The disclosed embodiments relate to system architecture, telecommunication network infrastructure, computer networks, digital ecosystems and various types of artificial intelligence.
The Internet
The internet was originally created as ARPANET to facilitate reliable military communication during times of war. Eventually, ARPANET become the internet as more computers were added to it and it was made available to the general public. The problem here is that ARPANET was never modified to provide a high level of secure communication and data transmission before it was released from a controlled environment into a world where anyone with a computer could make use of it. Rather than some sort of “front line” security, separate security needed to be installed on computer terminals, meaning data could still make it to a terminal and it would then be up to the terminal itself to ensure it was safe. Combining this lack of security improvement with the fact that when ARPANET was originally created computers would only have been available to technological institutions, scientists, governments, military and possibly the more affluent members of society, all of whom are named being more focused on educational or defensive purposes rather than malicious, the creators of ARPANET and in-turn the internet would most likely not have predicted, and definitely not been able to prepare for an explosion in malicious uses, vulnerabilities and exploits. By the time computers were mainstream and affordable, the internet was already at too late a stage to change its foundation and it could only have certain aspects built upon rather than redeveloped.
Now, in 2013, many argue that the internet has already, or is very much about to, reach its peak. In terms of data transfer the internet is sound, but as days go by, decades after its original inception, the cracks that the world had already caught a glimpse of are now turning into craters, and as more of the dark side is also brought to the public's attention through the media, more people are wondering what can be done about it.
One major issue and reason for many of these problems is that there was no universal data format for the internet nor the world wide web because they were both publicly released as places where anyone could roam as free as technology would allow. Anything could be distributed in any way, shape or form, meaning there was absolutely no limits or boundaries to what could be shared. Limitless freedom or, to be precise, freedom limited only by what hadn't been developed yet, as with anything in life, eventually led to chaotic situations and trust issues. Over the years companies and organisations have implemented various preventive measures in a bid to help users identify dangerous data sources and prevent security vulnerabilities from being exploited but in open, internet-based environments without any sort of regulation or governance it will always be a losing race for online safety.
Web Browsers
The easiest and most convenient way to view web pages and use web applications, web browsers have become a part of everyday life for most of the world and from a user point of view, things are (mostly) fine. The problems lay in front-end development using HTML, CSS and JS. With multiple browsers from multiple browser vendors, each choosing to support newer advancements when they feel like it and, in some cases, if at all, combined with the length of time it takes for language versions to become standardized, there is a vast period of time where one webpage can have so many different faces or facial features because one browser doesn't support something another does or implements in a different way a particular feature, syntax or property. This can often be a headache for web designers who had a particular vision for a page and has to modify it multiple times to please each browser or, more often than one should, have to settle for leaving out certain things because it's just not possible. In some cases, there are workarounds to get the same presentation, but that usually involves scripting languages, namely JavaScript, being used to create the feature, resulting in a bulkier web page and increased loading times.
Digital Ecosystems And Online Communities
Data—its preservation, distribution, control, searchability, security, accuracy, reliability and efficiency is more important today than it has ever been and, with more of the world relying on internet and digital infrastructure by the second, it becomes increasingly difficult to manage multiple streams from multiple sources around the clock. What's more troublesome is a person finding the data they actually want quickly. This is because the main open network environment used by the world today, the World Wide Web, is filled with only 2 types of data—data a person wants and data a person doesn't. The problem here is that there is barely any organisation across the spectrum, meaning anything can be difficult to find if not searched for under the right conditions. Now, when data useful to one person is utterly useless to another, but the data considered useless is, at that point in time, more than 99.99% of all the data out there, even the most complex search algorithms can yield a mass of results that a person can find daunting and invaluable.
To help with these issues, digital ecosystems have become more prominent in societies around the world. Though social networks and online communities have been around for nearly 3 decades, most have focused on topical interests and subjects such as forums, personal lives and opinions such as blogs or simple photo and video uploading and sharing.
Only since the beginning of the millennium have social network user bases expanded beyond technofreaks and those of specific interests to include general members of the public—and the increase has been both significant and exponential. Having started off on the World Wide Web, now, in 2013 and since the introduction of the first true smartphone in 2007, these ecosystems have migrated to these devices, with each company behind an ecosystem providing their own application software to provide quick and easy access to their services. This dramatically improved the speed performance of access and use of the ecosystems and allowed much more custom functionality than what could have been provided from the World Wide Web, but the trade off was the loss of freedom to update aesthetics and functionality at will and automatically have all users see these new changes without having to push updates which users had the option to ignore.
