People often attend social gatherings with the hope of meeting new people and making new friends. However, making an initial introduction can be intimidating and many social interactions to meet new people and friends may never take place. Moreover, at a venue, there may be people who are interested in meeting others, and people who are simply there to have an enjoyable time with their friends and would prefer not interact with new people. It would be helpful if there was a system for discerning between these two groups of people.
Embodiments will now be described with reference to
In general, the present technology allows two (or more) people who have no prior knowledge each other, or contact information for each other, to send private and discreet communications to each other via their computing devices such as their mobile phones. In one example, the present technology allows a first user to view the location of other users at a venue on a map displayed on the first user's computing device. Users' positions are displayed on the map and updated in real time as users move around the venue. When the first user wishes to introduce him or herself to a second user, the first user locates the second user on the map. Various tools may be provided to allow the first user to correlate the second user in real world space with the correct indication of the second user on the displayed map.
Positions of users in the real world space may be indicated by location tags that are displayed on the map. Once the first user has identified the second user on the map (by locating the second user's location tag), the user may select the location tag for the second user on the map. When the second user subscribed to the service, the second user may have provided a mobile telephone number for receiving text messages. Once the first user selects the second user's location tag, the system may open a messaging software application on the first user's device with a text message addressed to the second user's mobile telephone number. The first user may then send a text message to the second user to introduce him or herself and start a dialog. Thus, embodiments enable a first user to discreetly contact one or more second users, for example using a cellular phone or other computing device, without knowing beforehand any contact information for the one or more second users.
Once the second user receives the text message, the second user is provided with a few options. The second user may respond to the first user. The second user may look at the first user's profile. The second user may find the first user on the map of his/her computing device, so as to identify the position of the first user in real world space. The second user may view subscribing friends that the first and second users share in common. Or the second user may block incoming texts from the first user. Other use scenarios are contemplated.
Some of the computing devices 102 may be operated by administrators (or others) associated with a venue. These computing devices may be used to set up and run the services of the present technology that are to be provided at the venue. The venue computing devices may be stationary (such as a desktop computer) or mobile (such as a laptop or tablet). Others of the computing devices 102 may be operated by end users (referred to herein as a “user” or “users”) that use the service to gain introductions to other users at a venue. These users may have computing devices 102 that are mobile (such as a laptop computer, tablet, PDA or mobile telephone). Users may also use computing devices 102 that are stationary in embodiments. Further details of a given computing device 102 are described below with respect to
Where a computing device 102 is a mobile telephone (such as computing device 102-1), the computing device 102 may connect to the service provider 104 via a broadband mobile communications network. In examples, such the broadband mobile network may include base stations 112 (one of which is shown) for transferring data and software between mobile telephone 102-1 and a mobile network backbone 114. Backbone 114 may in turn have a network connection to network 108.
In embodiments, the network 108 may comprise the Internet, though other networks including, but not limited to, a LAN or WAN are contemplated. Computing devices 102 may be connected to each other by peer-to-peer connections 118 in addition to, or instead of, their connection to network 108, as indicated by dashed lines 118. Although only one connection 118 is shown, each computing device 102 may be connected to each other computing device 102 via a peer-to-peer connection 118. Other topologies 100 are contemplated.
As explained below, when subscribing to the service provider 104, users may create a social profile that is used by the service. Users may create that social profile for the service. Alternatively, users may already have a social profile that they have created and stored with a third-party social platform 120. Third-party social platform 120 may be social media websites such as Facebook®, Twitter®, etc. Alternatively or additionally, third-party social platform 120 may be dating websites such as Match.com®, eHarmony®, PlentyOfFish®, Zoosk®, Singlesnet®, etc. In embodiments, users may link or incorporate their profiles from the third-party social platform 120 to the service provider 104 for use as their profiles for the service provider 104. While one such third-party social platform is shown, there may be many that a user uses in conjunction with the present technology.
In embodiments, the venues may use computing devices 102 to connect with the service provider 104 to set up the service of the present technology within their venues. The service provider 104 may be remote from a venue, but in alternative embodiments, the service provider 104 may be resident within or integrated as part of one or more of the venues, and administered by the one or more venues. In such embodiments, an administrator (or other) associated with the venue may set up and run the service provider 104 within the venue to provide the features of the present technology within that venue. In this embodiment, multiple venues may each set up and run their own service provider 104.
