U.S. patent number 8,989,778 [Application Number 11/881,836] was granted by the patent office on 2015-03-24 for secure and private location sharing for location-aware mobile communication devices.
This patent grant is currently assigned to Green Dot Corporation. The grantee listed for this patent is Samuel H. Altman, Mark Jacobstein, Brian R. Knapp, Thomas B. Pernikoff, James F. Potter, Nicholas T. Sivo. Invention is credited to Samuel H. Altman, Mark Jacobstein, Brian R. Knapp, Thomas B. Pernikoff, James F. Potter, Nicholas T. Sivo.
United States Patent |
8,989,778 |
Altman , et al. |
March 24, 2015 |
Secure and private location sharing for location-aware mobile
communication devices
Abstract
Embodiments of a location sharing network manager process are
described. The process is executed on a server computer coupled to
a plurality of mobile communication devices over a wireless
network. Each mobile device is a location-aware mobile
communication device. The process determines the geographic
location of a mobile communication device operated by a user within
an area, displays a map representation of the area around the
mobile communication device on a graphical user interface of the
mobile communication device, and superimposes on the map the
respective locations of one or more other trusted users of mobile
communication devices coupled to the mobile communication device
over the network. A security component allows users to establish
trusted relationships by requiring mutual consent and disclosure of
identifier and phone number information for each trusted user.
Location information can be blocked among trusted users or
obfuscated on the display of the mobile devices of the other
users.
Inventors: |
Altman; Samuel H. (Menlo Park,
CA), Sivo; Nicholas T. (Palo Alto, CA), Jacobstein;
Mark (San Francisco, CA), Knapp; Brian R. (Mountain
View, CA), Potter; James F. (Mountain View, CA),
Pernikoff; Thomas B. (Mountain View, CA) |
Applicant: |
Name |
City |
State |
Country |
Type |
Altman; Samuel H.
Sivo; Nicholas T.
Jacobstein; Mark
Knapp; Brian R.
Potter; James F.
Pernikoff; Thomas B. |
Menlo Park
Palo Alto
San Francisco
Mountain View
Mountain View
Mountain View |
CA
CA
CA
CA
CA
CA |
US
US
US
US
US
US |
|
|
Assignee: |
Green Dot Corporation
(Monrovia, CA)
|
Family
ID: |
40317072 |
Appl.
No.: |
11/881,836 |
Filed: |
July 30, 2007 |
Prior Publication Data
|
|
|
|
Document
Identifier |
Publication Date |
|
US 20080070593 A1 |
Mar 20, 2008 |
|
Related U.S. Patent Documents
|
|
|
|
|
|
|
Application
Number |
Filing Date |
Patent Number |
Issue Date |
|
|
11445730 |
Jun 1, 2006 |
|
|
|
|
Current U.S.
Class: |
455/456.3;
455/456.6; 455/457; 455/456.1; 455/411; 455/415 |
Current CPC
Class: |
H04M
1/7243 (20210101); H04L 67/22 (20130101); H04W
12/084 (20210101); H04L 67/18 (20130101); H04L
67/306 (20130101); H04M 1/72457 (20210101); H04L
63/102 (20130101); H04W 4/029 (20180201); H04L
67/02 (20130101); H04L 67/04 (20130101); H04W
4/02 (20130101); H04W 28/06 (20130101); H04M
1/72451 (20210101); H04W 88/02 (20130101); H04W
4/00 (20130101); H04W 64/00 (20130101) |
Current International
Class: |
H04W
24/00 (20090101) |
Field of
Search: |
;455/456.3,456.1,456.6,457,456.4,415,414.1,411,410
;701/209,202,211 |
References Cited
[Referenced By]
U.S. Patent Documents
Foreign Patent Documents
|
|
|
|
|
|
|
1295500 |
|
May 2009 |
|
EP |
|
WO0160100 |
|
Aug 2001 |
|
WO |
|
Other References
Matt Duckham & Lars Kulik , Location Privacy and Location-aware
computing, 2006. cited by examiner .
International Searching Authority, International Search Report and
the Written Opinion of the International Searching Authority for
International Application No. PCT/US2007/012960, mailed Jan. 3,
2008. cited by applicant .
Secretadmirer.com, screen capture using http://web.archive.org of
http://secretAdmirer.com website, dated Dec. 2, 1998. cited by
applicant .
Lat49, screen capture of http://lat49.com/howitworks/index.php,
dated Jun. 12, 2009. cited by applicant .
Non-Final Office Action in U.S. Appl. No. 11/445,730, mailed Apr.
29, 2009. cited by applicant .
Non-Final Office Action in U.S. Appl. No. 11/445,727, mailed Jul.
25, 2008. cited by applicant .
Non-Final Office Action in U.S. Appl. No. 11/445,729, mailed Jun.
9, 2008. cited by applicant .
Non-Final Office Action in U.S. Appl. No. 11/445,751, mailed Jul.
10, 2008. cited by applicant .
International Searching Authority, International Search Report and
the Written Opinion of the International Searching Authority for
International Application No. PCT/IB2008/02235, mailed May 28,
2009. cited by applicant .
Loopt: "About Loopt" Internet Article, [Online] Dec. 14, 2004,
Retrieved from Internet at <http://www.loopt.com/about> on
Mar. 8, 2009. cited by applicant .
Fiercewireless: "Sprint offers Loopt's social mapping service"
Internet Article, [Online] Jul. 17, 2007, Retrieved from Internet
at
<http://fiercewireless.com/story/sprint-offers-loopts-social-mapping-s-
ervice/2007-07-17> on Mar. 8, 2009. cited by applicant .
Schreiner, Keri: "Where We At? Mobile Phones Bring GPS to the
Masses," IEEE Computer Graphics and Applications, vol. 27, No. 3,
May 2007-Jun. 2007, pp. 6-11. cited by applicant .
Mobilaris: "Find Your Buddy is a Social Networking application"
Internet Article, [Online] Jun. 7, 2007, Retrieved from Internet at
<http://mobilaris.gotlandica.se/virtupload/content/27/Find.sub.--Your.-
sub.--Buddy.pdf> on Mar. 8, 2009. cited by applicant .
Mobilaris: "Pacific Ocean extends technology lead by integrating
Mapinfo miAware? LBS Platform" Internet Article, [Online] Feb. 6,
2003, Retrieved from Internet at
<http://nweb.waymaker.se/bitonline/2003/02/06/20030205BIT00440/wkr0002-
.pdf> on Mar. 8, 2009. cited by applicant .
Liu, Jennifer: "BASES business competition awards $2,000," The
Daily Stanford Online Edition, [Online] Apr. 11, 2005, Retrieved
from Internet at
<http://www.stanforddaily.com/cgi-bin/?p=1017453> on Oct. 26,
2009. cited by applicant .
Altman, Samuel H.: "Viendo: A Mobile Entertainment Management
Service," BASES Business Plan Compeition/Symposium, Apr. 9, 2005.
cited by applicant .
International Searching Authority, International Search Report and
the Written Opinion of the International Searching Authority for
International Application No. PCT/US2009/49956, mailed Sep. 1,
2009. cited by applicant.
|
Primary Examiner: Nguyen; Khai M
Attorney, Agent or Firm: Arent Fox LLP Harriman; J. D.
Parent Case Text
CROSS-REFERENCE TO RELATED APPLICATIONS
The current application is a continuation-in-part application of
U.S. patent application Ser. No. 11/445,730, entitled "Displaying
the Location of Individuals on an Interactive Map Display on a
Mobile Communication Device" and filed on Jun. 1, 2006. The current
application is related to U.S. patent application Ser. No.
11/445,727, entitled "Message Transmission System for Users of
Location-Aware Mobile Communication Devices in a Local Area
Network," and U.S. patent application Ser. No. 11/445,729, entitled
"Mobile Dating System Incorporating User Location Information," and
U.S. patent application Ser. No. 11/445,751, entitled "Displaying
and Tagging Places of Interest on Location-Aware Mobile
Communication Devices in a Local Area Network," each of which is
hereby incorporated by reference in it entirety.
Claims
What is claimed is:
1. A location-aware mobile communication device system comprising:
a registration device allowing a first user and second user to
register for a location sharing service by validating possession of
a respective location-aware mobile device, wherein the registration
device transmits a series of messages from the server computer to
the respective mobile devices of the first user and second user
within pre-defined intervals following registration of the first
user and second user to the location sharing service; a
configuration device allowing the first user to invite the second
user to establish a trusted relationship on a server computer
coupled to each of the first and second user, by providing an
identifier and phone number of the second user; a location sharing
device t displaying a location of the first user on the mobile
device of the second user, when the trusted relationship has been
established, and the first user has enabled location display of the
first user's respective mobile device on the mobile device of the
second user.
2. The system of claim 1 wherein the configuration device transmits
a text message from the first user to the second user, and wherein
the text message contains an invitation message.
3. The system of claim 2 wherein acceptance of the invitation
message by the second user establishes the trusted relationship on
the server computer, and wherein rejection of the invitation
message disables location-sharing of the second user's mobile
device to the first.
4. The system of claim 3 wherein enabling the location sharing
function causes the display of a location icon on a mobile
communication device of the particular user, the location icon
indicating a position of the user relative to a scalable map
displayed on the mobile communication device.
5. The system of claim 4 wherein the location of the registered
user is updated on the scalable map by updated location information
determined by a global positioning system device.
6. The system of claim 1 wherein the registration device transmits
the series of messages from the server computer to the respective
mobile devices of the first user and second user at random times
within pre-defined intervals following registration of the first
user and second user to the location sharing service, the series of
messages including at least one message requiring an affirmative
response from a targeted user selecting location sharing for
another user.
7. The system of claim 6 wherein the series of messages comprises a
first welcome message to the targeted user followed by a plurality
of subsequent messages including alternate messages that require a
text response from the targeted user.
8. The system of claim 7 wherein the registration device transmits
a validation message at random intervals during use of the location
sharing service by the targeted user any time after registration of
the targeted user, wherein the validation message alerts the
targeted user that the location sharing feature of the user's
respective mobile device is enabled, and requesting a text message
back affirming continued enablement of the location sharing
feature.
9. The system of claim 4 wherein the location icon is configured to
indicate an obfuscated location of the registered user within the
region displayed on the scalable map.
10. The system of claim 9 wherein the obfuscated region is selected
from the group consisting of a gridblock region, a city, and a
zipcode.
11. The system of claim 1 wherein the location sharing device
includes a location determining module selected from the group
consisting of user input, global positioning system technology,
WiFi positioning technology, Bluetooth technology, Radio Frequency
signal technology, and Cellular identification technology.
12. The system of claim 11 wherein the network comprises a cellular
telephone network, and wherein each respective location-aware
mobile device comprises a cellular telephone.
13. The system of claim 11 wherein the network comprises the
Internet, and wherein each respective location-aware mobile device
comprises an Internet-enabled communication device.
14. The system of claim 11 wherein the network comprises a WiFi
network, and wherein each respective location-aware mobile device
comprises an WiFi-enabled communication device.
15. A method comprising: determining the geographic location of a
mobile communication device operated by a first user within an
area; displaying a map representation of the area around the mobile
communication device on a graphical user interface of the mobile
communication device; establishing a trusted friend relationship
between the first user and a second user upon an invitation request
from the first user referencing an identifier and a data element
related to the second user, the data element representing a
non-public item of information known only to trusted friends of the
second user, and a validation from the second user referencing an
identifier and phone number of the first user; and transmitting a
validation message that requires a response to the first user and
the second user at random intervals.
16. The method of claim 15 wherein the data element related to the
second user comprises the phone number of the second user.
17. The method of claim 16 wherein the network is selected from the
group consisting of a cellular telephone network, the Internet, and
a WiFi network.
18. The method of claim 17 wherein the location is provided by
display of a location icon, and wherein the location icon is
configured to indicate an actual location of the displayed user or
an obfuscated location of the displayed user within the region
displayed on the scalable map.
19. The method of claim 18 wherein the obfuscated region is
selected from the group consisting of a gridblock region, a city,
and a zipcode.
20. The method of claim 19 further comprising a graphical user
interface component displaying a number of security and privacy
parameters to enable direct configuration of a privacy preferences
directly by the user or network operator.
21. The method of claim 20 wherein certain of the privacy
parameters comprise one or more sub-parameters, and wherein the
privacy parameters and any associated sub-parameters are displayed
in a menu structure on at least one of: a location-aware cellular
telephone, a personal computer operated by the first user, and a
server computer coupled to the location-aware cellular telephone
over a network and operated by a network operator.