Some ecosystems used in the smart device world today are controlled by the operating system vendors, such as Google with the Android OS and Apple with iOS, who use proprietary software designed to function at maximum capability with their own OS systems as a way of ensuring users are somewhat forced to stay loyal to their products and services, regardless of whether or not the user chooses to also adopt the services of others. A universal ecosystem hasn't been able to be established for this reason.
The concept of digital ecosystems has been discussed for a number of years. In 2007, a paper entitled “Increasing participation in online communities: A framework for human-computer interaction”, written by Jonathan Bishop was published. He speaks of what drives people to become a part of communities that exist within an ecosystem if they are not an ecosystem themselves—a fundamental part of understanding how a universal ecosystem needs to be designed so it can function in a sustainable, secure and scalable way.
The theories, concepts and opinions mentioned in the paper, both of Jonathon and others, were mostly true at the time of publication as it was written before the explosion of online communities really occurred, but since then it has become irrevocably apparent that the basis of Jonathon's first principle “Principle 1—an actor is driven to act by their desires” where he states “actors are driven by their desires to perform an action as opposed to satisfy an internal entity, such as a need” (people are referred to as actors), is wrong, but by the development of situations rather than a lack of understanding. This is mainly due to the publicly viewable statistics of users such as friend count, profile views, and categorical ranking systems. What was once considered desires have now become needs for most—acceptance and popularity. Regardless of the end of the scale a person may wish to reside, trendsetter on one end or rebel on the other, the dominant percentage of users in these communities are not recognised globally as the person they want to be seen as and, with the freedom of information, communication and sharing available on the internet, it has given rise to a number of pretenseful personalities and characteristics, most noticeably pseudo-intellectualism, pseudo-antisocialism and pseudo-imperialism. Inevitably, this will continue to lead to the implosion of these online communities and ecosystems that are as free as the ones currently in existence, most commonly referred to as social networks. Jonathon speaks of some of the behaviours of these personalities when he mentions the Vengeance desire of level 1 of his framework.
Proprietary ecosystems, such as the one operated by Apple, known as “walled gardens”, are closed to most third-parties when the core of the ecosystem development is in question, and everything must go through them before it can enter the ecosystem, making it much more sustainable and secure than open environments simply because the proprietor controls everything from the ground up. Walled gardens also notoriously exclude extensively social features to the masses from the core of the ecosystem, only allowing those that are designed to connect genuine friends or small sets of people (in comparison to all users of a service as most social networks do. Exceptions do exist such as in the world of Xbox Live, where players can connect randomly to any other players to play a game but the actual friends list has a limitation), while sometimes allowing approved third-party social service providers to operate within the ecosystem using specific features, such as data sharing, or using their own software applications. While much safer and easier to maintain, “walled garden” ecosystems are known to heavily restrict a users freedom of expression as everything must first be pre-approved by the proprietor.
A viable universal ecosystem must provide the key benefits of proprietary ecosystems while allowing users an acceptable amount of freedom to express themselves with at least the option, but not obligation, of being social. A major advantage of the internet and digital world is privacy, personal space and more freedom than in the real world and this must be acknowledged and respected when creating and maintaining a sustainable environment. A common misconception when approaching digital ecosystems is the belief that they can be made, initially or eventually, to operate and be governed just as the real world is, except through the use of computers.
Digital Identities, Authentication and Authorization
With the explosion of digital ecosystems and online communities came the need for people to remember account login information for numerous sites and services. This caused two major issues/concerns:
Some open standards have been introduced and are in use by individuals and businesses of all sizes to help with identity verification and access. Standards for authentication purposes, such as OpenID, allow a user to use one account across all sites and services that support the standard they have an account for. Standards for authorization purposes, such as OAuth, allow a user to access server resources without the need to enter login credentials. A major issue, and possibly the most significant with these, is that it is available for anyone to implement and use and is purely software driven, meaning the security behind them will inevitably be cracked and at a much faster rate than if security hardware was involved as anyone around the world is able to take on the task of cracking it, individually or as a group. A second major issue is that security measures cannot be changed dynamically and immediately. Due to the distributed nature, security flaws can only be fixed by releasing updates, which then requires all who have chosen to implement these systems to download and install the update to completely eradicate previously found flaws.
