Several key internet applications have become increasingly popular in recent years. A current trend in internet usage involves social networking. Social networking involves making use of internet services which allow for the interaction and sharing of information between users of service.
Recently, mobile wireless communication standards have progressed to the point where relatively high speed data connections are possible to the phone over the wireless wide area network (WWAN). These standards include 1×EV-DO, HSDPA, EDGE, GPRS, Wi-Max (IEEE802.16e) and the like. Some social networking sites have included interfaces to their web sites optimized to make use of such high data rate mobile services for use on a mobile phone. These services are referred to as mobile social networking. For the most part, these services are simply versions of the standard social networking, redesigned to be usable on a mobile phone, adding little in the way of increased capability.
With the common capability of global positioning system (GPS) receivers being incorporated into phones, some additional capabilities have been added to some mobile social networking interfaces by incorporating location information for the user and that of the individual they interact with.
These services are utilizing GPS to determine the location of one mobile wireless user and to another to facilitate mobile social networking. An example of an existing application utilizing this approach is Loopt (www.loopt.com), which coordinates location based social interaction. One problem with GPS based mobile application involves the GPS receiver not receiving sufficient signal strength in many indoor locations. As a result these enhanced capabilities have typically been targeted at either navigation to a specified location, or as in the case with Loopt, allowing a user to see where their friends are located in a relatively large geographic location, on a map.
Another popular application for the internet is electronic commerce. Just as with social network, e-commerce services have provided interfaces optimized for use on mobile phones which provide basically the same capabilities as the standard interfaces. Very little location or proximity information has been used to enhance the mobile e-commerce experience.
Some attempts have been made to utilize RFID (Radio Frequency Identification) chips to perform mobile payments. This approach requires the additional hardware on a phone in the form of a RFID chip, or other specialized features. As a result, mobile electronic commerce has mostly allowed users to perform transaction with a remote party, such as purchasing an item on ebay (www.ebay.com). To date mobile electronic payments for individuals who are in close proximity to each other have not been practical for a number of reasons. First there is a need for the individuals to have a third trusted party to help facilitate the electronic transaction. Secondly, there needs to be a convenient, electronically secure, personally secure and anonymous method for each of the individuals to specify the party with which they wish to engage in a transaction. Thirdly, there is a need to cross validate the identities of the individuals engaged in the transaction. Finally, this method must work in indoors locations.
Most mobile phones on the market today support at least two wireless standards; one for the cellular wireless wide area network connection (WWAN) and one for a wireless personal or local area network (WPAN, WLAN). The cellular connection or WWAN is utilized for voice and data and can adhere to many different standards such as CDMA (IS-2000), GSM, W-CDMA, WiMax, etc. The WPAN or WLAN connection is typically for short range communications and is often used for wireless hands free devices, such as headsets, peripherals, or higher speed internet connections. The typical standards used for the sort range wireless communications include Bluetooth, Wi-Fi, and in some cases Ultra-Wide-B and (UWB).
In another approach to mobile social networking some services have attempted to utilize short range wireless capabilities often available on phones such as IEEE802.11 (Wi-Fi) or Bluetooth to facilitate peer to peer communications. These are also referred to a MANETs or Mobile Ad-hoc Networks. These services typically consist of a software application operating on a mobile phone using peer to peer networks to facilitate communication between wireless devices. Examples of such existing applications include Mobile-Cheddar, Peer-2-Me, and Flobbi. Published US Patent application US 2008/0182591 A1 filed Dec. 13, 2007 describes one such peer to peer approach. One issue with these approaches is that one can not communicate with a peer once the devices are no longer in proximity. A further disadvantage is that all information to be exchanged must be stored locally on each of the peer devices as the communication occurs directly between the two devices and any policy for the delivery of locally stored content is difficult to enforce without the potential for fraud such as spoofing identities between the peers. Such fraud may lead to concerns of personal safety or privacy allowing the identity of an individual to be determined when it is not desired. Further this peer to peer model is inadequate for mobile electronic commerce in part due to the lack of an independent third party to facilitate the services required for a secure proximity based mobile electronic transaction as previously mentioned.
The present invention is generally concerned with facilitating the exchange of information and transactions between two entities associated with two wireless devices when the devices are in close proximity to each other utilizing both a short range and a long range wireless capability.
Preferred embodiments of the present invention are generally concerned with facilitating the exchange of information and transactions between two entities associated with two wireless devices when the devices are in close proximity to each other. In one embodiment, this can be accomplished by a first device using a first short range wireless capability to detect an identifier transmitted from a second device in proximity to the first device, ideally using existing short range radio communication standard capabilities such as Bluetooth (IEEE802.15.1-2002) or Wi-Fi (IEEE802.11). The detected identifier, being associated with the device, is also associated with an entity. Rather than directly exchanging application data flow between the two devices using the short range wireless capability, a second wireless capability then allows for one or more of the devices to communicate with a central server via the internet, and perform an exchange of application data flow. By using a central server to draw on stored information and content associated with the entity or entities, the server can broker the exchange of information between the entities and the devices. In a preferred embodiment, this exchange may be comprised of information stored on the server associated with a detected entity, and it may be comprised of information received from the detected device via the second wireless capability and facilitated by the server.
In addition, the server can also allow for a brokering service, ideally independent of the entities, to enable the application of policy based on the identity of the two entities for the disclosure of stored information associated with the entities, the flow in information between the devices and the entities, and the enablement of procedures such as security verification between the entities.
Applications running on a device may also interact with the server to perform various functions, for example retrieving information associated with an entity or device, by utilizing a detected identifier. Such information may include stored content associated with the entity's account record such as music, pictures, links to social networking sites, instant messaging addresses, advertising content, and even executable scripts or application such as in AJAX. An example of such an application may include the detection of a device's identifier in a fixed location allowing for tour guide like information to be provided for that location.
As the server may be running applications which perform more function than just the retrieval of content, a pre-defined interaction process may also be applied by the server to the devices such as allowing the approval to share private content with the entity associated with the detected device. This process may eventually allow or disallow the sharing of information and to facilitate the interacting with another entity.
As a more complex example, in other embodiments, the devices may utilize the server as a third party to provide for new capabilities such as a secure three way e-commerce transaction between two entities. In this more complex process, the server may require confirmation of each party's identity with visual cross verification of the parties using pictures or other unique identifiers. The server may use this visual cross verification in conjunction with detecting that the individuals are in proximity with each other. The server may verify the proximity using GPS or using the peer to peer detection process in another embodiment. Further, the server may facilitate a process requiring each party to perform a step by step confirmation during the transaction including the stages of: the request for purchase, the payment, the receipt of goods and services, and the providing of payment receipt.
This differs from the approaches employed by prior art location aware mobile social networking techniques in that no GPS is needed to determine when one device is in proximity to another. Many wireless devices in use are not GPS-capable, and even when they are, GPS will often not operate indoors or where the GPS signal is weak. Using a peer to peer detection process to locate nearby devices allows for the operation of proximity detection indoors.
Preferred embodiments of the present invention can also differ from known peer to peer based social networking in that the information flow between the devices running the applications are over the wide area network via a central server, rather than carried over the peer to peer network itself. An example of this is a service called Flobbi, as discussed previously, where community members can identify each other via Bluetooth transmissions, then interact with chat. The messaging in this case is carried over Bluetooth itself. A distinction from such peer to peer approaches is the use of a central server to “broker” the transactions between peers, enhancing the ability to manage security and information disclosure. Such use allows for the opportunity to customize delivered content to include elements such as advertising or other content customized to the recipient based on additional information such as known personal purchasing history, or interests.
A further distinction of the preferred embodiment is the use of a central server to determine identities of detected peer devices, which additionally allows for secure and fraud resistant application of policies for the disclosure of information and content. An issue with the existing pure peer to peer approaches is that they are not capable of enforcing policy associated with the disclosure of information to unknown entities in a secure and fraud resistant manor. One reason for this is that information related to a user's device must be disclosed in the process of detection in the form of a static identifier. By the nature of the identifier, it must be static or peers would not be able to directly determine the identity of a friend over time with the information stored on their device. By using a central server, the system may coordinate the change of the identifiers from time to time such that the disclosure of an identifier by one device to another does not compromise the identity of the device. In this case the identifier may be assigned from a central server and such server coordinate the identifier's change from time to time.
Reliance on a central server also allows the secure and fraud resistant application of disclosure policy. Such policy might include the verification of the identity of the party to which information (identity and presence for instance) or content (pictures of the account owner) is to be provided. Such verification is performed in an anonymous way such that in the process of verifying information associated with each party, no personal information is disclosed between the parties prior to satisfaction of some pre-set policy such as inclusion on a friend list or belonging to a specific group or organization. Another important policy required for such services would be the determination of any past negative feed back ratings by other past peers for behavior for the particular user to which the information is to be provided. An individual with significant poor ratings having detected a peer, may be denied access to personal information or even notification of arrival of the detected peer based on the server policy setting by the detected peer or the server in general.
A further distinction is to enable electronic payments for individuals who are in close proximity to each other. The central server can act as a third trusted party to help facilitate the electronic transaction between the individuals. Secondly, the server allows for a convenient, electronically secure, personally secure and anonymous method for each of the individuals to specify the party with which they wish to engage in a transaction. Thirdly, participants in a transaction can cross validate the identities of the individuals engaged in the transaction. Finally, because this method is proximity based it will also work indoors or in other situations where GPS location information is not available.
The foregoing will be apparent from the following more particular description of example embodiments of the invention, as illustrated in the accompanying drawings in which like reference characters refer to the same parts throughout the different views. The drawings are not necessarily to scale, emphasis instead being placed upon illustrating embodiments of the present invention.
A description of example embodiments of the invention follows.
The teachings of all patents, published applications and references cited herein are incorporated by reference in their entirety.
Referring to
Devices 106, 108 can be considered “client(s)” of the server 100. The clients 106, 108 and server 100 provide processing, storage, and input/output devices for executing wireless system protocols, interfaces, and application level programs according to the invention. Client devices 106, 108 can also be linked through various communications networks to other computing devices, including other client devices/processes and other server computer(s). Communications network(s) providing the connection 101 can typically be part of a remote access network, a global network (e.g., the Internet), a worldwide collection of computers, Local area or Wide area networks, and gateways that currently use respective protocols (TCP/IP, 3G Wireless, Bluetooth, etc.). Other electronic device/computer network architectures are suitable.
The internal structure of devices 106, 108 or server 100 includes one or more data processors (not shown in detail) that are well known in the art to include a system bus for data transfer among the other internal components of a computer system (e.g., processor, disk storage, memory, input/output ports, network ports, etc.). Attached to the bus are other input/output devices (e.g., keyboard, mouse, displays, printers, speakers, network interfaces, etc.). Network interfaces allow the computer to connect to various other devices attached to a network. Memory provides volatile storage for computer software instructions and data used to implement an embodiment of the present invention (e.g., applications programs and the like). Disk storage can provide non-volatile storage for computer software instructions and data used to implement an embodiment of the present invention.
In one embodiment, the invention may include a computer program product including a computer readable medium (e.g., a removable storage medium such as one or more DVD-ROM's, CD-ROM's, diskettes, tapes, etc.) that provides at least a portion of the software instructions for the invention system. Computer program product can be installed by any suitable software installation procedure, as is well known in the art. In another embodiment, at least a portion of the software instructions may also be downloaded over a cable, communication and/or wireless connection. In other embodiments, the invention programs are a computer program propagated signal product 107 embodied on a propagated signal on a propagation medium (e.g., a radio wave, an infrared wave, a laser wave, a sound wave, or an electrical wave propagated over a global network such as the Internet, or other network(s)). Such carrier medium or signals provide at least a portion of the software instructions for the present invention.
More particularly, a given device 106, 108 uses a short range wireless link 107 such as a Bluetooth (IEEE802.15.1) or Wi-Fi (IEEE802.11) link to detect the presence of other devices such as device 108, and uses the wide area wireless network connections 103, 104 such as IS-2000, WCDMA, GPRS, EDGE, LTE, Wi-Max (IEEE802.16), or the like to perform communications to central server 100, and to perform the actual substantive communications between the wireless devices 106 and 108. Device 108 typically uses the short range wireless link 107 and wide area wireless link 103 in a similar manner to locate and initiate communicate with device 106. One distinction relative to prior art is that the short range wireless 107 is only used for the detection process, or to advertise a device's presence. In this embodiment, specific information called “wireless identifier” or simply “identify” (described in more detail below) is passed between devices 106 and 108 over the short range link 107. By transmitting a wireless identifier using the short range Wi-Fi, Bluetooth or other short range wireless link 107 and receiving wireless identifiers from other devices, this short range wireless link 107 will allow for a proximity detection process.
