This disclosure relates generally to data processing devices and, more particularly, to a method, a device and/or a system of emergency including crime broadcast data generation and publication in a constrained geospatial vicinity around a broadcast location of a neighborhood social network.
A person may wish to call for emergency assistance (e.g., when they are having a heart attack or observing a violent crime). They may also wish to document evidence of a crime (for example, take photographs of a hit-and-run) and/or accident (e.g., a chemical spill or heart attack) in order to communicate the evidence or documentation to other people around them. They may be motivated by a desire to warn others (e.g., of a dangerous condition such as a gas leak), catch perpetrators (e.g., be able to identify a thief), or because they need immediate medical assistance (e.g., in need of aspirin to minimize the damage of a stroke). Under such circumstances, sending messages through a mobile device (e.g., by calling 911, sending a message through Twitter, posting on Facebook) may reach a large number irrelevant recipients who are not nearby or do not expect to be alerted to emergencies on social media and therefore may miss the important message. For example, dialing emergency services may only connect the caller with the emergency services at a central location (which may be a distance away from the location of the crime and/or emergency). Closer and more capable persons who are capable of confronting the emergency (e.g., a doctor living in a neighborhood vicinity around the emergency) may not be able to assist because they were not informed. However, trying to contact neighbors one-at-a-time maybe be inefficient, wasting critical time. The person experiencing the emergency or peril to choose between calling emergency services or attempting to contact neighbors who the caller may not know or may have difficulty getting ahold of. Therefore, help may not arrive in time.
Disclosed are a method, a device and a system of emergency including crime broadcast data generation and publication in a constrained geospatial vicinity around a broadcast location of a neighborhood social network.
In one embodiment, a method of an emergency response server includes validating that an emergency broadcast data generated through a mobile device is associated with a verified user of the emergency response server using a processor and a memory. The method verifies that a set of geospatial coordinates associated with the emergency broadcast data generated through the mobile device are trusted based on a claimed geospatial location of the verified user of the emergency response server. In addition, the method determines that a time stamp associated with a creation date and a creation time of the emergency broadcast data generated through the mobile device is trusted based on the claimed geospatial location of the verified user of the emergency response server.
Furthermore, the emergency response server automatically publishes the emergency broadcast data generated through the mobile device on a set of user profiles having associated verified addresses in a threshold radial distance from the set of geospatial coordinates associated with the emergency broadcast data generated through the mobile device of the verified user of the emergency response server using a radial algorithm. The method may determine that the broadcast data is generated by the verified user of a neighborhood broadcast system when validating that the broadcast data is associated with the mobile device.
The method may also determine that an application on the mobile device is communicating the broadcast data to the emergency response network 150 when the broadcast data is processed. The verified user may be associated with a verified user profile in the emergency response network 150 through the application on the mobile device. The emergency broadcast data generated through the mobile device may be presented as an emergency alert pushpin of the emergency broadcast in a geospatial map surrounding pre-populated residential and/or business listings in a surrounding vicinity (such that the emergency alert pushpin of the emergency broadcast is automatically presented on the geospatial map in addition to being presented on the set of user profiles having associated verified addresses in the threshold radial distance from the set of geospatial coordinates associated with the emergency broadcast data generated through the mobile device of the verified user of the emergency response server).
The emergency broadcast data generated through the mobile device may be radially distributed through an on-page posting, an electronic communication, and/or a push notification (delivered to desktop and/or mobile devices). The emergency broadcast data may be associated with users and/or their user profiles around an epicenter defined at the set of geospatial coordinates associated with the emergency broadcast data.
The emergency broadcast data may be generated through the mobile device to all subscribed user profiles in a circular geo-fenced area defined by the threshold distance from the set of geospatial coordinates associated with the emergency broadcast data. Furthermore, the emergency broadcast data may be generated through the mobile device through the radial algorithm of a emergency response network 150 that measures a distance away of each address associated with each user profile 402 from the current geospatial location at the epicenter.
The verified user may be permitted to drag and drop the emergency alert pushpin on any location on the geospatial map and/or automatically determine a latitude and/or a longitude associated with a placed location. A police department, a fire department, and/or a hospital in a surrounding geospatial area to the set of geospatial coordinates associated with the emergency broadcast data generated through the mobile device may be notified.
Furthermore, the method may monitor whenever the mobile device associated with the verified user is used to generate an emergency telephone call. An audio data associated with the emergency telephone call through the mobile device may be captured through an emergency capture module of the emergency response server. Also, a transcript of the audio data through a transcription module of the emergency response server may be generated. A notification of the electronic telephone call, the audio data associated with the electronic telephone call, and/or the transcript of the electronic telephone call may be automatically broadcast through the on-page posting, the electronic communication, and/or the push notification (delivered to desktop and/or mobile devices associated with users and/or their user profiles around the epicenter defined at the set of geospatial coordinates associated with the emergency broadcast data generated through the mobile device using the radial algorithm). The geospatial coordinates may be extracted from a metadata associated with the emergency broadcast data generated through the mobile device.
The geospatial coordinated may be extracted when verifying that the set of geospatial coordinates associated with the emergency broadcast data generated through the mobile device are trusted based on the claimed geospatial location of the verified user of the emergency response server. A relative match between a persistent clock associated with the emergency response server and/or a digital clock of the mobile device may determine that the time stamp associated with the creation date and/or time of the emergency broadcast data generated through the mobile device is accurate and/or therefore trusted. The emergency broadcast data generated through the mobile device may be automatically deleted on a set of user profiles having associated verified addresses in the threshold radial distance from the set of geospatial coordinates associated with the emergency broadcast data generated through the mobile device of the verified user of the emergency response server based on an emergency alert expiration time.
A set of residential addresses each associated with a resident name in a neighborhood surrounding the mobile device may be geocoded. The set of residential addresses each associated with the resident name as the set of user profiles in the threshold radial distance from the claimed geospatial location of the verified user of the emergency response server may be populated in a neighborhood curation system communicatively coupled with the emergency response server.
The verified user may be permitted to modify content in each of the set of user profiles. The modified content may be tracked through the neighborhood curation system. A reversible history journal associated with each of the set of user profiles may be generated such that a modification of the verified user can be undone on a modified user profile page. An editing credibility of the verified user may be determined based on an edit history of the verified user and/or a community contribution validation of the verified user by other users of the neighborhood curation system.
The emergency broadcast data generated through the mobile device may be automatically published to the set of user profiles having associated verified addresses in the threshold radial distance from the claimed geospatial location of the verified user of the emergency response server using the radial algorithm. A claim request of the verified user generating the emergency broadcast data generated through the mobile device through the mobile device may be processed to be associated with an address of the neighborhood curation system.
It may be determined if the claimable neighborhood in the neighborhood curation system is associated with a private neighborhood community in the claimable neighborhood of the neighborhood curation system. The verified user may be associated with the private neighborhood community in the claimable neighborhood of the neighborhood curation system if the private neighborhood community has been activated by the verified user and/or a different verified user. The verified user may be permitted to draw a set of boundary lines in a form of a geospatial polygon such that the claimable neighborhood in a geospatial region surrounding the claim request creates the private neighborhood community in the neighborhood curation system if the private neighborhood community is inactive.
The method may verify the claim request of the verified user generating the emergency broadcast data generated through the mobile device through the mobile device to be associated with a neighborhood address of the neighborhood curation system when the address is determined to be associated with a work address and/or a residential address of the verified user.
The emergency broadcast data generated through the mobile device may be simultaneously published on the private neighborhood community associated with the verified user generating the emergency broadcast data generated through the mobile device through the mobile device in the threshold radial distance from the address associated with the claim request of the verified user of the neighborhood curation system (when automatically publishing the emergency broadcast data generated through the mobile device on a set of user profiles having associated verified addresses) in the threshold radial distance from the claimed geospatial location of the verified user of the emergency response server based on a set of preferences of the verified user using the radial algorithm.
A summary data may be provided to the verified user generating the emergency broadcast data generated through the mobile device through the mobile device of how many user profile pages were updated with an alert of the emergency broadcast data generated through the mobile device when publishing the emergency broadcast data generated through the mobile device (in the private neighborhood community and/or the set of user profiles having associated verified addresses in the threshold radial distance from the claimed geospatial location of the verified user of the emergency response server) based on the set of preferences of the verified user.
The emergency broadcast data generated through the mobile device may be live broadcast to the different verified user and/or other verified users in the private neighborhood community and/or currently within the threshold radial distance from the current geospatial location through a multicast algorithm of the emergency response server such that a live broadcast multicasts to a plurality of data processing systems associated with each of the different user and/or the other verified users simultaneously when the mobile device of the verified user generating the live-broadcast enables broadcasting of the emergency broadcast data generated through the mobile device to any one of a geospatial vicinity around the mobile device of the verified user generating the broadcast and/or in any private neighborhood community in which the verified user has a non-transitory connection.
The different verified user and/or other verified users in the private neighborhood community may be permitted to bi-directionally communicate with the verified user generating the broadcast through the emergency response server. Any private neighborhood community in which the verified user has the non-transitory connection may be the residential address of the verified user and/or a work address of the verified user that has been confirmed by the emergency response server as being associated with the verified user. The threshold distance may be between 0.2 and/or 0.4 miles from the set of geospatial coordinates associated with the emergency broadcast data generated through the mobile device to optimize a relevancy of the live-broadcast.
The emergency response server may include a crowdsourced moderation algorithm in which multiple neighbors to a geospatial area determine what content contributed to the emergency response server persists and which is deleted. Additionally, the emergency response server may permit users to mute messages of specific verified users to prevent misuse of the emergency response server.
In another aspect, the method of an emergency response server includes determining that a time stamp associated with a creation date and a creation time of an emergency broadcast data generated through the mobile device is trusted based on the claimed geospatial location of the user of the emergency response server using a processor and a memory. The method includes automatically publishing the emergency broadcast data generated through the mobile device on a set of user profiles having associated verified addresses in a threshold radial distance from the set of geospatial coordinates associated with the emergency broadcast data generated through the mobile device of the user of the emergency response server using a radial algorithm.
In addition, the method includes radially distributing the emergency broadcast data as a notification data through an on-page posting, an electronic communication, and/or a push notification delivered to either (1) a set of recipients through an internet protocol (IP) based network associated with users and their user profiles around an epicenter defined at the set of geospatial coordinates associated with the emergency broadcast data generated through the computing device, or (2) a set of emergency services accessible by the emergency response server through a cellular network using the radial algorithm in addition to the set of recipients through the IP based network associated with users and their user profiles.
In yet another aspect, a system includes an emergency response server with a processor and a memory to automatically publish the emergency broadcast data on a set of user profiles having associated verified addresses in a threshold radial distance from the set of geospatial coordinates associated with the emergency broadcast data of a verified user of the emergency response server using a radial algorithm. The system also includes a network and a mobile device communicatively coupled with the emergency response server through the network to generate the emergency broadcast data using a camera, a microphone, and a sensory capability of the mobile device and/or to generate a captured data that is appended with a present geospatial location and a time stamp associated with a creation date and a creation time of captured data to create the emergency broadcast data.
A validation module may determine that an emergency broadcast data generated through a mobile device is associated with a verified user of the emergency response server using the processor and the memory and/or to determine that the emergency broadcast data is generated by the verified user of the neighborhood broadcast system when validating that the broadcast data is associated with the mobile device. A validation module may ensure that a set of geospatial coordinates associated with the emergency broadcast data generated through the mobile device are trusted based on a claimed geospatial location of the verified user of the emergency response server.
A time stamp module may ensure that a time stamp associated with a creation date and/or a creation time of the emergency broadcast data generated through the mobile device is trusted based on the claimed geospatial location of the verified user of the emergency response server. A listing module may automatically publish the emergency broadcast data generated through the mobile device on a set of user profiles having associated verified addresses in a threshold radial distance from the set of geospatial coordinates associated with the emergency broadcast data generated through the mobile device of the verified user of the emergency response server using a radial algorithm.
An application module may determine that an application on the mobile device is communicating the broadcast data to the emergency response network 150 when the broadcast data is processed, and/or to associate the verified user with a verified user profile in the emergency response network 150 through the application on the mobile device.
A pushpin module may present the emergency broadcast data generated through the mobile device as an emergency alert pushpin of the emergency broadcast in a geospatial map surrounding pre-populated residential and/or business listings in a surrounding vicinity, such that the emergency alert pushpin of the emergency broadcast is automatically presented on the geospatial map in addition to being presented on the set of user profiles having associated verified addresses in the threshold radial distance from the set of geospatial coordinates associated with the emergency broadcast data generated through the mobile device of the verified user of the emergency response server.
A radial distribution module may radially distribute the emergency broadcast data generated through the mobile device through an on-page posting, an electronic communication, and/or a push notification delivered to desktop and/or mobile devices associated with users and/or their user profiles around an epicenter defined at the set of geospatial coordinates associated with the emergency broadcast data generated through the mobile device to all subscribed user profiles in a circular geo-fenced area defined by the threshold distance from the set of geospatial coordinates associated with the emergency broadcast data generated through the mobile device through the radial algorithm of a emergency response network 150 that measures a distance away of each address associated with each user profile 402 from the current geospatial location at the epicenter. A placement module may enable the verified user to drag and/or drop the emergency alert pushpin on any location on the geospatial map, and/or automatically determining a latitude and/or a longitude associated a placed location.
A notification module automatically notify a police department, a fire department, and/or a hospital in a surrounding geospatial area to the set of geospatial coordinates associated with the emergency broadcast data generated through the mobile device.
An emergency surveillance module may monitor whenever the mobile device associated with the verified user is used to generate an emergency telephone call. An emergency capture module may capture an audio data associated with the emergency telephone call made through the mobile device. A transcript may be generated from a transcript of the audio data through a transcription module of the emergency response server.
An auto-notification module may automatically broadcast a notification of the electronic telephone call, the audio data associated with the electronic telephone call, and/or the transcript of the electronic telephone call through the on-page posting, the electronic communication, and/or the push notification delivered to desktop and/or mobile devices associated with users and/or their user profiles around the epicenter defined at the set of geospatial coordinates associated with the emergency broadcast data generated through the mobile device using the radial algorithm.
An extraction module may separate the geospatial coordinates from a metadata associated with the emergency broadcast data generated through the mobile device when verifying that the set of geospatial coordinates associated with the emergency broadcast data generated through the mobile device are trusted based on the claimed geospatial location of the verified user of the emergency response server.
A matching module may determine a relative match between a persistent clock associated with the emergency response server and/or a digital clock of the mobile device to determine that the time stamp associated with the creation date and/or time of the emergency broadcast data generated through the mobile device is accurate and/or therefore trusted. A deletion module may automatically remove the emergency broadcast data generated through the mobile device on a set of user profiles having associated verified addresses in the threshold radial distance from the set of geospatial coordinates associated with the emergency broadcast data generated through the mobile device of the verified user of the emergency response server based on an emergency alert expiration time. A plotting module may geocode a set of residential addresses each associated with a resident name in a neighborhood surrounding the mobile device.
A data-seeding module may prepopulate the set of residential addresses each associated with the resident name as the set of user profiles in the threshold radial distance from the claimed geospatial location of the verified user of the emergency response server in a neighborhood curation system communicatively coupled with the emergency response server. A modification module may alter content in each of the set of user profiles. A discovery module may track the modified content through the neighborhood curation system.
An undo module may generate a reversible history journal associated with each of the set of user profiles such that a modification of the verified user can be undone on a modified user profile page. A reputation module may determine an editing credibility of the verified user based on an edit history of the verified user and/or a community contribution validation of the verified user by other users of the neighborhood curation system.
A publication module may automatically publish the emergency broadcast data generated through the mobile device to the set of user profiles having associated verified addresses in a threshold radial distance from the claimed geospatial location of the verified user of the emergency response server using the radial algorithm. A claiming module may process a claim request of the verified user generating the emergency broadcast data generated through the mobile device through the mobile device to be associated with an address of the neighborhood curation system. A private-neighborhood module may determine if the claimable neighborhood in the neighborhood curation system is associated with a private neighborhood community in the claimable neighborhood of the neighborhood curation system.
An association module may associate the verified user with the private neighborhood community in the claimable neighborhood of the neighborhood curation system if the private neighborhood community has been activated by the verified user and/or a different verified user. A boundary module may permit the verified user to draw a set of boundary lines in a form of a geospatial polygon such that the claimable neighborhood in a geospatial region surrounding the claim request creates the private neighborhood community in the neighborhood curation system if the private neighborhood community is inactive. An address type module may verify the claim request of the verified user generating the emergency broadcast data generated through the mobile device through the mobile device to be associated with a neighborhood address of the neighborhood curation system when the address is determined to be associated with a work address and/or a residential address of the verified user.
A concurrency module may simultaneously publish the emergency broadcast data generated through the mobile device on the private neighborhood community associated with the verified user generating the emergency broadcast data generated through the mobile device through the mobile device in the threshold radial distance from the address associated with the claim request of the verified user of the neighborhood curation system when automatically publishing the emergency broadcast data generated through the mobile device on a set of user profiles having associated verified addresses in a threshold radial distance from the claimed geospatial location of the verified user of the emergency response server based on a set of preferences of the verified user using the radial algorithm.
A summary module may generate a summary data to the verified user generating the emergency broadcast data generated through the mobile device through the mobile device of how many user profile pages were updated with an alert of the emergency broadcast data generated through the mobile device when publishing the emergency broadcast data generated through the mobile device in the private neighborhood community and/or the set of user profiles having associated verified addresses in the threshold radial distance from the claimed geospatial location of the verified user of the emergency response server based on the set of preferences of the verified user.