22. The method of claim 15 further comprising: the validation
message including an alert that the location sharing feature is
enabled, and requiring an affirmative response from each of the
first user and second user to continue to enable the location
sharing feature; and monitoring for misuse of the trusted friend
relationship by either of the first user and second user.
23. The method of claim 22 wherein the misuse of the trusted friend
relationship is selected from the group consisting of: non-use of
the location sharing feature by one of the first user and second
user, and repeated rejections of invitations by one of the first
user and second user.
24. A method of allowing display of location-aware mobile
communication devices in a network of users comprising: registering
users in the network through a message-based registration and
validation process, wherein the message-based registration and
validation process transmits a series of text messages to the user
mobile device of which at least one message alerts the user that
location display is enabled and requires a response from the user
and allows the user to disable such location display; allowing
registered users to invite one or more other users coupled to the
registered user over a network to participate in interaction within
the system by providing an identifier and phone number for each
user of the one or more other users.
25. The method of claim 24 wherein the network is selected from the
group consisting of a cellular telephone network, the Internet, and
a WiFi network, and wherein the each of the registered user and one
or more other users utilizes a location-aware mobile device capable
of displaying a location icon for any of the other users.
26. The method of claim 25 wherein the message-based registration
and validation process comprises: providing an application to the
user mobile communication device for use in the user mobile
communication device; instructing the user to install the
client-side application on the user mobile communication device;
receiving personal user information regarding the user; providing
carrier and service terms of use to the user; and receiving user
consent to the carrier and service terms of use.
27. The method of claim 24 wherein at least one message requires a
response from the user regarding enabling or disabling of such
location display.
28. The method of claim 27 further comprising: transmitting a
welcome message to the user mobile device upon completion of a
registration process; transmitting a second message at a random
time after the welcome message to the user mobile device, the
second message requiring the user to select continued location
display to the one or more other users; transmitting a third
message at a random time after the second message to the user
mobile device, the third message allowing the user to disable
location display of the user mobile device; transmitting a fourth
message at a random time after the third message to the user mobile
device, the fourth message requiring the user to select continued
location display to the one or more other users; transmitting a
fifth message at a random time after the fourth message to the user
mobile device, the fifth message allowing the user to disable
location display of the user mobile device; transmitting a sixth
message at a random time after the fifth message to the user mobile
device, the fifth message requiring the user to select continued
location display to the one or more other users.
29. The method of claim 28 wherein the user response may be
provided by one of a reply message to a server computer or an entry
to a web page maintained by the server computer.
30. The system of claim 28 further comprising transmitting a
validation message at random intervals during enablement of
location display by the targeted user any time after transmission
of the sixth message, wherein the validation message alerts the
user that location display enabled, and requesting a text message
back affirming continued enablement of the location display of the
user's mobile device.
31. The method of claim 28 wherein enabling the location sharing
function causes the display of a location icon on a mobile
communication device of the particular user, the location icon
indicating a position of the user relative to a scalable map
displayed on the mobile communication device.
32. A location-aware mobile communication device system comprising:
a registration device allowing a first user and second user to
register for a location sharing service by validating possession of
a respective location-aware mobile device; a configuration device
allowing the first user to invite the second user to establish a
trusted relationship on a server computer coupled to each of the
first and second user, by providing an identifier and phone number
of the second user; a location sharing device displaying a location
of the first user on the mobile device of the second user, when the
trusted relationship has been established, and the first user has
enabled location display of the first user's respective mobile
device on the mobile device of the second user; and a location
obfuscation device allowing the first user to choose to display an
obfuscated location of the first user on the mobile device of the
second user, and wherein the registration device transmits a series
of messages from the server computer to the respective mobile
devices of the first user and second user at random times within
pre-defined intervals following registration of the first user and
second user to the location sharing service, the series of messages
including at least one message requiring an affirmative response
from a targeted user selecting location sharing for another
user.
33. The system of claim 32 wherein the configuration device
transmits a text message from the first user to the second user,
and wherein the text message contains an invitation message.
34. The system of claim 33 wherein acceptance of the invitation
message by the second user establishes the trusted relationship on
the server computer, and wherein rejection of the invitation
message disables location-sharing of the second user's mobile
device to the first.
35. The system of claim 34 wherein enabling the location sharing
function causes the display of a location icon on a mobile
communication device of the particular user, the location icon
indicating a position of the user relative to a scalable map
displayed on the mobile communication device.
36. The system of claim 35 wherein the location of the registered
user is updated on the scalable map by updated location information
determined by a global positioning system device.
37. The system of claim 32 wherein the series of messages comprises
a first welcome message to the targeted user followed by a
plurality of subsequent messages including alternate messages that
require a text response from the targeted user.
38. The system of claim 37 wherein the registration device
transmits a validation message at random intervals during use of
the location sharing service by the targeted user any time after
registration of the targeted user, wherein the validation message
alerts the targeted user that the location sharing feature of the
user's respective mobile device is enabled, and requesting a text
message back affirming continued enablement of the location sharing
feature.
39. A method comprising: determining the geographic location of a
mobile communication device operated by a first user within an
area; displaying a map representation of the area around the mobile
communication device on a graphical user interface of the mobile
communication device; establishing a trusted friend relationship
between the first user and a second user upon an invitation request
from the first user referencing an identifier and a data element
related to the second user, the data element representing a
non-public item of information known only to trusted friends of the
second user, and a validation from the second user referencing an
identifier and phone number of the first user; and superimposing on
the map, an obfuscated location of the second user in the event
that the second user has enabled a location obfuscation feature for
the first user; transmitting a validation message to the first user
and the second user at random intervals, the validation message
including an alert that the location sharing feature is enabled,
and requiring an affirmative response from each of the first user
and second user to continue to enable the location sharing feature;
and monitoring for misuse of the trusted friend relationship by
either of the first user and second user.
40. The method of claim 39 wherein the data element related to the
second user comprises the phone number of the second user.
41. The method of claim 40 wherein the network is selected from the
group consisting of a cellular telephone network, the Internet, and
a WiFi network.
42. The method of claim 41 wherein the location is provided by
display of a location icon, and wherein the location icon is
configured to indicate an actual location of the displayed user or
an obfuscated location of the displayed user within the region
displayed on the scalable map.
43. The method of claim 42 wherein the obfuscated region is
selected from the group consisting of a gridblock region, a city,
and a zipcode.
44. The method of claim 43 further comprising a graphical user
interface component displaying a number of security and privacy
parameters to enable direct configuration of a privacy preferences
directly by the user or network operator.
45. The method of claim 44 wherein certain of the privacy
parameters comprise one or more sub-parameters, and wherein the
privacy parameters and any associated sub-parameters are displayed
in a menu structure on at least one of: a location-aware cellular
telephone, a personal computer operated by the first user, and a
server computer coupled to the location-aware cellular telephone
over a network and operated by a network operator.
46. The method of claim 39 wherein the misuse of the trusted friend
relationship is selected from the group consisting of: non-use of
the location sharing feature by one of the first user and second
user, and repeated rejections of invitations by one of the first
user and second user.
47. A method of allowing display of location-aware mobile
communication devices in a network of users comprising: registering
users in the network through a message-based registration and
validation process; allowing registered users to invite one or more
other users coupled to the registered user over a network to
participate in interaction within the system by providing an
identifier and phone number for each user of the one or more other
users; displaying an obfuscated location of the registered user on
a mobile device of the one or more other users, when the registered
user has enabled a location obfuscation function for the mobile
device; and wherein the message-based registration and validation
process transmits a series of text messages to the user mobile
device of which at least one message alerts the user that location
display is enabled and allows the user to disable such location
display, and at least one message requires a response from the user
regarding enabling or disabling of such location display.
48. The method of claim 47 wherein the network is selected from the
group consisting of a cellular telephone network, the Internet, and
a WiFi network, and wherein the each of the registered user and one
or more other users utilizes a location-aware mobile device capable
of displaying a location icon for any of the other users.
49. The method of claim 48 wherein the message-based registration
and validation process comprises: providing an application to the
user mobile communication device for use in the user mobile
communication device; instructing the user to install the
client-side application on the user mobile communication device;
receiving personal user information regarding the user; providing
carrier and service terms of use to the user; and receiving user
consent to the carrier and service terms of use.
50. The method of claim 47 further comprising: transmitting a
welcome message to the user mobile device upon completion of a
registration process; transmitting a second message at a random
time after the welcome message to the user mobile device, the
second message requiring the user to select continued location
display to the one or more other users; transmitting a third
message at a random time after the second message to the user
mobile device, the third message allowing the user to disable
location display of the user mobile device; transmitting a fourth
message at a random time after the third message to the user mobile
device, the fourth message requiring the user to select continued
location display to the one or more other users; transmitting a
fifth message at a random time after the fourth message to the user
mobile device, the fifth message allowing the user to disable
location display of the user mobile device; transmitting a sixth
message at a random time after the fifth message to the user mobile
device, the fifth message requiring the user to select continued
location display to the one or more other users.
51. The method of claim 50 wherein the user response may be
provided by one of a reply message to a server computer or an entry
to a web page maintained by the server computer.
52. The system of claim 50 further comprising transmitting a
validation message at random intervals during enablement of
location display by the targeted user any time after transmission
of the sixth message, wherein the validation message alerts the
user that location display enabled, and requesting a text message
back affirming continued enablement of the location display of the
user's mobile device.
53. The method of claim 50 wherein enabling the location sharing
function causes the display of a location icon on a mobile
communication device of the particular user, the location icon
indicating a position of the user relative to a scalable map
displayed on the mobile communication device.
Description
FIELD
Embodiments of the invention relate generally to mobile
communication networks, and more specifically, to securely and
privately displaying geographic locations of users on mobile
communication devices.
BACKGROUND
The incorporation of location and navigation technology, such as
global positioning system (GPS) technology into mobile phones and
similar wireless portable devices has created a class of
"location-aware" devices that allow users to communicate with other
users as well as determine or even view the location of other users
on their own device. Such devices may be configured to display a
regional map and the location of other users and/or places of
interest on their device. This greatly enhances the social
networking capability of such devices, beyond simple voice or
text-based communication by allowing users to quickly find friends
and associates and coordinate activities based on respective
locations.
The incorporation of location display capability in mobile
communication or computing devices, however, raises particular
concerns about security and privacy. Such capability can be
inadvertently used to locate or track people in situations where
such location information is not desired to be made known. Although
present systems may allow users to hide their location from display
on other user devices, such systems typically allow for wholesale
enabling or disabling of the location display feature for an entire
class of users. What is needed, therefore, is a location-aware
mobile communication system that incorporates flexible security and
privacy features to allow customized or context specific disabling
or enabling of location display capability on user devices.
SUMMARY
Embodiments of a location-based social network manager process are
described. The process is executed on a server computer coupled to
a plurality of mobile communication devices over a wireless
network. At least some of the mobile devices are location-aware
mobile communication devices. The process determines the geographic
location of a mobile communication device operated by a user within
an area, displays a map representation of the area around the
mobile communication device on a graphical user interface of the
mobile communication device, and superimposes on the map the
respective locations of one or more other users of mobile
communication devices coupled to the mobile communication device
over the network. The user can build a database of trusted friends
among the one or more other users whose location can be displayed
on each respective mobile communication device. A privacy component
allows users to establish trusted relationships by requiring mutual
consent and disclosure of identifier and phone number information
for each trusted user. Location information can be blocked among
trusted users or obfuscated on the display of the mobile devices of
the other users. Messaging and alert functions using the
communications capability of the mobile device can incorporate the
location information resulting in interaction among users based on
user identity as well as relative position to one another. A
location privacy manager user interface allows a user to control
various location display and privacy aspects of the system.
INCORPORATION BY REFERENCE
Each publication, patent, and/or patent application mentioned in
this specification is herein incorporated by reference in its
entirety to the same extent as if each individual publication
and/or patent application was specifically and individually
indicated to be incorporated by reference.
BRIEF DESCRIPTION OF THE DRAWINGS
Embodiments are illustrated by way of example and not limitation in
the figures of the accompanying drawings, in which like references
indicate similar elements.
FIG. 1A is a block diagram of a mobile communication and computer
network that implements embodiments of a location-based social
network system.