The support for IP based networking is standard for WWAN or 3G connections such as 1×EV-DO or HSPA, and as a result, communication between one device to another using the WWAN is currently supported in many devices with no modification. The use of simple detection of one or more identifiers requires significantly less resources in a phone than performing a complete peer to peer based communication network protocol, which accommodates dynamic configuration of nodes being added and dropped continuously. It is noted that the IP address on the WWAN interface is not location dependent in the present embodiment, but is addressing approaches are location dependent when true Peer to Peer topologies are used. The present embodiment has the advantage that communication between two devices may continue after the devices have left proximity of each other, but in the same manner as they had been communicating previously. As a result, a user who detects a short range transmission of an identifier, then begins a conversation or some other interaction with that device via the wireless wide area network may continue that conversation even in the case where the two devices move out of the proximity of the each other, and are no longer within the reception range of the short range wireless communication protocol. Further, since it is contemplated that the wireless identifiers transmitted on the short range wireless link from the devices would occasionally change, for security reasons, the present embodiment has the advantage that ongoing communications between mobile devices will not be interrupted despite a change in one of the device's identifier. In the case where the identifier is a MAC address of the short range wireless network adapter for one of the devices, it is not otherwise possible to change this address and easily maintain on going communications in a true peer to peer topology.
Referring to
An example of an application using this infrastructure follows. The device 204 will simply broadcast an identifier, with no WWAN connection but may facilitate advertising or local information. For instance, an account associated with one or more identifiers may belong to a museum. As a museum patron walks to an exhibit, the patron's device 202 will receive an identifier sent from museum broadcast device 204 operated by the museum. The patron device 202 passes the identifier or museum device 204 to the central server 100, which in-turn recognizes it as being associated with that exhibit within that museum and passes relevant information back to the user's device 202. A distinguishing feature of this approach relative to prior art is that the patron device 202 in this example may move out of proximity of broadcast device 204, yet continue to view the content being provided by the server 100 related to the detected broadcast device 204. Content may include text, pictures, web pages, application software such as games, informative display applications, or other content such as audio or video to be offered to the user's device as well. Other examples might include electronic coupons (such as in a grocery store), menus or special offers in a restaurant.
Assuming there are identifiers which are new to the device, the device will pass along a list of currently detected identifiers and request 305 that the server return information related to any other local device. The server will return the information related to any identifier that meets certain policy requirements. For instance, information is returned which is 1) relevant to that device, and 2) that the device is authorized to receive.
As an example of the overall process, a detected identifier may be relevant to the receiving device if the user associated with the detected identifier is listed in a “friends list” for the owner of the receiving device. If the identifiers for the individuals within the friends list have been passed to the device, the action function 303 may make this determination. In the preferred embodiment, the server would determine the identity and the relevance of the detected identifiers, and the action function 303 would work to reduce frequency of re-requests to the server.
To enable server 100 to associate an identifier with an entity, each device or entity (such as the museum) associated with an identifier has an account on server 100 or a related server as is common in information technology. The account is associated with the entity and the device and the current identifier.
As used herein, an “entity” may be a legal entity, such as an individual person or a business.
An “object” is intended to include a physical thing, such as a product that is being offered for sale, and may include a tangible article or intangible such as an electronic music or video file or photograph.
There is various information associated with each account. An example data record for an account is shown in
There can also be policy based permissions associated with each account and applied to any information associated with that account. The stored policy permissions can be used to determine what information and under which situations information may be disclosed to another device or user associated with another account. For example, the entity (person in this case) associated with device 202 may have set a policy in their account to not receive any unsolicited information from a broadcast device so as to not be disturbed. However, the person associated with 202 may see the broadcast device and a sign stating a discount is available, and provide input to their device to request any broadcast information on a one time exception basis. The messaging associated with an example mobile and broadcast device process will be described in more detail to follow associated with
As already mentioned above, in step 301 of
The identifiers themselves may be a hardware address such as the MAC address of the wireless device, or they may be another label such as the SSID for a IEEE802.11 device, or the device name for a Bluetooth device. Referring to
In one embodiment the BD_ADDR or MAC address of the Bluetooth device can be used as the Identifier and no further Bluetooth interaction is required until the next scan process is performed.
In another embodiment, the Bluetooth “Device Name” is used as the identifier.
The transmitted identifiers associated with any given device are only known to the central server and the device transmitting the identifiers. These identifiers may change from time to time, making a user's or a device's identity anonymous over time. The central server and any particular device must be coordinated such that the identifier and any device transmitting it, remains identifiable by the central server. This process is coordinated between the wireless device, and the central server utilizing the WWAN or cellular data link, carrying messaging between them and using an identifier manager 1303 to maintain a list of device identifiers 1302 in a central but secure location. This is shown in more detail in
Referring to
Chat Example Between Two Mobile Devices
E-Commerce Between Two Mobile Devices
The customer, having an account enabled with electronic payments, and wanting an item the vendor has, would press a button or make other input to his phone (or other device) which would indicate they would like to make a purchase and pay using their device (808). In this case the input selection would be “search for merchants.” The customer's device would then send a message (809) to the central server directing the server to perform a one time search for merchants, despite the current account settings. In one embodiment, the server would then direct the consumer's device 802 to initiate another search (809). Other embodiments may not include the server commanding Device 1 (802) to perform the search, but rather the search may be performed automatically, or use results from a recent search. In Step 811, Device 1 (802) performs another search and detects the identifier from Device 2 (803), DI2. Device 1 then sends a message 812 to the server again requesting information for all relevant devices detected, which will include at least DI2. In Step 813 the server, having received the request and list including DI2, looks up account information associated with DI2 and determines that the associated entity is a merchant. As the settings of the account associated Device 1 now allow for the notification of the user when a merchant is detected in proximity, DI2 is determined to be relevant to Device 1 and the Entity 1 (EI1) should be notified. The server then sends a message 814 to Device 1 (802) stating merchant services are available in proximity with a list of available merchant's information including information related to the entity (EI2). The user of device 1, Entity 1 (EI1) then provides input in step 815, (pressing a soft key on a touch screen for instance), selecting the specific merchant EI2 to engage with in a transaction. Device 1 (802) will then send a message (816) to the server requesting a transaction with EI2 associated with Device 2 (803). The server (801) will then respond in this embodiment with a message 817 to Device 1 confirming receipt of the requested transaction and providing information to allow the EI1 associated with Device 1 to independently confirm the identity of EI2 associated with Device 2 (803). In this embodiment the identifying information can include the name of the merchant, the merchant's logo, a picture of the vendor, or their mobile shopping cart. In other embodiments, the picture may be of a specific unattended vending machine in the location it is currently operating. It may also include other information such as the address of the merchant in cases where a fixed store location is provided. As this particular merchant in this example is a street vendor, an address may not be used. GPS information stored in the account associated with Device 2 may be used as further confirmation in some instances. However, in this example, GPS coordinates are not be available on Device 2 due to lack of capability, or Device 2 being indoors and without sufficient signal to determine a location. Further GPS information from Device 1 (802) may be used to provide further confirmation information. In this embodiment the photograph sent in message 817 shows a picture of the particular merchant and also his city issued business license in text and as a picture of where it is displayed on the cart. The consumer entity EI1 provides input to Device 1 in step 818 confirming the identity of EI2, the merchant entity associated with Device 2 (803). Device 1 then sends a message 819 to the server 801 confirming the identity of the merchant.
Server 801 then sends a message 820 to the merchant's device 803 notifying them of the request for a transaction with EI1. Device 2 (803) then indicates to the merchant that a customer with the capability and desire to pay electronically is in proximity. In step 821 the customer associated with Device 1 (802) places an order with the merchant associated with Device 2 (803) and a list of products to be purchased is generated and the merchant provides input to Device 2 (803) to proceed with a electronic transaction. In step 822 Device 2 performs a scan of identifiers and DI1 associated with device 1 (802) and the Consumer is detected. A request is sent to the server 801 with a list of identifiers which were detected to determine if any of them are relevant to the merchant. Note that while the merchant device 803, (and the merchant) have now been notified of the desire for EI1 to enter a transaction, they do not necessarily know the identifier for EI1 yet. In other embodiments, the identifier associated with EI1 and Device 1 (802) may be sent in message 819, and a confirmation that this identifier is detected during the scan process 821 may be performed at the device. In the preferred embodiment, further security may be provided by the having the server perform this function independently. The server performs this confirmation in step 824 may matching the device 1 identifier DI1 with the information stored in the account associated with Entity 1 (EI1) also referred to as the Consumer.
The server than generates a message 825 to Device 2 (803) indicating that Ell is relevant, and the transaction participant is present. The message in the preferred embodiment can also include a picture of the Consumer. Additionally, the message could also include other pictures of other individuals allowed to use this device for purchases. If more than one identifier was detected in step 822 and matched in step 824 to entities having requested transactions previously which are pending for that merchant, a list of information for each entity involved with a pending transaction request can be provided in message 825. The merchant then selects the correct consumer using the picture of that consumer, confirming the identity of the part to the transaction in step 826. The consumer information provided in message 825 in another embodiment may simply be the name of the customer and the merchant may either ask their name, or request identification such as a driver's license. In the preferred embodiment, where a picture is passed in message 825, it is not necessary that the individual's name be passed to the merchant for the merchant to be able to provide confirmation of the identity of the Consumer thus providing a level of anonymity to the transaction such as may be present when cash is used.
Following the confirmation by the merchant of the identity of the Consumer participating in the current transaction in step 826, Device 2 sends a message 827 to the server confirming the identity of the Consumer as Entity 1 (E1), and with information required for the transaction including the list of products to be purchased, their prices, the total price, and a request to charge E1 this total amount. Server 801 then confirms receipt of this message in step 828. The server then sends a message 829 to Device 1 requesting the Consumer to confirm the list of goods to be purchased and the total price to be paid. In step 830, the Consumer (Entity 1) reviews the list and amount to be paid and provides input to device 1 confirming the accuracy of the information and they the authorizing the server to pay. In step 832 the server charges E1 utilizing stored preferred charge card information, stored credit, or other payment method such as a PalPal™ user name (PayPal is a trademark of Ebay, Inc.) and password stored in the account associated with E1, and charges the consumer. In the case where a stored credit is used, the Consumer's account can be debited, and the credits not applied to the merchants account until a later step. In the case of a credit card, or PalPal™ transaction, the server provides payment to E2 (the merchant) utilizing information stored in the account associated with Device 2. The server then indicates payment is made to the merchant, and instructing the merchant to deliver the goods with message 833. E2 (the Merchant) then provides the goods and provides input to Device 2 that the goods have been delivered in step 834. Message 835 is generated by Device 2 (803) to the server confirming product delivery, and acknowledging the receipt of the payment confirmation message 833. The server can then send message 836 requesting the Consumer to confirm they received the goods. If a confirmation is not received in response to this request, this information may later be used to settle any dispute that might arise. In step 837 the consumer confirms receipt of the products, and message 838 is generated to the server confirming the receipt of goods by the consumer. In Step 839 the server concludes the transaction by completing any steps required to credit the Merchant with the payment amount from the Consumer, if required. The server then sends a message 840 to the Merchant indication the transaction is complete, which is acknowledges in message 841. The Consumer is notified of the completed transaction with message 842, which is acknowledged with message 843.
Finally, the transaction details may be stored by the server, or sent to a thirdly party server for tracking spending habits of that account holder, or customers of that merchant allowing the merchant to track that specific customer's behavior and cater to them in the future with various specials delivered via email, or during their next visit via their device in the form of an electronic coupon. This process can be performed with a goal to help the merchant expose the customer to other products or services the merchant believes the customer might find desirable.
The present invention can be extended to facilitate other types of transactions as well. In one specific application, consider use of the invention to facilitate a transaction such as the rental of an automobile. A well known business called ZipCar™, presently operating in several major urban areas in the United States, makes available a fleet of vehicles for shared use by their club members who pay a monthly fee plus a per use charge. Using the present invention, the club member would have a wireless device that serves as the “Consumer device” (Device 1) and the ZipCar vehicle would be equipped with a wireless device serving as the “Merchant” device (Device 2). The consumer would walk up to an available ZipCar vehicle and, using their wireless device, start an initial exchange of identifiers with the desired Merchant device, for example, using the short range local wireless network. The Consumer device and/or Merchant device would send a message to an application running on the Server requesting that a person associated with an account for the Consumer be granted access to a specific vehicle (e.g., an “object”) that is in the vicinity of and associated with the Merchant device. A set of confirmatory messages (such as to exchange access codes, to confirm the location of the vehicle, the per-use fee due, and payment for the same, etc.), are then typically also exchanged between the Consumer and the Merchant device with the assistance of the Server and the long range wireless network. Upon confirmation of the necessary transaction information, the Server sends a message to the Merchant device to unlock the vehicle requested (which may be sent over the second long range wireless network or a yet another network, such as a satellite network).
Example of a Mobile Device and a Broadcast Device.
Server 901 then transmits a Response message 907 indicated the presence of the detected device and the content available. The device 902 requests input from the entity associated with the device 901 for permission to download the coupon, and the availability to play content such as video about how to prepare a recipe using the vendors product. In this case the individual associated with Device 1 accepts the content, and a message 909 is sent to the server accepting the content. Response message 910 begins the delivery of the content.