A live broadcast module may live broadcast the emergency broadcast data generated through the mobile device to the different verified user and/or other verified users the private neighborhood community and/or currently within the threshold radial distance from the current geospatial location through a multicast algorithm of the emergency response server such that a live broadcast multicasts to a plurality of data processing systems associated with each of the different user and/or the other verified users simultaneously when the mobile device of the verified user generating the live-broadcast enables broadcasting of the emergency broadcast data generated through the mobile device to any one of a geospatial vicinity around the mobile device of the verified user generating the broadcast and/or in any private neighborhood community in which the verified user has a non-transitory connection.
A bi-directional communication module may permit the different verified user and/or other verified users in the private neighborhood community to bi-directionally communicate with the verified user generating the broadcast through the emergency response server. A non-transitory module may determine any private neighborhood community in which the verified user has a non-transitory connection is a residential address of the verified user and/or a work address of the verified user that has been confirmed by the emergency response server as being associated with the verified user. A threshold module may automatically set the threshold distance between 0.2 and/or 0.4 miles from the set of geospatial coordinates associated with the emergency broadcast data generated through the mobile device to optimize a relevancy of the live-broadcast. A moderation module may apply a crowdsourced moderation algorithm in which multiple neighbors to a geospatial area determine what content contributed to the emergency response server persists and/or which is deleted. A muting module may permit users to mute messages of specific verified users to prevent misuse of the emergency response server.
The emergency response server may permit the emergency broadcast data to be disseminated to adjacent neighborhoods that have been claimed by different users in a manner such that the emergency broadcast data is optionally disseminated to the surrounding claimed neighborhoods based on a preference of the verified user. A claimed neighborhood of the verified user may be activated based on a minimum number of other verified users in the threshold radial distance that have been verified through a primary residential address associated with each of the other verified users through at least one of a post card verification, a utility bill verification, a privately-published access code, and a neighbor vouching method. Access to the emergency broadcast data may be restricted to the claimed neighborhood of the verified user. Access to the emergency broadcast data may be denied to users having verified addresses outside the claimed neighborhood of the verified user.
The methods and systems disclosed herein may be implemented in any means for achieving various aspects, and may be executed in a form of a machine-readable medium embodying a set of instructions that, when executed by a machine, cause the machine to perform any of the operations disclosed herein. Other features will be apparent from the accompanying drawings and from the detailed description that follows.
The embodiments of this invention are illustrated by way of example and not limitation in the figures of the accompanying drawings, in which like references indicate similar elements and in which:
Other features of the present embodiments will be apparent from the accompanying drawings and from the detailed description that follows.
Example embodiments, as described below, may be used to provide a method, a system and/or a device of emergency including crime broadcast data generation and publication in a constrained geospatial vicinity around a broadcast location of a neighborhood social network. Although the present embodiments have been described with reference to specific example embodiments, it will be evident that various modifications and changes may be made to these embodiments without departing from the broader spirit and scope of the various embodiments.
Particularly,
The emergency response server 100 includes a processor 120, a memory 124, and a geospatial database 122, according to the embodiment of
The device 104 (e.g., a mobile device 504) (e.g., a smartphone, a tablet, a laptop) may access the emergency response server 100 through the network 101 using a browser application of the mobile device (e.g., Google® Chrome) and/or through a client-side application downloaded to the device 104 (e.g., a mobile device 504) (e.g., a Nextdoor.com mobile application, a Fatdoor.com mobile application) operated by the user 106. In an alternate embodiment, a non-mobile computing device, such as a desktop computer (not shown) may access the emergency response server 100 through the network 101.
The emergency broadcast data 102 may be communicated from the device 104 (e.g., a mobile device 504) to the emergency response server 100 through the network 101. The emergency broadcast data 102 may include information about an emergency (e.g., a heart attack, a mugging in progress) observed by the user 106 to recipients 114 and/or the emergency services 109 through the network 101. For example, the emergency may relate a type of medicine immediately needed by the user 106 (e.g., insulin) and/or identification information of a perpetrator (e.g., a license plate number).
The emergency broadcast data 102 may be generated and distributed through an application of the radial distribution module 140 (e.g., that applies the radial algorithm 240 of
Using an internet protocol based network (e.g., the network 101), the emergency response server 100 may be able to use the radial distribution module 140 (e.g., that applies the radial algorithm 240 of
The radial distribution module 140 (e.g., that applies the radial algorithm 240 of
The radial distribution module 140 (e.g., that applies the radial algorithm 240 of
Furthermore, the radial distribution module 140 (e.g., that applies the radial algorithm 240 of
The radial distribution module 140 (e.g., that applies the radial algorithm 240 of
The radial algorithm 240 may operate as follows, according to one embodiment. The radial algorithm may utilize a radial distribution function (e.g., a pair correlation function)
g(r)
in the emergency response network 150. The radial distribution function may describe how density varies as a function of distance from a user 106, according to one embodiment.
If a given user 106 is taken to be at the origin O (e.g., the epicenter 144), and if
ρ=N/V
is the average number density of recipients 114 in the emergency response network 150, then the local time-averaged density at a distance r from O is
ρg(r)
according to one embodiment. This simplified definition may hold for a homogeneous and isotropic type of recipients 114, according to one embodiment of the radial algorithm 240.
A more anisotropic distribution (e.g., exhibiting properties with different values when measured in different directions) of the recipients 114 will be described below, according to one embodiment of the radial algorithm 240. In simplest terms it may be a measure of the probability of finding a recipient at a distance of r away from a given user 106, relative to that for an ideal distribution scenario, according to one embodiment. The anisotropic algorithm involves determining how many recipients 114 are within a distance of r and r+dr away from the user 106, according to one embodiment. The radial algorithm 240 may be determined by calculating the distance between all user pairs and binning them into a user histogram, according to one embodiment.
The histogram may then be normalized with respect to an ideal user at the origin o, where user histograms are completely uncorrelated, according to one embodiment. For three dimensions (e.g., such as a building representation in the geospatially constrained social network 142 in which there are multiple residents in each floor), this normalization may be the number density of the system multiplied by the volume of the spherical shell, which mathematically can be expressed as,
g(r)I=4πr2pdr,
The radial distribution function of the radial algorithm 240 can be computed either via computer simulation methods like the Monte Carlo method, or via the Ornstein-Zernike equation, using approximative closure relations like the Percus-Yevick approximation or the Hypernetted Chain Theory, according to one embodiment.
This may be important because by confining the broadcast reach of a verified user in the emergency response network 150 to a specified range, the radial distribution module 140 (e.g., that applies the radial algorithm 240 of
The radial distribution module 140 (e.g., that applies the radial algorithm 240 of
In effect, the radial algorithm of the emergency response server enables users to notify people around locations that are cared about (e.g., around where they live, work, and/or where they are physically located). In one embodiment, the user 106 can be provided ‘feedback’ and/or a communication that the recipient 114 may be responding to the emergency after the emergency broadcast data 102 may be delivered to the recipients 114 and/or to the emergency services 109 using the radial distribution module 140 (e.g., that applies the radial algorithm 240 of
The various embodiments described herein of the emergency response server 100 using the radial distribution module 140 (e.g., that applies the radial algorithm 240 of
The radial algorithm may be a set of instructions that may enable users (e.g., verified users, non-verified users) of the Nextdoor.com and Fatdoor.com websites and applications to broadcast their activities (e.g., garage sale, t-shirt sale, crime alert) to surrounding neighbors within a claimed neighborhood and to guests of a claimed neighborhood, according to one embodiment. The radial algorithm may be new because current technology does not allow for users of a network (e.g., Nextdoor.com, Fatdoor.com) to locally broadcast their activity to a locally defined geospatial area. With the radial algorithm, users of the network may communicate with one another in a locally defined manner, which may present more relevant information and activities, according to one embodiment. For example, if a verified user of the network broadcasts an emergency, locally defined neighbors of the verified user may be much more interested in responding than if they observed an emergency on a general news broadcast on traditional radio, according to one embodiment. The radial distribution module 140 may solve the problem of neighbors living in the locally defined geospatial area who don't typically interact, and allows them to connect within a virtual space that did not exist before, according to one embodiment. Prior to this invention of the radial algorithm 240 operating through the radial distribution module 140, community boards (e.g., stolen or missing item boards) were the only method of distributing content in a surrounding neighborhood effectively. However, there was no way to easily distribute content related to exigent circumstances and/or with urgency in a broadcast-like manner to those listening around a neighborhood through mobile devices until the various embodiments applying the radial distribution module 140 as described herein.
A radial algorithm 240 may be a method of calculating a sequence of operations, and in this case a sequence of radio operations, according to one embodiment. Starting from an initial state and initial input, the radial algorithm 240 describes a computation that, when executed, proceeds through a finite number of well-defined successive states, eventually producing radial patterned distribution (e.g., simulating a local radio station), according to one embodiment.
The emergency response server 100 may solve technical challenges through the radial distribution module 140 (e.g., that applies the radial algorithm 240 of
The radial distribution module 140 (e.g., that applies the radial algorithm 240 of
The radial distribution module 140 (e.g., that applies the radial algorithm 240 of
The radial distribution module 140 (e.g., that applies the radial algorithm 240 of
By using the radial distribution module 140 (e.g., that applies the radial algorithm 240 of
The radial distribution module 140 (e.g., that applies the radial algorithm 240 of
In order to implement the radial distribution module 140 (e.g., that applies the radial algorithm 240 of
The radial algorithm 240 may be used to calculate relative distances between each one of millions of records as associated with each placed geo-spatial coordinate in the geospatially constrained social network 142 (e.g., a neighborhood social network such as Fatdoor.com, Nextdoor.com). Calculations of relative distance between each geospatial coordinate can be a large computational challenge because of the high number of reads, writes, modify, and creates associated with each geospatial coordinate added to the geospatially constrained social network 142 and subsequent recalculations of surrounding geospatial coordinates associated with other users and/or other profile pages based a relative distance away from a newly added set of geospatial coordinates (e.g., associated with the emergency broadcast data 102 and/or with other pushpin types). To overcome this computational challenge, the radial algorithm may leverage a massively parallel computing architecture 146 through which processing functions are distributed across a large set of processors accessed in a distributed computing system 148 through the network 101.
In order to achieve the utilization of the massively parallel computing architecture 146 in a context of a radial distribution function of a geospatially constrained social network 142, a number of technical challenges have been overcome in at least one embodiment. Particularly, the radial distribution module 140 constructs a series of tables based on an ordered geospatial ranking based on frequency of interaction through a set of ‘n’ number of users simultaneously interacting with the geospatially constrained social network 142, in one preferred embodiment. In this manner, sessions of access between the emergency response server 100 and users of the emergency response server 100 (e.g., the user 106) may be monitored based on geospatial claimed areas of the user (e.g., a claimed work and/or home location of the user), and/or a present geospatial location of the user. In this manner, tables associated with data related to claimed geospatial areas of the user and/or the present geospatial location of the user may be anticipatorially cached in the memory 124 to ensure that a response time of the geospatially constrained social network 142 may be not constrained by delays caused by extraction, retrieval, and transformation of tables that are not likely to be required for a current and/or anticipated set of sessions between users and the emergency response server 100.
In a preferred embodiment, an elastic computing environment may be used by the radial distribution module 140 to provide for increase/decreases of capacity within minutes of a database function requirement. In this manner, the radial distribution module 140 can adapt to workload changes based on number of requests of processing simultaneous and/or concurrent requests associated with emergency broadcast data 102 by provisioning and deprovisioning resources in an autonomic manner, such that at each point in time the available resources match the current demand as closely as possible.
The radial distribution module 140 (e.g., that applies the radial algorithm 240 of
The radial distribution module 140 (e.g., that applies the radial algorithm 240 of
The radial distribution module 140 (e.g., that applies the radial algorithm 240 of
The radial distribution module 140 (e.g., that applies the radial algorithm 240 of
The radial distribution module 140 (e.g., that applies the radial algorithm 240 of
In one or more embodiments, the radial distribution module 140 (e.g., that applies the radial algorithm 240 of
The radial distribution module 140 (e.g., that applies the radial algorithm 240 of
The radial distribution module 140 (e.g., that applies the radial algorithm 240 of
The radial distribution module 140 (e.g., that applies the radial algorithm 240 of
Another advantage of this broadcast via the radial distribution module 140 (e.g., that applies the radial algorithm 240 of
The user 106 may be an individual who operates the device 104 (e.g., a mobile device 504) to generate the emergency broadcast data 102. It will be understood by those skilled in the art that the verified nature of the user may be an optional characteristic in an alternate embodiment. This means that in an alternate embodiment, any user (whether verified or not) may generate the emergency broadcast data 102 through the device 104 (e.g., a mobile device 504). In another alternative embodiment, the user 106 may be an electronic sensor, such as a detection sensor device (e.g., a sensory detection sensor device such as a motion detector, a chemical detection device (for example, to sense a natural gas leak), a gunshot listening sensor, etc.), and/or an appliance (e.g., a refrigerator, a home security network, and/or a motion detector). It should also be noted that the ‘mobile’ nature of the device 104 may be optional in yet another alternative embodiment. In such an alternate embodiment, any computing device, whether mobile/portable or fixed in location may generate the emergency broadcast data 102.
The cellular network 108 may be associated with a telephone carrier (e.g., such as AT&T, Sprint, etc.) that provides an infrastructure through which communications are generated between the emergency response server 100 and the emergency services 109 using the radial algorithm 240. For example, the cellular network 108 may provide a communication infrastructure through which the emergency broadcast data 102 may be communicated as voice and/or text messages through telephones (e.g., standard telephones and/or smart phones) operated by at least some of the emergency services 109 of
The cellular network 108 (e.g., a mobile network) may be a wireless network distributed over land areas called cells, each served by at least one fixed-location transceiver, known as a cell site or base station through which the emergency broadcast data 102 is distributed from the emergency response server 100 to telephones of the emergency services 109 using the radial distribution module 140 (e.g., that applies the radial algorithm 240 of
When joined together these cells of the cellular network 108 may provide radio coverage over a wide geographic area through the cellular network 108 in a manner that ensures that the emergency broadcast data 102 may be simultaneously communicated via both IP networks (e.g., to the recipients 114) and/or to the emergency services 109 through the cellular network 108. It will be appreciated that the radial distribution module 140 (e.g., that applies the radial algorithm 240 of
The emergency services 109 may be locations, devices, and/or mobile phones associated with individuals and/or agencies associated with emergency services (e.g., a police department, a SWAT team, a poison control center, an animal control agency). The emergency services 109 may be notified when an emergency broadcast in an area that they service including a non-transitory location (e.g., around where they live and/or work, regardless of where they currently are) and a transitory location (e.g., where they currently are) is posted using the device 104 (e.g., a mobile device 504) as the emergency broadcast data 102.
The emergency services 109 are illustrated in
The emergency broadcast data 102 may be delivered as notification data 112 (which may include a number of attributes) from the emergency response server 100 to the recipients 114 and/or to the emergency services 109 using the radial distribution module 140 (e.g., that applies the radial algorithm 240 of
The recipients 114 may be individuals that have claimed a profile (e.g., verified their profile through a postcard, a telephone lookup, a utility bill) associated with a particular non-transitory address (e.g., a home address, a work address) through a geospatial social network (e.g., a geospatially constrained social network 142 (e.g., a neighborhood social network such as Fatdoor.com, Nextdoor.com)) through which the emergency response server 100 operates. The recipients 114 may be in a geo-fenced area, in that an epicenter 144 of a broadcast message from the device 104 (e.g., a mobile device 504) may be a center through which a radial distance is calculated based on a characteristic of the emergency broadcast data 102. For example, a minor crime (e.g., vandalism) may be delivered only to an immediate 0.1 mile radius, where as a major violent crime may be automatically delivered to a broader 0.6 mile radius either automatically and/or through a user defined preference (e.g., set by the user 106).
It should be appreciated that individuals in an area outside the threshold radial distance 115 may not receive the emergency broadcast data 102 because their geospatial address may be outside a radial boundary surrounding an epicenter 144 in which the emergency broadcast data 102 originates. Additionally, the threshold radial distance 119 may be confined on its edges by a geospatial polygon at a juncture between the area defined by recipients 114 and the area outside the threshold radial distance 115, according to one embodiment.
Particularly,
A validation module 200 may determine that an emergency broadcast data 102 generated through a mobile device 504 may be associated with a verified user (e.g., the user 106 of
In addition, the validation module 200 may ensure that a set of geospatial coordinates 103 associated with the emergency broadcast data 102 generated through the mobile device 504 are trusted based on a claimed geospatial location (e.g., any of the claimed geospatial locations 700 as described in
A time stamp module 202 may determine that a time stamp 510 associated with a creation date 508 and/or a creation time 507 of the emergency broadcast data 102 generated through the mobile device 504 may be trusted based on the claimed geospatial location (e.g., any of the claimed geospatial locations 700 as described in
A pushpin module 206 may present the emergency broadcast data 102 generated through the mobile device 504 as an emergency alert pushpin of the emergency broadcast in a geospatial map surrounding pre-populated residential and/or business listings in a surrounding vicinity, such that the emergency alert pushpin of the emergency broadcast may be automatically presented on the geospatial map in addition to being presented on the set of user profiles (e.g., preseeded user profiles 302 and/or claimed user profiles 304 as described in
A radial distribution module 140 may radially distribute the emergency broadcast data 102 generated through the mobile device 504 through an on-page posting, an electronic communication, and/or a push notification delivered to desktop and/or mobile devices 504 associated with users and/or their user profiles (e.g., preseeded user profiles 302 and/or claimed user profiles 304 as described in
A notification module 208 may automatically notify a hospital 309A, a police department 309B and/or a fire department 309C in a surrounding geospatial area to the set of geospatial coordinates 103 associated with the emergency broadcast data 102 generated through the mobile device 504. An extraction module 234 may separate the geospatial coordinates 103 from a metadata associated with the emergency broadcast data 102 generated through the mobile device 504 when verifying that the set of geospatial coordinates 103 associated with the emergency broadcast data 102 generated through the mobile device 504 are trusted based on the claimed geospatial location (e.g., any of the claimed geospatial locations 700 as described in
An emergency surveillance module 224 may monitor whenever the mobile device 504 associated with the verified user (e.g., the user 106 of
An emergency capture module 226 may capture an audio data 1202 associated with the emergency telephone call 1200 made through the mobile device 504. A transcript may be generated from a transcript 1204 of the audio data 1202 through a transcription module 260 of the emergency response server 100.