FIG. 1B is a block diagram of components of a location-aware mobile
device that is used in the network of FIG. 1A, under an
embodiment.
FIG. 2A illustrates an example of a map displayed on a mobile
communication device, according to an embodiment.
FIG. 2B illustrates the display of information details for users on
a map, according to an embodiment.
FIG. 3 illustrates a web page that provides access to the databases
and social network manager system, under an embodiment.
FIG. 4A illustrates an example of a database interface for storing
and grouping friends on a client computer, under an embodiment.
FIG. 4B illustrates an example of a database interface for storing
and grouping friends for implementation on a mobile communication
device, under an embodiment.
FIG. 5A illustrates an example of a friend list displayed on a
mobile communication device, according to an embodiment.
FIG. 5B illustrates an example of a friend list displayed on a web
page, according to an embodiment.
FIG. 6A illustrates an example of a privacy preference menu
displayed on a mobile communication device, under an
embodiment.
FIG. 6B illustrates an example of a privacy preference menu
displayed on a web page, under an embodiment.
FIG. 6C illustrates display windows containing an invite-a-friend
message in SMS format and as an e-mail message, under an
embodiment.
FIG. 6D is a flowchart illustrating a method of establishing a
friendship link between two users, under an embodiment.
FIG. 6E illustrates a display window for a location privacy
manager, under an embodiment.
FIG. 6F illustrates an SMS-based messaging system for re-validating
user preferences for location sharing, under an embodiment.
FIG. 7A illustrates an example of a messaging function for
implementation on a mobile communication device, according to an
embodiment.
FIG. 7B illustrates an example of a messaging function for
implementation on a web page, according to an embodiment.
FIG. 8A illustrates an example of an event manager function for
implementation on a mobile communication device, according to an
embodiment.
FIG. 8B illustrates an example of an event manager function for
implementation on a client computer, according to an
embodiment.
FIG. 9 illustrates an example of an alert function for the
location-based social network manager process, under an
embodiment.
FIG. 10 is a flowchart that illustrates GPS polling for a location
determination module, according to an embodiment.
FIG. 11 is a flowchart that illustrates an example of sending
updated information to a user's mobile device, under an
embodiment.
FIG. 12 illustrates an example of a user update on a mobile
communication device and a corresponding update table, under an
embodiment.
FIG. 13 illustrates an example of a user table and an associated
location history table, under an embodiment.
FIG. 14 is a flowchart of an overall user registration and
certification process, under an embodiment.
FIG. 15 is a flowchart of a message-based verification process for
user registration, under an embodiment.
DETAILED DESCRIPTION
Embodiments of a location-based social network system and mobile
communication device that incorporates a real-time map display with
enhanced privacy features are described. In the following
description, numerous specific details are introduced to provide a
thorough understanding of, and enabling description for,
embodiments of the system. One skilled in the relevant art,
however, will recognize that these embodiments can be practiced
without one or more of the specific details, or with other
components, systems, and so on. In other instances, well-known
structures or operations are not shown, or are not described in
detail, to avoid obscuring aspects of the disclosed
embodiments.
Embodiments are directed to a location-based social network system
that enables the display of maps and real-time location information
on mobile phones and similar communication devices. FIG. 1A
illustrates a communication and computer network system 100 that
implements one or more embodiments. In system 100, a plurality of
mobile communication devices, such as cell phones or similar
devices 102 are coupled to a communication network, such as cell
network 111. The mobile communication devices (or "mobile devices")
are each carried and operated by a user and communicate with one
another using known communication methods such as wireless
telephony, radio, satellite, cellular systems (e.g., GSM, CDMA, and
so on), or other similar systems. For the embodiment exemplified by
FIG. 1, the mobile communication devices are cellular phones and
the network coupling these devices is a cellular telephone network,
although it should be noted that any other type of wireless network
that supports mobile devices can also be used.
In one embodiment, a server computer 104 runs a location-based
social network manager process 112. This process controls various
data objects relating to one or more social parameters or
characteristics of the users of the mobile devices 102. The users
of the mobile devices form a group or number of subgroups of people
who desire to interact with one another on a social level by
communicating with one another, participating in activities,
sharing information or experiences, or other types of social or
professional interaction based on their location. Because the users
of the mobile devices are inherently transitory, a fundamental data
object associated with each of the users of the mobile devices is
the location of each user within a particular region. Other
parameters include the profile of each user, and the preferences of
each user with respect to activities, people, privileges, and so
on. Each user who desires to interact with other users in the
system using this data utilizes the location-based social network
manager process 112. Through a subscription, or similar
membership-type (free or fee-based) participation model, each user
registers with the server computer 104 by providing certain
information relating to the user. Each principle parameter or
characteristic for each user is stored in one or more databases
accessible to the server computer 104. For the embodiment of FIG.
1, the data objects are stored in a data store 120 and are
organized in databases for user profiles 124, user locations 126,
user provided data 128, and map tiles 122. The mobile network 111
supporting the mobile devices 102 are coupled to the server
computer through an intermediate server computer, such as cell
server 116.
In one embodiment, each user of a mobile device may also operate or
access the location-based social network manager process 112
through a client computer 106, or any device that can access the
Internet, such as a WAP (Wireless Application Protocol) device 105.
The client computer 106, or similar device 105 (hereinafter also
referred to as a "client computer"), facilitates the establishment
and management of each user's account on the server computer by
providing a comprehensive interface to the databases and processes
provided on the server computer 104. For the embodiment shown, the
client computer interface supported by the server computer is a
World-Wide Web (WWW) based interface through a web server 114 to
the network 110 that supports the client computers 106. Thus, for
this embodiment, the web server 114 is a server or process that
stores data in the form of web pages and transmits these pages as
Hypertext Markup Language (HTML) files over the Internet 110 to the
client computers 106. For this embodiment, the client computers
typically run a web browser program to access the web pages served
by the web server 114 and any available content provider or
supplemental server that may also be coupled to the network. The
client computers may access the Internet 110 through an Internet
Service Provider (ISP). It should be noted that network 110 may be
the Internet, a Wide Area Network (WAN), a Local Area Network
(LAN), or any combination thereof.
As shown in FIG. 1A, aspects of the one or more embodiments
described herein may be implemented on one or more computing
devices executing software instructions. The server computer 104 is
typically a server or workstation class computer, but can be any
type of computing device with sufficient power and resources. The
client computer 106 or 105 can be any type of personal computing
devices, such as a workstation, personal computer, notebook
computer, mobile communication device, game console, camera,
personal digital assistant (PDA), or any device with an appropriate
amount of processing capability. Likewise, each mobile device 102
can be a mobile computing device, such as a mobile phone, PDA,
notebook computer, game console, or any similar class of mobile
computing device with sufficient processing and communication
capability to interact with other devices over network 111.
As shown in FIG. 1A, server computer 104 runs a server-side
location-based social network manager process 112. The client
computers 106 may run a client side version of this program, or
they may access executable program components over the network 110,
such as through web browser. Data for any of the clients 106 or
mobile devices 102 may be provided by a data store 120 that is
closely or loosely coupled to any of the server 104 and/or each
network 110 and 111. A separate content provider computer may
provide some of the data that is associated with the social network
manager program 112. Although data store 120 is shown coupled to
the network server 104, it should be noted that content data may be
stored in or more data stores coupled to any of the computers of
the network, such as a network client 106 or to devices within the
network 110 itself.
In one embodiment, the location-based social network manager
process 112 contains one or more program components that perform
the tasks of displaying location and user profile information
related to each mobile communication device that is part of the
network, on each mobile device and client computer, and
facilitating communication between devices based on the location
information. The process also includes a database manager program
that manages the different databases stored in data store 120. It
should be noted that the various databases 122 to 128 shown in data
store 120 can be organized as separate databases, portions of a
single database, or any other logical structure appropriate for
storing the data.
As illustrated in FIG. 1A, data store 120 stores user information
in user database 124. This information relates to each user of a
mobile device 102 and includes basic information, such as the
user's name, identifier (nickname or "uid"), security check
information (e.g., date of birth, password), and so on. Depending
on the social network services provided by the system, this
database can also store the user's social and consumer preference
information, such as what type of people the user is interested in
meeting or dating, what types of food or events the user prefers,
and so on. The user provided database 128 stores graphic
information related to each user, such as the user's picture, and
any other associated images. These images can be displayed on the
other user's mobile devices to provide a visual reference for each
user. The user provided database can also store other data objects,
such as video clips, audio clips, hypertext links, documents, or
other data provided by or associated with the user. Real-time
location information for each user, and geo-tagged places and
journal entries, and so on, is stored in the location database 126.
In one embodiment, location history information is not stored,
unless a user provides geo-tagging information or specifies a log
or history to be kept.
A map database 122 can also be included in data store 120. This
database provides the background maps that are displayed on each
user's mobile device and correspond to an area or region around the
user at the time the user invokes the process. In one embodiment,
the map images comprise map tiles that are image files of maps with
varying degrees of granularity. For example, a map tile of the
United States may provide an image of the continental U.S. that can
be zoomed to display a regional street level map for any area in
the U.S. The maps may be stored locally within the data store 120
to be provided by the server 104 to the appropriate mobile device
102, or they may be provided by a third party map provider. Other
databases storing information relating to the user's of the system
and the areas of their operation can also be included in data store
120, such as an events database, a place of interest database, a
store finder database, and the like.
FIG. 1B is a block diagram of components of a location-aware mobile
device that is used in the network of FIG. 1A, under an embodiment.
For the embodiment of FIG. 1B, location-aware device 160 represents
a mobile phone or similar mobile device that incorporates the
location sharing feature provided by the location-based social
network manager process 112. This allows the location of device 160
to be displayed on its own display 170 as well as on the display of
other user devices 102, and/or server computers 104. Location
information for the device is determined by position determination
unit 166, such as a Global Positioning System (GPS) method, or
similar location determination process implemented within the
device 160. The location information is provided in a standardized
format, such as latitude/longitude to a processor 162 and a data
radio 164. Because of the limited size of the displays on devices
160 and 102, the background map must be appropriately scaled
depending on user preference. In one embodiment, the scale
information is provided by the user through input 168 (e.g., keypad
input). The data radio 164 transmits the location data for the
device as well as the scale information over network 110 to server
104.
In one embodiment, the location-based social network manager
process 112 executed by server 104 includes a location-to-display
process 152. This process converts the location data into pixel
data that displays an icon representing the device 160 on a map
that is appropriately scaled based on user input. The background
maps may be provided by a separate map server 154. The
location-based social network manager process 112 includes
components that display the location information for device 160 to
other user devices 102 based on lists of friends whom user 160 has
specified as authorized to view such location information.
In an alternative embodiment, the location-to-display process may
be implemented in part or in whole by a process that is executed
locally on device 160.
Social Networking
In one embodiment, each user of a mobile device 102 maintains an
account on the server computer 104 that is set up and maintained
through a subscription or similar membership mechanism. This
account allows each user to define their own profile and preference
data and define the boundaries of interaction with the other users
in the system. The server computer 104 may be a centralized server
or cluster of server computers that maintains the processes and
databases for a number of different users, or it may represent a
distributed set of computers located in different geographic
regions, each serving a different group of users.
The location-based social network manager allows each user to set
up virtual networks that connect that user to other people, places,
and events in a manner that adaptively utilizes the geographic
location information for each of these items. The process 112
utilizes the user profile and preference information to allow the
user to define networks of friends within the entire group of users
and then locate these friends on maps that are displayed on the
mobile device itself. Using the messaging and calendar functions of
the mobile device, the user can then send and receive messages on
the device from these friends, or find places of interest or events
in the area.
In one embodiment, each mobile communication device runs local
client versions of the map generator and database manager
components. Such a component or components may be a thin-client
program, such as a Java program running on a cell phone, for
example. In one embodiment, each mobile communication device
includes a circuit or component that determines the geographic
location of the device relative to a standard set of coordinates.
Such a location determination component can be a GPS module or
assisted GPS (A-GPS) that provides the location of the mobile
communication devices in terms of latitude/longitude coordinates,
or a cell phone locator module that provides the location in terms
of distance to the nearest fixed cell transmitter location or a
group of transmitters, or other similar location determination
method. Such methods can include, but are not limited to:
Time-of-Arrival (TOA), Time-Difference-of-Arrival (TDOA), a
Wireless Fidelity (WiFi) network, mesh networks, and similar
networks. The client side map generator displays a map of an area
(provided by map database 122) around the user on the display
screen of the mobile communication device. Superimposed on this map
is an indicator for the location of the mobile communication
device. As the user moves, the position of his location on the
displayed map is updated in real-time or near real-time. The map
image information is configurable depending upon the location of
the user, and can be provided by the server computer 104, a
separate map provider service, or it can be programmed into the
mobile device itself.