Referring now to
The service provider 104 may host one or more servers 124, which may for example include a web server, a media server for organizing and distributing selected media, and/or an ftp server supporting file transfer and/or other types of servers. One or more of these servers may be omitted in further embodiments. Servers 124 may also run or download the connection software platform 126. As explained below, the connection software platform (or just connection software) 126 may allow users to selectively locate another user at a venue, and then to privately and discreetly contact that other user. The different functions of servers 124 may be supported on different servers or otherwise combined in further embodiments. Further details of a given server 124 are described below with respect to
Computing devices 102 may invoke a user login and registration service 128, which is used to subscribe and thereafter authenticate a user on a device 102 with the service provider 104. During login, login service 128 obtains an alias (or other identifier associated with the user) and a password from the user. In order to gain access to the services on service provider 104, the alias and password may be authenticated by comparing the entered credentials to venue accounts 132 or user accounts 136 in a database 130. Database 130 may be located on the same server as user login service 128 or may be distributed on a different server or a collection of different servers. User login and registration service 128 may be omitted in further embodiments. In such embodiments, any user may connect to the service provider 104 and use the connection software without having to be authenticated.
The service database 130 may include venue accounts 132 and user accounts 136. Venue accounts 132 may include login and registration information for venues that make use of service provider 104 and the services according to the present technology. As explained below, a venue may for example be a restaurant, bar or other establishment where users of the service according to the present technology may gather. Using a computing device 102, a venue may subscribe to the service by creating an account with the service provider 104 which is saved within the service database 130. In addition to account information, venue accounts 132 may include maps 134 showing one or more views of a given venue. Maps 134 are explained in greater detail below, but in general may be a top view showing the positions of walls and fixtures within a venue. The maps 134 may be created by the venue or other at the venue's request, and then uploaded to service provider 104 and saved in venue accounts 132.
User accounts 136 may include login and registration information for users that make use of service provider 104 and the services according to the present technology. User accounts 136 may further include user profiles 138, either created by a user when subscribing to the service according to the present technology, or imported from (or linked to) a third-party social platform 120 (
User accounts 136 may further include a friends list, which may be a list of people a user has indicated him or herself to be friendly with or otherwise associated with. In embodiments, a user's friends list may be imported from (or linked to) a third-party social platform 120. The friends list of different users may be cross-referenced in service database 130 to identify one or more friends that two or more users may share in common. In embodiments, at least portions of venue accounts 132 and/or user accounts 136 to be stored locally on a computing device 102 operated by a user, or administrator (or other) at a venue.
Service provider 104 may further include a mail message service 140 which permits computing devices 102 to send mail messages to each other. Mail messages may be sent using short message service (SMS) protocols, but other protocols may be used including without limitation multimedia service (MMS), instant messaging (IM) and email protocols. Message service 140 may permit mail messages to be sent to one or more computing devices 102 from the service provider 104, from a venue, or from another user. The mail messages may be sent via the network 108 and the broadband communications system including base stations 112 and backbone 114. In further embodiments, mail messages may be sent between computing devices 102 using only the broadband communications system (omitting service provider 104 from the loop). In still further embodiments, mail messages can be sent directly between computing devices 102 using peer-to-peer networks 118 which may be established between computing devices 102. Mail messages may be sent and exchanged between computing devices 102 using a variety of other technologies in further embodiments.
In embodiments, a venue 150 may be a place that is susceptible to mapping. That is, a venue 150 may be a place having defined boundaries (such as walls) and/or fixtures, which can be rendered on a map of the venue 150. Where a venue has been mapped, it is contemplated that the boundaries and/or fixtures may move, at which point an administrator (or another) associated with the venue may upload a layout of the venue as modified.
In further embodiments, a venue need not be susceptible to mapping. For example, a venue may be a large outdoor or indoor space or street either having no discernible boundaries, or boundaries which are spaced apart to the point of providing little guidance when attempting to correlate the position of people within the venue to its boundaries. This embodiment where a venue may have no boundaries is explained in greater detail below with respect to
The venue 150 shown in
As explained below, sensors 154 may operate according to a variety of technologies. However, in one example, sensors 154 may be line of sight infrared (IR) sensors which may identify a particular user 152 (and in particular the mobile computing device 102 carried by that particular user 152) by triangulation. In such embodiments, the venue 150 may be outfitted with a number of sensors 154 so that each location in the venue 150 which may have users is visible to at least two sensors. As explained below, sensors 154 need not be line of sight sensors and each location in a venue 150 need not be visible to at least two sensors.