An auto-notification module 218 may automatically broadcast a notification of the emergency telephone call 1200, the audio data 1202 associated with the emergency telephone call 1200, and/or the transcript 1204 of the emergency telephone call 1200 through the on-page posting, the electronic communication, and/or the push notification delivered to desktop and/or mobile devices 504 associated with users and/or their user profiles around the epicenter 144 defined at the set of geospatial coordinates 103 associated with the broadcast data (e.g., the emergency broadcast data 102) generated through the mobile device 504 using the radial algorithm 240.
A matching module 210 may determine a relative match between a persistent clock associated with the emergency response server 100 and/or a digital clock of the mobile device 504 to determine that the time stamp 510 associated with the creation date 508 and/or time of the emergency broadcast data 102 generated through the mobile device 504 may be accurate and/or therefore trusted. A deletion module 236 may automatically remove a publishing of the emergency broadcast data 102 generated through the mobile device 504 on a set of user profiles (e.g., preseeded user profiles 302 and/or claimed user profiles 304 as described in
A data-seeding module 241 may prepopulate the set of residential addresses each associated with the resident name as the set of user profiles (e.g., preseeded user profiles 302 and/or claimed user profiles 304 as described in
A publishing module 214 may automatically communicate the emergency broadcast data 102 generated through the mobile device 504 to a set of user profiles (e.g., preseeded user profiles 302 and/or claimed user profiles 304 as described in
An association module 216 may associate the verified user (e.g., the user 106 of
A concurrency module 258 may simultaneously publish the emergency broadcast data 102 generated through the mobile device 504 on the private neighborhood community associated with the verified user (e.g., the user 106 of
The social community module 220 may generate a building creator in which the user 106 may create and/or modify empty unclaimed profiles (e.g., an unclaimed profile 1206 of
A live broadcast module 228 may live broadcast the emergency broadcast data 102 generated through the mobile device 504 to the different verified user (e.g., the user 106 of
A summary module 262 may generate a summary data 626 to the verified user (e.g., the user 106 of
A bi-directional communication module 230 may permit the different verified user (e.g., the user 106 of
An application module 274 may determine that an application on the mobile device 504 is communicating the broadcast data to the emergency response network 150 when the broadcast data is processed, and/or to associate the verified user (e.g., the user 106 of
A threshold module 268 may automatically set the threshold distance between 0.2 and/or 0.4 miles from the set of geospatial coordinates 103 associated with the emergency broadcast data 102 generated through the mobile device 504 to optimize a relevancy of the live-broadcast. A non-transitory module 270 may determine any private neighborhood community in which the verified user (e.g., the user 106 of
Particularly,
In
The hospital 309A, the police department 309B, and the fire department 309C may receive the emergency broadcast data 102 through their mobile devices, desktop devices, and/or through their cellular telephones. The hospital 309A, the police department 309B, and the fire department 309C may receive the emergency broadcast data 102 and may bi-directionally interact with the emergency services 109 through either cellular network 108 and/or through the network 101 (e.g., an internet protocol network). When a the emergency of the user 106 interacting with any one of the recipients 114 based on the bi-directional communication is responded to, the user 106 may be able to choose which hospital 309A, police department 309B and/or fire department 309C should respond.
The notification data 112 may be communicated through the network 101 to the preseeded user profiles 302 within a threshold radial distance 119 of the epicenter 144. Alternately, the notification data 112 may be communicated through the network 101 to different ones of the claimed user profile 304 within the claimed neighborhood 300 that are located within the threshold radial distance 119 from the epicenter 144. Additionally, as described in
The notification data 112 may also be communicated through the cellular network 108 or through the network 101 to the set of emergency services 109. For example, the hospital 309A may use the emergency response network 150 to monitor emergencies in a neighborhood and publish these emergencies to residents around a geospatial area of the neighborhood. In addition, the police department 309B and/or the fire department 309C may service a particular neighborhood and may be alerted of a new emergency based on a subscription they pay to access broadcasts from areas that they service. Additionally, it should be understood that other types of emergency service providers or businesses may receive the notification data 112. For example, additional services receiving the notification data 112 may include poison control, animal control, SWAT teams, FEMA, the national guard, the EPA, park rangers, coast guard, etc.
Particularly, in
It should be also noted that in some embodiments, the “preseeded user profiles” may be users that have previously signed up for the geospatially constrained social network 142, as opposed to users that have been preseeded there in a social network. For example, in one alternate embodiment, each of the claimed neighborhood 400 may serve as an approximate to actual radial distribution, in that broadcast messages are solely sent to claimed neighborhoods (e.g., private claimed neighborhoods) of actual users in a vicinity of a broadcast (rather than to public profiles).
Also illustrated in
Particularly,
Particularly,
In
Particularly,
Particularly,
According to the embodiment of
Particularly,
In the embodiment of
Additionally, the user 106 may also be able to see who watched their live broadcast 616 by the summary of recipients viewing live broadcast data 630. The summary data 626 may also include the summary of emergency services contacted 632 and the summary of recipients responding 634 so that the user 106 may know who is responding and about how long it may take them to arrive. Additionally, the embodiment of
In
Particularly,
In addition, the user interface view 1350 may provide a building creator (e.g., the building builder 2102 of
The diagrammatic system view 1600 may indicate a personal computer and/or a data processing system in which one or more operations disclosed herein are performed. The processor 1602 may be microprocessor, a state machine, an application specific integrated circuit, a field programmable gate array, etc. (e.g., Intel® Pentium® processor). The main memory 1604 may be a dynamic random access memory and/or a primary memory of a computer system.
The static memory 1606 may be a hard drive, a flash drive, and/or other memory information associated with the data processing system. The bus 1608 may be an interconnection between various circuits and/or structures of the data processing system. The video display 1610 may provide graphical representation of information on the data processing system. The alpha-numeric input device 1612 may be a keypad, keyboard and/or any other input device of text (e.g., a special device to aid the physically handicapped). The cursor control device 1614 may be a pointing device such as a mouse.
The drive unit 1616 may be a hard drive, a storage system, and/or other longer term storage subsystem. The signal generation device 1618 may be a bios and/or a functional operating system of the data processing system. The machine readable medium 1622 may provide instructions on which any of the methods disclosed herein may be performed. The instructions 1624 may provide source code and/or data code to the processor 1602 to enable any one/or more operations disclosed herein.
The map 1702 may indicate the global neighborhood environment (e.g., the geospatially constrained social network 142 of
For example, a verified registered user (e.g., a verified registered user 1810 of
Similarly, a tag data (e.g., the tags 1710 of
For example, a particular unclaimed profile (e.g., the particular unclaimed profile may be associated with a neighboring property to the specific property in the neighborhood) of the unclaimed profiles (e.g., the unclaimed profile 1802 of
In addition, a certain unclaimed profile of the unclaimed profiles may be de-listed when a private registered user claims a certain geographic location (e.g., the geographical location 1704 of
Furthermore, a tag data (e.g., the tags 1710 of
Moreover, the verified registered user (e.g., the verified registered user 1810 of
For example, the commercial user 1800 may be permitted to purchase a customizable business profile 1804 associated with a commercial geographic location. Also, the verified registered user 1810 may be enabled to communicate a message to the global neighborhood environment (e.g., the geospatially constrained social network 142 of
A text advertisement 1806 may display the information associated with the offers and/or events of the customizable business. The display advertisement 1808 may display ads of the products of the customizable business that may be displayed to urge the verified registered user 1810 to buy the products of the customizable business. The verified registered user 1810 may be user associated with the global neighborhood environment (e.g., the geospatially constrained social network 142 of
In the example embodiment illustrated in
The verified registered user 1810 may be verified registered user of the global neighborhood environment (e.g., the geospatially constrained social network 142 of
For example, a social community module (e.g., a social community module 220 of
In operation 2200 the search for the user profile (e.g., the user profile 1700 of
For example, a no-match module (e.g., a no-match module) of the search module (e.g., the search module) to request additional information from the verified registered user about a person, place, and business having no listing in the global neighborhood environment (e.g., the geospatially constrained social network 142 of
The GUI display 2302 and GUI display 2304 may display particular case of user interface for interacting with a device capable of representing data (e.g., computer, cellular telephones, television sets etc) which employs graphical images and widgets in addition to text to represent the information and actions available to the user (e.g., the user 106 of
The router 2312 may forward packets between networks and/or information packets between the global neighborhood environment (e.g., the geospatially constrained social network 142 of
The application server 2322 may be server computer on a computer network dedicated to running certain software applications of the global neighborhood environment (e.g., the geospatially constrained social network 142 of
The image server 2332 may store and provide digital images of the registered user of the global neighborhood environment (e.g., the geospatially constrained social network 142 of
The database 2400 be may include descriptive data, preference data, relationship data, and/or other data items regarding the registered user of the global neighborhood environment (e.g., the geospatially constrained social network 142 of
The user data 2402 may be a descriptive data referring to information that may describe a user (e.g., the user 106 of
The locations data 2404 may clarify the location details in formatted approach. For example Zip code may be formatted as integer, City may be in text and/or State may be in text. The zip codes data 2406 may provide information of a user location in formatted manner. For example Zip code may be formatted as text, Latitude may be in integer and/or Longitude may be in integer. The profile data 2408 may clutch personnel descriptive data that may be formatted.
For examples ID may be formatted as integer, Interests may be in text, Favoritemusic may be in text, Favaoritebooks may be in text, Favoritetv may be in text, Favoritemovies may be in text, Aboutme may be in text, Wanttomeet may be in text, Ethnicity may be in integer, Hair may be in integer, Eyes may be in integer, Height may be in integer, Body may be in integer, Education may be in integer, Income may be in integer, Religion may be in integer, Politics may be in integer Smoking may be in integer, Drinking may be in integer and/or Kids may be in integer.
The photos data 2410 may represent a digital image and/or a photograph of the user formatted in certain approach. For example Id may be formatted as integer, User may be in integer, Fileid may be in integer and/or Moderation may be in integer. The testimonials data 2412 may allow users to write “testimonials” 2412, or comments, about each other and in these testimonials, users may describe their relationship to an individual and their comments about that individual. For example the user might write a testimonial that states “Rohan has been a friend of mine since graduation days. He is smart, intelligent, and a talented person.” The elements of testimonials data 2412 may be formatted as Id may be in integer, User may be in integer, Sender may be integer, Approved may be in y/n, Date may be in date and/or Body may be formatted in text.
The search parameters data 2414 may be preference data referring to the data that may describe preferences one user has with respect to another (For example, the user may indicate that he is looking for a female who is seeking a male for a serious relationship). The elements of the search parameters data 2414 may be formatted as User 2402 may be in integer, Photosonly may be in y/n, Justphotos may be in y/n, Male may be in y/n, Female may be in y/n, Men may be in y/n, Women may be in y/n, Helptohelp may be in y/n, Friends may be in y/n, Dating may be in y/n, Serious may be in y/n, Activity may be in y/n, Minage may be in integer, Maxage may be in integer, Distance may be in integer, Single may be in y/n, Relationship may be in y/n, Married may be in y/n and/or Openmarriage may be in y/n.
The neighbor's data 2416 may generally refer to relationships among registered users of the global neighborhood environment (e.g., the geospatially constrained social network 142 of
The elements of the invites data 2420 may be formatted as Id may be in integer, Key may be in integer, Sender may be in integer, Email may be in text, Date may be in date format, Clicked may be in y/n, Joined may be in y/n and/or Joineduser may be in integer. The bookmarks data 2422 may provide the data for a process allowed wherein a registered user of the global neighborhood environment (e.g., the geospatially constrained social network 142 of
The message data 2424 may be formatted as Id may be in integer, (e.g., User may be in integer, Sender may be in integer, New may be in y/n, Folder may be in text, Date may be in date format, Subject may be in text and/or Body may be in text format) The bulletin board data 2426 may support the function of a bulletin board that users may use to conduct online discussions, conversation and/or debate. The data 2428 may share the user profiles (e.g., the user profile 1700 of
The “From” section may include the senders email id (e.g., user@domain.com). The “To” section may be provided to add the email id of the person whom the sender may want to join the neighborhood (e.g., the claimed neighborhood 400 of
In operation 2810, response from the user (e.g., the user 106 of
In operation 2816, if the invitee accepts the invitation sent by the registered user then system may notify the registered user that the invitee has accepted the invitation. In operation 2818, the input from the present invitee(s) that may contain the descriptive data about the friend (e.g., registered user) may be processed and stored in the database.
For example, each registered user associated e-mail addresses of individuals who are not registered users may be stored and identified by each registered user as neighbors. An invitation to become a new user (e.g., the user 106 of
The neighbor (e.g., the other addresses associated with user profiles 402 of
If it is determined that depth is more than maximum allowable degrees of separation then it may repeat the operation 2908. In operation 2914, it may be determined that the depth of the geographical location (e.g., the geographical location 1704) is less than maximum degrees of separation then the neighbors (e.g., the other addresses associated with user profiles 402 of
In operation 2918, if all the neighbors (e.g., the other addresses associated with user profiles 402 of
If it is determined that the neighbor (e.g., the other addresses associated with user profiles 402 of
For example, a first user ID with the verified registered user (e.g., the verified registered user 1810 of
Furthermore, the user ID of the different registered user may be searched (e.g., the method limits the searching of the different registered user in the sets of user IDs that may be stored as registered users who are less than Nmax degrees of separation away from the verified registered user (e.g., the verified registered user 1810 of
Moreover, the sets of user IDs that may be stored of registered users may be searched initially who are directly connected to the verified registered user (e.g., the verified registered user 1810 of
In addition, the connection path between the verified registered user (e.g., the verified registered user 1810 of
For example, the brief profiles of registered users, including a brief profile of the different registered user, to the verified registered user (e.g., the verified registered user 1810 of
Furthermore, the hyperlink selection from the verified registered user (e.g., the verified registered user 1810 of
In operation 3306, a map (e.g., a map 1702 of
In operation 3310, a query of at least one of the user profile (e.g., the user profile 1700 of
In operation 3314, a certain unclaimed profile (e.g., the unclaimed profile 1706 of
In operation 3316, the certain unclaimed profile (e.g., the unclaimed profile 1706 of
In operation 3322, a commercial user (e.g., a commercial user 1800 of
In operation 3326, a payment of the commercial user (e.g., the commercial user 1800 of
In operation 3330, a claimant of any unclaimed profile (e.g., the unclaimed profile 1706 of
In operation 3338, a maximum degree of separation (Nmax) of at least two may be set that is allowed for connecting any two registered users, wherein two registered users who are directly connected may be deemed to be separated by one degree of separation and two registered users who are connected through no less than one other registered user may be deemed to be separated by two degrees of separation and two registered users who may be connected through no less than N other registered users are deemed to be separated by N+1 degrees of separation. In operation 3340, the user ID of the different registered user may be searched in a set of user IDs that are stored of registered users who are less than Nmax degrees of separation away from the verified registered user (e.g., the verified registered user 1810 of
In operation 3342, the verified registered user (e.g., the verified registered user 1810 of
In operation 3348, a connection path between the verified registered user (e.g., the verified registered user 1810 of
In operation 3350, the connection path between the verified registered user (e.g., the verified registered user 1810 of
In operation 3352, a hyperlink in the connection path of each of the at least one registered users may be embedded through whom the connection path between the verified registered user (e.g., the verified registered user 1810 of
In operation 3356, an invitation may be communicated to become a new user (e.g., a user 106 of
In operation 3364, inputs from the neighbor (e.g., the other addresses associated with user profiles 402 of
In operation 3368, the hyperlink selection from the verified registered user (e.g., the verified registered user 1810 of
In operation 3370, brief profiles of those registered users who may be more than Nmax degrees of separation away from the verified registered user (e.g., the verified registered user 1810 of
It should be noted that there are a number of different ‘user’ roles described in the various embodiments described herein. The user roles include a ‘user’, a ‘claimed user’, and a ‘verified user’. The user is someone that has signed up for and/or accessed the emergency response server 100 through the geospatially constrained social network 142. The user can ‘claim’ an existing profile (e.g., prepopulated and/or created by another user through a wiki like creation process), and/or ‘claim’ an address with a new location, thereby transforming the user to the ‘claimed user’. The claimed user can verify that they actually live at a particular home address and/or work at a particular business address (e.g., thereby showing their affiliation with a non-transitory location) by submitting a response to a verification code on a postcard, submitting a utility bill, and/or being invited by and/or getting vouched for by an existing verified user. This can transform the claimed user to a ‘verified user’, in one embodiment. It will be understood by those with skill in the art that the user 106 may refer to either a user that has not yet claimed, the claimed user, and/or the verified user.
In one embodiment, a method of an emergency response server 100 includes validating that an broadcast data (e.g., the emergency broadcast data 102) generated through a mobile device 504 is associated with a verified user (e.g., the user 106 of
Furthermore, the emergency response server 100 automatically publishes the broadcast data (e.g., the emergency broadcast data 102) generated through the mobile device 504 on a set of user profiles having associated verified addresses in a threshold radial distance 119 from the set of geospatial coordinates 103 associated with the broadcast data (e.g., the emergency broadcast data 102) generated through the mobile device 504 of the verified user (e.g., the user 106 of
The method may also determine that an application on the mobile device 504 is communicating the broadcast data (e.g., the emergency broadcast data 102) to the emergency response network 150 when the broadcast data is processed. The verified user (e.g., the user 106 of
The broadcast data (e.g., the emergency broadcast data 102) generated through the mobile device 504 may be radially distributed through an on-page posting, an electronic communication, and/or a push notification (delivered to desktop and/or mobile devices 504). The broadcast data (e.g., the emergency broadcast data 102) may be associated with users and/or their user profiles around an epicenter 144 defined at the set of geospatial coordinates 103 associated with the broadcast data (e.g., the emergency broadcast data 102).
