics, interests, preferences, parameters or other data regarding or otherwise relating to the content or content types (collectively, ‘
content attributes’
),(such content, content types, and content attributes collectively, ‘
searched-for Content’
associated with the recipient devices, or the users of the recipient devices);setting the SS Client on the first device to discover the searched-for Content of the recipient devices or their users;
communicate with other devices whose identification information is unknown; and
locate other devices (jointly, ‘
screened devices’
) worldwide or within one or more certain or general geographic location(s) or zone(s) (jointly herein, a “
zone”
);prompting the SST Client on the first device to obtain and compile on the first device; (i) information or data from the screened devices (‘
compiled data’
) consisting of one or more of the searched-for attributes associated with the device (including its software or firmware) or its users; and(ii) unique device identification information, vendor or advertising IDs, or other device identifying information specific to each screened device (jointly herein, “
device identifying information”
, or “
DII”
);applying one or more filters on the first device to analyze such compiled data or DII to enable the selection of least one screened device (a ‘
designated screened device’
; and
the compiled data or DII used to enable such selection herein, ‘
variable identification information’
, or “
VII”
);enabling privacy preferences for the first device, wherein the privacy preferences enable the first device to send VII of the first device to a designated screened device; enabling the SST Client on the first device to specify whether a service message is a private service message, wherein the private service message is sent only to, and is accessible only by, the designated screened device; using VII of the designated screened device for authentication, sending the service message only to the specific designated screened device (herein, the ‘
recipient device’
), where either of the following conditions is also satisfied;(a) the contact information (e.g., email address;
public or private cryptography key;
IM screen name;
social media or Internet screen name, handle, alias, or avatar;
phone number;
MAC address;
IP address) (collectively herein “
Contact Information”
) of the recipient device is not previously known to any of;
the first device, its users, or any business, social or communications network to which the first device or any of its users is a member;
or(b) the service message is authenticated by or from the first device using such variable identification information, and without using email, public or private cryptography key, instant messaging (IM), text messaging, telephony or any other communications protocol or technique based on fixed endpoints where any of such Contact Information is known to any of;
the first device, any of its users, or any business, social or communications network of which the first device or any of its users is a member; andenabling the SS Client on a recipient device to authenticate, using the VII of the first device, the identity of the first device and to initiate or maintain communications by the recipient device with the first device, regardless of whether either device remains in the in the zone in which initial contact and authentication between the devices was established.
-
Specification