In step 208, the venue may upload a map of the venue to service provider 104. As explained below, when users use the service of the present technology at that venue, a user may access and view the map of that venue on his or her computing device 102. The map is displayed together with location tags, one for each subscribing user. The location tags on the map represent the real time positions of subscribing users in the venue.
The map may be any of a variety of renderings of the venue including for example computer-generated drawings, line drawings, blueprints, color renderings, photographs, etc. Where computer-generated, the map may be uploaded as a digital file and stored in venue accounts 132. Where not computer-generated, the rendered map may first be digitally encoded and then uploaded. In embodiments, the map may be a top view looking down on the floor of the venue. In further embodiments, side views (parallel to the floor) may alternatively or additionally be provided. Where a venue has multiple rooms on a single level, these rooms may be shown on a single map, or on multiple maps that are uploaded. Venues may also have more than one floor or level. A different map may be provided for each floor or level (where there are different levels that do not overlap, such as in a stadium, a single map or multiple maps may be provided). As explained below, the present technology may be used to identify and contact others at venues which are not mapped. For these embodiments, no map is uploaded and step 208 may be skipped.
The map may be registered to the real world space shown in the map using the known location of the sensors, or some other registration point or points. These registration point or points may also be uploaded in step 208 so that the location tags (described below) displayed on the map may accurately reflect the positions of the users in the venue. That is, one or more points on the map may be correlated to the corresponding positions of one or more users in the real world space of the venue. Using these registration point or points, the map may be registered to the reference frame of the real world space. Once the map is registered to the real world space, the positions of the location tags on the map may be displayed as an accurate reflection of the positions of the users in the real world space. Thus, for example, where a user is in the middle of a room in the real world space, the location tag for that user may be displayed in the middle of the same room on the map.
It is conceivable that the map may be registered to the real world space of the venue by methods other than registration point(s) in further embodiments. In one further embodiment, optical sensors, such as sensors 154 or other sensors, may be able to correlate real world walls and/or fixtures with walls or fixtures shown on the map. In such embodiments, no predefined registration points need be uploaded with the map.
Referring again to the flowchart of
Once a venue has provided login and other information described above, the service provider 104 may save this information in the venue accounts 132 in the service database 130 in step 212.
Aspects of the present technology, such as identifying locations of users on the map, and allowing discreet and private contact between those users, are implemented by the connection software 126, explained in greater detail below. The connection software may be accessed and run from the service provider 104, from a venue 150, from a user's computing device 102, or combinations thereof.
For example, in one embodiment, the connection software may remain mostly or entirely on one or more servers within the service provider 104. Users may use their computing devices 102 to access the service provider 104. One or more servers may then respond by providing the services of the present technology to locate and discreetly contact others.
As noted, the service provider 104 may be remote from, or integrated as part of, a venue 150 in different embodiments. Where the service provider 104 is remote from a venue 150, the connection software 126 may remain resident on servers in the service provider 104 as described above. Alternatively, portions or all of the connection software 126 may be embodied in a downloadable application, downloaded from the remote service provider 104 to a computing device 102 of a venue 150. For such embodiments, the connection software 126 may be downloaded to the venue in step 214 (assuming the service provider 104 is remote from the venue 150). Thereafter, users may use their computing devices 102 to access the computing device 102 at the venue to interact with the connection software and receive the services of the present technology to locate and discreetly contact others.
Portions or all of the connection software may alternatively or additionally be embodied in a downloadable application, downloaded from the service provider 104 (or venue 150) onto users' computing devices 102. In this embodiment, the connection software 126 may run entirely from a user's computing device 102, or run from the user's computing device while also accessing and receiving information/data from the service provider 104.
Each user 152 wishing to avail themselves of the connection software 126 may have their own, associated computing device 102. In embodiments, the connection software 126 is used to identify and track the position of each subscribing computing device 102 and its associated user, in real time, as the users move in and around a venue 150. Tracked computing devices may be mobile, but they may be stationary in further embodiments. As noted above, stationary computing devices 102 may more often be used by a venue by an administrator (or other) of the venue to subscribe and interact with the service provider 104, and to upload messages and a map of the venue.