Real World Connections
Everyday in the world there are people who need the services of other people and turn to the internet or directory services for an answer. Sometimes the answer is down the road while other times the answer is halfway around the world with people they may never meet in person. Sometimes they may never find the answer. Everyday these same people in need walk past a multitude of individuals as they go about their lives, completely oblivious to who they are or what they do. The person they need, the person who can provide the definitive answers and solutions to all their questions and problems may be sitting next to them on the train or standing behind them in a line for coffee, yet they don't even know it. People don't walk around with visible signs letting others know what skills they have and every single day people miss opportunities and don't even know it.
Software Industry's “Race to Zero”
In an article on his website “IPWatchdog” dated 9 Apr. 2009, patent attorney and electronic engineer/software programmer Gene Quinn discusses the “race to zero” of open source software and how free/open source software is killing off proprietary software, inevitably leading to the destruction of the software industry simply due to the fact that with free replicated versions of proprietary software so readily available comes the annihilation of cost, meaning no one makes money from software development. Some “open source advocates”, as Quinn refers to them, argue that the direction in which the industry is heading will force software creators to be innovative to stay ahead of all competition, but in a world where software patents are and have been a hot topic of debate for many years, with many sitting on either side of the fence regarding their patent eligibility, coupled with the fact that all the time, cost and effort put into research and development to find the best architecture and solutions can be diminished within months, likely before the next major release, by software creators who have copied and released a full-featured free version, who is going to risk software innovation for which they may never be rewarded as much as they ought to be? The answer, if anyone, could only be large corporations who can afford to develop and deploy quickly and, if necessary, pay for lawsuits. Smaller companies and independent developers risk losing out majorly to open source and freeware, and will continue to be forced to work for or sell their company or property to larger companies. Even worse, these groups may be ripped off by larger companies, as was the case with Snapchat versus Facebook's Poke in 2012/2013.
Power Consumption
Even with ARM architecture based processors providing an excellent power-to-performance ratio for portable smart devices, tasks a processor has to manage still consumes enough power to deplete a fully charged battery in less than 24 hours with average usage and 48-72 hours with minimal usage. Anyone who has experimented with “Airplane Mode” on for a substantial amount of time would have noticed the major decrease in power consumption, and the opposite is true for those who have airplane mode switched off and location services on with an even quicker depletion of power than normal. The amount of power required for the processor to send and receive data therefore dominates the breakdown of power consumed for different types of tasks.
Mobile Advertising
With the popularity of smart devices in the world today, namely smart phones and tablets, advertisers and operators of advertising networks are fighting desperately to be the first to solve the main issues of mobile advertising—how do you effectively advertise on a smart device within the confines of a personal screen space but without being overly obtrusive on the user, and how do you engage the user in such a manner that gains their intrigue. Two business individuals faced with this problem had this to say:
Until now, people have simply tried to impose advertising on users in an overly obtrusive manner—in-app ad banners that appear at the top and bottom of the screen, large ads appearing in line with news feeds and the old 90s method of advertising spaces on websites, usually at the top and running down a side column of a page or, in more recent years, screen overlays. The main problems with the website methods are, of course, that they haven't universally been optimized for mobile device browsers and their smaller screens, requiring mobile versions of sites to be made that couldn't efficiently employ the same advertising techniques, lack of frameworks needed to support certain types of ads (namely Adobe Flash missing from some devices) and the lack of hardware needed to provide satisfactory performance of motion graphics and rich media.
Within the past decade, advertising systems have relied heavily on algorithms in conjunction with data gathered from social networks, browser cookies, spyware and GPS location to gather data on users and serve them what's known as ‘targeted ads’—ads relative to a user's location, search history, browser history, social network behaviour and more. The algorithms have become more complex and the targets more accurate, making any data gathered more valuable, which is how companies have been seen to profit from this, as well as through the clicking of the ads themselves, or sometimes just through the impression of the ad.
With so many companies operating their own online and offline advertising networks, generating their own statistics and selling on all types of collected user data at their own prices, no one has focused on trying to make it cheaper and as efficient as possible for businesses to do the marketing and market research they need in order to prosper, especially new businesses with little to no capital, except for when they need to undercut the competition in order to steal clients.