In one embodiment, the client-side database manager component
stores user-generated connections between the subscribing user and
other subscribing users (e.g., acquaintances, friends, family, or
other contacts) (hereinafter collectively referred to as
"friends"), as well as other items of interest, such as places of
interest or locations of events of interest as generated by the
subscribing users. The map generator component can be configured to
display the locations of such subscriber-generated places or of any
friends that are within the region displayed on the map, and have
mobile devices that are similarly capable of determining their own
location. In this manner, the user of the mobile communication
device can see his or her location relative to other friends or
places of interest directly on maps displayed on the mobile
communication device. In general, the displayed map is a street
level map to aid the navigation of the user within the region
displayed by the map. The map can be scaled from any number of
degrees of resolution, such as from country to state or city level
down to block level, depending upon the configuration of the map
generator component.
FIG. 2A illustrates an example of a map displayed on a mobile
communication device, according to an embodiment. As shown in FIG.
2A, a mobile communication device, such as cellular phone 200 has a
display screen 202. The map generator displays a map on the display
with certain icons superimposed thereon denoting the location of
certain friends or places of interest to the user. For example, a
large circular icon 208 may denote the location of the user of the
mobile device, while smaller icons 206 or icons of a different
shape and/or color may indicate the location of his or her friends.
The display area can be divided into a number of different
sub-display areas devoted to displaying information relating to the
items displayed. Thus, as shown in FIG. 2A, display area 204
displays certain information relating to the user, such as name,
and status information. The status information includes both a
status message, a user-programmed message that is displayed on the
mobile devices of the other users, and an indication of
availability of the user, such as "free" or "busy." A status flag
can be defined to allow the user to specify whether he or she is
busy or free to all or certain users.
Depending upon the constraints of the display of the mobile device,
other items of interest, such as names and status of friends and/or
places of interest or events can also be displayed or shown on the
map. Different visual indicators or tiling techniques, or nested
menu techniques can be used to provide access to the graphical
information provided on the display. In one embodiment, the process
can be configured to display the name, image, and any associated
status information for a user when the icon associated with the
user is selected on the display.
FIG. 2B illustrates the display of information details for users on
a map, according to an embodiment. Because of display space
limitations that may be inherent in the mobile communication
devices, and even the web pages, various different display
configurations can be used to maximize the amount of information
displayed at any one time. In one embodiment, pop-up screens are
utilized to display the user information for a user whose location
is displayed on a map. As shown in FIG. 2B, the default display for
a user 220 shows the name or user ID for each displayed user. In
this example, the displayed icon is for the user of the mobile
communication device himself, and so the user icon is labeled
"You." Instead of displaying the user information is a portion of
the display screen, the user information is provided in a
pop-screen that is activated by a toggle switch or command. Thus,
as shown in pop-up display 222, information relating to the
displayed user, such as an image, a profile, or a pre-stored
message can be displayed without occupying too much display space.
This window can be minimized using the appropriate reverse toggle
sequence. In this manner, the amount of displayed information can
be selected directly by the user.
In one embodiment, access to the account for a mobile device user
is also provided through a web-based (or similar) interface from a
client computer 106. In general, client accounts and databases are
created using the server computer. The client computer provides the
means for the user to manage the databases used by the map
generator, user database, user provided database, etc. and takes
advantage of greater processing power typically not found in mobile
devices, such as cell phones. One or more databases are created to
store information related to the user's friends and other items of
interest, such as events, locations, and the like. In one
embodiment, the client computer 106 runs a web browser 114 to
access web pages and resources available on server 104 and served
by web server 114. FIG. 3 illustrates a web page that provides
access to the databases and social network manager system, under an
embodiment. For the example web page illustrated in FIG. 3, a first
display region displays a map 302 showing the location of the
user's mobile device. The user's profile is displayed in display
area 304. Other display areas can be configured to display other
items of information depending upon the requirements of the user.
For example, display area 306 can display messages or requests from
friends, and display area 308 can provide an input area to send
messages or requests to friends. The information shown on the web
page 300 can be the same information displayed on the mobile device
in a scaled up and rearranged format to take advantage of greater
display space, or it may display information that is impractical to
show and manage on the mobile device.
The database manager allows a user to create a database of
friendship connections, events, user-specified locations of
interest, favorite things, and any other items that have geographic
and/or time context with respect to interests of the user. These
data objects are stored in the user database 124 for each user. The
information in this database can be organized in any number of
ways. For friends, a grouping function allows the user to define
specific sub-groups of friends to facilitate finding or messaging
select people out of the total number of friends. Thus, friends can
be grouped into different categories to allow easier identification
and contact with specific people. The client side module on the
mobile device allows the user to access and modify these databases
of friends, events, and so on, on the mobile device. FIG. 4A
illustrates an example of a database interface for storing and
grouping friends on a web page, and FIG. 4B illustrates an example
of a database interface for accessing the friends database on the
mobile communication device. In one embodiment, the mobile
communication device interface can also allow the user to manage
the database by allowing storage and grouping of friends through a
function similar to that illustrated in FIG. 4A. As shown in FIG.
4A, a list of contact names from the user database 124 is displayed
in display area 402 and a set of groups is displayed in display
area 404. Through a drag and drop operation, or similar method,
names can be added to one or more appropriate groups. Display area
406 allows a user to define or modify an existing group by naming,
describing and modifying the composition of the group. A similar
database access and grouping function is provided through the
client side program for execution on the mobile communication
device. The client side module allows the user to access the group
database on the client computer, and add or modify the group
definitions. As shown in FIG. 4B, the defined groups are shown in
display area 412. In addition, a geographic descriptor is also
provided to further define a characteristic associated with the
group or any member within a group. For the embodiment illustrated
in FIG. 4B, display area 414 includes a descriptor that specifies
the radius of the friends group relative to the user's mobile
communication device. In this manner, a message or alert can be
sent not only to friends in a particular group, but friends who are
within a certain proximity to the user. This additional degree of
communication filtering takes advantage of the geographic location
information determined by the network 100. This location element
related to the database of friends and friend-groups can also be
employed by the client computer 106 when it accesses the database
on server 104.
Information within the databases stored in data store 120 can be
combined in any number of ways to provide the user with appropriate
data relating to his or her friends. The location information
relating to each friend can be used to provide a visual reference
for the user on a map of the area, such as that illustrated in FIG.
2A. In one embodiment, the location-based social network manager
process includes a list utility that allows the user to pull and
display various items of information relating to each of the
friends within the system. Not only can location information be
displayed on a map, but specific information can be displayed in a
list format on the client computer or mobile device of the user.
FIG. 5A illustrates an example of a friend list displayed on a
mobile communication device, and FIG. 5B illustrates an example of
a friend list displayed on a client computer, according to
embodiments. As shown in FIG. 5A, the friend list function starts a
display window 502 on the display of the mobile device that lists
friends whose information is accessible to the user. For each
listed friend, various items of associated information can be
displayed, such as the name, location (address, distance plus
direction vector, latitude/longitude, time of last update or
other), and any associated message or status information. The
status information is programmed into the profile portion of the
user database 124 for each friend and is pulled from that database,
while the location information is pulled from the location database
126 for each friend and is pulled from that database. If the
display of the mobile device accommodates the inclusion of the
user's image, the image may be pulled from the images within the
user provided database 128 and also displayed on the mobile device.
This is illustrated in the interface for the client computer shown
in FIG. 5B. In this embodiment, the same location and status
information 506 is displayed for each friend along with an image
508 of that person. Also provided in the illustrated client
computer interface is a menu area 510 that allows the user to
perform certain tasks associated with the friends list, such as
finding or removing friends, or sending messages to other
users.
Security and Privacy Features
Because the location-based social network manager stores and
provides access to sometimes sensitive personal identification
information (PII) of a user to a network of people, certain privacy
measures are included to allow the user to control who has access
to this information. PII data may include information about the
user (e.g., name, mobile phone number, personal profile, and other
unique identifier information), as well as information used by the
user (e.g., e-mail address, username, location information, and
other network interaction information).
In order to promote the privacy of users, as well as the proper use
of location and PII data, the system implements consent-based
features, in which any use or disclosure of system data is strictly
based upon receiving a user's authorization. A confirmation process
confirms that such consent is actually received from a device that
is to be located by the system. In one embodiment, the location
sharing system is a closed system in which location determination
and display services are supported in direct interactions between
real and trusted friends. The service does not necessarily control
any such interaction, but rather offers privacy setting s and tools
that encourages such interaction and allows users to define their
networks. This mechanism is meant to strengthen the friendships
between people who already know each other and spend time together,
not to facilitate the creation of new friendships with people that
subscribers do not already know. The security functions may be
implemented in a privacy manager module within the location based
social network manager 112 of server 104.
An important feature of the privacy functions include the ability
to turn off the location sharing so that the location of the device
is not broadcast to friends and cannot be determined by friends.
The location sharing on/off feature can be triggered through the
website, the mobile application, a customer service call, or via an
SMS message, or the like. If the mobile communication device is
lost or otherwise compromised, the system can disable access to the
service by expiring the session ID and erasing all information from
the device by means of an appropriate message or signal to the
device.
In one embodiment, individual users are provided the capability of
turning on or off their location sharing capability. This can be
implemented through means of a toggle switch provided by the user
interface on the mobile device or the web page, for each individual
user of the system. This would allow a user to turn off location
sharing for friend 1, but keep it on for friend 2, or to turn it
off for a class of friends, and so on. The user interface also
provides a method for the user to specify certain times or time
periods in which location sharing is to be automatically disabled
or enabled. For example, a user may specify that his or her
location should never be shared between 11 pm and 9 am, or on
weekends, or any other time parameter. Such restrictions can also
be specified for location, such as enabling or disabling location
based on area.
Along with location sharing itself, users may also turn off the
automatic location updating process. This will cause the display of
the last known location of the user if location sharing is enabled,
but automatic location updating is not allowed. The automatic
location update feature could also implement certain security
mechanisms. For example, a user can turn-off or set to `manual` the
location update feature, in which case his or her location fix,
time stamp and status is essentially frozen and displayed as a
constant to the other users. In one embodiment, the system can be
configured to make it appear as if the location information has
been updated, though, in reality it has not been updated with the
actual recent or current location of the user. Thus, an apparently
updated message may read "Work, 15 minutes ago," even though this
location may have been manually set days ago.
Through a privacy preference utility, the user can define which
characteristics the user can share with others within his or her
social network, and set filters to limit access of certain
information to only certain users. For example, the user can
specify which user or group of users within the network can see the
location of the user by defining a "blacklist" of users who are not
allowed to see the location information.
FIG. 6A illustrates an example of a privacy preference menu
displayed on a mobile communication device, and FIG. 6B illustrates
an example of a privacy preference menu displayed on a client
computer, according to embodiments. As shown in FIG. 6B, the
privacy and settings window 604 provides fields or commands that
allow the user to specify a status message. This is the message
that is displayed on the mobile devices of the other users, such as
shown in FIG. 5A, and the web pages of other users. A short message
can be typed in depending upon the constraints of the system and
can provide a small amount of useful information. The visibility
setting 608 allows the user to set which friends are allowed to
view the user's location information, and can be applied to all or
no friends, or specific friends specified on the blacklist. Display
area 610 allows the user to list the friends in the blocklist.
Display area 612 illustrates a simple free/busy toggle that allows
the user to set his or her status as free or busy. The busy setting
may be configured to block the user's information from his or her
friends until the user becomes free. The interface 604 illustrated
in FIG. 6A allows the user to set the privacy for the user's mobile
device. Depending upon the constraints of the mobile device, the
same or a subset of the privacy settings can also be displayed and
accessed on the mobile device itself. The corresponding fields for
the mobile device are illustrated in display window 602 of FIG.
6A.