In accordance with embodiments of the present technology, users 152 may subscribe to the service provider 104 to access the features of the present technology. An embodiment for subscribing to the service provider 104 will now be described with reference to the flowchart of
Upon prompting from the service provider 104, a user may provide registration and profile data, which is received at the service provider 104 in step 224. One example of this is shown in the illustration of
The user may also be prompted to add profile information, such as for example a photo 156, and/or a variety of textual descriptive material 158. This descriptive material 158 may for example include an “about me” section and/or a “likes/dislikes” section. Other information may be included as part of the descriptive material 158, such as for example specifics about the type of person the user might be interested in meeting (gender, age, personality, physical features, etc.). As noted above, as an alternative to the user entering profile information, the user may download this information from (or link to) an account the user has on a third-party social platform 120. Thus, when a first user accesses the profile of a second user as explained below, the second user's profile from the third-party social platform 120 may be shown to the first user.
Referring again to the flowchart of
As noted above, the connection software 126 may remain resident on the service provider 104 in embodiments. In further embodiments, once subscribed, components or all of the connection software 126 may be downloaded to and run by a subscribing user from the computing device 102 used for the subscription process in step 234.
The subscription steps described above with respect to the flowchart of
The subscription steps set forth above allow a user to access the features of the connection software 126, and also allow other users to find that user and view that user's profile. However, in a further embodiment, a user may access the features of the connection software without ever going through the subscription steps of
In an embodiment, contact information such as a mobile telephone number may be uploaded to the service provider for a non-enrolled user, upon the non-enrolled user accessing the connection software. In this instance, other users may be able to discreetly locate the non-enrolled user on their computing devices 102, but would not be able to view profile information for the non-enrolled user. In further embodiments, no contact information is uploaded for non-enrolled users. In this instance, other users may (or may not) be able to discreetly locate the non-enrolled user on their computing devices 102, but would not be able to contact the non-enrolled user.
Once subscribed, a user may use the connection software 126. Once subscribed, a user's location and identity (alias and profile) may also be broadcast or otherwise made available when that user arrives a venue 150. An example of the operation of embodiments of the present technology will now be described with reference to the flowchart of
In embodiments, a user accesses the connection software 126 when the user arrives at a particular venue 150. In such embodiments, connection software 126 may then automatically download the map and location tags for that venue 150 in step 244. As an alternative, it is conceivable that a user may access the connection software 126 remote from any venue 150, for example while they are at home or work. When a user accesses the connection software remote from a particular venue 150, the connection software 126 may present the user with a list of venues from which the user may choose. Once a user chooses a venue, a map of the venue, together with location tags for users at that venue, may be displayed to the user. A user may choose to do this to get a real time indication of what users are at what venues 150, and to possibly locate his or her friends. It is possible that a user may select a second venue and view the map and location tags for the second venue, while the user is at a first venue.
The map may be downloaded with location tags, or location tags may be displayed on the map after the map has been downloaded (step 246).
As seen in
In embodiments, location tags 162 are positioned on map 160 by first determining the real world positions of subscribing users in the venue 150, and then correlating those positions to the proper positions on the rendered map.
Referring initially to
In further embodiments, the sensors 154 may comprise a light source and an image capture device such as a depth camera and, possibly, an RGB camera. In such an example, the light source may emit a light, which reflects off of the user 152b and/or the user's computing device 102, and is received back at the camera. Using known techniques such as time-of-flight, structured light, stereo image, or the like, the feedback from a single sensor 154 may be sufficient to determine the position of the user 152b in two dimensional x, y space, or three dimensional x, y, z space. The feedback from more than one sensor 154 may be used with these techniques to assist and/or confirm the position of the user 152b.
It is understood that a wide variety of other technologies may be used by sensors 154 to enable the determination of the position of the device 102 and/or user 152b of that device 102 in the venue 150. Although GPS may have disadvantages as far as accuracy and working indoors, GPS may be used in further embodiments. As noted above, in embodiments, there may be as few as a single sensor 154 used in a venue 150, depending on the technology used by that sensor 154. There may be many more than four sensors used in further embodiments, depending in part on the technology used by the sensors 154 and, possibly, the size and shape of the venue 150.