The broadcast data (e.g., the emergency broadcast data 102) may be generated through the mobile device 504 to all subscribed user profiles in a circular geo-fenced area defined by the threshold distance from the set of geospatial coordinates 103 associated with the broadcast data (e.g., the emergency broadcast data 102). Furthermore, the broadcast data (e.g., the emergency broadcast data 102) may be generated through the mobile device 504 through the radial algorithm 240 of a emergency response network 150 that measures a distance away of each address associated with each user profile 402 from the current geospatial location at the epicenter 144.
The verified user (e.g., the user 106 of
Furthermore, the method may monitor whenever the mobile device 504 associated with the verified user (e.g., the user 106 of
The geospatial coordinated may be extracted when verifying that the set of geospatial coordinates 103 associated with the broadcast data (e.g., the emergency broadcast data 102) generated through the mobile device 504 are trusted based on the claimed geospatial location of the verified user (e.g., the user 106 of
A set of residential addresses each associated with a resident name in a neighborhood surrounding the mobile device 504 may be geocoded. The set of residential addresses each associated with the resident name as the set of user profiles in the threshold radial distance 119 from the claimed geospatial location of the verified user (e.g., the user 106 of
The verified user (e.g., the user 106 of
The broadcast data (e.g., the emergency broadcast data 102) generated through the mobile device 504 may be automatically published to the set of user profiles having associated verified addresses in the threshold radial distance 119 from the claimed geospatial location of the verified user (e.g., the user 106 of
It may be determined if the claimable neighborhood in the neighborhood curation system (e.g., part of the geospatially constrained social network 142) is associated with a private neighborhood community in the claimable neighborhood of the neighborhood curation system (e.g., part of the geospatially constrained social network 142). The verified user (e.g., the user 106 of
The method may verify the claim request of the verified user (e.g., the user 106 of
The broadcast data (e.g., the emergency broadcast data 102) generated through the mobile device 504 may be simultaneously published on the private neighborhood community associated with the verified user (e.g., the user 106 of
A summary data 626 may be provided to the verified user (e.g., the user 106 of
The broadcast data (e.g., the emergency broadcast data 102) generated through the mobile device 504 may be live broadcast to the different verified user (e.g., the user 106 of
In one embodiment, the emergency broadcast data 102 is generated based only upon special conditions and is sparingly used by users of the geo-spatially constrained social network 142 only in the most important and real emergency scenarios. In this model, the emergency broadcast data 102 is reserved only for true emergencies, similar to a 911 call. A user that abuses the use of the emergency broadcast data 102 may be banned from making future emergency broadcasts (e.g., the boy that cried wolf analogy). In one embodiment, a municipality and/or government agency may even make emergency broadcast data 102 created as a prank and for non-emergency purposes into a crime that is separately prosecutable. In one embodiment, transcripts of emergency broadcast data 102 may be automatically generated and be usable in a court proceeding to prove exigent circumstances and/or present sense impressions of an emergency event. In this way, a time stamp and archiving of the emergency broadcast data 102 may be extremely important, in one or more embodiments.
In one embodiment, the emergency broadcast data 102 generated in the geo-spatially constrained social network is limited in its use to emergency situations that require immediate assistance from the police, fire department, or an ambulance. For example, a scenario of a fire, a crime in progress, a car crash (e.g., especially when someone is injured), a medical emergency (e.g., such as when someone is unconscious, gasping for air or not breathing, experiencing an allergic reaction, having chest pain, having uncontrollable bleeding, and/or any symptoms that require immediate medical attention). In one embodiment, immediately after generating the emergency broadcast data 102, an official in the geo-spatially constrained social network 142 (e.g., may immediately establish a chat, video, and/or voice session and ask a series of question including the nature of the emergency, location of the emergency including the street address, the phone number the user is generating the emergency broadcast data 102 from, and details of the emergency such as a physical description of a person who may have committed a crime, a description of any fire that may be burning, or a description of injuries or symptoms being experienced by a person having a medical emergency. The call taker (e.g., perhaps an administrator of the geospatial social network) may append additional details to the emergency broadcast data 102 prior to it being sent out as the notification data 104 based on access privileges defined by the radial distribution module 140 using the radial algorithm 240.
In one embodiment, the mobile device 504 may generate the emergency broadcast data 102 by the depression of a button or combination of buttons without use of the user interface. For example, the mobile device 504 may include a “panic button” that begins recording audio and broadcasting it as an emergency broadcast data 102. In another example, the mobile device 504 may include several buttons used for ordinary functions (e.g., increase volume, decrease volume, power-off, etc.), that, when depressed in a certain combination or held down all at once generate the emergency broadcast data 102.
The different verified user (e.g., the user 106 of
The emergency response server 100 may include a crowdsourced moderation algorithm 204 in which multiple neighbors to a geospatial area determine what content contributed to the emergency response server 100 persists and which is deleted. Additionally, the emergency response server 100 may permit users to mute messages of specific verified users to prevent misuse of the emergency response server 100.
In another aspect, the method of an emergency response server 100 includes determining that a time stamp 510 associated with a creation date 508 and a creation time 507 of an broadcast data (e.g., the emergency broadcast data 102) generated through the mobile device 504 is trusted based on the claimed geospatial location of the user of the emergency response server 100 using a processor 120 and a memory 124. The method includes automatically publishing the broadcast data (e.g., the emergency broadcast data 102) generated through the mobile device 504 on a set of user profiles having associated verified addresses in a threshold radial distance 119 from the set of geospatial coordinates 103 associated with the broadcast data (e.g., the emergency broadcast data 102) generated through the mobile device 504 of the user of the emergency response server 100 using a radial algorithm 240.
In addition, the method includes radially distributing the broadcast data (e.g., the emergency broadcast data 102) as a notification data through an on-page posting, an electronic communication, and/or a push notification delivered to either (1) a set of recipients through an internet protocol (IP) based network 101 associated with users and their user profiles around an epicenter 144 defined at the set of geospatial coordinates 103 associated with the broadcast data (e.g., the emergency broadcast data 102) generated through the computing device, or (2) a set of emergency services accessible by the emergency response server 100 through a cellular network using the radial algorithm 240 in addition to the set of recipients through the IP based network 101 associated with users and their user profiles.
In yet another aspect, a system includes an emergency response server 100 to automatically publish the broadcast data (e.g., the emergency broadcast data 102) on a set of user profiles having associated verified addresses in a threshold radial distance 119 from the set of geospatial coordinates 103 associated with the broadcast data (e.g., the emergency broadcast data 102) of a verified user (e.g., the user 106 of
A validation module 200 may determine that an broadcast data (e.g., the emergency broadcast data 102) generated through a mobile device 504 is associated with a verified user (e.g., the user 106 of
A time stamp module 202 may ensure that a time stamp 510 associated with a creation date 508 and/or a creation time 507 of the broadcast data (e.g., the emergency broadcast data 102) generated through the mobile device 504 is trusted based on the claimed geospatial location of the verified user (e.g., the user 106 of
An application module 274 may determine that an application on the mobile device 504 is communicating the broadcast data to the emergency response network 150 when the broadcast data is processed, and/or to associate the verified user (e.g., the user 106 of
A pushpin module 206 may present the broadcast data (e.g., the emergency broadcast data 102) generated through the mobile device 504 as an emergency alert pushpin of the emergency broadcast in a geospatial map surrounding pre-populated residential and/or business listings in a surrounding vicinity, such that the emergency alert pushpin of the emergency broadcast is automatically presented on the geospatial map in addition to being presented on the set of user profiles having associated verified addresses in the threshold radial distance 119 from the set of geospatial coordinates 103 associated with the broadcast data (e.g., the emergency broadcast data 102) generated through the mobile device 504 of the verified user (e.g., the user 106 of
A radial distribution module 140 may radially distribute the broadcast data (e.g., the emergency broadcast data 102) generated through the mobile device 504 through an on-page posting, an electronic communication, and/or a push notification delivered to desktop and/or mobile devices 504 associated with users and/or their user profiles around an epicenter 144 defined at the set of geospatial coordinates 103 associated with the broadcast data (e.g., the emergency broadcast data 102) generated through the mobile device 504 to all subscribed user profiles in a circular geo-fenced area defined by the threshold distance from the set of geospatial coordinates 103 associated with the broadcast data (e.g., the emergency broadcast data 102) generated through the mobile device 504 through the radial algorithm 240 of a emergency response network 150 that measures a distance away of each address associated with each user profile 402 from the current geospatial location at the epicenter 144. A placement module 232 may enable the verified user (e.g., the user 106 of
A notification module 208 automatically notify a police department 309B, a fire department 309C, and/or a hospital 309D in a surrounding geospatial area to the set of geospatial coordinates 103 associated with the broadcast data (e.g., the emergency broadcast data 102) generated through the mobile device 504.
An emergency surveillance module 224 may monitor whenever the mobile device 504 associated with the verified user (e.g., the user 106 of
An auto-notification module 218 may automatically broadcast a notification of the emergency telephone call 1200, the audio data 1202 associated with the emergency telephone call 1200, and/or the transcript 1204 of the emergency telephone call 1200 through the on-page posting, the electronic communication, and/or the push notification delivered to desktop and/or mobile devices 504 associated with users and/or their user profiles around the epicenter 144 defined at the set of geospatial coordinates 103 associated with the broadcast data (e.g., the emergency broadcast data 102) generated through the mobile device 504 using the radial algorithm 240.
An extraction module 234 may separate the geospatial coordinates 103 from a metadata associated with the broadcast data (e.g., the emergency broadcast data 102) generated through the mobile device 504 when verifying that the set of geospatial coordinates 103 associated with the broadcast data (e.g., the emergency broadcast data 102) generated through the mobile device 504 are trusted based on the claimed geospatial location of the verified user (e.g., the user 106 of
A matching module 210 may determine a relative match between a persistent clock associated with the emergency response server 100 and/or a digital clock of the mobile device 504 to determine that the time stamp 510 associated with the creation date 508 and/or time of the broadcast data (e.g., the emergency broadcast data 102) generated through the mobile device 504 is accurate and/or therefore trusted. A deletion module 236 may automatically remove the broadcast data (e.g., the emergency broadcast data 102) generated through the mobile device 504 on a set of user profiles having associated verified addresses in the threshold radial distance 119 from the set of geospatial coordinates 103 associated with the broadcast data (e.g., the emergency broadcast data 102) generated through the mobile device 504 of the verified user (e.g., the user 106 of
A data-seeding module 241 may prepopulate the set of residential addresses each associated with the resident name as the set of user profiles in the threshold radial distance 119 from the claimed geospatial location of the verified user (e.g., the user 106 of
An undo module 246 may generate a reversible history journal associated with each of the set of user profiles such that a modification of the verified user (e.g., the user 106 of
A publishing module 214 may automatically publish the broadcast data (e.g., the emergency broadcast data 102) generated through the mobile device 504 to the set of user profiles having associated verified addresses in a threshold radial distance 119 from the claimed geospatial location of the verified user (e.g., the user 106 of
An association module 216 may associate the verified user (e.g., the user 106 of
A concurrency module 258 may simultaneously publish the broadcast data (e.g., the emergency broadcast data 102) generated through the mobile device 504 on the private neighborhood community associated with the verified user (e.g., the user 106 of
A summary module 262 may generate a summary data 626 to the verified user (e.g., the user 106 of
A live broadcast module 228 may live broadcast the broadcast data (e.g., the emergency broadcast data 102) generated through the mobile device 504 to the different verified user (e.g., the user 106 of
A bi-directional communication module 230 may permit the different verified user (e.g., the user 106 of
A moderation module 264 may apply a crowdsourced moderation algorithm 204 in which multiple neighbors to a geospatial area determine what content contributed to the emergency response server 100 persists and/or which is deleted. A muting module 266 may permit users to mute messages of specific verified users 706 to prevent misuse of the emergency response server 100.
The methods and systems disclosed herein may be implemented in any means for achieving various aspects, and may be executed in a form of a machine-readable medium embodying a set of instructions that, when executed by a machine, cause the machine to perform any of the operations disclosed herein. Other features will be apparent from the accompanying drawings and from the detailed description that follows.
Embodiments described herein in
A user can “Claim” one or more Business Pages and/or a Residential Pages, according to one embodiment. In order to secure their Claim, the user may verify their location associated with the Business Page and/or Residential page within 30 days, or the page becomes released to the community, according to one embodiment. A user can only have a maximum of 3 unverified Claims out at any given time, according to one embodiment. When a user clicks on “Claim this Page” on Business Profile page and/or a Residential Profile page, they can indicate the manner in which they intend to verify their claim, according to one embodiment. Benefits of Claiming a Business Page and/or Residential page may enable the user to mark their page ‘Self-Editable only’ from the default ‘Fully Editable’ status, and see “Private” listings in a claimed neighborhood around the verified location, according to one embodiment. Each edit by a user on a Residential Profile page and/or a Business Profile page may be made visible on the profile page, along with a date stamp, according to one embodiment.
Browse function: Based on the user's current location, the browse function may display a local map populated with pushpins for location-specific information, and a news feed, made up of business page edits, public people page edits, any recent broadcasts, etc., according to one embodiment. The news feed may show up on each Business Page and each Residential Page, based on activity in the surrounding area, according to one embodiment. Secure a Neighborhood function: May allow the user to identify and “secure” a neighborhood, restricting certain types of access to verified residents, according to one embodiment. Add a Pushpin function: May allow any registered or verified user to add any type of Pushpin (as described in
In addition to the map, the search results page may display a news feed, made up of business page edits, public people page edits, any recent broadcasts, and autogenerated alerts who has moved into the neighborhood, who has moved out of the neighborhood, any recent reviews in the neighborhood, any pushpins placed in the immediate area, etc., according to one embodiment. The news feed may prioritize entries relating to the search results, and will take into account privacy policies and preferences, according to one embodiment.
Example Newsfeeds may include:
Joe Smith moved into the neighborhood in September 2013. Welcome Joe! Like Share; 43 neighbors (hyperlink) moved in to the Cupertino library neighborhood in July 2013. Like Share; 12 neighbors (hyperlink) verified in to the Cupertino library neighborhood in July 2013. Like Share; Raj Abhyanker, invited Paul Smith, a guest to the Cupertino neighborhood. Raj indicates Paul is a friend from college looking to move into the neighborhood. Welcome Paul!: Raj Abhyanker posted a Nissan Leaf for rent $35 a day, in mountain view Rent now. Like Share
This content may feed each Profile Page and helps to increase Search Engine value for content on the site, according to one embodiment. Alerts may be created and curated (prioritized, filtered) automatically and/or through crowdsourcing, to keep each page vibrant and actively updating on a regular basis (ideally once a day or more), according to one embodiment.
A Multi-Family Residence page will display a list of residents in the entire building, according to one embodiment. Clicking on any resident will display a Single Family Residence page corresponding to the individual living unit where that person resides, according to one embodiment.
For example, suppose that John Smith and Jane Smith live in apartment 12 of a large building. Their names are included in the list of residents. When a user clicks on either John Smith or Jane Smith, we will display a “Single Family Residence” page showing both John and Jane, just as if apartment 12 was a separate structure, according to one embodiment.
The broadcast feature (e.g., associated with the emergency broadcast data 102 and generated by the radial algorithm 240 of the radial distribution module 140) may be a “Radio” like function that uses the mobile device's current geospatial location to send out information to neighbors around the present geospatial location of the user, according to one embodiment. Broadcasts may be posted to neighbor pages in the geospatial vicinity (e.g., in the same neighborhood) on public and private pages in the geospatial social network, according to one embodiment. These broadcasts may enable any user, whether they live in a neighborhood or not to communicate their thoughts to those that live or work (or have claimed) a profile in the neighborhood around where the broadcaster is physically at, regardless of where the broadcaster lives, according to one embodiment. Broadcasts can be audio, video, pictures, and or text, according to one embodiment. For accountability, the broadcaster may be a verified user and their identity made public to all users who receive the broadcast in one embodiment.
This means that the broadcast feature may be restricted to be used only by devices (e.g., mobile phones) that have a GPS chip (or other geolocation device) that an identify a present location of where the broadcast is originating from, according to one embodiment. The broadcast may be sent to all users who have claimed a profile in the geo spatial vicinity where the broadcast originates, according to one embodiment. This can either be broadcast live to whoever is “tuned” in to a broadcast of video, audio, picture, and text in their neighborhood, or can be posted on each users profile if they do not hear the broadcast to the neighborhood in a live mode in one embodiment.
When a broadcast is made neighbors, around where the broadcast is made, they may receive a message that says something like:
Raj Abhyanker, a user in Menlo Park just broadcast “Japanese cultural program” video from the Cupertino Union church just now. Watch, Listen, View
This broadcast may be shared with neighbors around Menlo park, and or in Cupertino. This way, Raj's neighbors and those in Cupertino can know what is happening in their neighborhoods, according to one embodiment. In one embodiment, the broadcast only goes to one area (Cupertino or Menlo park in the example above).
Broadcasts could be constrained to devices that have geospatial accuracy of present location and a current only (mobile devices for example). Otherwise, broadcasts won't mean much, according to one embodiment (would otherwise be just like thoughts/video upload without this). Broadcasts shouldn't be confused with ‘upload videos’, according to one embodiment. Different concepts. Why? Broadcasts have an accuracy of time and location that cannot be altered by a user, according to one embodiment, Hence, mobile is the most likely medium for this not desktop computer, according to one embodiment. We should not let the user set their own location for broadcasts (like other pushpin types), according to one embodiment. Also time is fixed, according to one embodiment. Fixing and not making these two variables editable give users confidence that the broadcast was associated with a particular time and place, and creates a very unique feature, according to one embodiment. For example, it would be not useful if the broadcast is untrusted as to location of origination, according to one embodiment. E.g., I broadcast when I am somewhere only about the location I am at, according to one embodiment.