As previously mentioned, several key distinctions of this embodiment include that the user of device 902 may walk away out of range form the broadcast device 903 and continue to receive the content using their cellular link, or may choose to play the content at a later time having stored the detected like in a favorites list. Additionally, the content stored in the account associated with the broadcast device 2 (903) is relevant to the placement of the device and the products near it. Further, as the content is stored in the server 901 rather than in the broadcast device 903, the content may be updated, modified, or deleted at anytime. For example the server 901 knowing that the consumer has never been detected previously, may customize the electronic coupon to provide a deeper discount than a regularly detected consumer. In the case where the devices are used for electronic commerce as in
Just as in the previous example of an identifier being deemed relevant to a user based on a friends list, permission for disclosing a device's presence may require being on a friends list as well. For example, when a server receives an inquiry from a device with a list of identifiers, it may only respond with information for users associated with the identifiers that are on that device's friends list, and on each of the individual's friend lists as well. These friends' lists and policies can be stored within a user account which allows for disclosure of a user's presence only to individuals on this list, such as described in
It is contemplated that the permissions not be an “all or nothing” decision, but that different classes of information may be assigned different permissions and mechanisms. An example of this might be a user's presence, identity, and cart services being made available to only one set of other accounts (or users), while the presence of an anonymous individual being made available to anyone, but with other classes services available such as multi-player games being treated differently. Additionally multiple contacts may be included in the account, each given customized permissions. An example can be that any user may be notified of an anonymous user or other information based on additional policies.
As only the server contains personal information, and performs the association of an account with a particular identifier, it can inherently enforce the security of the policies as a distinct advantage relative to true peer to peer services. In this way, the central server controls the process of passing information related to an account to a particular requesting device.
Most of the fields in
Referring now to
As will be recognized by an individual skilled in the area of information technology, the concept of a central server may well be implemented as a collection of servers to allow for load balancing, redundancy, and the like in a manor common to the information technology industry.
Other Example Applications Utilizing Still Other Embodiments Follow Below.
Requiring the brokering of the communication via a central server can also allow a mobile device to receive information associated with a “broadcast only” device, such as in the museum example discussed previously. This is important, as such broadcast devices can enable a vast set of new applications built upon the infrastructure developed in this application, beyond the museum application. Some of these applications may involve an electronic commerce aspect, for example.
Electronic Commerce Applications
Ecommerce between a fixed broadcast device and a mobile device
Football Stadium Example
An embodiment of a transaction model, enabled by the infrastructure described above can be an event such as a concert, or sporting event (particularly when it is an indoor venue where no GPS is available). A number of the broadcast only devices are placed through out the seating areas. The devices are very short range, and only transmit intermittently and as a result may be battery powered and to remain active over a very long time period. Each device can be placed in a known location, in a predicable manner.
An attendee at the event has his or her device enabled with the identifier protocol and other embodiments described above. The device detects a broadcast device, and interacts over the internet with the server via the WWAN connection (as already described above). The server receives an indication of the broadcast device's identifier and the identifier of the account associated with the device which detected the broadcast device. The server retrieves content associated with the service provider's account and provide that content to the application on the requesting mobile device. The content may indicate that the venue has a product delivery service. The user may then press an indication on their device that they would like to see a menu or list of items for sale from the merchant(s) in the venue. The application on the user's device would then allow them to see a menu, for instance, and select items to purchase. The user then would be asked to confirm the purchase. The server would then indicate to the merchant that a user located near a specific broadcast device has ordered something. In this case, it is expected that a delivery fee could also be charged for the enhanced service. The server would facilitate the purchasing of the goods or services from the merchant and payment from customer's account, and provide confirmation to each. Such confirmation can include an electronic receipt provided to the customer, for user upon arrival of the delivery person of the good or service. The customer can then select an indication on their device confirming receipt of the good or service via the mobile device, thereby completing the transfer of funds and the transition. Optionally, the delivery person of the good or service may have an enabled mobile device as well. In this case the identifiers may be detected by the customer's device and reported to the server to confirm that the provider's delivery person was present. Further, the delivery person's device can be able to detect the broadcast device's identifier and reported to the server confirming the delivery person was in the correct area independently. Even further proximity confirmation may be achieved by the customer's device's transmitted identifier being detected by the delivery person's device and reported to the central server further confirming the physical proximity of the parties involved in the transaction. Upon arrival of the delivery person, the customer may be notified that the delivery person is looking for them, and has arrived. These cross confirmations can allow for the central server evidence to justify payments both in completed transactions and in disputed or failed transactions. Further, the delivery person may receive a picture of the requesting customer assisting to identify the customer to whom the food is to be delivered. Once the customer is found, the delivery person can confirm the delivery of the good or service to the customer via the user input on their mobile device, and that confirmation being reported to the central server. The customer can have the option to report confirmation or denial of the reception of the product or service as well, as in the last example.
In another embodiment, the merchant device may be fixed, but have an internet connection (wireless or otherwise). Further, in some embodiments, the merchant may be an automated device such as a vending machine. In such a model, a customer may use their enabled cell phone to purchase an item such as a beverage from the machine without the need to insert currency into the machine. This can be accomplished by the customer's cell phone detecting the vending machine transmission of the identifier or visa-versa. Following the detection of either the customer's identifier by the vending machine, or the customer detecting the vending machine identifier, the respective device notifies the server, which in turn provides notification (assuming the account settings allow for notification) to the potential customer via their device. Assuming the customer selects to purchase an item from the vending machine using their account associated with their device, the customer may be presented a menu as in the example above. The customer may further be presented information to ensure the identity of the vending machine, such as a description of the machine, a machine identification number, or a (most likely) a picture of the machine where it is located. The customer can then confirm this is the machine they are interfacing with, and select to pay via their account. The customer may in one model select the item to dispense by input to their phone, or they may simply select to provide payment to the machine allowing them to make the selection manually as is the typical mode of operation today. The vending machine can then interact with the server via its own internet connection, and participate in the transaction in a manner similar to the mode described above allowing for step by step confirmation as previously described.
Electronic Opinion Polling, Tied to a Known Location.
In a much simpler example, such a capability might be used to tie a survey to a known location in such a way as to provide an e-coupon to the survey taker on their device in return for completion of the survey. Alternatively, this type of interaction can enable a very large crowd to interact with a Jumbo-Tron like display to provide input to polls or to participate in group activities. Users at different locations in a audience may form teams and interact with other teams for group activities.
1. In a first embodiment:
One device is transmitting a wireless identifier using a wireless protocol capable of peer to peer communication;
The wireless identifier being associated with a specific account on a server connected to the internet;
A second device receiving the wireless identifier
The second device capable of communicating with the server over an internet connection;
The second device requesting information from the service associated with the first identifier
The identifiers associated with the accounts being updated such that the identifiers would no longer be recognized as being associated with specific accounts without past or current interaction with the server;
Using one or more of Cellular network timing information, and information form the central server to coordinate the broadcast and search times amongst the devices. (to reduce power and resource consumption); and/or
Data necessary to engage in an E-commerce transaction may be exchanged as well such as the identity verification such as via a picture and/or mutual identifier detection.
2. In a second embodiment,
A device is capable of operating two wireless protocols simultaneously, utilizing a first wireless protocol in the device to detect the proximity of another wireless device and using the second wireless protocol to communicate with a remote server, where:
A central serving capability is provided to mobile devices utilizing a wireless WAN connection to provide and exchange information between one or more application on one or more wireless devices and the central server where
A central server uses an identity manager to assign identifiers to devices using a WWAN cellular data link, and wherein
While this invention has been particularly shown and described with references to example embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the scope of the invention encompassed by the appended claims.