Others have tried to go about attempting to solve the problem of mobile advertising by using simple methods of innovation—building upon what is already there in minor incremental steps, rather than looking at highly complex methods of innovation that borderline on the creation of new technology; rebuilding from the foundation up instead of just adding a new level.
Hybrid Applications
A final obstacle for those looking to become prominent in smart devices, particularly mobile, is that they only have 3 options:
Gartner, Inc. who believe at least 50% of all companies and businesses will be using hybrid applications by 2016, had this to say:
While hybrid applications do the best they can to provide the best aspects of both worlds, due to the nature of how web engines and the World Wide Web itself works, web browsers (in any form) will never be able to keep up with the performance of native applications when comparing user interaction and data handling of web documents to native objects. Even more so, as technology continues to progress and is implemented in smart devices, the same differences will remain, some of which are:
Artificial Intelligence and Ambient Intelligence
For decades technologists, computer scientists, software engineers and programmers have been searching for a way for computers to become as intelligent as humans—and then surpass them. Thanks to individuals such as Raymond Kurzweil and Juan Carlos Augusto, computers are able to understand, communicate and adapt to physical environmental changes, but so far nothing on a large scale has been designed that can truly bring the world together as most work is still in theoretical, hypothetical or research stages. Also, systems of this nature have been heavily criticized for the unknown—the impossibility of predicting what a computer system may desire once it has the ability to become intelligent and self-aware, and what political, societal and cultural impacts it may have, as well as privacy invasion that may occur. Some have also voiced the opinion that building something of this nature is utterly impossible.
Augmented Reality
There have been some new advances in a technology that, although was first created around 1957, has yet to find a mainstream, real world and everyday use. Augmented Reality, a term coined in 1990, has been the subject of many projects in recent years, with multiple large corporations now manufacturing prototypes and even full production models of what is seen to be the first feasible versions of AR units that can be used as part of everyday life, which are to be released as early as the second half of 2013. Yet still, companies face a number of issues, including:
Virtual Worlds
Computer-driven, digital virtual worlds have existed since the 1960s with the introduction of a visual flight simulator by Thomas A. Furness III and the virtual reality and augmented reality head-mounted display system by Ivan Sutherland and Bob Sproull. Now, in a world as connected as we are in 2014 and with the affordable computer processing power easily and readily available, the aesthetics and capabilities of virtual worlds have significantly improved and now benefit multiple industries. In the world of entertainment, some massively multiplayer online (MMO) games that permit user generated content, such as Second Life, have taken virtual worlds to new heights, bridging a gap between the real world and virtual worlds by allowing in-game actions to have a real world outcome, for example, the ability to order products in game that are then delivered in real life. The problem with online virtual worlds such as Second Life arise when there are conflicts with in-game possibilities and real world laws. Illegal online gambling, fraud and IP violation are common crimes committed online and as such have caused much controversy for Second Life as governance of digital crime, especially over the internet, is very difficult and lengthy.
Virtual Cryptocurrency
Though in existence since 2008, cryptocurrencies remained generally unknown until the revelation of the Silk Road criminal website which used bitcoin for transactions in late 2013. As an encrypted virtual currency, it is decentralized from any government authority and encrypted in such a way that has thus far made it impossible to see or track who is sending or receiving funds over the peer-to-peer bitcoin network, making it a haven for criminal finances and financial transactions. Since the emergence of bitcoin, other virtual currencies have been created and are currently in circulation. Due to the nature of cryptocurrencies, the value, especially of bitcoin, is on the rise and will likely remain that way without government intervention.
Accordingly, there is a need for the following:
The above deficiencies and other problems that may be associated are reduced or eliminated by the disclosed multifunction system. In some embodiments, a telecommunication network using sensors and one or more computer systems is used to increase the performance and reliability of data transfer as well as improve the security of data and data connections. In some embodiments, the system is capable of powering a globally connected digital ecosystem. In some embodiments, the system provides extensive data management capabilities using metadata, maps, sensors or wireless technology. In some embodiments, the system provides a way to remotely control the interface and functionality of native applications. In some embodiments, the system is an artificial intelligence system or life form. In some embodiments, the system provides a personally tailored digital experience for users. In some embodiments, the system is a digital mail carrier. In some embodiments, the system provides the capability of advertising effectively. In some embodiments, the system creates a reality-virtuality continuum by significantly bringing the gap between the real and virtual world.