Broadcasts are different that other pushpins because location of where a broadcast, and time of broadcast is
*current location* and *current time*, according to one embodiment. They are initiated wherever a broadcaster is presently at, and added to the news feed in the broadcasters neighborhood and in the area wherever a broadcaster is presently at, according to one embodiment.
Broadcast rules may include:
1. If I post a Broadcast in my secured neighborhood, only my neighbors can see it, according to one embodiment.
2. If I post a Broadcast in different secured neighborhood then my own, my neighbors can see it (e.g., unless I turn this off in my privacy setting) and neighbors in the secured neighborhood can see it (e.g., default not turn-offable, but I can delete my broadcast), according to one embodiment.
3. If I post a Broadcast in different unsecured neighborhood then my own, my neighbors can see it (unless I turn this off in my privacy setting) and the broadcast is publicly visible on user pages of public user profiles in the unsecured neighborhood until profiles are claimed and/or the neighborhood is secured, according to one embodiment.
4. If an outsider in a secure neighborhood posts a broadcast in my secure neighborhood, it's not public, according to one embodiment.
5. If an outsider in a unsecure neighborhood posts a broadcast in my secure neighborhood, the system does not post on profiles in his unsecure neighborhood (to prevent stalking, burglary), but does post in my secure neighborhood, according to one embodiment.
Privacy settings. For each verified residential or business location, the user may set Privacy to Default, Public, Private, or Inactive, according to one embodiment. The Default setting (which is the default) means that the profile will be public, until the neighborhood is secured; in a secured neighborhood, the profile will be Private, according to one embodiment. By changing this setting, the user may force the profile to be Public or Private, regardless of whether the neighborhood is secured, according to one embodiment.
For each verified residential location, the user may set edit access to Group Editable or Self Editable, according to one embodiment.
Residential Privacy example. The residential profiles can be: Public: anyone can search, browse, or view the user profile, according to one embodiment. This is the default setting for unsecured neighborhoods (initially, all the content on the site), according to one embodiment. Private: only people in my neighborhood can search, browse, or view the user's profile, according to one embodiment. This is the default for secured neighborhoods, according to one embodiment. Inactive: nobody can search, browse, or view the profile, even within a secured neighborhood, according to one embodiment. A user may have at least one active (public or private), verified profile in order to have edit capabilities, according to one embodiment; if the user makes all profiles inactive, that user is treated (for edit purposes) as an unverified user, according to one embodiment.
Verified users can edit the privacy setting for their profile and override the default, according to one embodiment. Group Editable: anyone with access to a profile based on the privacy roles above can edit the profile, according to one embodiment. This is the default setting, according to one embodiment Self Editable, only the verified owner of a profile can edit that profile, according to one embodiment.
Exceptions Guest User. A verified user in another neighborhood is given “Guest” access to a neighborhood for a maximum of 60 days by a verified user in the neighborhood in which the guest access is given, according to one embodiment. In effect, the guest becomes a member of the neighborhood for a limited period, according to one embodiment. Friend. When a user has self-elected being friends with someone in a different neighborhood, they can view each other's profiles only (not their neighbors), according to one embodiment. One way for a user to verify a location is to submit a scanned utility bill, according to one embodiment.
When a moderator selects the Verify Utility Bills function, the screen will display a list of items for processing, according to one embodiment. Accept the utility bill as a means of verification, according to one embodiment. This will verify the user's location, and will also generate an e-mail to the user, according to one embodiment. Or Decline the utility bill as a means of verification, according to one embodiment. There will be a drop-down list to allow the moderator to select a reason, according to one embodiment; this reason will be included in an e-mail message to the user. Reasons may include: Name does not match, address does not match, name/address can't be read, not a valid utility bill, according to one embodiment.
An example embodiment will now be described. A person confronted with an emergency situation (e.g. the user 106, the verified user 706) may send a broadcast on a geospatially constrained social network (e.g. Fatdoor.com, Nextdoor.com). To accomplish this broadcast the person may generate the broadcast data 102 which will be sent to the emergency response server 100 to generate the notification data 112. The notification data 112 may include any information contained in the broadcast data 102 such as the geospatial location, time, date, a textual description and live broadcast of audio and/or video generated by the user 106. The notification data 112 may then be radially distributed in the area with a threshold radial distance 119 of the epicenter 144 that may be the location of the device observing the emergency. The person may be hoping for immediate assistance from other people living nearby (e.g. the recipients 114) to help confront the emergency situation. Rather than attempt to contact those living nearby individually, the person experiencing the emergency may broadcast the notification 112 to proximate neighbors simultaneously, maximizing the chance that a relevant person will appreciate, view and/or respond to the broadcast.
Additionally, for example, the broadcast may even occur automatically upon the dialing of emergency services 109 as to allow concurrent notification of nearby recipients 114 without detracting from a conventional mode of contacting emergency services (e.g. the emergency call 1200). The emergency call 1200 may be monitored by the emergency response server 100 to automatically generate the emergency broadcast data 102, including live audio of the call which the emergency response server 100 may use to create a transcript 1204. The transcript 1204, along with metadata from the call that may include the geo spatial location of the mobile device on which the call was made may then be broadcast according to the radial distribution module 140 to nearby recipients 114. The recipients 114 may then be notified of the emergency situation and/or prompted to respond without detracting from a call to the emergency services 109.
For example, in an elementary school setting (e.g., the threshold radial distance 119 may be set to a boundaries of the elementary school using the radial algorithm 240 of the radial distribution module 140). A principal of the Sacred Brooks Elementary School Mr. Higgins may hear gunshots that he believes are coming from an on-campus location. Screams of panicked teachers and children may soon follow. Mr. Higgins may use his mobile device (e.g., his cellular phone) to call an emergency number ‘911’. Calling this emergency number ‘911’ may also trigger an automatic alert to the geo-spatially constrained social network 142 to generate the emergency broadcast data 102 (or alternatively Mr. Higgins may separately send an emergency broadcast using the Fatdoor mobile application). All teachers at the school and parents in adjacent neighborhoods may be instantly notified (e.g., through the creation of the emergency broadcast data 102 distributed as the notification data 112).
Wilson Brighton at the Fatdoor Emergency Center may receive a message that there is an emergency at the Sacred Brooks Elementary school. Wilson Brighton may open up a communication channel with Mr. Brighton and invite adjacent neighborhoods and medical professionals having claimed profiles and/or living in the area to help. In addition, Wilson may merge the emergency transmissions into a single session so that Mr. Higgins initial emergency broadcast is automatically merged with related other broadcasts by teachers, parents, staff, and children at the school. This single thread of broadcasts related to the Sacred Brooks Elementary school may be provided as live-feed emergency broadcasts to all users of Fatdoor.com having a claimed profile (e.g., a home address and/or a work address) within the threshold radial distance from Mr. Higgins (e.g., the epicenter of the broadcast). Even when parents are at work, they may still receive the broadcast live on their mobile devices because they have downloaded the Fatdoor application and have claimed their home/business address around a location of the emergency.
As a result, local neighborhood parents may arrive from their work locations, even when they work at a different location than where they live. This may save lives at the Sacred Brooks elementary school because help may arrive sooner.
For example, one recipient of Mr. Higgin's broadcast may be Samuel Wilson (“Sam”), who has two children at Sacred Brooks Elementary School: John, a bright kindergartener 6, and Samantha, a talented artist of age 10. Sam may be alerted even when he is at work on a construction site 6 miles away from the Sacred Brooks Elementary School where John and Samatha are located. Sam may receive an alert on his mobile phone that there is an emergency in his neighborhood. Jumping into his truck, Sam may drive to the school to render assistance, tuning in to the live broadcast as events unfold. Others may join in and as well and communicate and provide instructions and reassurance to Mr. Higgins and other broadcasters.
Nearby resident Chen Su, whose backyard fence adjoins the playground of Sacred Brooks, may also receive the broadcast. Chen may run outside and unlock his gate, opening it so that children may not be trapped in the playground area. Chen may then send a separate broadcast a new escape route has been established. Mr. Higgins may gather as many nearby children as he can and lead them safety through Chen's gate.
Henry Stewart, a decorated army veteran who lives a few blocks away from Sacred Brooks Elementary, may also receive the broadcast. Alarmed for the safety of the children, and knowing that it may take the police several minutes to arrive at the school, Henry may decide that it will maximize the children chance at survival if he is the first responder. Equipping his .22 caliber rifle, he may run to the school and distract or defeat the shooter in time to save many lives.
Similarly, Dr. Juan Sanchez, M.D. may have an office in the neighborhood immediately adjacent to Sacred Brooks. Dr. Sanchez and his team of medical professionals may rush to the scene, engaging in bi-directional communications with the school staff during the live broadcast event so that he knows exactly which building to arrive at. Calming victims and putting pressure on wounds until ambulances arrive, Dr. Sanchez and his team may save the lives of wounded children.
When the incident is over, many people may want to recreate the events for journalistic or evidentiary purposes. They may also want to study generally the flow of information during emergencies in their neighborhood, and decide how their school could better prepare. Similarly, they may want to ensure they are part of the broadcast system in cast there are future incidents. Persons who have not yet claimed their verified profiles in the area surrounding Sacred Brooks Elementary School on Fatdoor may go online and find profiles pre-seeded with data associated with their address. Those pre-seeded profiles may have been updated with local broadcasts. These people may be able to claim their profile and have access to previous broadcasts, including those associated with the school shootings. This may help them to better prepare for the safety of their children.
Because of the technologies described herein, the neighborhood, city, and country is a better place because emergency response teams are supplemented with information from those who have a claimed geo-spatial location around a neighborhood in which there is trouble. In addition, evidence may be formed that is admissible to prove guilt of the gunmen, defeat a defense of insanity, or impose a maximum sentence.
In another example, a user Bob Jones may be walking around Menlo Park, Calif. when he observes a robber pull out a knife and threaten to harm Paula Nelson in a parking lot if she does not give the robber her car keys. Bob may take out his mobile device and select the emergency listing criteria “major violent crime” in the user interface of the mobile application that communicates with the emergency response server. Bob may center his viewfinder on the unfolding robbery and select the “broadcast live” indicator on the user interface, as well as entering the brief description “Car jacking in progress” in a small data field. The broadcast data, including live video and audio, may be generated and sent to the emergency response server where it may be radially distributed to user profiles at a threshold radial distance from the epicenter centered on Bob's mobile device. Because Bob specified the emergency as a “major violent crime” its threshold radial distance may be larger than if Bob had selected mere “vandalism.”
To further illustrate, several relevant parties may receive the broadcast. Patrick Sloan, an off-duty police detective, is alerted to Bob Jones' broadcast data by a notification sent to his mobile device. Patrick, looks his mobile device to read Bob's brief description, and notices that the event is only “0.3 miles away.” Patrick selects the “respond indicator” to let Bob know he is on his way, and also selects “dial broadcaster” to establish a bi-directional communication with Bob. A map on Patrick's mobile device and a set of directions may show Patrick the fastest way to travel to the epicenter, along with warning Patrick when he is within 100 yards of the emergency.
Jason Steinbrenner, a retired surgeon, also receives Bob's broadcast. Jason opts to view Bob's live video feed. Jason notices that the robber severely lacerates Paula with his knife as he grabs Paula's keys away. Jason sees that he is only 0.7 miles away from the emergency and also selects the “respond indicator” to let Bob know he will arrive shortly. Through his user interface he sends Bob a text message “I'm a doctor.”
Jane Doe, a resident living within the threshold radial distance also receives Bob's broadcast. Jane, while viewing Bob's live feed, takes note of the vehicle make, model and color. As the robber gets in Paula's car and drives away, out of Bob's view, Jane goes to her apartment window and looks outside. A minute later, Jane sees the woman's car, driven by the robber, headed down her street, trying to keep a low profile. Jane generates her own broadcast including a video feed of the car stopped at a stoplight. Patrick Sloan, driving his car to reach Bob's location, receives Jane's broadcast. Patrick, now using Jane's epicenter, redirects his path to intercept the robber. Using Jane's live video broadcast to remotely view the intersection, Patrick is able to safely approach the robber from behind and surprise him at the stoplight, capturing him.
Emergency services, which may subscribe to all emergency broadcasts within the threshold radial distance of the epicenter, may also have been notified. The police department and an ambulance arrive after Patrick catches the robber and Jason stabilizes the woman.
Bob and Jane may receive a summary of their broadcast data that shows them how many recipients received his broadcast, the emergency services contacted, and who was responding. Their broadcast submissions may also include a unique identifies such that the live video, recorded by the emergency response server, which may be later retrieved to provide evidence against the robber with a unique identification code.
Because of the emergency response sever described in
Bob and Jane may live in the Lorelei neighborhood of Menlo Park, and for this reason receive the emergency broadcast data. If Bob creates an emergency broadcast, Bob may choose to restrict dissemination of his emergency broadcast just to the Lorelei neighborhood because it is an ‘active’ neighborhood around where Bob lives. Particularly, a minimum number of Bob's neighbors in the Lorelei neighborhood, such as 10 neighbors in the Lorelei neighborhood, may have signed up and verified their profiles through an online neighborhood social network (e.g., Fatdoor.com). If Bob is the first user that creates a private network for his neighborhood (e.g., a ‘founding member’), he may need to draw geospatial boundaries and/or claim geospatial boundaries around his neighborhood and invite a threshold number of neighbors (e.g., 10 neighbors) to activate it. An amount of time for Bob to invite and activate his neighborhood may be limited (e.g., 21 days). However, Bob may request an extension of time from the geospatially constrained social network 142 if Bob needs more time to invite users, and the geospatially constrained social network 142 may grant this extra time. In other words, if Bob is a founding member, he may have the ability to define the neighborhood boundary and choose the neighborhood name.
The geo-spatially constrained social network 142 may internally make corrections to either the boundaries or name that Bob set based on feedback from other neighbors and/or based on internal policies. These internal policies may include a preference for a use of official names for a community (e.g., based on local thoroughfares, a nearby park, or landmark for inspiration), a neighborhood name that is short and sweet (e.g., eliminating unnecessary words like city, state, neighbors, neighborhood, HOA, friends, etc.), with correct capitalization (e.g., to ensure that a first letter of each word is capitalized), and/or use of spaces between each word in a neighborhood name. In one embodiment, Bob may designate neighborhood ‘leads’ who can adjust boundaries of their neighborhood through an adjust boundaries tool. Bob may be part of an elite group of neighborhood ‘leads’ who keep the geospatially constrained social network 142 operating smoothly by organizing information and posting neighborhood-wide information. The neighborhood leads like Bob may have special privileges such as removing inappropriate messages, adjusting neighborhood boundaries, verifying unverified members, editing the about section on a neighborhood feed, and/or promoting other members to become neighborhood leads.
Bob and his neighbors may have each verified their addresses through a postcard verification system in which they received a postcard at their home with an access code that permits each of them to access their private Lorelei neighborhood community information including emergency broadcast alerts in the online neighborhood social network (e.g., the Fatmail postcard system through which an access code may have been received at a respective Lorelei home that uniquely identifies and verifies a home in the Lorelei neighborhood). Bob may have invited a threshold number (e.g., 10) of his Lorelei neighbors prior to the Lorelei neighborhood becoming active. Bob may choose to disseminate his emergency broadcast data to a neighborhood adjacent to Lorelei, such as Menlo Park downtown (e.g., using the radial algorithm 240 of the radial distribution module 140). Optionally, Bob may choose to restrict his emergency broadcast data just to Lorelei neighbors (e.g., using the radial algorithm 240 of the radial distribution module 140). In other words, users of the neighborhood social network in an entirely different neighborhood, such as the Financial District neighborhood of San Francisco (about 20 miles away) may not be able to access the emergency broadcast data that Bob generates.
For example, the emergency broadcast data may be disseminated to adjacent neighborhoods that have been claimed by different users in a manner such that the emergency broadcast data is optionally disseminated to the surrounding claimed neighborhoods based on Bob's preference.
It will be understood with those skill in the art that in some embodiments, the radial distribution module 140 may restrict dissemination of broadcast data by verified users to claimed neighborhoods in a private neighborhood social network (e.g. the geospatially constrained social network 142 may be a private social network, the neighborhood curation system described herein may also be part of the private neighborhood social network) in which the broadcaster resides (e.g., has a home) using the radial algorithm 140. The geo-spatially constrained social network 142 may include online communities designed to easily create private websites to facilitate communication among neighbors and build stronger neighborhoods (e.g., to help neighbors build stronger and safer neighborhoods).
Further, it follows that the threshold radial distance 119 may take on a variety of shapes other than purely circular and is defined to encompass a variety of shapes based on associated geographic, historical, political and/or cultural connotations of associated boundaries of neighborhoods and/or as defined by a city, municipality, government, and/or data provider (e.g., Maponics®, Urban Mapping®), in one embodiment. For example, the threshold radial distance 119 may be based on a particular context, such as a school boundary, a neighborhood boundary, a college campus boundary, a subdivision boundary, a parcel boundary, and/or a zip code boundary.
In an alternative embodiment, the threshold radial distance 119 generated by the geospatially constrained social network 142 may be restricted to a shared apartment building (e.g., and/or an office building). In addition, it will be understood with those skilled in the art that the emergency response server 100 may be operate as a function of the geo-spatially constrained social network 142 (e.g., a neighborhood social network).