Data from the sensors 154 may be uploaded to the service provider 104, which then determines the position of user 152b based on the received data. Instead of uploading to service provider 104, this data may be sent to a computing device 102 within venue 150, or to users' computing devices 102, which then determine the position of user users 152b based on the received data. Once the real world position of the user 152b is known in the venue 150, that position may be correlated to the map 160 using the registration point(s) uploaded by the venue 150 with the map 160, or other registration techniques. Once the position of the user 152b is known on the map 160, a location tag 162b for that user may be displayed on the map 160 as shown in
In embodiments, it is contemplated that the service provider 104 be integrated together with the sensor 154 at or near (e.g., within wireless network range) a venue 150. Thus, a venue may have a single component which provides all of the services of the present technology to the venue 150 and users 152 at the venue 150. More than one venue may share such a single component in further embodiments.
As noted, the above-described processes may be performed for all subscribing users (enrolled and, possibly, non-enrolled users) so that the locations of all such users in the venue 150 may be represented by location tags 162 on the map 160. It may be that people at a venue do not wish to be identified and do not wish to be part of the system of the present technology. Accordingly, in embodiments, only subscribing users (enrolled and non-enrolled users who have subscribed to the service provided by service provider 104) are shown on the map 160 with location tags 162. However, it is conceivable that subscribing users and people who have not subscribed may be shown with location tags 162 on map 160.
Moreover, it may be that, at times, a subscribing user does not wish to broadcast their presence at a venue. For such instances, the connection software may offer users the option to disable its functionality for that user. The user may still be a subscriber, but his or her presence is not broadcast in this instance, and no location tag would show up for that user. When a user's functionality is disabled so that they do not show up on the map, that user may, or may not, be able to use the connection software to view profiles and locate other users in different embodiments.
Along with identifying a position of a user, the computing devices of subscribing users may also transmit the identity of the computing device. Using this and the stored login and registration data for all subscribing users, the connection software 126 knows not only the position of subscribing users 152 in the venue 150, but the identity and associated contact information (e.g., cellular telephone) of such subscribing users 152.
The location tags 162 may be color coded to provide some information about the respective users 152, for example a first color indicating women, a second color indicating men and a third color indicating venue staff. Users or developers of the connection software 126 may define that different colors for the location tags represent different demographics in further embodiments (different age groups, single versus in a relationship, etc.).
In accordance with embodiments explained below, a first user may want to introduce him or herself to a specific second user that he/she has seen at the venue 150. However, as an alternative, a first user may simply wish to review a list of profiles for users 152 that are currently at a venue 150. In step 248, the connection software 126 determines whether a user has selected an option to view a list of profiles. This option may be presented on a graphical user interface generated by the connection software 126 on a user's computing device 102.
If the option to view a list of profiles is selected in step 248, the profiles of subscribing users then at the venue (or possibly recently at the venue) may be displayed to the user in step 252. The user may then peruse the profiles to possibly find friends or find someone to whom they would like to introduce him or herself as explained below. If a user finds a friend or someone else he or she would like to meet from perusing the profiles, the user may select another option on the user interface which shows the user where that selected user is in the venue. This feature is shown in greater detail below with respect to
The above steps for perusing profiles may be performed by a user while at a venue. However, a user may be remote from a venue, for example at home or work, when a user performs these steps for perusing profiles. A user can select a venue and look at the profiles of users then at the venue, or who have recently been at the venue.
Instead of (or in addition to) perusing a list of profiles, a first user may see someone at the venue 150 that he or she would like an introduction to. As one example, in
An example of a zoomed in view of map 160 is shown in
However, to gain still further clarity, the user 152a may track and correlate movements of users 152 with the movement of location tags 162 over time. As noted above, the positions of location tags 162 may be updated in real time or near real time, as users 162 move around. As such, referring to
Once the user 152a has identified the location tag 162b of the user they are interested in meeting, the user 152a may select that location tag. In embodiments, each location tag may be hyperlinked to a profile page for the associated user. A user may select a specific location tag using a selection device such as for example a finger touching a selected location tag (for displays which are touch sensitive) or positioning a cursor over a selected location tag and selecting it with a mouse, keyboard or other input selection device.
Referring again to the flowchart of
The user 152a can peruse this information. If the user 152a decides not to follow through with the introduction, the user 152a can return to a display of location tags 160 in step 246 and as shown in
If the user 152a elects to send a text message in step 270, the user may select the button 170, at which point a messaging application is opened in step 272 on the computing device 102 of the user 152a. The messaging application may be a text messaging application and may for example open an SMS dialog box for the user 152a to add any message that he would like to send to the computing device 102 of the user 152b.