This application is a continuation of U.S. patent application Ser. No. 14/861,563, filed Sep. 22, 2015 which is a continuation of pending U.S. patent application Ser. No. 14/472,477, filed Aug. 29, 2014 which is a continuation of U.S. patent application Ser. No. 13/775,435, filed Feb. 25, 2013, now issued as U.S. Pat. No. 8,849,698 on Sep. 30, 2014 which is a continuation of U.S. patent application Ser. No. 13/212,723, filed Aug. 18, 2011, now issued as U.S. Pat. No. 8,374,592 on Feb. 12, 2013 which is a continuation of U.S. application Ser. No. 12/364,828, filed Feb. 3, 2009, now issued as U.S. Pat. No. 8,090,359 on Jan. 3, 2012 which claims the benefit of U.S. Provisional Application No. 61/095,001, entitled “Central Server Enabled Proximity Based Applications Utilizing Both Short Range, and Wide Area Wireless Radios”, filed on Sep. 8, 2008 and U.S. Provisional Application No. 61/095,359, entitled “Central Server Enabled Proximity Based Applications Utilizing Both Short Range, and Wide Area Wireless Radios”, filed on Sep. 9, 2008. The entire teachings of the above applications are incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
5121126 | Clagett | Jun 1992 | A |
5804803 | Cragun et al. | Sep 1998 | A |
5815811 | Pinard et al. | Sep 1998 | A |
5987011 | Toh et al. | Nov 1999 | A |
6002918 | Heiman et al. | Dec 1999 | A |
6049711 | Ben-Yehezkel et al. | Apr 2000 | A |
6067297 | Beach | May 2000 | A |
6081629 | Browning | Jun 2000 | A |
6163771 | Walker | Dec 2000 | A |
6188681 | Vesuna | Feb 2001 | B1 |
6199048 | Hudetz et al. | Mar 2001 | B1 |
6233565 | Lewis et al. | May 2001 | B1 |
6236674 | Morelli et al. | May 2001 | B1 |
6259898 | Lewis | Jul 2001 | B1 |
6422462 | Cohen | Jul 2002 | B1 |
6439345 | Recktenwald et al. | Aug 2002 | B1 |
6446208 | Gujar et al. | Sep 2002 | B1 |
6487540 | Smith et al. | Nov 2002 | B1 |
6487601 | Hubacher et al. | Nov 2002 | B1 |
6493550 | Raith | Dec 2002 | B1 |
6553006 | Kalliokulju et al. | Apr 2003 | B1 |
6580700 | Pinard et al. | Jun 2003 | B1 |
6587034 | Heiman et al. | Jul 2003 | B1 |
6601040 | Kolls | Jul 2003 | B1 |
6615804 | Matthews et al. | Sep 2003 | B2 |
6616049 | Barkan et al. | Sep 2003 | B1 |
6629149 | Fraser et al. | Sep 2003 | B1 |
6675017 | Zellner et al. | Jan 2004 | B1 |
6675153 | Cook et al. | Jan 2004 | B1 |
6700535 | Gilkes et al. | Mar 2004 | B2 |
6712274 | Dvorkis et al. | Mar 2004 | B2 |
6715681 | Dvorkis | Apr 2004 | B2 |
6716101 | Meadows et al. | Apr 2004 | B1 |
6738808 | Zellner et al. | May 2004 | B1 |
6788702 | Garcia-Luna-Aceves | Sep 2004 | B1 |
6791997 | Beyer et al. | Sep 2004 | B2 |
6799049 | Zellner et al. | Sep 2004 | B1 |
6837436 | Swartz et al. | Jan 2005 | B2 |
6845338 | Willins | Jan 2005 | B1 |
6857021 | Schuster et al. | Feb 2005 | B1 |
6868079 | Hunt et al. | Mar 2005 | B1 |
6901270 | Beach | May 2005 | B1 |
6909399 | Zegelin et al. | Jun 2005 | B1 |
6909721 | Ekberg et al. | Jun 2005 | B2 |
6929149 | Selfridge et al. | Aug 2005 | B2 |
6934535 | Phyalammi | Aug 2005 | B2 |
6965914 | Dowling | Nov 2005 | B2 |
6970850 | Freeny et al. | Nov 2005 | B1 |
6978165 | Martinez et al. | Dec 2005 | B2 |
6990587 | Willins et al. | Jan 2006 | B2 |
6993049 | Davies et al. | Jan 2006 | B2 |
7003283 | Hiltunen et al. | Feb 2006 | B2 |
7005968 | Bridgelall | Feb 2006 | B1 |
7010267 | Vanluijt et al. | Mar 2006 | B2 |
7016336 | Sorensen et al. | Mar 2006 | B2 |
7020106 | Barnard et al. | Mar 2006 | B2 |
7030761 | Bridgelall | Apr 2006 | B2 |
7030812 | Bekritsky et al. | Apr 2006 | B2 |
7039027 | Bridgelall | May 2006 | B2 |
7039358 | Shellhammer et al. | May 2006 | B1 |
7065559 | Weiss | Jun 2006 | B1 |
7126926 | Bjorklund et al. | Oct 2006 | B1 |
7127236 | Khan et al. | Oct 2006 | B2 |
7142120 | Charych et al. | Nov 2006 | B2 |
7142527 | Garcia-Luna-Aceves | Nov 2006 | B2 |
7151764 | Heinonen et al. | Dec 2006 | B1 |
7156311 | Attia et al. | Jan 2007 | B2 |
7158756 | Palin et al. | Jan 2007 | B2 |
7167487 | Herrmann et al. | Jan 2007 | B2 |
7173922 | Beach | Feb 2007 | B2 |
7173923 | Beach | Feb 2007 | B2 |
7174031 | Rhoads et al. | Feb 2007 | B2 |
7177594 | Burr et al. | Feb 2007 | B2 |
7181521 | Knauerhase et al. | Feb 2007 | B2 |
7185204 | Narayanaswami et al. | Feb 2007 | B2 |
7194438 | Sovio et al. | Mar 2007 | B2 |
7197326 | Acampora et al. | Mar 2007 | B2 |
7200132 | Twitchell et al. | Apr 2007 | B2 |
7206820 | Rhoads et al. | Apr 2007 | B1 |
7207480 | Geddes | Apr 2007 | B1 |
7209468 | Twitchell et al. | Apr 2007 | B2 |
7213742 | Birch et al. | May 2007 | B1 |
7213743 | Carlson et al. | May 2007 | B2 |
7221668 | Twitchell et al. | May 2007 | B2 |
7233801 | Winn | Jun 2007 | B2 |
7233960 | Boris et al. | Jun 2007 | B1 |
7245602 | Skubic et al. | Jul 2007 | B2 |
7246149 | Dowling | Jul 2007 | B2 |
7249182 | Heinonen et al. | Jul 2007 | B1 |
7254406 | Beros et al. | Aug 2007 | B2 |
7280836 | Fuccello et al. | Oct 2007 | B2 |
7280847 | Goldthwaite et al. | Oct 2007 | B2 |
7289810 | Jagadeesan et al. | Oct 2007 | B2 |
7302256 | O'Hara et al. | Nov 2007 | B1 |
7305245 | Alizadeh-Shabdiz et al. | Dec 2007 | B2 |
7313120 | Ekberg et al. | Dec 2007 | B2 |
7315944 | Dutta et al. | Jan 2008 | B2 |
7322043 | Letsinger et al. | Jan 2008 | B2 |
7324824 | Smith et al. | Jan 2008 | B2 |
7324957 | Boys | Jan 2008 | B2 |
7327701 | Fong et al. | Feb 2008 | B2 |
7330112 | Emigh et al. | Feb 2008 | B1 |
7339909 | Kotzin et al. | Mar 2008 | B2 |
7340438 | Nordman et al. | Mar 2008 | B2 |
7340439 | Burger et al. | Mar 2008 | B2 |
7342876 | Bellur et al. | Mar 2008 | B2 |
7343564 | Othmer et al. | Mar 2008 | B2 |
7346341 | Costa-Requena et al. | Mar 2008 | B2 |
7349871 | Labrou et al. | Mar 2008 | B2 |
7359674 | Markki et al. | Apr 2008 | B2 |
7363494 | Brainard et al. | Apr 2008 | B2 |
7376433 | Hose | May 2008 | B1 |
7379920 | Leung et al. | May 2008 | B2 |
7386878 | Fernando et al. | Jun 2008 | B2 |
7403120 | Duron et al. | Jul 2008 | B2 |
7403762 | Morgan et al. | Jul 2008 | B2 |
7412246 | Lewis et al. | Aug 2008 | B2 |
7414988 | Jones et al. | Aug 2008 | B2 |
7433649 | Toulis et al. | Oct 2008 | B2 |
7433694 | Morgan et al. | Oct 2008 | B2 |
7434723 | White et al. | Oct 2008 | B1 |
7436831 | Miller et al. | Oct 2008 | B2 |
7440781 | Beach et al. | Oct 2008 | B2 |
7471954 | Brach et al. | Dec 2008 | B2 |
7492254 | Bandy et al. | Feb 2009 | B2 |
7502933 | Jakobsson et al. | Mar 2009 | B2 |
7509131 | Krumm et al. | Mar 2009 | B2 |
7515914 | Herrod et al. | Apr 2009 | B2 |
7522058 | Light et al. | Apr 2009 | B1 |
7545784 | Mgrdechian et al. | Jun 2009 | B2 |
7546141 | Leon et al. | Jun 2009 | B2 |
7580699 | Shaw et al. | Aug 2009 | B1 |
7590246 | Calmels et al. | Sep 2009 | B2 |
7620026 | Anschutz et al. | Nov 2009 | B2 |
7630986 | Herz et al. | Dec 2009 | B1 |
7647024 | Wang et al. | Jan 2010 | B2 |
7647055 | Gum et al. | Jan 2010 | B2 |
7661132 | Ohkubo et al. | Feb 2010 | B2 |
7702108 | Amon et al. | Apr 2010 | B2 |
7711100 | Dennis | May 2010 | B2 |
7711620 | Abifaker | May 2010 | B2 |
7714712 | Emigh et al. | May 2010 | B2 |
7716484 | Kaliski, Jr. | May 2010 | B1 |
7729326 | Sekhar | Jun 2010 | B2 |
7756467 | Bent et al. | Jul 2010 | B2 |
7773995 | Rappaport et al. | Aug 2010 | B2 |
7774231 | Pond et al. | Aug 2010 | B2 |
7775430 | Lin | Aug 2010 | B2 |
7822000 | Sekhar | Oct 2010 | B2 |
7826425 | Sekhar | Nov 2010 | B2 |
7836512 | Mizuki et al. | Nov 2010 | B2 |
7848765 | Phillips et al. | Dec 2010 | B2 |
7876701 | Li et al. | Jan 2011 | B2 |
7877082 | Eagle et al. | Jan 2011 | B2 |
7886962 | Vawter et al. | Feb 2011 | B2 |
7904952 | Yeap et al. | Mar 2011 | B2 |
7936736 | Proctor, Jr. et al. | May 2011 | B2 |
7942337 | Jain et al. | May 2011 | B2 |
7952481 | Shoarinejad et al. | May 2011 | B2 |
7962369 | Rosenberg | Jun 2011 | B2 |
7963441 | Emmons et al. | Jun 2011 | B2 |
7965983 | Swan et al. | Jun 2011 | B1 |
7991644 | Bryant et al. | Aug 2011 | B2 |
7991664 | Stone | Aug 2011 | B1 |
8014755 | Sun et al. | Sep 2011 | B2 |
8024272 | Doran et al. | Sep 2011 | B2 |
8073795 | Honisch | Dec 2011 | B2 |
8089405 | Piersol et al. | Jan 2012 | B2 |
8090359 | Proctor et al. | Jan 2012 | B2 |
8112794 | Little et al. | Feb 2012 | B2 |
8116749 | Proctor et al. | Feb 2012 | B2 |
8121917 | Insolia et al. | Feb 2012 | B2 |
8160495 | Khedouri et al. | Apr 2012 | B2 |
8185133 | Billmaier et al. | May 2012 | B2 |
8204039 | Beach et al. | Jun 2012 | B2 |
8205240 | Ansari et al. | Jun 2012 | B2 |
8229458 | Busch | Jul 2012 | B2 |
8233841 | Griffin et al. | Jul 2012 | B2 |
8254338 | Anschutz et al. | Aug 2012 | B2 |
8275359 | Drennan | Sep 2012 | B2 |
8295819 | Kaplan et al. | Oct 2012 | B1 |
8321913 | Turnbull et al. | Nov 2012 | B2 |
8332521 | Chang et al. | Dec 2012 | B2 |
8352323 | Fisher | Jan 2013 | B2 |
8364171 | Busch | Jan 2013 | B2 |
8369842 | Proctor et al. | Feb 2013 | B2 |
8374592 | Proctor, Jr. et al. | Feb 2013 | B2 |
8385896 | Proctor et al. | Feb 2013 | B2 |
8385913 | Proctor et al. | Feb 2013 | B2 |
8478300 | Kuehnel et al. | Jul 2013 | B2 |
8543500 | Ogilvy | Sep 2013 | B2 |
8559968 | Frank et al. | Oct 2013 | B2 |
8576846 | Kumar et al. | Nov 2013 | B2 |
8688570 | Jones et al. | Apr 2014 | B2 |
8787575 | Laaksonen et al. | Jul 2014 | B2 |
8825538 | Insolia et al. | Sep 2014 | B2 |
9038129 | Proctor et al. | May 2015 | B2 |
9137012 | Bailey et al. | Sep 2015 | B2 |
9161164 | Proctor et al. | Oct 2015 | B2 |
9373091 | Belser et al. | Jun 2016 | B1 |
9646319 | Hammond et al. | May 2017 | B2 |
9659285 | Hunter et al. | May 2017 | B2 |
9734198 | Taylor | Aug 2017 | B2 |
9805347 | Hurry | Oct 2017 | B2 |
10133527 | Chang et al. | Nov 2018 | B2 |
10140072 | Chang et al. | Nov 2018 | B2 |
10387087 | Chang et al. | Aug 2019 | B2 |
10489096 | Chang et al. | Nov 2019 | B2 |
10642576 | Chang et al. | May 2020 | B2 |
11074615 | Proctor et al. | Jul 2021 | B2 |
20010003191 | Kovacs et al. | Jun 2001 | A1 |
20010036200 | Nelson et al. | Nov 2001 | A1 |
20020032746 | Lazaridis | Mar 2002 | A1 |
20020061009 | Sorensen et al. | May 2002 | A1 |
20020065720 | Carswell et al. | May 2002 | A1 |
20020073027 | Hui et al. | Jun 2002 | A1 |
20020077083 | Zellner et al. | Jun 2002 | A1 |
20020077118 | Zellner et al. | Jun 2002 | A1 |
20020101993 | Eskin | Aug 2002 | A1 |
20020123965 | Phillips et al. | Sep 2002 | A1 |
20020128932 | Yung et al. | Sep 2002 | A1 |
20020131445 | Skubic et al. | Sep 2002 | A1 |
20020161666 | Fraki et al. | Oct 2002 | A1 |
20020188565 | Nakamura et al. | Dec 2002 | A1 |
20020188656 | Patton et al. | Dec 2002 | A1 |
20030021250 | Willins et al. | Jan 2003 | A1 |
20030028481 | Flitcroft | Feb 2003 | A1 |
20030045272 | Burr | Mar 2003 | A1 |
20030053484 | Sorenson | Mar 2003 | A1 |
20030074259 | Slyman et al. | Apr 2003 | A1 |
20030100328 | Klein et al. | May 2003 | A1 |
20030134650 | Sundar | Jul 2003 | A1 |
20030149874 | Balfanz et al. | Aug 2003 | A1 |
20030158959 | Jayapalan et al. | Aug 2003 | A1 |
20030195808 | Brown et al. | Oct 2003 | A1 |
20030200140 | Hars | Oct 2003 | A1 |
20030200489 | Hars | Oct 2003 | A1 |
20030220835 | Barnes | Nov 2003 | A1 |
20030224787 | Gandolfo | Dec 2003 | A1 |
20040019564 | Goldthwaite et al. | Jan 2004 | A1 |
20040023640 | Ballai | Feb 2004 | A1 |
20040030601 | Pond et al. | Feb 2004 | A1 |
20040076136 | Beach | Apr 2004 | A1 |
20040093268 | Ramchandani et al. | May 2004 | A1 |
20040097243 | Zellner et al. | May 2004 | A1 |
20040137886 | Ross et al. | Jul 2004 | A1 |
20040167837 | Reel et al. | Aug 2004 | A1 |
20040186768 | Wakim et al. | Sep 2004 | A1 |
20040190468 | Saijonmaa | Sep 2004 | A1 |
20040203895 | Balasuriya | Oct 2004 | A1 |