In addition, it will be understood that in some embodiments, the emergency broadcast data 102 is generated by the police department 309C (e.g., and/or others of the emergency services 109) in the form of crime alerts, health alerts, fire alerts, and other emergency alerts and provided as a feed (e.g., a Real Simple Syndication (RSS) feed) to the geo-spatially constrained social network 142 for distribution to relevant ones of the claimed neighborhoods in the geo-spatially constrained social network 142. It will be understood that the emergency broadcast data 102 may appear in a ‘feed’ provided to users of the geo-spatially constrained social network 142 (e.g., a private social network for neighbors) on their profile pages based on access control privileges set by the radial broadcast module 140 using the radial algorithm 240. For example, access to the emergency broadcast data 102 may be limited to just a claimed neighborhood (e.g., as defined by neighborhood boundaries) and/or optionally adjacent neighborhoods.
In one embodiment, the geo-spatially constrained social network 142 may provide police departments and other municipal agencies with a separate login in which they can invite neighbors themselves, provide for a virtual neighborhood watch and emergency preparedness groups, and conduct high value crime and safety related discussions from local police and fire officials without requiring any technical integration. This may provide police departments and municipalities with a single channel to easily broadcast information across neighborhoods that they manage, and receive and track neighborhood level membership and activity to identify leaders of a neighborhood.
For example, communications defined from one broadcasting user to an adjacent neighborhood o may involve sharing information about a suspicious activity that might affect several neighborhoods, explaining about a lost pet that might have wandered into an adjoining neighborhood, to rally support from neighbors from multiple neighborhoods to address civic issues, to spread the word about events like local theater production or neighborhood garage sales, and/or to ask for advice or recommendations from the widest range of people in a community). In one embodiment, the geospatially constrained social network 142 may prevent self-promotional messages that are inappropriate (e.g., a user sending such messages may be suspended from the geospatially constrained social network using the crowd sourced moderation algorithm 204. In one embodiment, the user 106 may personalize nearby neighborhoods so that the user can choose exactly which nearby neighborhoods (if any) they wish to communicate with. The user 106 may be able to flag a neighborhood feeds from adjacent neighborhoods. In addition, leaders from a particular neighborhood may be able to communicate privately with leaders of an adjoining neighborhood to plan and organize on behalf of an entire constituency. Similarly, users 106 may be able to filter feeds to only display messages from the neighborhood that they reside in. The user 106 may be able to restrict posts (e.g., pushpin placements) only in the neighborhood they are presently in. In one embodiment, nearby neighbors may (or may not) be able to access profiles of adjacent neighborhoods.
It will also be understood that in some embodiments, that users may be ‘verified through alternate means, for example through a utility bill verification (e.g., to verify that a user's address on a utility bill matches the residential address they seek to claim), a credit card verification (e.g., or debit card verification), a phone number verification (e.g., reverse phone number lookup), a privately-published access code (e.g., distributed to a neighborhood association president, and/or distributed at a neighborhood gathering), and a neighbor vouching method (e.g., in which an existing verified neighbor ‘vouches’ for a new neighbor as being someone that they personally know to be living in a neighborhood.
In one embodiment, the geospatially constrained social network 142 ensures a secure and trusted environment for a neighborhood website by requiring all members to verify their address. In this embodiment, verification may provide assurance the assurance that new members are indeed residing at the address they provided when registering for an account in the geo-spatially constrained social network 142. Once a neighborhood has launched out of pilot status, only members who have verified their address may be able access to their neighborhood website content.
It will be understood that among the various ways of verifying an address, a user of the geo-spatially constrained social network 142 may uses the following methods to verify the address of every member:
A. Postcard. The geo-spatially constrained social network 142 can send a postcard to the address listed on an account of the user 106 with a unique code printed on it (e.g., using the Fatmail postcard campaign). The code may allow the user 106 to log in and verify their account.
B. Credit or debit card. The geo-spatially constrained social network 142 may be able to verify a home address through a credit or debit card billing address. In one embodiment, billing address may be confirmed without storing personally identifiable information and/or charging a credit card.
C. Home phone. If a user 106 has a landline phone, the user may receive an automated phone call from the geo-spatially constrained social network 142 that may provide with a unique code to verify an account of the user 106.
D. Neighborhood leader. A neighborhood leader of the geo-spatially constrained social network can use a verify neighbors feature of the geo-spatially constrained social network 142 to vouch for and verify neighbors.
E. Mobile phone. A user 106 may receive a call to a mobile phone associated with the user 106 to verify their account.
F. Neighbor invitations. A neighbor who is a verified member of the geo-spatially constrained social network 142 can vouch for, and may invite another neighbor to join the geo-spatially constrained social network 142. Accepting such an invitation may allow the user 106 to join the geo-spatially constrained social network 142 as a verified member, according to one embodiment.
H. Social Security Number (SSN). The geo-spatially constrained social network 142 can verify a home address when the user 106 provides the last 4 digits of a SSN (e.g., not stored by the geospatially constrained social network 142 for privacy reasons).
It will be also understood that in a preferred embodiment neighborhood boundaries defined by the radial distribution module 140 using the radial algorithm 140 may be constrained to work in neighborhoods having a threshold number of homes (e.g., 100 homes in a neighborhood) and more (e.g., up to thousands of homes) as this may be needed to reach the critical mass of active posters that is needed to help the geo-spatially constrained social network 142 succeed. In one embodiment, ‘groups’ may be creatable in smaller neighborhoods having fewer than the threshold number of homes for communications in micro-communities within a claimed neighborhood.
It will also be appreciated that in some embodiments, a mobile device 104 may be a desktop computer, a laptop computer, and/or a non-transitory broadcasting module. In addition, it will be understood that the prepopulated data (e.g., preseeded data) described herein may not be created through data licensed from others, but rather may be user generated content of organically created profiles in the geo-spatial social network created by different users who have each verified their profiles.
Although the present embodiments have been described with reference to specific example embodiments, it will be evident that various modifications and changes may be made to these embodiments without departing from the broader spirit and scope of the various embodiments. For example, the various devices and modules described herein may be enabled and operated using hardware circuitry (e.g., CMOS based logic circuitry), firmware, software or any combination of hardware, firmware, and software (e.g., embodied in a machine readable medium). For example, the various electrical structures and methods may be embodied using transistors, logic gates, and electrical circuits (e.g., application specific integrated (ASIC) circuitry and/or Digital Signal Processor (DSP) circuitry).
In addition, it will be appreciated that the various operations, processes, and methods disclosed herein may be embodied in a machine-readable medium and/or a machine accessible medium compatible with a data processing system. Accordingly, the specification and drawings are to be regarded in an illustrative rather than a restrictive sense.
This patent application is a continuation in part, claims priority from, and hereby incorporates by reference and claims priority from the entirety of the disclosures of the following cases and each of the cases on which they depend and further claim priority or incorporate by reference: (1) U.S. Utility patent application Ser. No. 11/653,194 titled ‘LODGING AND REAL PROPERTY IN A GEO-SPATIAL MAPPING ENVIRONMENT’ filed on Jan. 12, 2007, which is a CIP of U.S. application Ser. No. 11/603,442, and provisional cases including 60/783,226 filed on Mar. 17, 2006, 60/817,470 filed on Jun. 28, 2006, 60/853,499 filed on Oct. 19, 2006, and 60/854,230 filed on Oct. 25, 2006.(2) U.S. Utility patent application Ser. No. 11/827,400 titled ‘HOT NEWS NEIGHBORHOOD BANTER IN A GEO-SPATIAL SOCIAL NETWORK’ filed on Jul. 10, 2007.(3) U.S. Utility patent application Ser. No. 11/731,465 titled ‘WHITE PAGES AND YELLOW PAGE DIRECTORIES IN A GEO-SPATIAL ENVIRONMENT, filed on Mar. 29, 2007.(4) U.S. Utility patent application Ser. No. 13/236,964 titled ‘NEAR-FIELD COMMUNICATION ENABLED WEARABLE APPAREL GARMENT AND METHOD TO CAPTURE GEOSPATIALLY AND SOCIALLY RELEVANT DATA OF A WEARER OF THE WEARABLE APPAREL GARMENT AND/OR A USER OF A READER DEVICE ASSOCIATED THEREWITH’ filed on Sep. 20, 2011.(5) U.S. Utility patent application Ser. No. 13/242,303 titled ‘GEOSPATIALLY CONSTRAINED GASTRONOMIC BIDDING’ filed on Sep. 23, 2011.(6) U.S. Utility patent application Ser. No. 13/272,245 titled ‘NEAR-FIELD COMMUNICATION ENABLED WEARABLE APPAREL GARMENT AND METHOD TO CAPTURE GEOSPATIALLY AND SOCIALLY RELEVANT DATA OF A WEARER OF THE WEARABLE APPAREL GARMENT AND/OR A USER OF A READER DEVICE ASSOCIATED THEREWITH’ filed on Oct. 13, 2011.(7) U.S. Provisional patent application No. 61/894,443 titled ‘RADIO BROADCAST, COMMERCE PUSHPINS, AND AUTOMATED PAGE UPDATES TO A GEOSPATIALLY CONSTRAINED NEIGHBORHOOD REGION THROUGH AN INTERNET NETWORK AND SEPARATELY A TRACKABLE SOCIAL COMMUNITY FORMED BASED ON TRACKABLE TAG BASED APPAREL THAT CREATES INCENTIVES AND CONNECTIONS BETWEEN USERS WEARING PROMOTIONAL APPAREL AND THOSE OTHER USERS READING THE TRACKABLE TAG ON THE APPAREL’ filed on Oct. 23, 2013.(8) U.S. Utility patent application Ser. No. 14/079,611 titled ‘JOB BROADCAST DATA PUBLICATION THROUGH A WORK-OPPORTUNITY LISTING SERVER USING A RADIAL ALGORITHM TO AUTOMATICALLY DISTRIBUTE THE JOB BROADCAST DATA IN A THRESHOLD RADIAL DISTANCE FROM A SET OF GEOSPATIAL COORDINATES ASSOCIATED WITH A MOBILE DEVICE’ filed on Nov. 13, 2013.(9) U.S. Utility patent application Ser. No. 14/089,779 titled ‘EMERGENCY INCLUDING CRIME BROADCAST IN A NEIGHBORHOOD SOCIAL NETWORK’ filed on Nov. 26, 2013.(10) U.S. Utility patent application Ser. No. 14/100,034 titled ‘SOCIAL CONNECTIONS THROUGH TAGGABLE APPAREL’ filed on Dec. 9, 2013.(11) U.S. Utility patent application Ser. No. 14/102,474 titled ‘SHORT-TERM RESIDENTIAL SPACES IN A GEO-SPATIAL MAPPING ENVIRONMENT’ filed on Dec. 10, 2013.(12) U.S. Utility patent application Ser. No. 14/141,432 titled ‘HOLIDAY EXPRESSION AND MAPPING IN A GEOSPATIALLY CONSTRAINED SOCIAL NETWORK’ filed on Dec. 26, 2013.(13) U.S. Utility patent application Ser. No. 13/272,245 titled ‘Near-field communication enabled wearable apparel garment and method to capture geospatially and socially relevant data of a wearer of the wearable apparel garment and/or a user of a reader device associated therewith’ filed on Oct. 13, 2011.(14) U.S. Provisional patent application No. 61/894,443 titled ‘Radio broadcast, commerce pushpins, and automated page updates to a geospatially constrained neighborhood region through an internet network and separately a trackable social community formed based on trackable tag based apparel that creates incentives and connections between users wearing promotional apparel and those other users reading the trackable tag on the apparel’ filed on Oct. 23, 2013.(15) U.S. Utility patent application Ser. No. 14/079,611 titled ‘Job broadcast data publication through a work-opportunity listing server using a radial algorithm to automatically distribute the job broadcast data in a threshold radial distance from a set of geospatial coordinates associated with a mobile device’ filed on Nov. 13, 2013.
Number | Name | Date | Kind |
---|---|---|---|
2035218 | Bloom | Mar 1936 | A |
3253806 | Eickmann | May 1966 | A |
3556438 | Meditz | Jan 1971 | A |
3762669 | Curci | Oct 1973 | A |
4161843 | Hui | Jul 1979 | A |
5032989 | Tornetta | Jul 1991 | A |
5325294 | Keene | Jun 1994 | A |
5521817 | Burdoin et al. | May 1996 | A |
5581630 | Bonneau, Jr. | Dec 1996 | A |
5584025 | Keithley et al. | Dec 1996 | A |
5590062 | Nagamitsu et al. | Dec 1996 | A |
5671342 | Millier et al. | Sep 1997 | A |
5805810 | Maxwell | Sep 1998 | A |
5831664 | Wharton et al. | Nov 1998 | A |
5905499 | McDowall et al. | May 1999 | A |
5926765 | Sasaki | Jul 1999 | A |
5930474 | Dunworth et al. | Jul 1999 | A |
5937413 | Hyun et al. | Aug 1999 | A |
5940806 | Danial | Aug 1999 | A |
6024288 | Gottlich et al. | Feb 2000 | A |
6029141 | Bezos et al. | Feb 2000 | A |
6029195 | Herz | Feb 2000 | A |