As stated above, the service offers end user privacy settings to
encourage interaction only between real and trusted friends. The
system incorporates certain fundamental privacy features. First,
the system requires that two users mutually consent to be friends
in the system before any direct interaction (messaging, location
sharing, event invitations, etc.) can occur. This request for
mutual consent can come in the form as an invitation to the
service, in the case that one of the users is not yet a registered
user of the service, or as a request to be friends on the network,
in the case that both users are already registered users of the
service. Accordingly, the system is a "closed network." Besides,
mutual consent, the service requires that the users input a user's
phone number before being able to invite them to the service or
request a friendship connection. This requirement accomplishes two
primary objectives. First, it helps to encourage usage of the
service with real and trusted friends. Since consumers are
generally trained to be careful to whom they give their phone
number, and knowledge of someone's phone numbers typically makes
the existence of a real relationship more likely. Second, it limits
the ability of users to either inadvertently or maliciously invite
or request friendship from users that they do not already know.
Thus the system avoids the two most difficult problems faced by
many open social networks today: the ability predators have to spam
users with friend requests, and "phishing," the creation and use of
fake identities or multiple anonymous profiles in the hope that an
unsuspecting user will accept a bogus friend request. The service
will not send an invite or request until a valid phone number has
been entered, and there is no other means by which to create a
friend connection on the system.
In one embodiment, users are able to invite friends to join the
service via SMS or e-mail messages after entering a valid mobile
phone number of the prospective friend. Before sending out an
invite on behalf of the user, the system checks to see that the
invite-a-friend messages are sent from verified mobile numbers and
accounts. If an invitee accepts an invitation and joins the
service, the invitee automatically receives a friend request from
inviter. Note that this exchange does not automatically make these
parties "friends." The invitee must explicitly consent to the
friend request to create a reciprocal friendship connection. No
information sharing occurs through the system until both users
mutually and expressly consent to a friendship connect, and the
sharing of location information.
In general, friend requests may be sent over the web via email or
the mobile device via SMS (SMPP connection). Thus, an invitation
may be sent in a number of different formats. FIG. 6C illustrates a
display window 617 containing an invite-a-friend message in SMS
format that may be sent to user, under an embodiment. If the user
is not currently a subscribed member, the message provides access
to information and a sign-up page. If the user is a subscribed
member, he or she is directed to a page that allows acceptance or
rejection of the invitation. Alternatively, the invite-a-friend
message may be sent as an e-mail message. Window 619 of FIG. 6C
represents a display window containing an invite-a-friend message
sent as an e-mail message, under an embodiment.
In order to successfully send a request the inviter must already
know the invitee's phone number. Accepted friend requests make
sharing location an option, not a requirement. The ability to share
location information is disabled until both users mutually and
expressly consent to sharing location. The service checks that the
request is initiated from a confirmed account, and that the friend
request is being accepted from a valid registered user account and
mobile device. During the invitation process, if the system
determines that the invitee is already a registered user, the
system provides the username and phone number of the inviter, and
checks to see if the phone number is in the personal address book
of the invitee. If it is, the name that is entered in the address
book is then revealed.
When a user initiates friend request approvals, a reminder message
may be displayed on the web and mobile application. Such a warning
may state that the service allows other people to know where you
are, and that for privacy the user should always make sure that
they know who they are sharing their location with. The system can
be configured to send an SMS reminder to the user reminding him or
her that they are sharing their location. The system can also send
an SMS message at an unpredictable time after a new friendship
connection is created or a change of password has occurred. Other
warning or notification messages can be sent to regularly remind
the user about how to use the service's privacy tools. These can
include warnings to users that before they close the application
that the service will update their location in the background
unless they request to completely turn off location sharing;
regular text messages notifying users that the service is running
on their phone, along with instructions for canceling the service,
and other similar warnings.
FIG. 6D is a flowchart illustrating an overall method of
establishing a friendship link between two users, under an
embodiment. The first user, or "inviter" registers or logs in to
the system as a registered user, block 621. The registration
mechanism can be any type of subscription based mechanism that
restricts access to system services and validates a user based on
certain identifying criteria. Once logged-in, the inviter can then
send an invitation message to a second user, the "invitee", block
623. The invitation message can either be an SMS or e-mail message,
as illustrated in FIG. 6C, or it can be any other type of
invitation message recognized by the system. In one embodiment, the
invitation method includes or references a specific item of
information that is not well known about the invitee. This can be
the invitee's phone number or similar data element that is
typically known only to true friends or trusted associates of the
invitee. The second user receives the invitation, block 625, and
either accepts or rejects the invitation. If the invitee rejects
the invitation, as determined in block 627, the invitation process
ends, and no friendship link is established. If the invitee accepts
the invitation, the second user acknowledges acceptance and shares
his or her location information with the inviter, block 631. At
this point, the system establishes a friendship link between the
first and second user, block 633, and appropriate database table
entries are created in the database.
As shown in FIG. 6D, the system requires that any two users
mutually consent to friendship before location sharing is even
activated. Even when two users mutually consent to friendship,
users can choose to share or hide their location from their friends
at any time. When users consent to sharing location information,
they have the option of three visibility settings. They can choose
to share their location with all, some, or none of their friends,
as shown in FIG. 6B. The system is configured to only allow its
members to browse the profiles of friends and friend-of-friends.
There is no "open browsing" in which people can search for
individuals they don't know in order to try to establish a new
"friendship." In one embodiment, the user profiles contain
personal, contact, and professional information, and favorite
places, but they do not contain location information, and members
can not see the location of anyone who is not explicitly a friend
who has chosen to share location information with them. Restricted
browsing accomplishes two primary objectives. First, it reinforces
the notion that the service is a closed network meant to be used
with real and trusted friends. An open network with unlimited
browsing invites users to peruse profiles and information of users
that they do not know. Friend-of-friend browsing does not allow for
that behavior. Second, users generally feel more comfortable
sharing information in a more private network. The information
users are willing to share with friends and peers is vastly
different than the information they should be sharing with the open
community.
In one embodiment, the system implements a limited search
capability in which users can search for friends on the service,
but the system only returns limited profiles when displaying
results. This limited profile can include a photo, name, and age.
If a user chooses to send a friend request, they must provide the
valid phone number of their friend before the request is sent.
Limited search, along with restricted browsing, discourages unsafe
behavior prevalent on more open networks where users can discover
new users and browse their profiles freely.
Before being able to use the service, the service requires users to
first register with the service. The registration process requires
that the user verify ownership of the mobile device attached to
their account. The system does this by sending a verification text
message to the phone number that the user entered during the
registration process. The user must click a link in that
verification text message before the account can be activated.
Requiring verified ownership of a mobile phone is important to end
user privacy for at least two primary reasons. First, it generally
eliminates true anonymity. The phone number attached to each
account may provide identifying information of the primary account
holder. Users are typically less likely to act inappropriately or
maliciously knowing that their account's activity can be traced
back to them. Second, it restricts abuse of accounts. Because a
real phone number is required to activate an account, it is far
more challenging to create multiple accounts and identities on the
service, as this would require the user to have multiple mobile
phone accounts in contrast with Web-based social networks that
allow unlimited and free sign-ups. A network that requires a
physical phone number severely limits this behavior.
In one embodiment, the service implements certain ongoing
monitoring processes to identify and prevent or warn against
unwitting or dangerous use, such as stalking of users. For example,
if a user creates an account but specifies no friends, this might
indicate a user who is interested in only tracking other people.
Similarly, if a user has a very low ratio of accepted to denied
friends, this may indicate a user with problematic usage behavior
and inappropriate intent. A situation in which two accounts are
created with one friendship and user A has heavy usage and user B
has no usage may also indicate improper use. Many other usage
patterns can be defined and monitored to target possible
inappropriate use of the system. Such usage patterns are constantly
monitored and users are alerted if such patterns are detected.
Service may then be suspended or cancelled for users how are not
able to provide a satisfactory explanation of such behavior.
In one embodiment, the location-based social network manager 112
includes a graphical user interface component that allows either
the user and/or the network to manage a device holder's
location-based privacy in a comprehensive system. FIG. 6E
illustrates a display window for a location privacy manager, under
an embodiment. This interface and management component would handle
all location transactions for a user, whether they are
phone-initiated or network-initiated. As shown in FIG. 6E, the
display area 602 includes a number of options that allows the
device user to select a level of privacy, or the on/off state of a
number of different privacy parameters. These parameters a global
privacy lock, or specific privacy settings for individual users
and/or situations. Thus, the parameters can include and
identification of other users or groups of user who are allowed to
view the user location and profile information, blockage of
location information based on time or day, obfuscation levels, and
application enablement. For the embodiment of FIG. 6E, the people
section of the display area 602 displays a list of the other users
who are registered friends of the user, including any defined
groups of users. Either a global privacy on/off option can be made
for each person, or specific sub-parameters can be specified, such
as allowing a particular person to view location information at a
certain time, or if they are within or outside of a certain
proximity to a person, object or location, and so on.
Many other parameters are also possible depending upon the privacy
functions that are defined for each user. The interface can be
implemented in a variety of different ways depending upon the
system requirements and design choice, and can include lists of
options, hierarchical drop-down menus, simple command entry, and so
on. In one embodiment, a user can access and configure the privacy
parameters him or herself. Alternatively, or in certain
circumstances, the network operator may be able to configure
certain privacy parameters, such as in providing a default
parameter configuration upon service initiation, or to block or
allow access to certain classes of users, and to enable certain
regulatory requirements or emergency response services (such as
parental controls for minors and E911 systems, etc.).
In one embodiment, the security component is configured to analyze
user log-in or subscription behavior to identify potentially
suspicious or malicious behaviors based on friend rejections. For
example, if a user has been rejected a number of times from a
number of different users, this may be taken as a sign that the
user is using the service inappropriately and phishing for friend
connections. There are two main triggers for suspicious activity.
One is a measure of the ratio of rejections to invites to determine
whether or not a user has a disproportionately high number of
rejections. This is probably an indication that they are "phishing"
for friends. A second trigger is a measure of whether or not a user
has been rejected multiple times from the same person. This
generally indicates that the user is trying to harass another user
into accepting a friendship connection. When a user hits either of
these triggers, a backend process of the system will flag the user
account. In reaction to any of these triggers, the system may be
configured to suspend the user's account, warn the user via a SMS
and/or email, or simply delete the email. This feature serves as an
auto-watchlist for suspicious activities.
Other security and privacy measures can also be incorporated in the
system in alternative embodiments, such as protection for minors
through limited access to the service to certain age groups. In
this embodiment, mechanisms such as restrictions on PII data
gathering can be enforced, age screening registration, and parental
consent mechanisms can be implemented.
To ensure protection of sensitive user information, such as profile
data, location, and any other user data objects that may be stored
in the system, the social network manager of the system employs
certain privacy functions to limit access to user information to
only the user and authorized friends. In one embodiment, each user
account is identified by a unique user ID and protected by an
associated password known only to the user. User account
information is typically stored on the server computer in the form
of database tables, such as in user database 124. Other information
relating to the users are maintained in separate database tables on
the server computer. These can include the location, friends list,
profile information, account information, or any other items of
information managed by the system.
FIG. 13 illustrates an example of a user table and an associated
location table, under an embodiment. The user table 1302 contains
the listing of the users with certain key information, such as
name, user ID, and phone number, among other possible
identification information. Certain databases within the system
store sensitive user information, such location information and
dating preferences, and the like. To ensure privacy and security,
these tables are not explicitly associated with any particular
user. This ensures that anyone gaining unauthorized access to the
databases within the system will not be able to associate any
particular sensitive information with the corresponding user. This
correspondence is provided only by way of an encoded linkage
structure. Thus, as illustrated in FIG. 13, there is a code denoted
"linkA" for each user. When a user is created within the system,
the unique linkA code is generated for that user. It is a randomly
generated alpha-numeric text string that is unique to each user.
The user also provides a password, which is not itself is not
stored within the system, but is instead used to encode or link the
table entries in the user table 1302 to other data objects in the
user's database. Thus, in one embodiment, the linkA code is used by
the system to link to other database tables holding sensitive or
confidential information for the user within the system.
Because the social networking system can provide location
information for individual members of a network, certain privacy
features are provided to allow a user to mask or hide a user's
actual location information, or limit access to the user's location
information. This is an alternative to turning off the location
display feature entirely for a user. In one embodiment, a fuzzy
location feature is provided. This function adds a random offset to
the actual location of a user, and allows the user to share his
general location information with other users but hide his exact
location. For example, the offset could be one mile, thus the
user's location would be offset by a mile when displayed on another
user's mobile communication device. The offset value is used until
the user moves out of the offset radius. The offset value is then
reset and used until the user moves outside of the boundaries
defined by the previous or new offset value. The user is randomly
displayed in any location within the offset radius, and can be
displayed as a large icon encompassing the entire fuzzy area or as
a focused icon randomly placed within the radius. This prevents
other users from being able to guess a user's location by selecting
the location in the middle of several densities.