20040205198 | Zellner et al. | Oct 2004 | A1 |
20040208151 | Haverinen et al. | Oct 2004 | A1 |
20040243519 | Perttila | Dec 2004 | A1 |
20040245332 | Silverbrook et al. | Dec 2004 | A1 |
20040260608 | Lewis et al. | Dec 2004 | A1 |
20040264404 | Zegelin | Dec 2004 | A1 |
20040264466 | Huang | Dec 2004 | A1 |
20050038876 | Chaudhuri et al. | Feb 2005 | A1 |
20050047385 | Otsuka | Mar 2005 | A1 |
20050054350 | Zegelin | Mar 2005 | A1 |
20050068928 | Smith et al. | Mar 2005 | A1 |
20050086211 | Mayer et al. | Apr 2005 | A1 |
20050096031 | Sugaya et al. | May 2005 | A1 |
20050099291 | Landau | May 2005 | A1 |
20050113090 | Sharony | May 2005 | A1 |
20050114654 | Brackett | May 2005 | A1 |
20050124359 | Willins et al. | Jun 2005 | A1 |
20050131837 | Sanctis et al. | Jun 2005 | A1 |
20050136845 | Masuoka et al. | Jun 2005 | A1 |
20050136891 | Wang et al. | Jun 2005 | A1 |
20050156026 | Ghosh et al. | Jul 2005 | A1 |
20050165667 | Cox | Jul 2005 | A1 |
20050174975 | Mgrdechian et al. | Aug 2005 | A1 |
20050180367 | Dooley et al. | Aug 2005 | A1 |
20050185615 | Zegelin | Aug 2005 | A1 |
20050187873 | Labrou et al. | Aug 2005 | A1 |
20050187959 | Jung et al. | Aug 2005 | A1 |
20050188062 | Li et al. | Aug 2005 | A1 |
20050213553 | Wang | Sep 2005 | A1 |
20050243737 | Dooley et al. | Nov 2005 | A1 |
20050243781 | Vesuna | Nov 2005 | A1 |
20050250552 | Eagle et al. | Nov 2005 | A1 |
20050266868 | Fuccello | Dec 2005 | A1 |
20050273440 | Ching | Dec 2005 | A1 |
20060003785 | Zatezalo | Jan 2006 | A1 |
20060022038 | Hewlin et al. | Feb 2006 | A1 |
20060029024 | Zeng et al. | Feb 2006 | A1 |
20060030335 | Zellner et al. | Feb 2006 | A1 |
20060032901 | Sugiyama | Feb 2006 | A1 |
20060045042 | Sethi et al. | Mar 2006 | A1 |
20060046709 | Krumm et al. | Mar 2006 | A1 |
20060047835 | Greaux | Mar 2006 | A1 |
20060050728 | Sung et al. | Mar 2006 | A1 |
20060069922 | Jelinek et al. | Mar 2006 | A1 |
20060079284 | Lu et al. | Apr 2006 | A1 |
20060085419 | Rosen | Apr 2006 | A1 |
20060089134 | Moton et al. | Apr 2006 | A1 |
20060089876 | Boys et al. | Apr 2006 | A1 |
20060094447 | Zellner | May 2006 | A1 |
20060095348 | Jones et al. | May 2006 | A1 |
20060095349 | Morgan et al. | May 2006 | A1 |
20060099966 | Moton et al. | May 2006 | A1 |
20060104200 | Park | May 2006 | A1 |
20060104243 | Park | May 2006 | A1 |
20060106850 | Morgan et al. | May 2006 | A1 |
20060111045 | Orlassino et al. | May 2006 | A1 |
20060114104 | Scaramozzino | Jun 2006 | A1 |
20060116160 | Fuccello | Jun 2006 | A1 |
20060125631 | Sharony | Jun 2006 | A1 |
20060141932 | Lawrence et al. | Jun 2006 | A1 |
20060153085 | Willins et al. | Jul 2006 | A1 |
20060171341 | Wang et al. | Aug 2006 | A1 |
20060193258 | Ballai | Aug 2006 | A1 |
20060200843 | Morgan et al. | Sep 2006 | A1 |
20060217131 | Alizadeh-Shabdiz et al. | Sep 2006 | A1 |
20060229058 | Rosenberg et al. | Oct 2006 | A1 |
20060234631 | Dieguez et al. | Oct 2006 | A1 |
20060240840 | Morgan et al. | Oct 2006 | A1 |
20060245373 | Bajic | Nov 2006 | A1 |
20060245393 | Bajic | Nov 2006 | A1 |
20060245404 | Bajic | Nov 2006 | A1 |
20060264212 | Sekhar | Nov 2006 | A1 |
20060268746 | Wijting et al. | Nov 2006 | A1 |
20060268765 | Bajic et al. | Nov 2006 | A1 |
20060268834 | Bajic | Nov 2006 | A1 |
20060270412 | Willins et al. | Nov 2006 | A1 |
20060282738 | Sohn et al. | Dec 2006 | A1 |
20060287813 | Quigley | Dec 2006 | A1 |
20070001904 | Mendelson | Jan 2007 | A1 |
20070002833 | Bajic | Jan 2007 | A1 |
20070004427 | Morgan et al. | Jan 2007 | A1 |
20070004428 | Morgan et al. | Jan 2007 | A1 |
20070010278 | D'Agostino et al. | Jan 2007 | A1 |
20070015549 | Hernandez et al. | Jan 2007 | A1 |
20070025287 | Goren et al. | Feb 2007 | A1 |
20070026818 | Willins et al. | Feb 2007 | A1 |
20070030824 | Ribaudo et al. | Feb 2007 | A1 |
20070032225 | Konicek et al. | Feb 2007 | A1 |
20070043828 | Famolari et al. | Feb 2007 | A1 |
20070049297 | Gopalan et al. | Mar 2007 | A1 |
20070050258 | Dohse | Mar 2007 | A1 |
20070060105 | Batta | Mar 2007 | A1 |
20070060117 | Fishman et al. | Mar 2007 | A1 |
20070060130 | Gogic et al. | Mar 2007 | A1 |
20070061487 | Moore et al. | Mar 2007 | A1 |
20070078851 | Grell et al. | Apr 2007 | A1 |
20070081503 | Mower | Apr 2007 | A1 |
20070091859 | Sethi et al. | Apr 2007 | A1 |
20070094084 | Rau et al. | Apr 2007 | A1 |
20070096909 | Lally | May 2007 | A1 |
20070100651 | Ramer et al. | May 2007 | A1 |
20070106612 | O'Brien et al. | May 2007 | A1 |
20070117576 | Huston et al. | May 2007 | A1 |
20070118748 | Edney | May 2007 | A1 |
20070121534 | James et al. | May 2007 | A1 |
20070121550 | Wada | May 2007 | A1 |
20070133453 | Sethi et al. | Jun 2007 | A1 |
20070143348 | Rosenberg et al. | Jun 2007 | A1 |
20070161382 | Melinger et al. | Jul 2007 | A1 |
20070173248 | Sekhar | Jul 2007 | A1 |
20070178886 | Wang et al. | Aug 2007 | A1 |
20070178907 | Gopalan et al. | Aug 2007 | A1 |
20070179792 | Kramer et al. | Aug 2007 | A1 |
20070187491 | Godwin et al. | Aug 2007 | A1 |
20070190494 | Rosenberg et al. | Aug 2007 | A1 |
20070201417 | Malik et al. | Aug 2007 | A1 |
20070204158 | Hatashita et al. | Aug 2007 | A1 |
20070211727 | Sethi et al. | Sep 2007 | A1 |
20070230441 | Sethi et al. | Oct 2007 | A1 |
20070233367 | Chen et al. | Oct 2007 | A1 |
20070237321 | Bloebaum et al. | Oct 2007 | A1 |
20070242643 | Chandra et al. | Oct 2007 | A1 |
20070242765 | Parizhisky et al. | Oct 2007 | A1 |
20070244633 | Phillips et al. | Oct 2007 | A1 |
20070244811 | Tumminaro | Oct 2007 | A1 |
20070255653 | Tumminaro et al. | Nov 2007 | A1 |
20070264968 | Frank et al. | Nov 2007 | A1 |
20070264991 | Jones et al. | Nov 2007 | A1 |
20070270099 | Le Gars | Nov 2007 | A1 |
20070280269 | Rosenberg | Dec 2007 | A1 |
20070281634 | Rao et al. | Dec 2007 | A1 |
20070286111 | Corson et al. | Dec 2007 | A1 |
20080002641 | Hong et al. | Jan 2008 | A1 |
20080008117 | Alizadeh-Shabdiz et al. | Jan 2008 | A1 |
20080008118 | Alizadeh-Shabdiz et al. | Jan 2008 | A1 |
20080008119 | Alizadeh-Shabdiz et al. | Jan 2008 | A1 |
20080008120 | Alizadeh-Shabdiz et al. | Jan 2008 | A1 |
20080008121 | Alizadeh-Shabdiz et al. | Jan 2008 | A1 |
20080009307 | Sekhar et al. | Jan 2008 | A1 |
20080010190 | Rackley, III et al. | Jan 2008 | A1 |
20080025282 | Hong | Jan 2008 | A1 |
20080036653 | Huston et al. | Feb 2008 | A1 |
20080037487 | Li et al. | Feb 2008 | A1 |
20080039020 | Eskin | Feb 2008 | A1 |
20080045236 | Nahon | Feb 2008 | A1 |
20080051033 | Hymes et al. | Feb 2008 | A1 |
20080051059 | Fisher | Feb 2008 | A1 |
20080052109 | Boys et al. | Feb 2008 | A1 |
20080056215 | Kopikare et al. | Mar 2008 | A1 |
20080070593 | Altman et al. | Mar 2008 | A1 |
20080071874 | Roodman et al. | Mar 2008 | A1 |
20080080397 | Richardson et al. | Apr 2008 | A1 |
20080089519 | Ekberg | Apr 2008 | A1 |
20080097851 | Bemmel et al. | Apr 2008 | A1 |
20080097879 | Sadowski et al. | Apr 2008 | A1 |
20080099552 | Grillion | May 2008 | A1 |
20080102856 | Fortescue | May 2008 | A1 |
20080104227 | Birnie et al. | May 2008 | A1 |
20080108308 | Ullah | May 2008 | A1 |
20080109741 | Messing et al. | May 2008 | A1 |
20080109843 | Ullah | May 2008 | A1 |
20080114647 | Singer et al. | May 2008 | A1 |
20080114699 | Yuan et al. | May 2008 | A1 |
20080114834 | Miyazaki et al. | May 2008 | A1 |
20080119136 | Khazi | May 2008 | A1 |
20080132170 | Alizadeh-Shabdiz et al. | Jun 2008 | A1 |
20080132223 | Lin et al. | Jun 2008 | A1 |
20080132252 | Altman et al. | Jun 2008 | A1 |
20080133336 | Altman et al. | Jun 2008 | A1 |
20080133403 | Hamzeh | Jun 2008 | A1 |
20080134052 | Davis et al. | Jun 2008 | A1 |
20080136621 | Malik et al. | Jun 2008 | A1 |
20080139114 | Ranganathan | Jun 2008 | A1 |
20080139217 | Alizadeh-Shabdiz et al. | Jun 2008 | A1 |
20080140714 | Rhoads et al. | Jun 2008 | A1 |
20080167961 | Wentker et al. | Jul 2008 | A1 |
20080167988 | Sun et al. | Jul 2008 | A1 |
20080176583 | Brachet et al. | Jul 2008 | A1 |
20080177668 | Delean | Jul 2008 | A1 |
20080181154 | Sherman | Jul 2008 | A1 |
20080182591 | Krikorian et al. | Jul 2008 | A1 |
20080182592 | Cha et al. | Jul 2008 | A1 |
20080188261 | Arnone et al. | Aug 2008 | A1 |
20080189394 | Ross et al. | Aug 2008 | A1 |
20080195621 | Tedesco et al. | Aug 2008 | A1 |
20080205340 | Meylan et al. | Aug 2008 | A1 |
20080208762 | Arthur et al. | Aug 2008 | A1 |
20080214116 | Hang et al. | Sep 2008 | A1 |
20080214166 | Ramer et al. | Sep 2008 | A1 |
20080220746 | Ekberg | Sep 2008 | A1 |
20080222711 | Michaelis et al. | Sep 2008 | A1 |
20080248815 | Busch | Oct 2008 | A1 |
20080249928 | Hill et al. | Oct 2008 | A1 |
20080255947 | Friedman et al. | Oct 2008 | A1 |
20080261564 | Logan | Oct 2008 | A1 |
20080262928 | Michaelis | Oct 2008 | A1 |
20080288408 | Jacobsen | Nov 2008 | A1 |
20080301102 | Liang | Dec 2008 | A1 |
20080305738 | Khedouri et al. | Dec 2008 | A1 |
20080306825 | Schick et al. | Dec 2008 | A1 |
20080313079 | Van Bosch et al. | Dec 2008 | A1 |
20080313082 | Van Bosch et al. | Dec 2008 | A1 |
20090016248 | Li et al. | Jan 2009 | A1 |
20090016250 | Li et al. | Jan 2009 | A1 |
20090016255 | Park | Jan 2009 | A1 |
20090016315 | Laroia et al. | Jan 2009 | A1 |
20090016353 | Li et al. | Jan 2009 | A1 |
20090016524 | Park et al. | Jan 2009 | A1 |
20090019168 | Wu et al. | Jan 2009 | A1 |
20090022096 | Walley et al. | Jan 2009 | A1 |
20090037286 | Foster | Feb 2009 | A1 |
20090061901 | Arrasvuori et al. | Mar 2009 | A1 |
20090063624 | Nordstrom et al. | Mar 2009 | A1 |
20090085806 | Piersol et al. | Apr 2009 | A1 |
20090099961 | Ogilvy | Apr 2009 | A1 |
20090143104 | Loh et al. | Jun 2009 | A1 |
20090170559 | Phillips | Jul 2009 | A1 |
20090177530 | King et al. | Jul 2009 | A1 |
20090197681 | Krishnamoorthy et al. | Aug 2009 | A1 |
20090219132 | Maytal et al. | Sep 2009 | A1 |
20090270120 | Park | Oct 2009 | A1 |
20090271211 | Hammad | Oct 2009 | A1 |
20090281904 | Pharris | Nov 2009 | A1 |
20090282130 | Antoniou et al. | Nov 2009 | A1 |
20090285119 | Horn et al. | Nov 2009 | A1 |
20090287827 | Horn et al. | Nov 2009 | A1 |
20090288012 | Hertel et al. | Nov 2009 | A1 |
20090291909 | Henderson et al. | Nov 2009 | A1 |
20090303250 | Phillips | Dec 2009 | A1 |
20090303926 | Den Hartog et al. | Dec 2009 | A1 |
20090307132 | Phillips | Dec 2009 | A1 |
20090307133 | Holloway et al. | Dec 2009 | A1 |
20090310517 | Narayanan et al. | Dec 2009 | A1 |
20090311963 | Haverty | Dec 2009 | A1 |
20090313105 | Magnusson | Dec 2009 | A1 |
20090323647 | Park et al. | Dec 2009 | A1 |
20090323648 | Park et al. | Dec 2009 | A1 |
20090325601 | Park et al. | Dec 2009 | A1 |
20100020746 | Zaks | Jan 2010 | A1 |
20100030638 | Davis et al. | Feb 2010 | A1 |
20100030651 | Matotek et al. | Feb 2010 | A1 |
20100041402 | Gallagher et al. | Feb 2010 | A1 |
20100049615 | Rose et al. | Feb 2010 | A1 |
20100051685 | Royyuru et al. | Mar 2010 | A1 |
20100062758 | Proctor, Jr. et al. | Mar 2010 | A1 |
20100063867 | Proctor, Jr. et al. | Mar 2010 | A1 |
20100096450 | Silverbrook et al. | Apr 2010 | A1 |
20100124196 | Bonar et al. | May 2010 | A1 |
20100138481 | Behrens | Jun 2010 | A1 |
20100141437 | Karam et al. | Jun 2010 | A1 |
20100201536 | Robertson et al. | Aug 2010 | A1 |
20100250673 | Laroia et al. | Sep 2010 | A1 |
20100274859 | Bucuk | Oct 2010 | A1 |
20100284447 | Gore et al. | Nov 2010 | A1 |
20110039592 | Haddad et al. | Feb 2011 | A1 |
20110119733 | Proctor, Jr. et al. | May 2011 | A1 |
20120066043 | Carmichael et al. | Mar 2012 | A1 |
20120066199 | Ramer et al. | Mar 2012 | A1 |
20130217332 | Altman | Aug 2013 | A1 |
20150200811 | Kasslin et al. | Jul 2015 | A1 |