6034618 | Tatebayashi et al. | Mar 2000 | A |
6036601 | Heckel | Mar 2000 | A |
6047194 | Andersson | Apr 2000 | A |
6073138 | de l'Etraz et al. | Jun 2000 | A |
6088702 | Plantz et al. | Jul 2000 | A |
6175831 | Weinreich et al. | Jan 2001 | B1 |
6229533 | Farmer et al. | May 2001 | B1 |
6269369 | Robertson | Jul 2001 | B1 |
6308177 | Israni et al. | Oct 2001 | B1 |
6317718 | Fano | Nov 2001 | B1 |
6336111 | Ashby et al. | Jan 2002 | B1 |
6339745 | Novik | Jan 2002 | B1 |
6401085 | Gershman et al. | Jun 2002 | B1 |
6408307 | Semple et al. | Jun 2002 | B1 |
6498982 | Bellesfield et al. | Dec 2002 | B2 |
6507776 | Fox, III | Jan 2003 | B1 |
6513069 | Abato et al. | Jan 2003 | B1 |
6532007 | Matsuda | Mar 2003 | B1 |
6542813 | Kovacs | Apr 2003 | B1 |
6542936 | Mayle et al. | Apr 2003 | B1 |
6557013 | Ziff et al. | Apr 2003 | B1 |
6615039 | Eldering | Sep 2003 | B1 |
6629136 | Naidoo | Sep 2003 | B1 |
6633311 | Douvikas et al. | Oct 2003 | B1 |
6636803 | Hartz et al. | Oct 2003 | B1 |
6643663 | Dabney et al. | Nov 2003 | B1 |
6647383 | August et al. | Nov 2003 | B1 |
6654800 | Rieger, III | Nov 2003 | B1 |
6658410 | Sakamaki et al. | Dec 2003 | B1 |
6662016 | Buckham et al. | Dec 2003 | B1 |
6684196 | Mini et al. | Jan 2004 | B1 |
6687878 | Eintracht et al. | Feb 2004 | B1 |
6691114 | Nakamura | Feb 2004 | B1 |
6711414 | Lightman et al. | Mar 2004 | B1 |
6716101 | Meadows et al. | Apr 2004 | B1 |
6719570 | Tsuchioka | Apr 2004 | B2 |
6721748 | Knight et al. | Apr 2004 | B1 |
6745196 | Colyer et al. | Jun 2004 | B1 |
6750881 | Appelman | Jun 2004 | B1 |
6798407 | Benman | Sep 2004 | B1 |
6816850 | Culliss | Nov 2004 | B2 |
6834229 | Rafiah et al. | Dec 2004 | B2 |
6882307 | Gifford | Apr 2005 | B1 |
6883748 | Yoeli | Apr 2005 | B2 |
6889213 | Douvikas et al. | May 2005 | B1 |
6926233 | Corcoran, III | Aug 2005 | B1 |
6950791 | Bray et al. | Sep 2005 | B1 |
6968179 | De Vries | Nov 2005 | B1 |
6968513 | Rinebold et al. | Nov 2005 | B1 |
6987976 | Kohar et al. | Jan 2006 | B2 |
7006881 | Hoffberg et al. | Feb 2006 | B1 |
7013292 | Hsu et al. | Mar 2006 | B1 |
7024455 | Yokobori et al. | Apr 2006 | B2 |
7047202 | Jaipuria et al. | May 2006 | B2 |
7068309 | Toyama et al. | Jun 2006 | B2 |
7069308 | Abrams | Jun 2006 | B2 |
7072849 | Filepp et al. | Jul 2006 | B1 |
7080019 | Hurzeler | Jul 2006 | B1 |
7080096 | Imamura | Jul 2006 | B1 |
7085650 | Anderson | Aug 2006 | B2 |
7099745 | Ebert | Aug 2006 | B2 |
7099862 | Fitzpatrick et al. | Aug 2006 | B2 |
7117254 | Lunt et al. | Oct 2006 | B2 |
7136915 | Rieger, III | Nov 2006 | B2 |
7158878 | Rasmussen et al. | Jan 2007 | B2 |
7174301 | Florance et al. | Feb 2007 | B2 |
7177872 | Schwesig et al. | Feb 2007 | B2 |
7188153 | Lunt et al. | Mar 2007 | B2 |
7209803 | Okamoto et al. | Apr 2007 | B2 |
7228232 | Bodin et al. | Jun 2007 | B2 |
7233781 | Hunter et al. | Jun 2007 | B2 |
7249123 | Elder et al. | Jul 2007 | B2 |
7249732 | Sanders, Jr. et al. | Jul 2007 | B2 |
7251647 | Hoblit | Jul 2007 | B2 |
7269590 | Hull et al. | Sep 2007 | B2 |
7293019 | Dumais et al. | Nov 2007 | B2 |
7296026 | Patrick et al. | Nov 2007 | B2 |
7306186 | Kusic | Dec 2007 | B2 |
7353034 | Haney | Apr 2008 | B2 |
7353199 | DiStefano, III | Apr 2008 | B1 |
7359871 | Paasche et al. | Apr 2008 | B1 |
7359894 | Liebman et al. | Apr 2008 | B1 |
7383251 | Might | Jun 2008 | B2 |
7386542 | Maybury et al. | Jun 2008 | B2 |
7424438 | Vianello | Sep 2008 | B2 |
7424541 | Bourne | Sep 2008 | B2 |
7433832 | Bezos et al. | Oct 2008 | B1 |
7433868 | Satomi et al. | Oct 2008 | B1 |
7437368 | Kolluri et al. | Oct 2008 | B1 |
7441031 | Shrinivasan et al. | Oct 2008 | B2 |
7447685 | Nye | Nov 2008 | B2 |
7447771 | Taylor | Nov 2008 | B1 |
7454524 | Jeong | Nov 2008 | B2 |
7477285 | Johnson | Jan 2009 | B1 |
7478324 | Ohtsu | Jan 2009 | B1 |
7480867 | Racine et al. | Jan 2009 | B1 |
7487114 | Florance et al. | Feb 2009 | B2 |
7496603 | Deguchi et al. | Feb 2009 | B2 |
7505919 | Richardson | Mar 2009 | B2 |
7520466 | Bostan | Apr 2009 | B2 |
7562023 | Yamamoto | Jul 2009 | B2 |
7581702 | Olson et al. | Sep 2009 | B2 |
7587276 | Gold et al. | Sep 2009 | B2 |
7599935 | La Rotonda et al. | Oct 2009 | B2 |
7658346 | Goossen | Feb 2010 | B2 |
7668405 | Gallagher | Feb 2010 | B2 |
7669123 | Zuckerberg et al. | Feb 2010 | B2 |
7680673 | Wheeler | Mar 2010 | B2 |
7725492 | Sittig et al. | May 2010 | B2 |
7734254 | Frost et al. | Jun 2010 | B2 |
7756467 | Bent et al. | Jul 2010 | B2 |
7792815 | Aravamudan et al. | Sep 2010 | B2 |
7797256 | Zuckerberg et al. | Sep 2010 | B2 |
7801542 | Stewart | Sep 2010 | B1 |
7802290 | Bansal et al. | Sep 2010 | B1 |
7809709 | Harrison, Jr. | Oct 2010 | B1 |
7809805 | Stremel et al. | Oct 2010 | B2 |
7810037 | Edwards et al. | Oct 2010 | B1 |
7812717 | Cona et al. | Oct 2010 | B1 |
7827120 | Evans et al. | Nov 2010 | B1 |
7827208 | Bosworth et al. | Nov 2010 | B2 |
7827265 | Cheever et al. | Nov 2010 | B2 |
7860889 | Martino et al. | Dec 2010 | B1 |
7886024 | Kelly et al. | Feb 2011 | B2 |
7933810 | Morgenstern | Apr 2011 | B2 |
7937291 | Carlson et al. | May 2011 | B2 |
7945653 | Zuckerberg et al. | May 2011 | B2 |
7958011 | Cretney et al. | Jun 2011 | B1 |
7966567 | Abhyanker | Jun 2011 | B2 |
7970657 | Morgenstern | Jun 2011 | B2 |
8013734 | Saigh et al. | Sep 2011 | B2 |
8027943 | Juan et al. | Sep 2011 | B2 |
8032413 | Carlson | Oct 2011 | B2 |
8064590 | Abhyanker | Nov 2011 | B2 |
8073907 | Roumeliotis et al. | Dec 2011 | B2 |
8095430 | Abhyanker | Jan 2012 | B2 |
8107879 | Pering et al. | Jan 2012 | B2 |
8136145 | Fetterman et al. | Mar 2012 | B2 |
8149113 | Diem | Apr 2012 | B2 |
8167234 | Moore | May 2012 | B1 |
8171128 | Zuckerberg et al. | May 2012 | B2 |
8190357 | Abhyanker et al. | May 2012 | B2 |
8204776 | Abhyanker | Jun 2012 | B2 |
8204952 | Stremel et al. | Jun 2012 | B2 |
8225376 | Zuckerberg et al. | Jul 2012 | B2 |
8249943 | Zuckerberg et al. | Aug 2012 | B2 |
8271057 | Levine et al. | Sep 2012 | B2 |
8292215 | Olm et al. | Oct 2012 | B2 |
8296373 | Bosworth et al. | Oct 2012 | B2 |
8301743 | Curran et al. | Oct 2012 | B2 |
8328130 | Goossen | Dec 2012 | B2 |
8370003 | So et al. | Feb 2013 | B2 |
8391909 | Stewart | Mar 2013 | B2 |
8402094 | Bosworth et al. | Mar 2013 | B2 |
8433609 | Abhyanker | Apr 2013 | B2 |
8433650 | Thomas | Apr 2013 | B1 |
8447810 | Roumeliotis et al. | May 2013 | B2 |
8521127 | Strahs | Aug 2013 | B2 |
8521656 | Zimberoff et al. | Aug 2013 | B2 |
8543143 | Chandra et al. | Sep 2013 | B2 |
8600602 | Mcandrew et al. | Dec 2013 | B1 |
8627506 | Vera et al. | Jan 2014 | B2 |
8660541 | Beresniewicz et al. | Feb 2014 | B1 |
8660897 | Abhyanker | Feb 2014 | B2 |
8695919 | Shachor et al. | Apr 2014 | B2 |
8732846 | D'Angelo et al. | May 2014 | B2 |
D710454 | Barajas et al. | Aug 2014 | S |
8794566 | Hutson | Aug 2014 | B2 |
8832556 | Steinberg | Sep 2014 | B2 |
20010005829 | Raveis, Jr. | Jun 2001 | A1 |
20010020955 | Nakagawa et al. | Sep 2001 | A1 |
20010029501 | Yokobori et al. | Oct 2001 | A1 |
20010036833 | Koshima et al. | Nov 2001 | A1 |
20010037721 | Hasegawa et al. | Nov 2001 | A1 |
20010042087 | Kephart et al. | Nov 2001 | A1 |
20010049616 | Khuzadi et al. | Dec 2001 | A1 |
20010049636 | Hudda et al. | Dec 2001 | A1 |
20020019739 | Juneau et al. | Feb 2002 | A1 |
20020026388 | Roebuck | Feb 2002 | A1 |
20020029350 | Cooper et al. | Mar 2002 | A1 |
20020030689 | Eichel et al. | Mar 2002 | A1 |
20020038225 | Klasky et al. | Mar 2002 | A1 |
20020046243 | Morris et al. | Apr 2002 | A1 |
20020049617 | Lencki et al. | Apr 2002 | A1 |
20020059201 | Work | May 2002 | A1 |
20020065691 | Twig et al. | May 2002 | A1 |
20020065739 | Florance et al. | May 2002 | A1 |
20020070967 | Tanner et al. | Jun 2002 | A1 |
20020077901 | Katz | Jun 2002 | A1 |
20020078171 | Schneider | Jun 2002 | A1 |
20020087506 | Reddy | Jul 2002 | A1 |
20020090996 | Maehiro | Jul 2002 | A1 |
20020091556 | Fiala et al. | Jul 2002 | A1 |
20020097267 | Dinan et al. | Jul 2002 | A1 |
20020099693 | Kofsky | Jul 2002 | A1 |
20020103813 | Frigon | Aug 2002 | A1 |
20020103892 | Rieger, III | Aug 2002 | A1 |
20020124053 | Adams et al. | Sep 2002 | A1 |
20020130906 | Miyaki | Sep 2002 | A1 |
20020147638 | Banerjee et al. | Oct 2002 | A1 |
20020156782 | Rubert | Oct 2002 | A1 |
20020156917 | Nye | Oct 2002 | A1 |
20020169662 | Claiborne | Nov 2002 | A1 |
20020184496 | Mitchell et al. | Dec 2002 | A1 |
20030004802 | Callegari | Jan 2003 | A1 |
20030005035 | Rodgers | Jan 2003 | A1 |
20030018521 | Kraft et al. | Jan 2003 | A1 |
20030023489 | McGuire et al. | Jan 2003 | A1 |
20030023586 | Knorr | Jan 2003 | A1 |
20030033176 | Hancock | Feb 2003 | A1 |
20030061503 | Katz et al. | Mar 2003 | A1 |
20030063072 | Brandenberg et al. | Apr 2003 | A1 |
20030064705 | Desiderio | Apr 2003 | A1 |
20030069002 | Hunter et al. | Apr 2003 | A1 |
20030078897 | Florance et al. | Apr 2003 | A1 |
20030088520 | Bohrer et al. | May 2003 | A1 |
20030145093 | Oren et al. | Jul 2003 | A1 |
20030154213 | Ahn | Aug 2003 | A1 |
20030177019 | Santos et al. | Sep 2003 | A1 |
20030177192 | Umeki et al. | Sep 2003 | A1 |
20030200192 | Bell et al. | Oct 2003 | A1 |
20030218253 | Avanzino et al. | Nov 2003 | A1 |
20030220807 | Hoffman et al. | Nov 2003 | A1 |
20030222918 | Coulthard | Dec 2003 | A1 |
20030225632 | Tong et al. | Dec 2003 | A1 |
20040002871 | Geranio | Jan 2004 | A1 |
20040003283 | Goodman et al. | Jan 2004 | A1 |
20040021584 | Hartz et al. | Feb 2004 | A1 |
20040024846 | Randall et al. | Feb 2004 | A1 |
20040030525 | Robinson et al. | Feb 2004 | A1 |
20040030741 | Wolton et al. | Feb 2004 | A1 |
20040039581 | Wheeler | Feb 2004 | A1 |
20040054428 | Sheha et al. | Mar 2004 | A1 |
20040088177 | Travis et al. | May 2004 | A1 |
20040109012 | Kraus et al. | Jun 2004 | A1 |
20040111302 | Falk et al. | Jun 2004 | A1 |
20040128215 | Florance et al. | Jul 2004 | A1 |
20040135805 | Gottsacker et al. | Jul 2004 | A1 |
20040139049 | Hancock et al. | Jul 2004 | A1 |
20040148275 | Achlioptas | Jul 2004 | A1 |
20040153466 | Ziff et al. | Aug 2004 | A1 |
20040158488 | Johnson | Aug 2004 | A1 |
20040162064 | Himmelstein | Aug 2004 | A1 |
20040166878 | Erskine et al. | Aug 2004 | A1 |
20040167787 | Lynch et al. | Aug 2004 | A1 |
20040186766 | Fellenstein et al. | Sep 2004 | A1 |
20040215517 | Chen et al. | Oct 2004 | A1 |
20040215559 | Rebenack et al. | Oct 2004 | A1 |
20040217884 | Samadani et al. | Nov 2004 | A1 |
20040217980 | Radburn et al. | Nov 2004 | A1 |
20040220903 | Shah et al. | Nov 2004 | A1 |
20040220906 | Gargi et al. | Nov 2004 | A1 |
20040257340 | Jawerth | Dec 2004 | A1 |
20040260604 | Bedingfield, Sr. | Dec 2004 | A1 |
20050015488 | Bayyapu | Jan 2005 | A1 |
20050018177 | Rosenberg et al. | Jan 2005 | A1 |
20050021750 | Abrams | Jan 2005 | A1 |
20050027723 | Jones et al. | Feb 2005 | A1 |
20050034075 | Riegelman et al. | Feb 2005 | A1 |
20050044061 | Klemow | Feb 2005 | A1 |
20050049971 | Bettinger | Mar 2005 | A1 |
20050055353 | Marx et al. | Mar 2005 | A1 |
20050091027 | Zaher et al. | Apr 2005 | A1 |
20050096977 | Rossides | May 2005 | A1 |
20050097319 | Zhu et al. | May 2005 | A1 |
20050108520 | Yamamoto et al. | May 2005 | A1 |
20050114759 | Williams et al. | May 2005 | A1 |
20050114783 | Szeto | May 2005 | A1 |
20050120084 | Hu et al. | Jun 2005 | A1 |
20050131761 | Trika et al. | Jun 2005 | A1 |
20050137015 | Rogers et al. | Jun 2005 | A1 |
20050143174 | Goldman et al. | Jun 2005 | A1 |
20050149432 | Galey | Jul 2005 | A1 |
20050154639 | Zetmeir | Jul 2005 | A1 |
20050159970 | Buyukkokten et al. | Jul 2005 | A1 |
20050171799 | Hull et al. | Aug 2005 | A1 |
20050171832 | Hull et al. | Aug 2005 | A1 |
20050171954 | Hull et al. | Aug 2005 | A1 |
20050171955 | Hull et al. | Aug 2005 | A1 |
20050177385 | Hull et al. | Aug 2005 | A1 |
20050187823 | Howes | Aug 2005 | A1 |
20050192859 | Mertins et al. | Sep 2005 | A1 |
20050192912 | Bator et al. | Sep 2005 | A1 |
20050192999 | Cook et al. | Sep 2005 | A1 |
20050197775 | Smith | Sep 2005 | A1 |
20050197846 | Pezaris et al. | Sep 2005 | A1 |
20050198020 | Garland et al. | Sep 2005 | A1 |
20050198031 | Pezaris et al. | Sep 2005 | A1 |
20050198305 | Pezaris et al. | Sep 2005 | A1 |
20050203768 | Florance et al. | Sep 2005 | A1 |
20050203807 | Bezos et al. | Sep 2005 | A1 |
20050216186 | Dorfman et al. | Sep 2005 | A1 |
20050216300 | Appelman et al. | Sep 2005 | A1 |
20050216550 | Paseman et al. | Sep 2005 | A1 |
20050219044 | Douglass et al. | Oct 2005 | A1 |
20050235062 | Lunt et al. | Oct 2005 | A1 |
20050240580 | Zamir et al. | Oct 2005 | A1 |
20050251331 | Kreft | Nov 2005 | A1 |
20050256756 | Lam et al. | Nov 2005 | A1 |
20050259648 | Kodialam et al. | Nov 2005 | A1 |
20050273346 | Frost | Dec 2005 | A1 |
20050283497 | Nurminen et al. | Dec 2005 | A1 |
20050288957 | Eraker et al. | Dec 2005 | A1 |
20050288958 | Eraker et al. | Dec 2005 | A1 |
20050289650 | Kalogridis | Dec 2005 | A1 |
20060004680 | Robarts et al. | Jan 2006 | A1 |
20060004703 | Spivack et al. | Jan 2006 | A1 |
20060004734 | Malkin et al. | Jan 2006 | A1 |
20060022048 | Johnson | Feb 2006 | A1 |
20060023881 | Akiyama et al. | Feb 2006 | A1 |
20060026147 | Cone et al. | Feb 2006 | A1 |
20060036748 | Nusbaum et al. | Feb 2006 | A1 |
20060041543 | Achlioptas | Feb 2006 | A1 |
20060042483 | Work et al. | Mar 2006 | A1 |
20060048059 | Etkin | Mar 2006 | A1 |
20060052091 | Onyon et al. | Mar 2006 | A1 |
20060059023 | Mashinsky | Mar 2006 | A1 |
20060064431 | Kishore et al. | Mar 2006 | A1 |
20060075335 | Gloor | Apr 2006 | A1 |
20060080613 | Savant | Apr 2006 | A1 |
20060085419 | Rosen | Apr 2006 | A1 |
20060089882 | Shimansky | Apr 2006 | A1 |
20060113425 | Rader | Jun 2006 | A1 |
20060123053 | Scannell | Jun 2006 | A1 |
20060136127 | Coch et al. | Jun 2006 | A1 |
20060136419 | Brydon et al. | Jun 2006 | A1 |
20060143066 | Calabria | Jun 2006 | A1 |
20060143067 | Calabria | Jun 2006 | A1 |
20060143183 | Goldberg et al. | Jun 2006 | A1 |
20060149624 | Baluja et al. | Jul 2006 | A1 |