In another embodiment, the display obfuscation method includes
snapping a location indicator to set location, such as the upper
right corner of a grid. This would prevent so-called "centroid"
attacks on the system to try to decode the user's location.
Location information can also be obfuscated on the basis of other
location parameters, such as zip code, city, region, and so on. In
this case, an icon or location-indicator would indicate that a user
was in a certain region or zip code, but would not provide the
location of the user within that area. Other obfuscation techniques
could also be implemented to mask or obscure the location
information for users or groups of users. For example, groups of
close points on a map, either users or points of interest on a map
may be clustered. A key would then be needed to scroll through the
clustered points.
In certain deployments, such as those involving many mobile device
users based around one or more server computers, the amount of data
transmitted throughout the system can be very high. If many users
constantly change location and/or message other users on a frequent
basis and at approximately the same time, the network traffic could
easily overwhelm the system causing lock-up conditions or drastic
slowing of network traffic. In one embodiment, the location-based
social network manager process employs a data compression mechanism
to compress the location and message data to reduce the network
traffic between the mobile devices and the server computer. The
data compression mechanism, according to one embodiment recognizes
frequently used patterns and assigns them a number between 0 and
255. These patterns can thus be represented in one-byte. A
dictionary of the 256 most frequently used patterns is generated
and stored on one or both of the server and client devices and
shared between the client and server. In alternative embodiments,
other known data compression methods can be used to compress the
network traffic between the server computer and the client
computers and mobile communication devices.
Messaging Functionality
The mobile communication device can also be configured to provide
other functions or utilities that facilitate user interaction with
friends based on the location information displayed on the mobile
communication device. For example, a messaging utility can be used
to send and receive text or voice messages from a friend or groups
of friends within a displayed area. In one embodiment, the
location-based social network manager process 112 includes a
messaging module that allows messages to be sent to friends on the
device where they are most likely to see it. The messaging module
utilizes the group module and the geographic location functionality
of the mobile communication device. The message can be sent as a
text message or instant message (IM) between mobile communication
devices, or as a web message between client computers. In general,
messages can be transmitted between any of the computers and
devices illustrated in FIG. 1, thus, messages can go from mobile to
mobile, web to web or mobile to web.
FIG. 7A illustrates an example of a messaging function for
implementation on a mobile device, and FIG. 7B illustrates an
example of a messaging function for implementation on a client
computer, according to embodiments. As shown in FIG. 7B, the client
computer based messaging function can be provided as a simple user
interface with fields for the recipients, message subject, and
message. An attachment utility can also be included to allow the
transmission of attached data objects, such as documents, files,
pictures, and the like. The mobile communication device version of
the messaging function is typically a simple text based utility
that displays the recipients and the text message to be sent, and
if space is constrained, these display areas may be provided in
successive screens of the device, as shown in FIG. 7A. Message data
can be sent via standard SMS protocol, data transfer, or any other
suitable messaging protocol.
In one embodiment, the social network manager also includes an
event manager module that allows a user to program places and/or
events of interest. The event manager allows the user to create and
manage various events using date and location information and send
invitations or messages regarding the events to friends using the
grouping function and messaging utilities of the system. Thus, the
event manager module utilizes the group module and the geographic
location functionality of the mobile communication device. Lists of
public events can be provided by separate event servers accessible
to the server, client computers or mobile devices of the system
100, or they may be programmed into an event database stored in
data store 120. Typically private events are created and stored by
each user, and each user may store events or other similar
information in their own user provided database. Alternatively,
events can be stored in one or more separate event databases
(public and/or private events) within database store 120. If
permission is granted, the database functionality of the mobile
devices allows a user to view events created by other users or
those that are public. Public events are typically events that are
provided by users or partners that provide event information.
FIG. 8A illustrates an example of an event manager function for
implementation on a mobile device, and FIG. 8B illustrates an
example of an event manager function for implementation on a client
computer, according to embodiments. As shown in FIG. 8B, a display
area 810 displays a description of the event including the time and
place of the event, as well as any other relevant information. The
location of the event is shown as an icon 813 on a map displayed in
display area 812, and the date of the event can be shown on a
calendar displayed in display area 814. Similar information can be
provided through the client side program for display through the
mobile communication device, as shown in FIG. 8A. Depending upon
the constraints of the display the event information can be
provided in a series of screens. Additionally, certain geographic
parameters can also be provided, such as relative distance to the
event based on the location of the mobile communication device as
well as the location of the event on the map.
User-Generated Locations
In one embodiment, the location-based social network manager
includes a user-generated location feature, feature that allows
users in the network to program and share private and possibly,
public places of interest (POI) with one another. A database
specifying places and/or events can be stored in data store 120.
This database can store different items of information relevant to
a place of interest, such as, location, hours, products/services
provided, and so on. This information can be provided to a user in
a "pull" model, in which the user searches for the stored
user-generated location through the web page or mobile
communication device. Alternatively, the information can be
provided to the user in a "push" model in which the server sends
relevant POI information to a user based on a user condition, such
as if the user goes near a particular POI. The POI feature utilizes
a reverse geocoding method in which the system determines the
user's location, and correlates the location coordinates to entries
in the POI database to determine which bar, restaurant, or other
where they may be. This POI information can then be displayed on
the user's friends mobile communication devices as the location of
the user. This allows the system to automatically determine and
display the location of a user and to share more descriptive and
precise location information without requiring the user to manually
type anything. For example, using the friend finding and messaging
functions, a user can send a message to his or her friends simply
saying that they are near the "ABC" bookstore instead of any
address or other location information. In determining the location
of the user, the server looks up the latitude/longitude information
of the user, matches it to the corresponding POI, and sends the POI
information to the other users in the network.
The storage of user-generated location information in a database
allows a user to search for and find user-generated places almost
automatically using the location finding capabilities of the mobile
communication device. The user can specify a POI to be found, and
the system will display the location of the POI relative to the
user. The user can then bring up the relevant information relating
to the POI, such as hours, prices, and so on. User-generated places
can be private or public. Public user-generated places are those
that are defined or provided by the server or third party
providers. Private user-generated places are those that are defined
by individual users. Depending upon the privilege settings, a user
may be able to access his or her friend's user-generated
places.
In one embodiment, the user-generated location feature provides a
tagging and feedback sharing mechanism that allows the user to tag
a place and provide feedback. Tagging involves noting the location
of a place or capturing an image of the place and downloading it to
the server. User feedback can be provided as text messages or
rankings using a user-defined or pre-defined template that is
stored in the user-provided database or separate POI database. This
database can be made available to friends or other users of the
network, depending upon the preferences set by the user. Various
messages, such as reviews, advertisements, and the like can be
associated with each POI and displayed upon selection of the POI by
the user. The POI and messaging features also enable users to send
itineraries of trips to groups of friends. This greatly facilitates
the planning and communication of group trips.
In one embodiment, the location-based social network manager
includes a review and recommendation function that allows each user
to review and rank events or user-generated places so that this
information can be shared with the other users. When a user visits
a tagged POI (or attends a tagged event), he or she can provide a
numerical (keypad) ranking of 1-9 and/or write a short summary of
the place. The server process can also be configured to
automatically request or remind the user to provide a ranking or
summary of the POI upon the user's next system login through the
web site or the mobile communication device. For each POI, the
server compiles the rankings and summary reports and makes these
available to any user who desires to see them. The server process
can also be configured to compile statistical profiles or
qualitative profiles of different tagged user-generated places once
enough ranking or summary information is available.
The server process can also include a machine learning component
that can provide personalized ranking and reviews for individual
users based on the identity of the reviewers. This process includes
a Bayesian trust network component that learns each user's trust
levels with respect to the other user's. Each user may trust
certain of their friends with respect to certain types of
user-generated places. In this case, the system will weight the
ranking provided to the user based on the identity of the reviewer
if the reviewer opinion is particularly trusted with respect to the
tagged POI. In this manner, personalized and dynamic ranking and
review profiles can be established for each POI based on the users
and reviewers.
In one embodiment, an auto messaging mechanism sends an alert to a
user based on the POI of another user. For this embodiment, when
the user tags a particular POI, the server sends an alert to that
user when a friend of the user gets within a certain distance of
the POI. In this manner, the user can call, send a message, or
arrange to meet with his or her friend at the POI, without needing
to go through the trouble of pre-arranging a meeting. This
facilitates spontaneous networking among users and their friends at
particular user-generated places. It should be noted that
user-generated places can be any type of location, such as retail
establishment (store, restaurant, club, theater, gas station etc.),
building (office, house, etc.), public resource (library, museum),
street corner, object (e.g., ATM kiosk, post box), and the
like.
Several interactive network features are facilitated through the
use of the location determination and message capabilities of the
mobile devices. For example, not only can friend locations be
displayed on a user's mobile device, but an alert function can
provide a graphic or audible alert to the user when a particular
friend has entered a user determined area or region around the
user. FIG. 9 illustrates an example of an alert function for the
location-based social network manager process, under an embodiment.
The user can specify a radius 906 around which he or she should be
notified if a friend enters. The server computer then performs a
periodic comparison of the user's location compared to that of his
or her friends to determine if any of the user's friends are within
this specified radius. The user location and radius are displayed
on map 904. When a friend enters this radius, as determined by the
server computer, a message is sent from the server to the user over
network link 908 and displayed on the user's mobile device 902. The
alert function can also be used to facilitate other interactive
features, such as displaying or alerting the user to the location
of user-generated places in the displayed area or the time and
location of events of interest when the user enters a particular
area.
The user interface screens illustrated in FIGS. 2A through 9 can be
configured in any number of ways depending upon the constraints,
requirements, and preferences of the system and system integrators.
Various types of icons can be used to specify the identity and
status of users and friends on the mobile devices and client
computers of each user. For example, a portion of the mobile device
display, such as the top of the menu may include one or more icons
indicating whether the location of the device has been determined
and whether or not the user is sharing his or her location
information. The icons can be color or shape coded to define all of
the different states available with regard to the user's location
and status information. Likewise, the map display and icons for
friends, places, events, and so on can be customized depending upon
the needs and preferences of the user. Scrolling and scaling
functions for control of the displays on both the mobile device and
client computers can also be customized to utilize the input/output
interfaces available on the different devices that can be used in
conjunction with embodiments of the location-based social network
manager process.
The display process may utilize various smart mechanisms for
panning, zooming, scaling, or otherwise displaying dynamic (time
and space) information on inherently small form factor displays
(i.e., mobile phones). For example, a smart pan and zoom feature
may utilize an automatic zoom out mechanism that uses a zoom box
instead of a cursor when a user pans off a screen. Then display
then zooms back to the original zoom level when the user stops
panning.
Location Determination
In one embodiment, each mobile communication device 102 includes a
device location module that allows the mobile communication device
to determine its own geographic location so that the location of
the user operating the device can be displayed on a map on the
device, as well as on the mobile devices and client computers of
other users in the network. In one embodiment, the location
information for mobile communication device is transmitted and
stored in the server computer of the network. The location
information for all of the users is then transmitted from the
server to the mobile communication devices based on the filters and
preferences established for each of the users.
For an embodiment in which the network 110 is a cellular phone
network, and the mobile communication devices are cellular phones
or cell based communication devices, the device location module is
a cell ID positioning program that determines the location of the
device relative to the nearest one or more cell transmitters to
determine a location fix of the device. Depending upon the
capabilities of the system, location accuracy can be provided on
the order of one to two hundred meters to actual location. If
accuracy is not sufficient, the user can be provided with their
approximate location either through map or text display and then
input their actual location using street address, point of
interest, or latitude longitude information.
In one embodiment, the location determination module is a GPS
(global positioning system) circuit that determines the location of
the mobile communication device using GPS methodology. GPS circuits
are capable of updating a device's location on a real or near
real-time basis. However, such continuous updates can impose a
great deal of processing and communications overhead on the device
and the network. Moreover, for a device that is capable of
displaying the location of any number of other users, such
continuous update methods are highly impractical. If the actual
location of every friend in a network were required to be
determined every time the user brought up a map, the time and cost
requirements would likely be excessive. For embodiments in which
the communication network comprises a cellular phone network and
the mobile devices are cell phones, the location determination
module may be an assisted GPS or "A-GPS" module that uses an
assistance server and cell tower that helps the GPS receiver in the
phone perform tasks of range measurements and position
solutions.