20150249637 | Lawson-Brown et al. | Sep 2015 | A1 |
20150281939 | Li et al. | Oct 2015 | A1 |
20160025837 | Hillier | Jan 2016 | A1 |
20160093184 | Locke et al. | Mar 2016 | A1 |
20170131994 | Middleton et al. | May 2017 | A1 |
20190250239 | Samuelsson | Aug 2019 | A1 |
Number | Date | Country |
---|---|---|
2235002 | Dec 1998 | CA |
2 766 024 | Aug 2002 | CA |
2 766 184 | Aug 2002 | CA |
2218268 | Jan 2007 | CA |
2688189 | Dec 2008 | CA |
2564287 | Aug 2010 | CA |
2506121 | Sep 2010 | CA |
1759620 | Apr 2006 | CN |
101036061 | Sep 2007 | CN |
101233722 | Jul 2008 | CN |
0156856 | Oct 1985 | EP |
1207654 | May 2002 | EP |
1296155 | Mar 2003 | EP |
1098477 | Dec 2009 | EP |
1908235 | Jan 2018 | EP |
2752347 | Feb 1998 | FR |
2798749 | Mar 2001 | FR |
2003152739 | May 2003 | JP |
0702686-7 | Dec 2007 | SE |
134837 | Oct 2007 | SG |
8501373 | Mar 1985 | WO |
0158098 | Aug 2001 | WO |
0173575 | Oct 2001 | WO |
2007047181 | Apr 2007 | WO |
2007084973 | Jul 2007 | WO |
WO 2007081356 | Jul 2007 | WO |
2008069446 | Jun 2008 | WO |
WO 2009050322 | Apr 2009 | WO |
WO 2009063272 | May 2009 | WO |
Entry |
---|
Heeger, David, “Signal Detection Theory Handout,” University of Stanford, 1998, www.psych.stanford.edu/˜lera/psych115s/notes/signal/, 7 pages. |
Wauters, R., “TC50: Gift Card Auction Site Rackup Aims to Shake Up Market” [online], Sep. 14, 2009. Retrieved from the Internet URL: http://techcrunch.com/2009/09/14/tc50-gift-card-auction-site-rackup-aims-to-shake-up-market/, one page. |
Rusli, E., “Gift card marketplace Cardpool Introduces Instand Redemption, Attracts Super Angels” [online], Sep. 7, 2010. Retrieved from the Internet URL: http://techcrunch.com/2010/09/07/gift-card-marketplace-cardpool-plasticjungle/, one page. |
Office Action, U.S. Appl. No. 12/364,823, dated Dec. 28, 2010. |
Office Action, U.S. Appl. No. 12/364,828, dated Sep. 15, 2010. |
Notice of Allowance, U.S. Appl. No. 12/364,828, dated Jul. 1, 2010. |
Office Action, U.S. Appl. No. 12/364,938, dated Sep. 14, 2010. |
Office Action, U.S. Appl. No. 12/364,938, dated Jul. 21, 2011. |
Office Action, U.S. Appl. No. 12/364,819, dated Nov. 15, 2010. |
Final Office Action, U.S. Appl. No. 12/364,819, dated Jun. 28, 2011. |
U.S. Appl. No. 60/758,010, filed Jan. 11, 2006 by Rajiv Laroia for Methods and apparatus for facilitating identification, synchronization or acquisition using beacon signals, 30 pages. |
U.S. Appl. No. 60/758,011, filed Jan. 11, 2006 by Rajiv Laroia for Methods and apparatus for using beacon signals for identification, synchronization or acquisition in an ad hoc wireless network, 26 pages. |
U.S. Appl. No. 60/758,012, filed Jan. 11, 2006 by Rajiv Laroia for Methods and apparatus for using beacon signals in a cognitive radio network, 24 pages. |
U.S. Appl. No. 60/845,051, filed Sep. 15, 2006 by Junyi Li for Beacons in a mixed wireless communication system, 30 pages. |
U.S. Appl. No. 60/845,052, filed Sep. 15, 2006 by Aleksandar Jovicic for Beacons in a mixed wireless communication system, 29 pages. |
U.S. Appl. No. 60/863,304, filed Oct. 27, 2006 by Rajiv Laroia for Power Allocation Scheme, 15 pages. |
Ortiz-Yepes, “Enhancing Authentication in eBanking with NFC enabled mobile Phones;” Masters Thesis, Department of Mathematics and Computer Science, Eihdhoven University of Technology; Aug. 11, 2008. |
Office Action, U.S. Appl. No. 12/364,819, dated Apr. 16, 2012. |
Office Action, U.S. Appl. No. 13/212,766, dated Apr. 26, 2012. |
Office Action, U.S. Appl. No. 13/213,028, dated May 5, 2012. |
http://www.smartcardalliance.org/resources/lib/Proximity_Mobile_Payments_200709.pdf; “Smart Card Alliance” 39 pages, Sep. 2007, retrieved from Internet Mar. 21, 2012. |
http://www.ietf.org/rfc/rfc4793.txt; The EAP Protected One-Time Password Protocol (EAP-POTP); 77 pages, Feb. 2007; retrieved from Internet Mar. 21, 2012. |
Office Action, U.S. Appl. No. 12/364,819, dated Aug. 26, 2010. |
Office Action, U.S. Appl. No. 12/364,823, dated Jun. 16, 2010. |
Office Action, U.S. Appl. No. 12/364,828, dated May 14, 2010. |
Office Action, U.S. Appl. No. 12/364,938, dated May 13, 2010. |
Office Action, U.S. Appl. No. 13/015,306 dated Jun. 17, 2011. |
Office Action, U.S. Appl. No. 13/015,306 dated Jul. 17, 2012. |
Notice of Allowance, U.S. Appl. No. 13/015,306 dated Nov. 8, 2012. |
Office Action, U.S. Appl. No. 13/015,306 dated Jan. 9, 2012. |
Notice of Allowance, U.S. Appl. No. 13/212,723 dated Jan. 16, 2013. |
S. S. (Peter) Wang et al., E-911 Location Standards and Location Commercial Services, Nokia Research Center (2000) 5 pages. |
Jonathan P. Munson & Vineet K. Gupta, Location-Based Notification as a General-Purpose Service, Proceedings of the 2nd International Workshop on Mobile Commerce (2002) 5 pages. |
File History of U.S. Appl. No. 60/814,254, filed Jun. 16, 2006, 44 pages. |
Hunn, Nick, “EZURiO—An Introduction to Wibree” Nov. 2006, 7 pages. |
Shruthi et al., “Wibree Using Digital Radio Technology” International Journal of Advanced Trends in Computer Science and Engineering, vol. 3 , No. 1, pp. 260-264 (2014), Special Issue of ICETETS 2014—Held on Feb. 24-25, 2014 in Malla Reddy Institute of Engineering and Technology, Secunderabad—14, AP, India. |
Ateniese et al., “Untraceable RFID Tags via Insubvertible Encryption”, CCS'05, Nov. 7-11, 2005, Alexandria, Virginia, USA. Copyright 2005 ACM 1-59593-226-7/05/0011, 10 pages. |
Juels, Ari, “Minimalist Cryptography for Low-Cost RFID Tags” SCN'04 Proceedings of the 4th international conference on Security in Communication Networks, Springer-Verlag Berlin, Heidelberg © 2005, 29 Pages. |
Molnar, David, Andrea Soppera, and David Wagner. “A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID Tags.” International Workshop on Selected Areas in Cryptography. Springer Berlin Heidelberg, 2005, 15 pages. |
IEEE Standard for Information Technology Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs), IEEE Std 802.15.4, Oct. 1, 2003, 679 pages. |
Honkanen et al., “Low End Extension for Bluetooth,” Radio and Wireless Conference, 2004 IEEE, pp. 199-202. |
Jakobsson et al., “Security Weaknesses in Bluetooth,” D. Naccache (Ed.): CT-RSA 2001, LNCS 2020, 2001. c Springer-Verlag Berlin Heidelberg 2001, 16 pages. |
Juels, et al., “Squealing Euros: Privacy Protection in RFID-Enabled Banknotes,”2003, 22 pages. |
Gao et al., The Advanced Health and Disaster Aid Network: A Light-Weight Wireless Medical System for Triage, Article in IEEE Transactions on Biomedical Circuits and Systems ⋅ Oct. 2007, 15 pages. |
D Molnar, Privacy and Security in Library RFID Issues, Practices, and Architectures, Anonymized for submission, May 3, 2004, 19 pages. |
Sarma et al., RFID Systems and Security and Privacy Implications, B.S. Kaliski Jr. et al. (Eds.): CHES 2002, LNCS 2523, 2003. c Springer-Verlag Berlin Heidelberg 2003, 16 pages. |
Weis et al., Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems, International Journal of Security and Networks, vol. 5 Issue 2/3, Mar. 2010, 12 pages. |
Golle, et al., “Universal Re-encryption for Mixnets”, 2004, 15 pages. |
Shih et al., “Wake on Wireless: An Event Driven Energy Saving Strategy for Battery Operated Devices,” MOBICOM '02 Sep. 23-26, 2002, Atlanta, Georgia, USA, Copyright 2002, 12 pages. |
D. Ramireddy PowerPoint Presentation—WIBREE Technology, Mar. 26, 2015, 21 pages. |
Jukka Reunamaki PowerPoint Presentation—Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs), Submission Title: [Nokia PHY submission to Task Group 4], Jul. 2001, 59 pages. |
Huomo et al., PowerPoint Presentation—Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs), Submission Title: [Nokia MAC Proposal for IEEE802.15 TG4], Jul. 2001, 50 pages. |
Social Serendipity: Mobilizing Social Software, Eagle et al., Pervasive Computing, 1536-1268, pp. 28-34 (2005). |
Beacon-Stuffing: Wi-Fi Without Associations, Chandra et al., IEEE Computer Society, 1550-6193, pp. 53-57 (2007). |
IEEE Standard for Information Technology Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Std 802.11, (2007) 1232 pages. |
“Specification of the Bluetooth System”, Bluetooth Master Table of Contents & Compliance Requirements, Covered Core Package version: 2.1 + EDR (2007). |
Wang, et al., “Peer2Me—Rapid Application Framework for Mobile Peer-to-Peer Applications”, Department of Computer and Information Science. |
Golle et al. “Universal re-encryption for Mixnets”. In: Topics in Cryptology—CT-RSA 2004. Springer, 2004, pp. 163-178. |
U.S. Appl. No. 61/054,162, filed May 18, 2008 by Mark Braverman for System and Method for Electronic Payment. |
“Simple Pairing Whitepaper”, Bluetooth Special Interest Group, V10r00, (2006). |
Mettala, R., “Bluetooth Protocol Architecture”, Bluetooth White Paper, Document No. 1.C.120/1.0, 3-20 (1999). |
Duflot, et al., “A Formal Analysis of Bluetooth Device Discovery”, School of Computer Science, University of Birmingham, 1-16. |
Wg, Hid, “Device Identification Specification”, V12r00, 1-20 (2006) Need Publication Details. |
U.S. Appl. No. 61/122,240, filed Dec. 12, 2008 by Rajiv Patel for System and Method for Electronic Payment. |
Bluetooth White Paper 1.1, AU-System, 1-25 (2000). |
Brakman et al., “Formal model of the Bluetooth Inquiry Protocol”, 1-13 (2006). |
Weis et al. “Security and privacy aspects of low-cost radio frequency identification Systems”. In: Security in pervasive computing. Springer, 201-212 (2004). |
Amended Invalidity Contentions, dated Mar. 22, 2019, Case No. 6:16-cv-00064-RBK-GJK, Proxicom Wireless, L.L.C, v. Macy's, Inc. and Macy's Florida Stores, LLC. |
File History for U.S. Pat. No. 9,038,129. |
File History for U.S. Pat. No. 9,161,164. |
File History for U.S. Pat. No. 8,090,359. |
Gao, J., et al., “P2P Paid: A Peer-to-Peer Wireless Payment System,” Proceedings of the 2005 Second IEEE International Workshop on Mobile Commerce and Services (WMCS05), 10 pp. (2005). |
Giaglis, G., et al., “On the Potential Use of Mobile Positioning Technologies in Indoor Environments,” 15th Bled eCommerce Conference eReality: Constructing the eEconomy, Bled, Slovenia, Jun. 17-19, 2002, 18 pp. |
Hallberg, J., et al., “Positioning with Bluetooth,” Lulea University of Technology, Dept. of Computer Science & Electrica Engineering, IEEE 2003. |
Hari Balakrishnan, et al. “Cricket Location System” “Cricket Presentation”, 31 pages (2005). |
Harrison, B. et al., “Bridging Physical and Virtual Worlds with Tagged Documents, Objects and Locations,” Xerox PARC, Chi 99 May 1-20, 1999, pp. 29-30. |
Hochmair, H., “1 PDA-Assisted Indoor-Navigation with Imprecise Positioning: Results of a Desktop Usability Study,” Dept. of Geography, St. Cloud State University. |
Iftode, L., et al., “Smart Phone: An Embedded System for Universal Interactions,” Rutgers University Dept. of computer Sciences, pp. 1-12 (2004). |
International Search Report and Written Opinion dated May 11, 2018 for Related PCT/US18/12277. |
Ismail Guvenc, et al., Enhancements to RSS Based Indoor Tracking Systems Using Kalman Filters, Global Signal Processing Expo (2003). |
James Bickers, A Giant of a Self-Service Rollout, Kiosk Marketplace (Nov. 28, 2005), https://www.kioskmarketplace.com/articles/a-giant-of-a-self-service-rollout-3/. |
Joint Claim Construction Statement filed May 22, 2020 with the United States District Court, Middle District of Florida, Orlando Division. |
Joint Claim Construction Statement, dated Jun. 15, 2020; Case No. IPR2020-00934, Target Corporation vs. Proxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-6. |
Joint Claim Construction Statement, dated Jun. 15, 2020; Case No. IPR2020-00977, Target Corporation vs. Proxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-6. |