20060161599 | Rosen | Jul 2006 | A1 |
20060178972 | Jung et al. | Aug 2006 | A1 |
20060184578 | La Rotonda et al. | Aug 2006 | A1 |
20060184617 | Nicholas et al. | Aug 2006 | A1 |
20060184997 | La Rotonda et al. | Aug 2006 | A1 |
20060190279 | Heflin | Aug 2006 | A1 |
20060190281 | Kott et al. | Aug 2006 | A1 |
20060194186 | Nanda | Aug 2006 | A1 |
20060200311 | Arutunian et al. | Sep 2006 | A1 |
20060200384 | Arutunian et al. | Sep 2006 | A1 |
20060217885 | Crady et al. | Sep 2006 | A1 |
20060218225 | Hee Voon et al. | Sep 2006 | A1 |
20060218226 | Johnson et al. | Sep 2006 | A1 |
20060226281 | Walton | Oct 2006 | A1 |
20060229058 | Rosenberg | Oct 2006 | A1 |
20060229063 | Koch | Oct 2006 | A1 |
20060230061 | Sample et al. | Oct 2006 | A1 |
20060238383 | Kimchi et al. | Oct 2006 | A1 |
20060242139 | Butterfield et al. | Oct 2006 | A1 |
20060242178 | Butterfield et al. | Oct 2006 | A1 |
20060242581 | Manion et al. | Oct 2006 | A1 |
20060247940 | Zhu et al. | Nov 2006 | A1 |
20060248573 | Pannu et al. | Nov 2006 | A1 |
20060251292 | Gokturk et al. | Nov 2006 | A1 |
20060253491 | Gokturk et al. | Nov 2006 | A1 |
20060256008 | Rosenberg | Nov 2006 | A1 |
20060264209 | Atkinson et al. | Nov 2006 | A1 |
20060265277 | Yasinovsky et al. | Nov 2006 | A1 |
20060265417 | Amato et al. | Nov 2006 | A1 |
20060270421 | Phillips et al. | Nov 2006 | A1 |
20060293976 | Nam | Dec 2006 | A1 |
20070002057 | Danzig et al. | Jan 2007 | A1 |
20070003182 | Hunn | Jan 2007 | A1 |
20070005683 | Omidyar | Jan 2007 | A1 |
20070011148 | Burkey et al. | Jan 2007 | A1 |
20070011617 | Akagawa et al. | Jan 2007 | A1 |
20070016689 | Birch | Jan 2007 | A1 |
20070033064 | Abrahamsohn | Feb 2007 | A1 |
20070043947 | Mizikovsky et al. | Feb 2007 | A1 |
20070050360 | Hull et al. | Mar 2007 | A1 |
20070061405 | Keohane et al. | Mar 2007 | A1 |
20070078747 | Baack | Apr 2007 | A1 |
20070078772 | Dadd | Apr 2007 | A1 |
20070099609 | Cai | May 2007 | A1 |
20070105536 | Tingo | May 2007 | A1 |
20070106627 | Srivastava et al. | May 2007 | A1 |
20070112645 | Traynor et al. | May 2007 | A1 |
20070112729 | Wiseman et al. | May 2007 | A1 |
20070118525 | Svendsen | May 2007 | A1 |
20070150375 | Yang | Jun 2007 | A1 |
20070150603 | Crull et al. | Jun 2007 | A1 |
20070156429 | Godar | Jul 2007 | A1 |
20070159651 | Disario et al. | Jul 2007 | A1 |
20070162432 | Armstrong et al. | Jul 2007 | A1 |
20070162458 | Fasciano | Jul 2007 | A1 |
20070162547 | Ross | Jul 2007 | A1 |
20070162942 | Hamynen et al. | Jul 2007 | A1 |
20070167204 | Lyle et al. | Jul 2007 | A1 |
20070174389 | Armstrong et al. | Jul 2007 | A1 |
20070179905 | Buch et al. | Aug 2007 | A1 |
20070192299 | Zuckerberg et al. | Aug 2007 | A1 |
20070208613 | Backer | Sep 2007 | A1 |
20070208802 | Barman et al. | Sep 2007 | A1 |
20070208916 | Tomita | Sep 2007 | A1 |
20070214141 | Sittig et al. | Sep 2007 | A1 |
20070218900 | Abhyanker | Sep 2007 | A1 |
20070219659 | Abhyanker et al. | Sep 2007 | A1 |
20070219712 | Abhyanker | Sep 2007 | A1 |
20070220174 | Abhyanker | Sep 2007 | A1 |
20070226314 | Eick et al. | Sep 2007 | A1 |
20070233291 | Herde et al. | Oct 2007 | A1 |
20070233367 | Chen et al. | Oct 2007 | A1 |
20070233375 | Garg et al. | Oct 2007 | A1 |
20070233582 | Abhyanker | Oct 2007 | A1 |
20070239552 | Sundaresan | Oct 2007 | A1 |
20070245002 | Nguyen et al. | Oct 2007 | A1 |
20070250321 | Balusu | Oct 2007 | A1 |
20070250511 | Endler et al. | Oct 2007 | A1 |
20070255785 | Hayashi et al. | Nov 2007 | A1 |
20070255831 | Hayashi et al. | Nov 2007 | A1 |
20070259654 | Oijer | Nov 2007 | A1 |
20070260599 | McGuire et al. | Nov 2007 | A1 |
20070261071 | Lunt et al. | Nov 2007 | A1 |
20070266003 | Wong et al. | Nov 2007 | A1 |
20070266097 | Harik et al. | Nov 2007 | A1 |
20070266118 | Wilkins | Nov 2007 | A1 |
20070273558 | Smith et al. | Nov 2007 | A1 |
20070281689 | Altman et al. | Dec 2007 | A1 |
20070282987 | Fischer et al. | Dec 2007 | A1 |
20070288621 | Gundu et al. | Dec 2007 | A1 |
20070294357 | Antoine | Dec 2007 | A1 |
20080005076 | Payne et al. | Jan 2008 | A1 |
20080005231 | Kelley et al. | Jan 2008 | A1 |
20080010343 | Escaffi et al. | Jan 2008 | A1 |
20080020814 | Kernene | Jan 2008 | A1 |
20080032666 | Hughes et al. | Feb 2008 | A1 |
20080032703 | Krumm et al. | Feb 2008 | A1 |
20080033739 | Zuckerberg et al. | Feb 2008 | A1 |
20080033776 | Marchese | Feb 2008 | A1 |
20080040370 | Bosworth et al. | Feb 2008 | A1 |
20080040428 | Wei et al. | Feb 2008 | A1 |
20080040474 | Zuckerberg et al. | Feb 2008 | A1 |
20080040475 | Bosworth et al. | Feb 2008 | A1 |
20080040673 | Zuckerberg et al. | Feb 2008 | A1 |
20080046976 | Zuckerberg | Feb 2008 | A1 |
20080048065 | Kuntz | Feb 2008 | A1 |
20080051932 | Jermyn et al. | Feb 2008 | A1 |
20080059992 | Amidon et al. | Mar 2008 | A1 |
20080065611 | Hepworth et al. | Mar 2008 | A1 |
20080070593 | Altman et al. | Mar 2008 | A1 |
20080070697 | Robinson et al. | Mar 2008 | A1 |
20080071929 | Motte et al. | Mar 2008 | A1 |
20080077581 | Drayer et al. | Mar 2008 | A1 |
20080077642 | Carbone et al. | Mar 2008 | A1 |
20080086368 | Bauman et al. | Apr 2008 | A1 |
20080086458 | Robinson et al. | Apr 2008 | A1 |
20080091723 | Zuckerberg et al. | Apr 2008 | A1 |
20080097999 | Horan | Apr 2008 | A1 |
20080104227 | Birnie et al. | May 2008 | A1 |
20080115082 | Simmons et al. | May 2008 | A1 |
20080115226 | Welingkar et al. | May 2008 | A1 |
20080117928 | Abhyanker | May 2008 | A1 |
20080126355 | Rowley | May 2008 | A1 |
20080126411 | Zhuang et al. | May 2008 | A1 |
20080126476 | Nicholas et al. | May 2008 | A1 |
20080126478 | Ferguson et al. | May 2008 | A1 |
20080133495 | Fischer | Jun 2008 | A1 |
20080133649 | Pennington | Jun 2008 | A1 |
20080134035 | Pennington et al. | Jun 2008 | A1 |
20080148156 | Brewer et al. | Jun 2008 | A1 |
20080154733 | Wolfe | Jun 2008 | A1 |
20080155019 | Wallace et al. | Jun 2008 | A1 |
20080162211 | Addington | Jul 2008 | A1 |
20080162260 | Rohan et al. | Jul 2008 | A1 |
20080168068 | Hutheesing | Jul 2008 | A1 |
20080168175 | Tran | Jul 2008 | A1 |
20080172173 | Chang et al. | Jul 2008 | A1 |
20080172288 | Pilskalns et al. | Jul 2008 | A1 |
20080189292 | Stremel et al. | Aug 2008 | A1 |
20080189380 | Bosworth et al. | Aug 2008 | A1 |
20080189768 | Callahan et al. | Aug 2008 | A1 |
20080195483 | Moore | Aug 2008 | A1 |
20080201156 | Abhyanker | Aug 2008 | A1 |
20080208956 | Spiridellis et al. | Aug 2008 | A1 |
20080215994 | Harrison et al. | Sep 2008 | A1 |
20080221846 | Aggarwal et al. | Sep 2008 | A1 |
20080221984 | Abhyanker | Sep 2008 | A1 |
20080222140 | Lagad et al. | Sep 2008 | A1 |
20080222308 | Abhyanker | Sep 2008 | A1 |
20080228719 | Abhyanker et al. | Sep 2008 | A1 |
20080228775 | Abhyanker et al. | Sep 2008 | A1 |
20080229424 | Harris et al. | Sep 2008 | A1 |
20080231630 | Shenkar et al. | Sep 2008 | A1 |
20080240397 | Abhyanker | Oct 2008 | A1 |
20080242317 | Abhyanker | Oct 2008 | A1 |
20080243598 | Abhyanker | Oct 2008 | A1 |
20080243667 | Lecomte | Oct 2008 | A1 |
20080250025 | Abhyanker | Oct 2008 | A1 |
20080255759 | Abhyanker | Oct 2008 | A1 |
20080263460 | Altberg et al. | Oct 2008 | A1 |
20080270158 | Abhyanker | Oct 2008 | A1 |
20080270945 | Abhyanker | Oct 2008 | A1 |
20080281854 | Abhyanker | Nov 2008 | A1 |
20080284587 | Saigh et al. | Nov 2008 | A1 |
20080288277 | Fasciano | Nov 2008 | A1 |
20080288612 | Kwon | Nov 2008 | A1 |
20080294678 | Gorman et al. | Nov 2008 | A1 |
20080294747 | Abhyanker | Nov 2008 | A1 |
20080300979 | Abhyanker | Dec 2008 | A1 |
20080301565 | Abhyanker | Dec 2008 | A1 |
20080306754 | Abhyanker | Dec 2008 | A1 |
20080307053 | Mitnick et al. | Dec 2008 | A1 |
20080307066 | Amidon et al. | Dec 2008 | A1 |
20080307320 | Payne et al. | Dec 2008 | A1 |
20080319778 | Abhyanker | Dec 2008 | A1 |
20080319806 | Abhyanker | Dec 2008 | A1 |
20090003265 | Agarwal et al. | Jan 2009 | A1 |
20090006177 | Beaver et al. | Jan 2009 | A1 |
20090006473 | Elliott et al. | Jan 2009 | A1 |
20090007195 | Beyabani | Jan 2009 | A1 |
20090015582 | Abhyanker | Jan 2009 | A1 |
20090018850 | Abhyanker | Jan 2009 | A1 |
20090018925 | Abhyanker | Jan 2009 | A1 |
20090019004 | Abhyanker | Jan 2009 | A1 |
20090019085 | Abhyanker | Jan 2009 | A1 |
20090019122 | Abhyanker | Jan 2009 | A1 |
20090019366 | Abhyanker | Jan 2009 | A1 |
20090019373 | Abhyanker | Jan 2009 | A1 |
20090024740 | Abhyanker | Jan 2009 | A1 |
20090030927 | Cases et al. | Jan 2009 | A1 |
20090031006 | Johnson | Jan 2009 | A1 |
20090031245 | Brezina et al. | Jan 2009 | A1 |
20090031301 | D'Angelo et al. | Jan 2009 | A1 |
20090043650 | Abhyanker et al. | Feb 2009 | A1 |
20090044254 | Tian | Feb 2009 | A1 |
20090048922 | Morgenstern et al. | Feb 2009 | A1 |
20090049070 | Steinberg | Feb 2009 | A1 |
20090049127 | Juan et al. | Feb 2009 | A1 |
20090061883 | Abhyanker | Mar 2009 | A1 |
20090061902 | Abhyanker | Mar 2009 | A1 |
20090063252 | Abhyanker | Mar 2009 | A1 |
20090063467 | Abhyanker | Mar 2009 | A1 |
20090063500 | Zhai et al. | Mar 2009 | A1 |
20090063565 | Abhyanker | Mar 2009 | A1 |
20090064011 | Abhyanker | Mar 2009 | A1 |
20090064144 | Abhyanker | Mar 2009 | A1 |
20090069034 | Abhyanker | Mar 2009 | A1 |
20090070435 | Abhyanker | Mar 2009 | A1 |
20090102644 | Hayden | Apr 2009 | A1 |
20090171950 | Lunenfeld | Jul 2009 | A1 |
20090247116 | Sennett et al. | Oct 2009 | A1 |
20090254971 | Herz et al. | Oct 2009 | A1 |
20090284530 | Lester et al. | Nov 2009 | A1 |
20100011081 | Crowley et al. | Jan 2010 | A1 |
20100024045 | Sastry et al. | Jan 2010 | A1 |
20100051740 | Yoeli | Mar 2010 | A1 |
20100057555 | Butterfield et al. | Mar 2010 | A1 |
20100083125 | Zafar et al. | Apr 2010 | A1 |
20100106731 | Cartmell et al. | Apr 2010 | A1 |
20100108801 | Olm et al. | May 2010 | A1 |
20100243794 | Jermyn | Sep 2010 | A1 |
20100279656 | Hazzani | Nov 2010 | A1 |
20110001020 | Forgac | Jan 2011 | A1 |
20110060640 | Thompson et al. | Mar 2011 | A1 |
20110066648 | Abhyanker et al. | Mar 2011 | A1 |
20110093340 | Kramer et al. | Apr 2011 | A1 |
20110174920 | Yoeli | Jul 2011 | A1 |
20110184643 | Abhyanker | Jul 2011 | A1 |
20110191181 | Blackhurst et al. | Aug 2011 | A1 |
20110218864 | Pentz et al. | Sep 2011 | A1 |
20110219318 | Abhyanker | Sep 2011 | A1 |
20110221657 | Haddick et al. | Sep 2011 | A1 |
20110291851 | Whisenant | Dec 2011 | A1 |
20120123667 | Gueziec | May 2012 | A1 |
20120138732 | Olm et al. | Jun 2012 | A1 |
20120166935 | Abhyanker | Jun 2012 | A1 |
20120232958 | Silbert | Sep 2012 | A1 |
20120254774 | Patton | Oct 2012 | A1 |
20130041761 | Voda | Feb 2013 | A1 |
20130054317 | Abhyanker | Feb 2013 | A1 |
20130068876 | Radu | Mar 2013 | A1 |
20130072114 | Abhyanker | Mar 2013 | A1 |
20130073375 | Abhyanker | Mar 2013 | A1 |
20130080217 | Abhyanker | Mar 2013 | A1 |
20130105635 | Alzu'bi et al. | May 2013 | A1 |
20130110930 | Moon et al. | May 2013 | A1 |
20130159127 | Myslinski | Jun 2013 | A1 |
20130183924 | Saigh et al. | Jul 2013 | A1 |
20130297589 | Work et al. | Nov 2013 | A1 |
20130317999 | Zimberoff et al. | Nov 2013 | A1 |
20140032034 | Raptopoulos et al. | Jan 2014 | A1 |
20140067167 | Levien et al. | Mar 2014 | A1 |
20140108540 | Crawford | Apr 2014 | A1 |
20140222908 | Park et al. | Aug 2014 | A1 |
20140254896 | Zhou et al. | Sep 2014 | A1 |
20140277834 | Levien et al. | Sep 2014 | A1 |
Number | Date | Country |
---|---|---|
1426876 | Jun 2004 | EP |
101069834 | Oct 2010 | KR |
1020120121376 | Jul 2012 | KR |
2006020471 | Feb 2006 | WO |
2007113844 | Oct 2007 | WO |
2008105766 | Sep 2008 | WO |
2011106443 | Sep 2011 | WO |
2014121145 | Aug 2014 | WO |
Entry |
---|
“Friends and Neighbors on the Web”, 2001 by Lada A. Adamic et al. (pp. 9) http://www.hpl.hp.com/research/idl/papers/web10/fnn2.pdf. |
“A social influence model of consumer participation in network- and small-group-based virtual communities”, International Journal of Research in Marketing, 2004 by Utpal M, Dholakia et al. (pp. 23) http://www-bcf.usc.edu/˜douglast/620/bettina1.pdf. |
“BuzzMaps: a prototype social proxy for predictive utility”, ACM Digital Library, 2003 by Azzari Caillier Jarrett et al. (Pages) http://dl.acm.org/citation.cfm?id=948547&dl=ACM&coll=DL&CFID=456946313&CFTOKEN=50139062. |
“Direct Annotation: A Drag-and-Drop Strategy for Labeling Photos”, University of Maryland, 2000 by Ben Shneiderman et al. (pp. 8) http://hci12.cs.umd.edu/trs/2000-06/2000-06.pdf. |
“Notification for Shared Annotation of Digital Documents”, Technical Report Msr—TR-2001-87, Sep. 19, 2001 by A. J. Bernheim Brush et al. (pp. 9) http://research.microsoft.com/pubs/69880/tr-2001-87.pdf. |
“HT06, Tagging Paper, Taxonomy, Flickr, Academic Article, ToRead”, Yahoo Research Berkeley, CA, 2006 by Cameron Marlow et al. (pp. 9) http://www.danah.org/papers/Hypertext2006.pdf. |
“Computer Systems and the Design of Organizational Interaction”, by Fernando Flores et al. (pp. 20) http://cpe.njit.edu/dlnotes/CIS/CIS735/ComputerSystemsandDesign.pdf. |
“ChipIn—the easy way to collect money”, Louis' Really Useful Finds, Mar. 12. (p. 1) http://reallyusefulthings.tumblr.com/post/28688782/chipin-the-easy-way-to-collect-money. |
Number | Date | Country | |
---|---|---|---|
20140087780 A1 | Mar 2014 | US |
Number | Date | Country | |
---|---|---|---|
60783226 | Mar 2006 | US | |
60817470 | Jun 2006 | US | |
60853499 | Oct 2006 | US | |
60854230 | Oct 2006 | US | |
61526693 | Aug 2011 | US | |
61894443 | Oct 2013 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 11603442 | Nov 2006 | US |
Child | 14089779 | US | |
Parent | 11653194 | Jan 2007 | US |
Child | 11603442 | US | |
Parent | 11731465 | Mar 2007 | US |
Child | 11653194 | US | |
Parent | 11827400 | Jul 2007 | US |
Child | 11731465 | US | |
Parent | 11827774 | Jul 2007 | US |
Child | 11827400 | US | |
Parent | 13236964 | Sep 2011 | US |
Child | 11827774 | US | |
Parent | 13242303 | Sep 2011 | US |
Child | 13236964 | US | |
Parent | 13272245 | Oct 2011 | US |
Child | 13242303 | US | |
Parent | 14079611 | Nov 2013 | US |
Child | 13272245 | US |