In general, the task of determining location in a mobile device and
transmitting location information to a server can utilize a
significant amount of power and processing resources, as well as
generate a great deal of network traffic to the server. For systems
with a large number of mobile devices, polling each device at a set
frequency (e.g., every three minutes) could result in an
overwhelming amount of network traffic. To minimize the power usage
and network and processing overhead, an embodiment of the location
determination module employs a GPS polling method that polls the
device location of each mobile device in the system as infrequently
as possible to thereby impose a minimum load on the carrier
networks. The GPS polling method is an iterative polling method
that employs a caching mechanism that updates a user's location
based on known location information and user behavior. Instead of
polling each mobile device in the network at a fixed frequency, the
frequency of the location polls for each device depends on the
movement and/or activity (interaction with the server) of the user.
If the user is stationary and inactive the polling frequency is
minimized to result in fewer GPS location polls. If a user is on
the move and/or interacting with the server computer, the polling
frequency is increased to result in more frequent GPS location
polls. A difference value can be used to determine whether the
updated location information is stored in the cache and/or
transmitted to the server computer, thus adaptively utilizing
system resources depending upon the amount of movement or activity
of the user.
FIG. 10 is a flowchart that illustrates GPS polling for a location
determination module, according to an embodiment. A location poll
operation can be performed each time a user forces a location
update from his mobile device, accesses the server computer from
the mobile device, or at the end of a present polling period, 1002.
In the event of any of these occurrences, the user's present
geographic location is determined, 1004. In certain cases, a
location fix might not be obtained, such as due to lack of signal,
loss of device power, and so on. In step 1006 it is determined
whether or not a location fix was obtained. If not, the device will
wait (enter sleep mode) for a preset period of time, such as two
minutes, and then retry the location fix. If a location fix is not
obtained after a number (e.g., five) of tries, the system will
determine whether or not the user has changed cell tower location,
1008. If so, the system will send the cell tower location to the
device and the location fix will be attempted again, otherwise, the
device will longer period sleep mode before retrying.
If a location fix is obtained, a smart polling process is executed
wherein the change in distance (distance delta) of the user from
the present location and the previous location is used to set the
polling frequency, and the location information is updated to the
server computer. In step 1010 it is determined whether the new
fixed location differs from the previous location by a threshold
distance. If the distance delta is not greater than the threshold
value, it is assumed that the user has not moved by an appreciable
amount, and therefore no location update to the server computer is
necessary. In this case, the location polling interval is increased
by decreasing the GPS polling frequency by a preset factor. This
results in fewer GPS location pulls for a relatively static user.
The process then continues from step 1002 at the end of the first
new polling period. If, in step 1010, it is determined that the
distance delta is greater than the threshold value, then it is
assumed that the user has moved by an appreciable amount. In this
case, the location information is transmitted to the server, 1014.
The polling frequency is also increased by a preset factor
depending upon the current polling frequency. If the present
polling frequency is slow, it can be increased to track the user.
The process then continues from step 1002 to obtain a new fix at
the end of the shorter period. If the user slows down or stops, the
distance delta comparison step 1010 will cause the polling
frequency to decrease in accordance with the reduced movement of
the user.
The initial and modified location polling frequencies can be set to
any value in accordance with the requirements and constraints of
the server and mobile devices. For example, an initial polling
interval could be set to 20 minutes, and the wait or sleep period
could be set to anywhere between 15 seconds to 300 minutes.
Likewise, the threshold distance represents the minimum distance
that the user has traveled to require that the system update his or
her location, and can vary from a few meters to a few kilometers,
or more. The increase or decrease in the polling interval performed
in steps 1012 and 1016 can vary from 100% of the present polling
period up to a certain maximum number of minutes, such as between
80 minutes to 300 minutes, depending on certain factors such as
time of day, system requirements, and so on.
The GPS polling method illustrated in FIG. 10 provides for
efficient use of network and mobile device resources based on each
user's activity and movement. The more active or more mobile a user
is, the more frequent the GPS location determination operations
occur. Likewise, if a user is stationary or less active, the GPS
polling frequency is reduced. This results in less use of GPS
services and network usage. Such polling can also be tailored
depending on a user's sleep or general travel or commute
patterns.
In one embodiment, the latest location information for a user is
stored as a data entry on the mobile communication device and sent
to the server for temporary or permanent storage. Each location
entry is stored, at least temporarily, in the location database 126
on the server computer. The server computer can be configured to
store only the latest location for the user, or all previous
locations of the user in a location log. The location log entries
include a time stamp based on the location poll time and the
latitude/longitude (or other location indicator) at that time. To
reduce memory usage successive unchanged location entries can be
discarded so that only changes in location are stored in the
location log. Security or privacy functions can be implemented to
block the access of location history information to anyone but the
user himself.
Data Synchronization and Privacy
In one embodiment, the location-based social network manager
process 112 includes an intelligent caching and synchronization
function that caches critical data with normal updates to each
mobile communication device in the network. Because a user can
update their own data on either the mobile communication device or
through the client computer, and other members can also impact a
particular user's data, a synchronization function is necessary to
ensure that the information available to the user is as up-to-date
as possible while minimizing network traffic. Data between the
user's mobile communication device and account data stored on the
server and/or client may be out of sync because the user changed
the data on the web site, but not the mobile device, a friendship
request from another user was confirmed, or some other input from
another user was input to the system. Each class of information to
be synchronized is assigned a version number, which is maintained
by both the server computer 104 and the respective mobile
communication device 102. Each time a mobile communication device
makes a request to the server, its data packets are prepended with
a set of synchronization bytes. The server checks all of these
bytes. If the data is out of sync with data that is on the server,
the updated information is prepended by the server computer for
transmission back to the mobile communication device.
Certain important data is cached on the mobile communication device
itself. This includes the status of a user's friends on the network
and other similar data that is small in size and frequently
accessed. The caching mechanism reduces the network traffic between
the mobile communication device and the server computer, thereby
increasing network efficiency, minimizing open sockets on the
network, and providing a more fluid and immediate user experience
through the mobile communication device. The synchronization
function is used in conjunction with the mobile communication
device cache to ensure data coherence between the user's mobile
communication device and the server computer. FIG. 11 is a
flowchart that illustrates an example of sending updated
information to a user's mobile device, under an embodiment. In step
1102, any friends with updated information transmit the new data to
the server computer. The updated information can be generated by a
new location fix or through a message transmitted over the system
or a parameter change in the user's database. For example, an
information update can be performed by the user inputting certain
new or modified information directly into his or her mobile device,
or automatically through a friend update, such as a status change
caused by a friend changing location, sending a message, or
changing the status availability flag. The updated information is
transmitted from the mobile communication device to the server
computer. On the server computer, the data is updated and flagged
as updated data, step 1104.
Although the server computer can be configured to transmit the
updated information along to the user as soon as it is received, in
a preferred embodiment, the updated information is sent only upon
user activity to reduce network traffic and tailor data updates
based on user demand. If a user is not active, it is assumed that
the user does not necessarily need real time updates of changed
friend information. Any user activity with the server computer can
trigger an update, such as powering on the device, making a request
for services, forcing a location fix, or a performing a refresh
operation, and the like. Upon receiving a network call from the
user, the server computer bundles all of the flagged and held
updated data and transmits it to the user. Thus, in step 1108, the
user receives the updated data or changed status for his or her
friend on the mobile device or client computer.
FIG. 12 illustrates an example of a user update on a mobile
communication device and a corresponding update table, under an
embodiment. The display area 1204 of mobile communication device
1202 displays the status information for a number of friends. This
information is cached on the mobile device itself. The status
information may be updated as a friend changes location or sends a
message or signal that indicates a change in his or her status with
respect to the user of the mobile communication device. The status
information is stored in a corresponding friend information table
1206, which is stored on the data store 120 of the server computer
104. As shown in FIG. 12, the information table 1206 stores the
user ID, and name of the user's friends, as well as their distance
to the user and any message text that was sent to the user from
each friend. The table 1206 also includes a flag column 1208 to
indicate the friends which have updated status information
transmitted from the user's mobile communication device. For the
example shown in FIG. 12, message information for users 216 and 219
have been updated as indicated by the flag icon in column 1208, as
well as the graphical overwriting of the message in their
respective message columns. This flagged data will be sent to the
user upon his next interaction with the server computer.
Social-Network Business System
In one embodiment, the location-based social network manager can
incorporate or be used as a platform for a revenue-based social
networking business system. One or more aspects of the process will
involve fee-based services that generate income for any of the
service providers and/or users. For example, a fee could be charged
to each user every time a location fix is provided and displayed
for the user's friends on his or her mobile communication device,
or every time a message is sent or received from the user's
friends. Revenue generating aspects can also be associated with the
POI feature. For example, a fee could be charged to a user for
accessing and displaying a POI on the mobile communication device.
For commercial user-generated places, a fee might be charged to the
business for displaying the location on the user's mobile
communication device. Likewise, fees could be charged for the
transmission of advertising messages to the users in a network.
Such ads could be associated directly with particular places of
interest, or they could be streamed to the user's through an ad
serving service, or the like. Various different revenue models can
be implemented with the fee structure defined and controlled by the
server computer administrator. Any revenue received through the use
of service fees, message fees, advertising fees,
subscription/membership fees, and the like can be retained by the
system administrator or shared among the parties in a manner
defined by the administrator.
In one embodiment, each user of a mobile communication device
establishes an account with the server computer to set up the
appropriate databases and establish communication with the server
computer. This account mechanism establishes a membership system
whereby users who can share their location information are all
"members" of the network defined by the location-based social
network process. In a typical deployment, the membership is free
for the users. Alternatively, each user can be charged a periodic
or one-time membership fee to use the social network process. In
general, each member logs into the server computer individually to
establish and manage their account. In one embodiment, the social
network process includes a invitation mechanism that allows
established users to invite non-members to the service. In this
embodiment, the member user sends the phone number, e-mail address,
or other contact information for the non-member to the server
computer. The server computer then sends a client application (or
applet) to the non-member user. The client application prompts the
non-member to fill in certain fields to activate his or her new
account. Upon providing the proper information, a new account is
set up and this person is part of the network. The inviting member
is automatically added as a friend in the new member's friends
database.
Depending upon the actual system implementation architecture, a
number of different methods can be employed to register and
validate users. FIG. 14 is a flowchart of an overall user
registration and certification process, under an embodiment. The
basic process steps include a verification process to verify that
the rightful holder of the mobile device has activated the
location-based social network service, and consented to use of the
system, as well as periodic notification that the service is
activated on their mobile device. Registration can be performed
application either through the device itself (handset) or through a
computer using a web-based registration process, or similar
mechanism. In block 1402, the user downloads the location-based
social network service application from the handset deck or from a
server computer over a network, and installs the application on the
handset. The user then opens application and selects the "register"
command. Depending upon the interface with any data carrier,
different rate and usage plans may be available. Thus, the user may
be presented with a data usage notice, such as: "Note: Using the
service will require data usage. An unlimited data plan is
recommended." During this process, the user is typically required
to enter a carrier password or otherwise validate authorized use
through the carrier. In one embodiment, the user is allowed to
select or change their usage plan through the registration process.
Alternatively, they may change the plan with their carrier, if
necessary, block 1406. The user then inputs certain personal
information, such as: First Name, Last Name, Mobile Number, and
Birthdate, or some other age-neutral screening mechanism, and
creates a system password, block 1408.
Upon input of the user information, the system displays certain
carrier and service notices that require user review and consent.
Without such consent, the user is not allowed to use the service.
As shown in block 1410, the user is first shown and consents to the
carrier terms of use. The carrier terms of use typically contains
information regarding provision of voice and data services and
billing issues. The user is then shown and must consent to the
social network service terms of use notice, block 1412. The social
network service terms of use provides information about location
sharing issues and any other social networking services that may be
available through the service. In one embodiment, consent to the
social network service requires review of a Terms, Conditions, and
Privacy Notice menu, from which the user must select one out of a
number of options with regard to how he or she will access or
receive the terms of use. These can include: "Read on Web," which
directs the user to find the Terms of Use and Privacy Notice on the
service web site; "Read on Phone," which option displays the entire
Terms of Use and Privacy Notice on the handset; "Get by email,"
which prompts the end user for email address, and the Terms of Use
and Privacy Notice are distributed to that email address; "Get by
postal mail," which prompts user for a postal mailing address, and
the Terms of Use and Privacy Notice are distributed to that postal
mailing address. After selecting a delivery option and reviewing
the user is shown a "Done" screen; an initial verification SMS (or
similar text message) is then delivered to the handset. The user
must then "select link" within the verification SMS to log into the
service for the first time, block 1414. Once the user completes
registration, the location tracking features of the service are
enabled.