As noted above, the user 152a may not know the user 152b and may have no contact information for the user 152b (though in further embodiments, the user 152a may know and have contact information for the user 152b). When a request is received to send a communication to user 152b, contact information for user 152b is retrieved from the database, and the message is automatically addressed to the computing device 102 of the user 152b. For example, if sending a text message, the message is automatically addressed to the mobile telephone number received for the user 152b in setting up her profile. In further embodiments, the messaging application may be an email application, in which case the message may be automatically addressed to an email address provided by the user 152b in setting up her profile. In further embodiments, the contact information provided by user 152b may instead by an account on a social networking website, such as Facebook® or Twitter®. In such event, the user 152a may post a note to the account user 152b has on that social networking website.
In embodiments where the user 152a is sending a text or email, the user 152a may be able to see the telephone number, email address or other contact information of user 152b. However, for security or other reasons, users may not wish to give out their contact information such as mobile telephone number or email address in the use of the present system. Accordingly, in the above-described scenario, in further embodiments, the user 152a is not able to see or identify the telephone number, email address or other contact information of the user 152b. In embodiments, users may configure their profiles as to whether other users are able to see, or not see, contact information.
For additional security, in further embodiments, the message to be sent by the user 152a may in fact be addressed to a proxy address (proxy telephone number or proxy email address) for example at the service provider 104. In this instance, after the user 152a creates and sends the message, the message may be sent to the service provider 104, which may then resolve the proxy address to the correct address, and then forward the message to the user 152b. Thus, the user 152a is able to send a message to the user 152b, but does not in fact have the actual contact information for the user 152b. It is conceivable that proxy addresses not be used, and messages be sent directly to the actual contact information in further embodiments. In further embodiments, a venue 150 may give out computing devices 102 to users for temporary use while at the venue.
The message page 172 may further include a “show where I am” button 178, though the button 178 may have different labels in further embodiments. Again, the connection software 126 has identification information of the user that sent a message, including where that user 152a is in the venue 150. If the user 152b selects the button 178, a map of the venue 150 may be displayed to the user 152b with the location tag 162a of the user 152a highlighted as shown in
The message page 172 may further include a reply button 180. The user 152b may select the reply button 180, to initiate a dialogue with the user 152a (step 276) and they can thereafter exchange messages using the messaging applications on their respective computing devices 102 as shown for example in
Referring again to
The message page 172 may further include a “block” button 184, though the button 184 may have different labels in further embodiments. If the user 152b selects button 184, a message may be sent to the service provider 104 to block all communications from user 152a to user 152b. The service provider 104 may store this as a rule in association with the account data of user 152a and/or user 152b. Thereafter, if user 152a attempts to send a message to user 152b, the message is not sent to user 152b. User 152a may or may not receive notification of a blocked message in different embodiments of the present technology.
The user 152b may select one or more of the options described above. The buttons 176, 178, 180, 182 and 184 are merely examples of options which may be provided to the user 152b on message page 172. It is understood that one or more of these buttons may be omitted, rearranged in a different order, or supplemented with other options in further embodiments.
In embodiments described above, a first user may identify a second user and use the map 160 to initiate a dialog, while at the venue. However, it is conceivable that the same process takes place while the first user is remote from a venue (or remote from all venues, for example at home). While remote, the first user may pull up a list of maps as described above, peruse the maps to see who is at what venues, select a user from a map at a given venue, and then initiate the dialogue with the selected user as described above. It is not required that the first and second users be at the same venue at the same time in order to initiate a dialogue according to the present technology.
In general, the connection software 126, as implemented by one or more servers at the service provider 104, and/or computing devices 102 of the venue or users, provides a variety of functions. These functions include, but are not limited to:
Using this functionality, embodiments of the present technology enhance social interactions by allowing new introductions to be made in a discreet and private manner. A first user has the ability to identify a second user that he or she would like to send a message to. Thereafter, even though the first and second users have no pre-knowledge of each other's identity or contact information, the first user is able to send a private message specifically to the second user, and the second user alone. In further embodiments, instead of not knowing a message recipient, the present technology may be used by friends who know each other to locate and contact each other at a venue.
