Method for connecting to one another communicating objects in which user profiles are stored, and communicating object corresponding thereto
First Claim
1. Method for connecting users using at least two communicating objects, comprising the steps of:
- creating, for each communicating object, a user account comprising at least one single identifier field for identifying a user associated with a communicating object on a hardware server;
associating at least one already existing user'"'"'s profile account on a profile account network to the user account associated with the user by the hardware server by;
obtaining, from an holder of the profile account network, an authorization allowing an interconnection between the hardware server and a database of a corresponding network different from a server database;
importing data concerning an already existing user'"'"'s profile in the server database;
downloading the data towards a corresponding communicating object to unify all identities of the user for said at least one already existing user'"'"'s profile account to a single identifier field of said corresponding communicating object; and
wherein said at least one already existing user'"'"'s profile account comprises at least one account among an account of a social network, an account of a professional network or an account stored in a customer database;
incorporating and storing the user accounts and the associated profile account of all users in a general database by the server;
determining search keys for a communicating object sought by the user'"'"'s communication object, the search keys corresponding to fields of the user account or the associated profile account;
determining detection keys for the communicating object, the detection keys corresponding to the fields of the user account or the associated profile account and permitting the communication object to be detected by other communicating objects;
detecting detectable communicating objects by a detecting communicating object within a framework of an authenticated and protected connection without the intervention of the user of the detecting communicating object nor the users of detectable communicating objects;
exchanging fields of the user accounts or associated profile accounts, the detection keys and the search keys between the detecting communicating object and the detected communicating objects;
identifying common keys between the search keys of the detecting communicating object and the detection keys of a detected communicating object, comparing values of the common keys between the detecting communicating object and the detected communicating object by at least the detecting communicating object;
in response to a determination that the values of the common keys are equal to or within predefined proximity of each other, notifying the user of the detecting communicating object that at least one communication object partially or completely corresponding to the search keys has been detected by a signal emitted by the detecting communicating object and connecting the detecting communication object and the detected communication object;
inviting contacts identified by the user'"'"'s communicating object to join a contact network of the user for each user'"'"'s profile account; and
notifying the contacts of the contact network of the user about events resulting from an activity the user had through the user'"'"'s communicating object, thereby transposing a real life activity of the user using the user'"'"'s communicating object to each virtual identity corresponding said each user'"'"'s profile account.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for connecting to users using at least two communicating objects comprises the step of creating a user account, associating the user account to profile accounts, such as professional and/or social network accounts and/or an account memorized in a customer data base. The user accounts and the associated profile accounts of all the users are incorporated into a general data base. The detecting communication objects detects detectable communicating objects and exchanges fields of the user accounts and/or associated profile accounts, the detection keys and the search keys with each other. Common keys between the search keys of the detecting communicating object and the detection keys of a detected communicating object are identified, the user is notified, and the two communicating objects are connected to each other.
19 Citations
16 Claims
-
1. Method for connecting users using at least two communicating objects, comprising the steps of:
-
creating, for each communicating object, a user account comprising at least one single identifier field for identifying a user associated with a communicating object on a hardware server; associating at least one already existing user'"'"'s profile account on a profile account network to the user account associated with the user by the hardware server by; obtaining, from an holder of the profile account network, an authorization allowing an interconnection between the hardware server and a database of a corresponding network different from a server database; importing data concerning an already existing user'"'"'s profile in the server database; downloading the data towards a corresponding communicating object to unify all identities of the user for said at least one already existing user'"'"'s profile account to a single identifier field of said corresponding communicating object; and wherein said at least one already existing user'"'"'s profile account comprises at least one account among an account of a social network, an account of a professional network or an account stored in a customer database; incorporating and storing the user accounts and the associated profile account of all users in a general database by the server; determining search keys for a communicating object sought by the user'"'"'s communication object, the search keys corresponding to fields of the user account or the associated profile account; determining detection keys for the communicating object, the detection keys corresponding to the fields of the user account or the associated profile account and permitting the communication object to be detected by other communicating objects; detecting detectable communicating objects by a detecting communicating object within a framework of an authenticated and protected connection without the intervention of the user of the detecting communicating object nor the users of detectable communicating objects; exchanging fields of the user accounts or associated profile accounts, the detection keys and the search keys between the detecting communicating object and the detected communicating objects; identifying common keys between the search keys of the detecting communicating object and the detection keys of a detected communicating object, comparing values of the common keys between the detecting communicating object and the detected communicating object by at least the detecting communicating object; in response to a determination that the values of the common keys are equal to or within predefined proximity of each other, notifying the user of the detecting communicating object that at least one communication object partially or completely corresponding to the search keys has been detected by a signal emitted by the detecting communicating object and connecting the detecting communication object and the detected communication object; inviting contacts identified by the user'"'"'s communicating object to join a contact network of the user for each user'"'"'s profile account; and notifying the contacts of the contact network of the user about events resulting from an activity the user had through the user'"'"'s communicating object, thereby transposing a real life activity of the user using the user'"'"'s communicating object to each virtual identity corresponding said each user'"'"'s profile account. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
Specification