Systems and methods of viral enablement of features by peer-to-peer connection
First Claim
1. A non-transitory computer readable storage medium impressed with computer program instructions to enable delivering software applications including application code having one or more bonus features of an application by proximate social interaction among first devices, second devices and third devices running the application code, wherein when delivered to a device, the application code has a susceptible state and an infectious state, which computer program instructions are configured to cause a processor to:
- at least initiate delivering the application code that includes capability to unlock access to a locked desirable bonus feature to the first devices and second devices in a susceptible state; and
at least initiate delivering the application code for the third devices either in the infectious state or triggered into the infectious state after delivery;
wherein transition of the application code from the susceptible state to the infectious state is accompanied by unlocking of the locked desirable bonus feature;
detecting proximate interaction of the application code running on any of the third devices with the application code running on any of the first devices; and
at least initiating the application code running on respective first devices to unlock the locked desirable bonus feature and to transition the first devices from the susceptible state to the infectious state, whereby the first devices are enabled to infect the second devices and unlock the locked desirable bonus feature on the second devices.
1 Assignment
0 Petitions
Accused Products
Abstract
The technology disclosed relates to identifying and notifying a user of nearby attendees at a mega attendance event who are in user'"'"'s social graph by comparing the user'"'"'s social graph to a list of event attendees. The identified attendees can be stratified into social graph tags that annotate, categorize and prioritize other users in the user'"'"'s social graph. The technology disclosed also relates to identifying and notifying the user of nearby attendees of sessions at the event who meet introduction preferences of the user by finding matches between introduction preference attributes specified by the user and attributes of the attendees provided by the list of event attendees.
162 Citations
20 Claims
-
1. A non-transitory computer readable storage medium impressed with computer program instructions to enable delivering software applications including application code having one or more bonus features of an application by proximate social interaction among first devices, second devices and third devices running the application code, wherein when delivered to a device, the application code has a susceptible state and an infectious state, which computer program instructions are configured to cause a processor to:
-
at least initiate delivering the application code that includes capability to unlock access to a locked desirable bonus feature to the first devices and second devices in a susceptible state; and at least initiate delivering the application code for the third devices either in the infectious state or triggered into the infectious state after delivery; wherein transition of the application code from the susceptible state to the infectious state is accompanied by unlocking of the locked desirable bonus feature; detecting proximate interaction of the application code running on any of the third devices with the application code running on any of the first devices; and at least initiating the application code running on respective first devices to unlock the locked desirable bonus feature and to transition the first devices from the susceptible state to the infectious state, whereby the first devices are enabled to infect the second devices and unlock the locked desirable bonus feature on the second devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of enabling desirable bonus features of application code of an application by proximate social interaction among first devices initially in a susceptible state, second devices in a susceptible state, and third devices in an infectious state, the method including:
-
at least initiating delivery of application code including a locked desirable bonus feature to the first devices and second devices in a susceptible state; and at least initiating delivery of application code for the third devices either in the infectious state or triggered into the infectious state after delivery; wherein transition of application code from the susceptible state to the infectious state is accompanied by unlocking of the locked desirable bonus feature; detecting proximate interaction of application code running on any of the third devices with application code running on any of the first devices; and at least initiating application code running on respective first devices to unlock the locked desirable bonus feature and to transition the first devices from the susceptible state to the infectious state, whereby the first devices are enabled to infect the second devices and unlock the locked desirable bonus feature on the second devices. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A system including one or more processors coupled to a memory, the memory loaded with computer instructions, which computer instructions, when executed on the one or more processors, implement actions of:
-
at least initiating delivering application code including a locked desirable bonus feature to first devices and second devices in a susceptible state; and at least initiating delivering application code for third devices either in an infectious state or triggered into the infectious state after delivery; wherein transition of application code from the susceptible state to the infectious state is accompanied by unlocking of the locked desirable bonus feature; detecting proximate interaction of application code running on any of the third devices with application code running on any of the first devices; and at least initiating application code running on respective first devices to unlock the locked desirable bonus feature and to transition the first devices from the susceptible state to the infectious state, whereby the first devices are enabled to infect the second devices and unlock the locked desirable bonus feature on the second devices. - View Dependent Claims (20)
-
Specification