In one embodiment, the registration process of the service includes
a message-based mechanism to verify that the rightful holder of the
handset on which the service is installed is aware that the
location of the handset may be shared through confirmed connections
(as applicable in accordance with each end users' privacy settings.
In one embodiment, this is accomplished through a stream of
messages from the service to the user handset, in which at least
some of the messages require a response from the user. Failure of
the user to provide an adequate response can trigger a suspension
of service or disablement of certain features. This helps ensure
that only the rightful user of a device is the person who is using
the location sharing features of the device. FIG. 15 is a flowchart
of a message-based verification process for user registration,
under an embodiment. In block 1502 a first message comprising a
welcome message is sent to the user's handset. This message can
alert the user that the service has been installed and tracks the
location of the phone and allows friends to see its location.
Instructions to disable this feature, such as "text "stop" to 43556
[Reply with "stop"] or call 611 to stop location sharing," can be
included. This message is sent from the application server at a
random time within the 3 to 24 hours of a completed
registration.
The welcome message is followed by a second text message that
requires a response, block 1504. This response can be performed by
accessing a web page or sending a text message back to the service.
For example, the second message can be of the form: "service
installed! You must click/go to https://www.***.com in the next 12
hours to continue sharing your real-time location with friends"; or
it can be of the form: "service installed! You must text "Y" to
***** in the next 12 hours to continue sharing your real-time
location with friends." Instead of a simple Yes/No input to such a
question, the system may be configured to require a special text
input that must be read or derived from a message in order to
provide an appropriate answer. For example, the prompt message may
read: "Please reply to the SMS with the word `affirmative` to
continue sharing your location." This helps prevent an unauthorized
person from accessing the phone and simply typing `Yes` to a
service text message. This second message is sent from the server
computer randomly within 25 to 48 hours of a completed
registration. In the reply to the second message, the user is
presented with different reply options. One option is to present
the user a WAP-page offering the user multiple options to confirm
location-sharing preferences. A second option is to allow the user
to reply to the message with a text "Y" for yes, "N" for no, or "H"
for help to turn on or off the location display capabilities.
After receipt of the response to the second message, the
application server then sends a third message, block 1506. This
message again alerts the user that the service is installed and
that location display is or may be enabled. The third message thus
includes text that instructs the user how to disable the feature,
such as: "Text "stop" to 43556 [Reply with "stop"] or call 611 to
stop location sharing." The third message is sent randomly within
49 to 72 hours of a completed registration.
After the third message is sent, the server transmits a fourth
message to validate location sharing selection by the user, block
1508. This fourth message requires a response from the user. Like
the second message, the fourth message can be of the form: "service
installed! You must click/go to https://www.***.com in the next 12
hours to continue sharing your real-time location with friends"; or
it can be of the form: "service installed! You must text "Y" to
***** in the next 12 hours to continue sharing your real-time
location with friends." This fourth message is sent from the server
computer randomly within 73 to 96 hours of a completed
registration. The user response to this fourth message can be
performed by accessing a web page or sending a text message back to
the service, as described in relation to the second message
response.
After receipt of the response to the fourth message, the
application server then sends a fifth message, block 1510. This
message again alerts the user that the service is installed and
that location display is or may be enabled, and includes text that
instructs the user how to disable the feature, such as: "Text
"stop" to 43556 [Reply with "stop"] or call 611 to stop location
sharing." The fifth message is sent randomly within 97-120 hours of
a completed registration. This fifth message is then followed up by
a sixth message, block 1512, that is identical to the second and
fourth messages in that it requires user response and validation of
the location sharing feature. The sixth message is sent randomly
within 121 hours to 144 hours of a completed registration.
A failure by the user to respond to any of the messages that
require response within a pre-defined period of time will result in
the disablement of location sharing on that account. In one
embodiment, a disabled account status can be overcome by responding
"Y" or otherwise to the SMS message, or logging into the
application. If a "Y" response is received during a specified
window of time (e.g., 6 hours), then location display remains
active. If a "No" response is received, then the account is
suspended/cancelled. If a No response is received to any of the
three responses-required SMSs, then the account is
suspended/cancelled.
The message scheme and timing illustrated in FIG. 15 is an example
of a possible message-based registration and user verification
method, and it should be understood that many other message
sequences are possible.
In one embodiment, the service can be configured to periodically
send validation messages to each user throughout the period of
service use, besides just upon initial registration. This serves to
continually alert users that location sharing may be enabled on
their devices, and for occasional validation that only the
authorized user of a device is enabling or disabling this feature.
FIG. 6F illustrates an SMS-based messaging system for re-validating
user preferences for location sharing, under an embodiment.
As shown in FIG. 6F, once a user completes system registration,
block 620, the system obtains the account owner's (user) profile
via an API method of contact, such as e-mail address, fax number,
mailing address, etc, block 622. In one embodiment, account owner
notice is separate and distinct from sending SMS messages to the
handset, and comprises the sending of notices via email, fax, or
mail to the ultimate account owner. The SMS verification process
consists of sending periodic text messages to the user, and
requiring the user to respond or take some action to indicate to
the system that the user is still engaged, block 624. The
periodicity and timing of the message transmission can be
configured to any appropriate interval, such as daily, weekly,
monthly, and so on, with messages sent at the same time for each
period or random times within each period. Such a message can
indicate that the location sharing service is installed on the
user's device and that the user must either type a message back to
the service within a specified time period (e.g., 12 hours) or log
in to a web page to continue sharing the location of their device.
In response to this message, the user may take a number of
different actions. If the user does nothing, block 626, the
location sharing feature is disabled, block 648. If the user
indicates that the location sharing feature should be stopped,
block 628, the system then configures the device to enter a
location hidden mode (i.e., "disabled" state), block 650. If the
user replies to a text message with a "No" response, block 630, the
account is suspended, block 652. If the user replies to a text
message with a "Yes" response, block 632, the location sharing
feature is enabled, block 656. The user can also request help,
block 634, or call customer service, 638, during the message
process, in which case help instructions are transmitted, 640, or
actions on the account, such as suspension, deletion, or
modification, are carried out. Certain responses or monitored
activities may cause a user's account to be deleted, in which case,
an account deletion process 636 is invoked
If the location-sharing feature of a device has been disabled, the
user must be in possession of the mobile device to re-enable the
feature. The user may re-enable by responding "Y" to the SMS or
logging into the application itself.
In one embodiment, the SMS message structure and sequence
illustrated in FIG. 15 utilizes a client-server transmission based
on SMS messages that contain the phone number and password of the
user to validate the message transmit and receive sequence. In an
alternative embodiment, the system utilizes a PPG (push proxy
gateway) mechanism to transmit messages between the client and
servers in the validation message transmission sequence.
The location-based social network manager of an embodiment includes
a mobile communication device comprising a network interface
configured to allow the mobile communication device to communicate
with one or more other mobile communication devices over a network.
The device of an embodiment includes a geographic location circuit
coupled to the network interface and configured to determine the
location of the device relative to a terrestrial coordinate system.
The device of an embodiment includes a graphical user interface
including a display area allowing output of information to a user
of the device. The device of an embodiment includes a map
generation circuit configured to display a map encompassing an area
around the location of the device on the graphical user interface.
The map generation circuit of an embodiment displays geographic
location information on the display area for any of the one or more
other mobile communication devices that are within a predefined
range of the device and that are in communication with the device
over the network. The device of an embodiment includes a filter
circuit configured to allow a user of the mobile communication
device to limit sharing of geographic location information to
certain users of the one or more other mobile communication devices
by preventing display of the geographic location information on the
displays of the mobile communication devices of users who are not
selected as able to share the geographic location information.
The network of an embodiment comprises a cellular telephone
network. The device and each of the one or more other mobile
communication devices of an embodiment comprises a location aware
cellular telephone.
The terrestrial coordinate system of an embodiment comprises a
latitude/longitude coordinate system. The geographic location
device of an embodiment comprises one of a global positioning
system circuit, a WiFi circuit, and a mesh network circuit capable
of determining a position of the device to within a predetermined
radius of a given latitude/longitude position of the device.
Embodiments of the location-based social network manager process
described herein may be applied to various types of computer and
mobile device networks utilizing communication over the Internet or
similar distributed network protocols.
Aspects of the mobile communication device location display system
described herein may be implemented as functionality programmed
into any of a variety of circuitry, including programmable logic
devices ("PLDs"), such as field programmable gate arrays ("FPGAs"),
programmable array logic ("PAL") devices, electrically programmable
logic and memory devices and standard cell-based devices, as well
as application specific integrated circuits. Some other
possibilities for implementing aspects of the process include:
microcontrollers with memory (such as EEPROM), embedded
microprocessors, firmware, software, etc. Furthermore, aspects of
the described process may be embodied in microprocessors having
software-based circuit emulation, discrete logic (sequential and
combinatorial), custom devices, fuzzy (neural) logic, quantum
devices, and hybrids of any of the above device types. The
underlying device technologies may be provided in a variety of
component types, e.g., metal-oxide semiconductor field-effect
transistor ("MOSFET") technologies like complementary metal-oxide
semiconductor ("CMOS"), bipolar technologies like emitter-coupled
logic ("ECL"), polymer technologies (e.g., silicon-conjugated
polymer and metal-conjugated polymer-metal structures), mixed
analog and digital, and so on.
It should also be noted that the various functions disclosed herein
may be described using any number of combinations of hardware,
firmware, and/or as data and/or instructions embodied in various
machine-readable or computer-readable media, in terms of their
behavioral, register transfer, logic component, and/or other
characteristics. Computer-readable media in which such formatted
data and/or instructions may be embodied include, but are not
limited to, non-volatile storage media in various forms (e.g.,
optical, magnetic or semiconductor storage media) and carrier waves
that may be used to transfer such formatted data and/or
instructions through wireless, optical, or wired signaling media or
any combination thereof. Examples of transfers of such formatted
data and/or instructions by carrier waves include, but are not
limited to, transfers (uploads, downloads, e-mail, etc.) over the
Internet and/or other computer networks via one or more data
transfer protocols (e.g., HTTP, FTP, SMTP, and so on).
Unless the context clearly requires otherwise, throughout the
description and the claims, the words "comprise," "comprising," and
the like are to be construed in an inclusive sense as opposed to an
exclusive or exhaustive sense; that is to say, in a sense of
"including, but not limited to." Words using the singular or plural
number also include the plural or singular number respectively.
Additionally, the words "herein," "hereunder," "above," "below,"
and words of similar import refer to this application as a whole
and not to any particular portions of this application. When the
word "or" is used in reference to a list of two or more items, that
word covers all of the following interpretations of the word: any
of the items in the list, all of the items in the list and any
combination of the items in the list.
The above description of illustrated embodiments of the
location-sharing network manager process is not intended to be
exhaustive or to limit the embodiments to the precise form or
instructions disclosed. While specific embodiments of, and examples
for, the process and system are described herein for illustrative
purposes, various equivalent modifications are possible within the
scope of the described embodiments, as those skilled in the
relevant art will recognize.
The elements and acts of the various embodiments described above
can be combined to provide further embodiments. These and other
changes can be made to the location-based social network manager
process in light of the above detailed description.
In general, in any following claims, the terms used should not be
construed to limit the described system to the specific embodiments
disclosed in the specification and the claims, but should be
construed to include all operations or processes that operate under
the claims. Accordingly, the described system is not limited by the
disclosure, but instead the scope of the recited method is to be
determined entirely by the claims.
While certain aspects of the location-based social network manager
process are presented below in certain claim forms, the inventor
contemplates the various aspects of the methodology in any number
of claim forms. For example, while only one aspect of the system is
recited as embodied in machine-readable medium, other aspects may
likewise be embodied in machine-readable medium. Accordingly, the
inventor reserves the right to add additional claims after filing
the application to pursue such additional claim forms for other
aspects of the described systems and methods.
* * * * *
References