Joint Claim Construction Statement, dated Jun. 15, 2020; Case No. IPR2020-00978, Target Corporation vs. Proxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-6. |
Joint Claim Construction Statement, dated Jun. 15, 2020; Case No. IPR2020-00979, Target Corporation vs. Proxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-6. |
Joint Claim Construction Statement, dated Jun. 15, 2020; Case No. IPR2020-00980, Target Corporation vs. Proxicom Nireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-6. |
Joint Claim Construction Statement, dated May 22, 2020; Case No. IPR2020-00903, Target Corporation vs. Proxicom Nireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-28. |
Joint Claim Construction Statement, dated May 22, 2020; Case No. IPR2020-00904, Target Corporation vs. Proxicom Nireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-28. |
Joint Claim Construction Statement, dated May 22, 2020; Case No. IPR2020-00931, Target Corporation vs. Proxicom Nireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-28. |
Joint Claim Construction Statement, dated May 22, 2020; Case No. IPR2020-00932, Target Corporation vs. Proxicom Nireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-28. |
Joint Claim Construction Statement, dated May 22, 2020; Case No. IPR2020-00933, Target Corporation vs. Proxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-28. |
Joint Claim Regarding Claim Construction Briefing Procedure, dated Jun. 15, 2020; Case No. IPR2020-00903, Target Corporation vs Proxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-6. |
Joint Statement Regarding Claim Cnstruction Briefing Procedure, dated Jun. 15, 2020; Case No. IPR2020-00931, Target Corporation vs. Proxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-28. |
Joint Statement Regarding Claim Cnstruction Briefing Procedure, dated Jun. 15, 2020; Case No. IPR2020-00932, Target Corporation vs. Proxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-28. |
Joint Statement Regarding Claim Cnstruction Briefing Procedure, dated Jun. 15, 2020; Case No. IPR2020-00933, Target Corporation vs. Proxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-6. |
Joint Statement Regarding Claim Construction Briefing Procedure, dated Jun. 15, 2020; Case No. IPR2020-00904, arget Corporation vs. Proxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-28. |
Josephson, W., et al., “Peer-to-Peer Authentication with a Distributed Single Sign-on Service,” G.M. Voelker and S. Shenker (Eds.): IPTPS 2004, LNCS 3279, pp. 250-258, 2004. |
Kolodziej, K., et al., “In-Building Positioning: Modeling Location for Indoor World,” Proceedings of the 15th Int'l Workshop on Database and Expert Systems Applications (DEXA'04), 5 (2004). |
Kolodziej, K., et al., “Local Positioning Systems, LBS Applications and Services,” Taylor & Francis Group LLC, 2006, 436. |
Kortuem, G. et al., “Context-Aware, Adaptive Wearable Computers as Remote Interfaces to ‘Intelligent’ Environments” University of Oregon Computer Science Department (1998). |
LaMarca, A., et al., “Place Lab: Device Positioning Using Radio Beacons in the Wild,” Intel Corp., 2004. |
Laudon, K. “E-commerce: Business, Technology, Society”, Second Edition, (Pearson 2003). |
Laudon, Kenneth C., et al., “E-commerce,” Second Edition, Pearson, ISBN No. 0-321-20056-X, 2004. |
Lee, T.O., et al., “An Agent-Based Micropayment System for E-commerce,” J. Liu and Y. Ye (Eds.): E-commerce Agents, LNAI 2033, pp. 247-263, 2001. |
Lim, H., et al., “Zero-Configuration, Robust Indoor Localization: Theory and Experimentation,” University of Illinois Dept. of Computer Science, Technical Report No. UIUCDCS-R-2005-2629, Aug. 2005, p. 1-12. |
Liu, H., et al., “Survey of Wireless Indoor Positioning Techniques and Systems,” IEEE Transactions on Systems, Man, and Cybernetics—Part C: Applications and Reviews, vol. 37, No. 6, Nov. 2007, pp. 1067-1080. |
Makela, Petteri, “Local Positioning Systems and Indoor Navigation,” Licentiate of Science Thesis, Tampere University of Technology, pp. 116 (2008). |
Marco, A., et al., “Location-based services for elderly and disabled People,” ScienceDirect, Computer Communications 31 (2008), pp. 1055-1066. |
Nissanka B. Priyantha, et al., Anchor-Free Distributed Localization in Sensor Networks, LCS Tech. Report #892 (2003). |
Nissanka B. Priyantha, et al., Mobile-Assisted Localization in Wireless Sensor Networks, IEEE INFOCOM Conf. (Mar. 2005). |
Ondrus, J., et al., “An Architecture for Mobile Payments and Couponing in the Retail Industry,” 17th Bled eCommerce Conference eGlobal, Bled, Slovenia, Jun. 21-23, 2004, pp. 1-15. |
Order dated Feb. 12, 2019, United States District Court Middle District of Florida Orlando Division. |
P370/470 Radio Scanner, Preliminary Symbol, Symbol Technologies, Inc., pp. 1-34 (1999). |
Panos Kourouthanassis, et al., Grocery Supply-Chain Management: MyGROCER Innovative Business and echnology Framework, 17th Int'l Logistics Congress 264-73 (2001). |
Panos Kourouthanassis, et al., Intelligent Cokes and Diapers: MyGROCER Ubiquitous Computing Environment, First Int'l Mobile Bus. Conf., 150-72 (2002). |
Part 15.3: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for High Rate Wireless Personal Area Networks (WPANs), IEEE Standards Board, Approved Jun. 12, 2003, The Institute of Electrical and Electronics Engineers, Inc. (New York); pp. 5, 25, 118 and 203. |
Patent Owner Proxicom Wireless, LLC's Preliminary Response Pursuant to 37 C.F.R. 42.107; dated Aug. 13, 2020, Case No. IPR2020-00903, Target Corporation vs. Proxicom Wireless, L.L.C.; pp. 1-50. |
Aalto, L., et al., “Bluetooth and WAP Push Based Location-Aware Mobile Advertising System,” MobiSys '04, Jun. 6-9, 2004, Boston, MA, pp. 49-58. |
Adam Smith, et al., Tracking Moving Devices with the Cricket Location System, 2nd USENIX/ACM MobiSys Conf. (Jun. 2004). |
Adams, Richard, “www.advertising,” Watson Guptill, ISBN 978-0823058617 (2003). |
Amendment in Response to Non-Final Office Action filed Jun. 3, 2008 for U.S. Appl. No. 11/055,310. |
Aparicio, S., et al., “A Fusion Method Based on Bluetooth and WLAN Technologies for Indoor Location,” Proceedings of IEEE Int'l Conference on Multisensor Fusion and Integration for Intelligent Systems Seoul, Korea, Aug. 20-22, 2008, pp. 487-491. |
Bahl, P. et al., “RADAR: An In-Building RF-based User Location and Tracking System,” Microsoft Research. |
Barahim, Z., et al., “Low-Cost Bluetooth Mobile Positioning for Location-based Application,” University of Mauritius Computer Science & Engineering Dept., 4 pp. |
Bargh, M., et al., “Indoor Localization Based on Response Rate of Bluetooth Inquiries,” Melt '08, Sep. 19, 2008, San Francisco, CA, pp. 49-54. |
Case Study: “Agilysys Makes a Giant Leap Toward Wireless Shopping”, CRN News (2005). |
Chari, S., et al., “Security Issues in M-Commerce: A Usage-based Taxonomy,” E-commerce Agents, LNAI 2033, pp. 264-282, 2001. |
Chawathe, S., “Beacon Placement for Indoor Localization using Bluetooth,” Proc. of the 119th Int'l IEEE Conference on Intelligent Transportation Systems, Beijing, China, Oct. 12-15, 2008, pp. 980-985. |
Cricket v2 User Manual, Cricket Project, MIT Computer Science and Artificial Intelligence Lab Cambridge, MA (2005). |
Dan Alaimo, Giant Eagle to Test Self-Scanning, Supermarket News (Jun. 26, 2000), https://www.supermarketnews.com/print/26715. |
Declaration of David Hilliard Williams in Support of Petition for Inter Partes Review of U.S. Pat. No. 7,936,736. |
Declaration of David Hilliard Williams in Support of Petition for Inter Partes Review of U.S. Pat. No. 8,090,359. |
Declaration of David Hilliard Williams in Support of Petition for Inter Partes Review of U.S. Pat. No. 8,116,749. |
Declaration of David Hilliard Williams in Support of Petition for Inter Partes Review of U.S. Pat. No. 8,369,842. |
Declaration of David Hilliard Williams in Support of Petition for Inter Partes Review of U.S. Pat. No. 8,385,896. |
Declaration of David Hilliard Williams in Support of Petition for Inter Partes Review of U.S. Pat. No. 8,385,913. |
Declaration of David Hilliard Williams in Support of Petition for Inter Partes Review of U.S. Pat. No. 9,038,129. |
Declaration of David Hilliard Williams in Support of Petition for Inter Partes Review of U.S. Pat. No. 9,161,164. |
Declaration of Sylvia Hall-Ellis, Ph.D in Support of Patent Owner's Preliminary Response; Case No. IPR2020-00979, Target Corporation vs. Proxicom Wireless, L.L.C.; pp. 1-66. |
Defendant's Preliminary Constructions of Proposed Terms, dated May 14, 2020; Case No. IPR2020-00903, Target Corporation vs Proxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-28. |
Defendant's Preliminary Constructions of Proposed Terms, dated May 14, 2020; Case No. IPR2020-00904, Target Corporation vs Proxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-28. |
Defendant's Preliminary Constructions of Proposed Terms, dated May 14, 2020; Case No. IPR2020-00931, Target Corporation vs Proxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-28. |
Defendant's Preliminary Constructions of Proposed Terms, dated May 14, 2020; Case No. IPR2020-00932, Target Corporation vs Proxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-28. |
Defendant's Preliminary Constructions of Proposed Terms, dated May 14, 2020; Case No. IPR2020-00933, Target Corporation vs Proxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-28. |
Defendant's Preliminary Constructions of Proposed Terms, dated May 14, 2020; Case No. IPR2020-00934, Target corporation vs Proxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-28. |
Defendant's Preliminary Constructions of Proposed Terms, dated May 14, 2020; Case No. IPR2020-00977, Target corporation vs Proxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-28. |
Defendant's Preliminary Constructions of Proposed Terms, dated May 14, 2020; Case No. IPR2020-00978, Target corporation vs Proxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-28. |
Defendant's Preliminary Constructions of Proposed Terms, dated May 14, 2020; Case No. IPR2020-00979, Target corporation vs Proxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-28. |
Defendant's Preliminary Constructions of Proposed Terms, dated May 14, 2020; Case No. IPR2020-00980, Target Corporation vs Proxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-28. |
Defendant's Preliminary Constructions of Proposed Terms, dated May 8, 2020; Case No. IPR2020-00903, Target Corporation vs Proxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-22. |
Defendant's Preliminary Constructions of Proposed Terms, dated May 8, 2020; Case No. IPR2020-00904, Target Corporation vs Proxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-22. |
Defendant's Preliminary Constructions of Proposed Terms, dated May 8, 2020; Case No. IPR2020-00931, Target Corporation vs Proxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-22. |
Defendant's Preliminary Constructions of Proposed Terms, dated May 8, 2020; Case No. IPR2020-00932, Target Corporation vs Proxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-22. |
Defendant's Preliminary Constructions of Proposed Terms, dated May 8, 2020; Case No. IPR2020-00933, Target Corporation vs Proxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-22. |
Defendant's Preliminary Constructions of Proposed Terms, dated May 8, 2020; Case No. IPR2020-00934, Target corporation vs Proxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-22. |
Defendant's Preliminary Constructions of Proposed Terms, dated May 8, 2020; Case No. IPR2020-00977, Target corporation vs Proxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-22. |