In still further embodiments, the present technology may be used by the venue 150 to send out an announcement to a select group or all subscribers, or periodic announcements to a select group or all subscribers. The announcements may relate to discounts, specials, events, etc., and may be targeted for specific demographics based on information in user profiles. Additionally, the venue may keep track of users' ordering preferences, for example storing the data in the service database 130 of service provider 104. Thus, a venue can target messages to specific users. For example, if some users have shown a preference for a specific type of alcohol, and the venue is going to have a special featuring that alcohol, the venue can target messages to those specific users in advance.
Embodiments of the present technology described above provide merely some examples, and a wide variety of other use scenarios are contemplated for the present technology. Continuing with an example where venue 150 is a bar or restaurant, a first user may see a bartender or waiter (for whom profiles have also been created in the database), find them on the map 160 (i.e., location tag 152c in
An example of this message exchange is shown in
As a further embodiment, a user may provide his or her credit card information to the service provider 104, for example as part of the user's profile information. When the user thereafter orders food or beverage (either as shown in
Referring to a further use scenario shown in
In
As noted above, any of a wide variety of venues may be mapped and used in accordance with the present invention.
In embodiments described above, a venue generates a map which then aids users in correlating other users in the real-world space of the venue with location tags shown on the map. However, in a further embodiment, it is conceivable that the present technology operate without a map. One such embodiment is shown in
Records of use of the present technology may be stored in service provider 104. These records may be kept confidential or made public. Where public, the connection software 126 may provide an option on a user interface for users to view these public records. The public records may show for example how often given users have used the system to contact others. The public records may also show for example how often given users have been contacted by others via the system. Information provided by different users 152 may also be collected and mined by the venue 150 and/or service provider 104, for example for the purposes of targeted advertising.
The present system may also have further tie-ins to one or more of the third party social platforms 120 (
The computing environment 300 further includes computer readable media. Computer readable media can be any available tangible media that can be accessed by the computing environment 300 and includes both volatile and nonvolatile media, removable and non-removable media. Computer readable media does not include transitory, modulated or other transmitted data signals that are not contained in a tangible media. The system memory 304 includes computer readable media in the form of volatile and/or nonvolatile memory such as ROM 310 and RAM 312. RAM 312 may contain an operating system 313 for computing environment 300. The computer readable media may also include storage media 306, such as hard drives, optical drives and flash drives.
The computing environment 300 may include a variety of interfaces for the input and output of data and information. Input interface 316 may receive data from different sources including touch (in the case of a touch sensitive screen, a mouse 324 and/or keyboard 322.
A video interface 330 may be provided for interfacing with a touchscreen 331 and/or monitor 332. A peripheral interface 336 may be provided for supporting peripheral devices, including for example a printer 338.
The computing environment 300 may operate in a networked environment via a network interface 340 using logical connections to one or more remote computers 344, 346. The logical connection to computer 344 may be a local area connection (LAN) 348, and the logical connection to computer 346 may be via the Internet 350. Other types of networked connections are possible, including broadband communications as described above.
It is understood that the above description of computing environment 300 is by way of example only, and may include a wide variety of other components in addition to or instead of those described above.
In summary, one example, the present technology relates to a method of enabling a first user to contact a second user at a venue, comprising: (a) displaying location tags on a computing device of the first user, the location tags representing positions of users in the venue; (b) receiving a selection by the first user of a location tag, the selected location tag correlated to a position of the second user in the venue; and (c) opening a message for sending by the first user after receipt of selection of the second user in said step (b), the message addressed for receipt by the second user.
In another example, the present technology relates to a system of enabling introductions, comprising: a digitally encoded map of a venue; and a processor on a computing device, the processor executing an connection software to cause the computing device to display the digitally encoded map and a location tag correlating to a location of a user at the venue, the processor further causing information regarding the user to be displayed on the computing device upon receipt of a selection of the location tag.
In a further example, the present technology relates to a computer readable medium for programming a processor to perform a method of enabling introduction of a first user to a second user, the method comprising: (a) displaying a map of a venue on a first computing device of the first user; (b) displaying location tags on the first computing device, the location tags representing users in the venue, and the location tags showing positions of users in the venue; (c) receiving a selection by the first user of a location tag based on the first user determining the selected location tag correlates to the second user; and (d) displaying information to the first user for the user represented by the selected location tag.
The foregoing detailed description of the invention has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise form disclosed. Many modifications and variations are possible in light of the above teaching. The described embodiments were chosen in order to best explain the principles of the invention and its practical application to thereby enable others skilled in the art to best utilize the invention in various embodiments and with various modifications as are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the claims appended hereto.