Defendant's Preliminary Constructions of Proposed Terms, dated May 8, 2020; Case No. IPR2020-00978, Target corporation vs Proxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-22. |
Defendant's Preliminary Constructions of Proposed Terms, dated May 8, 2020; Case No. IPR2020-00979, Target Corporation vs Proxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-22. |
Defendant's Preliminary Constructions of Proposed Terms, dated May 8, 2020; Case No. IPR2020-00980, Target Corporation vs Proxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-22. |
Feldmann, S., et al., “An indoor Bluetooth-based positioning system: concept, Implementation and experimental Evaluation,” Institute of Communications Engineering. |
Fernandez, T., et al., “Bluetooth Sensor Network Positioning System with Dynamic Calibration,” Dept. of Electronics & Systems, University of Coruna, Spain, IEEE 2007, pp. 45-49. |
File History for U.S. Pat. No. 8,369,842. |
File History for U.S. Pat. No. 8,370,955. |
File History for U.S. Pat. No. 8,374,592. |
File History for U.S. Pat. No. 8,385,896. |
File History for U.S. Pat. No. 8,385,913. |
File History for U.S. Pat. No. 8,849,698. |
Patent Owner Proxicom Wireless, LLC's Preliminary Response Pursuant to 37 C.F.R. 42.107; dated Aug. 13, 2020, Case No. IPR2020-00904, Target Corporation vs. Proxicom Wireless, L.L.C.; pp. 1-50. |
Patent Owner Proxicom Wireless, LLC's Preliminary Response Pursuant to 37 C.F.R. 42.107; dated Aug. 13, 2020, Case No. IPR2020-00931, Target Corporation vs. Proxicom Wireless, L.L.C.; pp. 1-48. |
Patent Owner Proxicom Wireless, LLC's Preliminary Response Pursuant to 37 C.F.R. 42.107; dated Aug. 19, 2020, Case No. IPR2020-00932, Target Corporation vs. Proxicom Wireless, L.L.C.; pp. 1-46. |
Patent Owner Proxicom Wireless, LLC's Preliminary Response Pursuant to 37 C.F.R. 42.107; dated Aug. 19, 2020, Case No. IPR2020-00933, Target Corporation vs. Proxicom Wireless, L.L.C.; pp. 1-48. |
Patent Owner Proxicom Wireless, LLC's Preliminary Response Pursuant to 37 C.F.R. 42.107; dated Sep. 8, 2020, Case No. IPR2020-00934, Target Corporation vs. Proxicom Wireless, L.L.C.; pp. 1-49. |
Patent Owner Proxicom Wireless, LLC's Preliminary Response Pursuant to 37 C.F.R. 42.107; dated Sep. 8, 2020, Case No. IPR2020-00977, Target Corporation vs. Proxicom Wireless, L.L.C.; pp. 1-78. |
Patent Owner Proxicom Wireless, LLC's Preliminary Response Pursuant to 37 C.F.R. 42.107; dated Sep. 8, 2020, Case No. IPR2020-00978, Target Corporation vs. Proxicom Wireless, L.L.C.; pp. 1-71. |
Patent Owner Proxicom Wireless, LLC's Preliminary Response Pursuant to 37 C.F.R. 42.107; dated Sep. 8, 2020, Case No. IPR2020-00979, Target Corporation vs. Proxicom Wireless, L.L.C.; pp. 1-78. |
Patent Owner Proxicom Wireless, LLC's Preliminary Response Pursuant to 37 C.F.R. 42.107; dated Sep. 8, 2020, Case No. IPR2020-00980, Target Corporation vs. Proxicom Wireless, L.L.C.; pp. 1-73. |
Patro, R.J., “Localization in Wireless Sensor Network with Mobile Beacons,” Honeywell Tech. Solution Lab, IEEE 2004, pp. 22-24. |
Petition for Inter Partes Review, dated May 15, 2020, Case No. IPR2020-00931, Target Corporation vs. Proxicom Wireless, L.L.C. |
Petition for Inter Partes Review, dated May 15, 2020, Case No. IPR2020-00932, Target Corporation vs. Proxicom Wireless, L.L.C. |
Petition for Inter Partes Review, dated May 15, 2020, Case No. IPR2020-00933, Target Corporation vs. Proxicom Wireless, L.L.C. |
Petition for Inter Partes Review, dated May 27, 2020, Case No. IPR2020-00934, Target Corporation vs. Proxicom Wireless, L.L.C. |
Petition for Inter Partes Review, dated May 27, 2020, Case No. IPR2020-00977, Target Corporation vs. Proxicom Wireless, L.L.C. |
Petition for Inter Partes Review, dated May 8, 2020, Case No. IPR2020-00903, Target Corporation vs. Proxicom Wireless, L.L.C. |
Petition for Inter Partes Review, dated May 8, 2020, Case No. IPR2020-00904, Target Corporation vs. Proxicom Wireless, L.L.C. |
Petition for Inter Partes Review, dated Jun. 1, 2020, Case No. IPR2020-00978, Target Corporation vs. Proxicom Wireless, L.L.C. |
Petition for Inter Partes Review, dated Jun. 1, 2020, Case No. IPR2020-00979, Target Corporation vs. Proxicom Wireless, L.L.C. |
Petition for Inter Partes Review, dated Jun. 1, 2020, Case No. IPR2020-00980, Target Corporation vs. Proxicom Wireless, L.L.C. |
Priyantha et al., “The Cricket Indoor Location System,” Massachusetts Institute of Technology, pp. 1-199 (2005). |
Quiqley, A., et al., “BlueStar, a privacy centric location aware System,” Telstra Research Laboratories, Melbourne, Australia, IEEE 2004, 6. |
Roth, C.; Email dated Apr. 14, 2020 regarding Initial Identification of Disputed Claim Terms; Target Corporation vs. Droxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-2. |
Savvides, A., et al., “Chapter 15: Localization in Sensor Networks,” pp. 327-349. |
Schiller, Jochen, et al., “Location-Based Services,” Elsevier, ISBN 9781493303786. |
Specification vol. 0, Specification of the Bluetooth System, Wireless Connections Made Easy, Master Table of Contents & Compliance Requirements, Covered Core Package version 3.0 + HS, Current Master TOC, Apr. 21, 2009, 1712. |
Srinivasan, T., et al., “HPRS: A Hybrid P2P Reputation System using File and Peer Rating,” Third International Symposium on Information Assurance and Security, IEEE, pp. 307-312 (2007). |
Subramanian, S., et al., “SBIL: Scalable Indoor Localization and Navigation Service,” University of Tubingen Dept. of Computer Engineering, IEEE 2007, pp. 27-30. |
Symbol Technologies, PDT 2800 Series, Product Reference Guide, pp. 1-36 (2001). |
Symbol Technologies, PDT 6800 Series, Product Reference Guide, Revision A (2001). |
Symbol Technologies, PDT 8100 Series, Product Reference Guide, pp. 1-48 (2001). |
Symbol Technologies, Portable Shopping System: Integration Guide (2000); Wise Marketer Staff, Giant Foods Self-service Concept Store Opens (Oct. 12, 2005), https://thewisemarketer.com/headlines/giant-foods-self-service-concept-store-opens-4-2/. |
Symbol Technologies, Wireless Networker LA-5033 PCT Adapter & LA-5030 PC Card, User Guide, pp. 1-72 (2004). |
Target Corporation's Preliminary Invalidity Contentions dated Mar. 16, 2020, filed in Proxicom Wireless LLC v. Target Corporation, U.S District Court, Middle District of Florida, Orlando Division, C.A. No. 6:19-cv-1886-RBD-LRH. |
Target's Initial Identification of Disputed Claim Terms; dated Apr. 10, 2020; Case No. IPR2020-00903, Target Corporation vs Proxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-6. |
Target's Initial Identification of Disputed Claim Terms; dated Apr. 10, 2020; Case No. IPR2020-00904, Target Corporation vs Proxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-6. |
Target's Initial Identification of Disputed Claim Terms; dated Apr. 10, 2020; Case No. IPR2020-00931, Target Corporation vs Proxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-6. |
Target's Initial Identification of Disputed Claim Terms; dated Apr. 10, 2020; Case No. IPR2020-00932, Target Corporation vs Proxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-6. |
Target's Initial Identification of Disputed Claim Terms; dated Apr. 10, 2020; Case No. IPR2020-00933, Target Corporation vs Proxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-6. |
Target's Initial Identification of Disputed Claim Terms; dated Apr. 10, 2020; Case No. IPR2020-00934, Target corporation vs Proxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-6. |
Target's Initial Identification of Disputed Claim Terms; dated Apr. 10, 2020; Case No. IPR2020-00977, Target corporation vs Proxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-6. |
Target's Initial Identification of Disputed Claim Terms; dated Apr. 10, 2020; Case No. IPR2020-00978, Target corporation vs Proxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-6. |
Target's Initial Identification of Disputed Claim Terms; dated Apr. 10, 2020; Case No. IPR2020-00979, Target Corporation vs Proxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-6. |
Target's Initial Identification of Disputed Claim Terms; dated Apr. 10, 2020; Case No. IPR2020-00980, Target Corporation vs Proxicom Wireless, L.L.C.; C.A. No. 6:19-cv-1886-RBD-LRH; pp. 1-6. |
Thongthammachart, S., et al., “Bluetooth enables in-door mobile location Services,” In Proceedings of the 57th IEEE Semiannual Vehicular Technology Conference: VTC2003 (vol. 3, pp. Session 8H, paper 3) IEEE. |
Transaction Receipt; PACER Service Center, dated Aug. 6, 2020, pp. 1-3. |
Transcript of Telephonic Motion Hearing, dated Jun. 3, 2020; United States District Court, Middle District of Florida, Orlando Division; pp. 1-41; Case No. IPR2020-00903; Target Corporation vs. Proxicom Wireless, L.L.C.; C.A. No. 5:19-cv-1886-RBD-LRH; p. 141. |
Using Blouetooth, MC909X User Guide, Symbol Technologies, Inc., pp. 1-66 (2005). |
Using MC9094 Phone, MC909X User Guide, Symbol Technologies, Inc., pp. 1-20 (2005). |
Wang, F., et al., “Bridging Physical and Virtual Worlds: Complex Event Processing for RFID Data Streams,” University of California, Los Angeles Computer Science Department, Springer-Verlag Berlin Heidelberg 2006, pp. 588-607. |
Want, R., et al., “Bridging Physical and Virtual Worlds with Electronic Tags,” Xerox PARC, CHI '99 May 15-20, 1999, pp. 370-377. |
WaveWorks Portable Shopping System Integration Guide, Integration Services Group, Pittsburgh, Pennsylvania, pp. 1-185. |
Wei, G., et al., “HiPEC: A Hybrid P2P Model for Electronic Commerce,” Zhejiang Gongshang University College of Computers Information Engineering, pp. 1-5 (2008). |
Yang, H., et al., “Indoor Localization Systems—Tracking objects and personnel with sensors, wireless networks and RFID,” Measurement+ Control, vol. 42/1, Feb. 2009, pp. 18-23. |
Zhang, Y., et al., “Progress in WWW Research and Development,” 1oth Asia-PacificWeb Conference, APWeb 2008, Shenyang, China, Apr. 26-28, 2008 Proceedings, pp. 331-341. |
Zhou, Y., et al., “A Map Registration Localization Approach based on Mobile Beacons for Wireless Sensor Networks,” Communications Research Centre Canada, 2011 Crown, 5 pp. |
Non-Final Office Action received for U.S. Appl. No. 14/861,563, dated May 9, 2016, 16 pages. |
Non-Final Office Action received for U.S. Appl. No. 16/817,896, dated Jun. 9, 2020, 22 pages. |
Non-Final Office Action received for U.S. Appl. No. 16/817,896, dated Nov. 24, 2020, 34 pages. |
Non-Final Office Action received for U.S. Appl. No. 16/817,896, dated Sep. 3, 2020, 23 pages. |
Non-Final Office Action received for U.S. Appl. No. 17/366,826, dated Aug. 17, 2021, 40 pages. |
Notice of Allowance received for U.S. Appl. No. 16/817,896, dated Jun. 8, 2021, 17 pages. |
Notice of Allowance received for U.S. Appl. No. 16/817,896, dated Jun. 28, 2021, 4 pages. |
Notice of Allowance received for U.S. Appl. No. 16/817,896, dated Mar. 19, 2021, 17 pages. |
Final Office Action received for U.S. Appl. No. 17/366,826, dated Dec. 13, 2021, 42 pages. |
Number | Date | Country | |
---|---|---|---|
20170011425 A1 | Jan 2017 | US |
Number | Date | Country | |
---|---|---|---|
61095359 | Sep 2008 | US | |
61095001 | Sep 2008 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 14861563 | Sep 2015 | US |
Child | 15271410 | US | |
Parent | 14472477 | Aug 2014 | US |
Child | 14861563 | US | |
Parent | 13775435 | Feb 2013 | US |
Child | 14472477 | US | |
Parent | 13212723 | Aug 2011 | US |
Child | 13775435 | US | |
Parent | 12364828 | Feb 2009 | US |
Child | 13212723 | US |