In an aspect of the invention, problems it recognises and/or how it solves them, an interconnected computer system and telecommunication network brings together the real and virtual worlds through the use of smart devices in order to assist in the everyday lives of physical entities.
In another aspect of the invention, problems it recognises and/or how it solves them, although users publish data onto a universal ecosystem, they are granted fine control over who is able to view any of their data should they wish to limit it to anyone specific.
In another aspect of the invention, problems it recognises and/or how it solves them, publishing users can have other users endorse their data, enabling all users endorsing data to acquire their own individual view count for the endorsed data while contributing to the total view count of said data on behalf of the publishing user.
In another aspect of the invention, problems it recognises and/or how it solves them, users are able to create one or more distribution lists using single click solutions for them to distribute data on the system that can be used universally across the ecosystem without having to build independent modules for applications deployed within the environment.
In another aspect of the invention, problems it recognises and/or how it solves them, by allowing users to publish a single piece of data in multiple languages or having it automatically translated, publishers can reach tourists who don't speak or read the native language without having to incur additional costs, and have the correct language displayed depending on factors such as the localization settings of the user's device or the settings on their account.
In another aspect of the invention, problems it recognises and/or how it solves them, by allowing entities to publish and control content from their smart devices, they are able to target their desired audience while on the move and, by leveraging the power of a sensor-based telecommunication network, can reach others on a global scale for the same price as reaching an entity next to them.
In another aspect of the invention, problems it recognises and/or how it solves them, users may only pay for data views that are genuine—by delaying the execution of the view count increase until a user has been viewing the content for a specified amount of time, publishing users will no longer have to pay for accidental views.
In another aspect of the invention, problems it recognises and/or how it solves them, users who have difficulties with sight and therefore find it hard to interact with data that doesn't use sound can have an audio description played to them, allowing them to hear what has been written and visualise in their mind what the data on screen is of.
In another aspect of the invention, problems it recognises and/or how it solves them, the system is capable of analysing and producing data tailored on behalf of an entity to their specific needs and requirements.
In another aspect of the invention, problems it recognises and/or how it solves them, with one system capable of storing important statistical data on a global scale, a unified set of statistics can be used to produce more accurate results relating to how effective and successful/unsuccessful data has been. Based on these results, the system can produce trend patterns and predictions based on data from previous years, recent search statistics, recent user activity and more, significantly reducing the time and cost for those conducting research to gather the information they need and make critical decisions.
In another aspect of this invention, problems it recognises and/or how it solves them, by allowing remote code to be downloaded that can then be interpreted and translated into native objects, functions, function calls, classes, actions, properties and more, users can dynamically create layouts and change the user experience of their applications without having to seek approval on updates, meaning they can fix issues, add features and change the look and feel in an instant while at the same time ensuring all users are running the most up-to-date version.
In another aspect of the invention, problems it recognises and/or how it solves them, Augmented Reality was originally used for military, industrial and medical purposes, but in modern times has been applied in areas such as art, commerce, education, navigation, entertainment and tourism, yet still there is no proven reason as to why individuals should and would constantly have an AR device on their person at all times and in constant use. This system, providing Augmented Reality capable data to digital screens around the world, creates a real world environment that under normal circumstances appears simply as a completely digital version of what we see today but, when viewed with Augmented Reality capable hardware, springs to life and bursts into action, giving all those using Augmented Reality capable hardware their own personal experience of sound and visual motion, augmenting the reality of a user so much so that it creates the realistic illusion that the real world and digital world have crashed together and are co-existing in the same living space, with the latter only perceived to exist under the right circumstances. Each user's perceived view of current reality can also be tailored to them. Conditional statements and algorithms can allow different users to have a different Augmented Reality experience when looking at the object, based on metadata and a user's interests.
In another aspect of the invention, problems it recognises and/or how it solves them, certain areas of some cities are renowned for certain industries being the dominant presence, such as the fashion industry in London's Savile Row and Rue du Faubourg Saint-Honore in Paris, while Performance Arts take center stage in the Theatre District of New York. By custom mapping areas of the world within the system, material made prominent on a user's smart device can reflect what they are seeing in the real world by using the device's location to filter what is shown and what they view.
Similarly, entities that occupy and are in control of a space, such as those with their own shops, may want to:
By employing a content-control system comprised of a control unit and sensors, the owner of the space can use the sensors to filter all data viewable within that space by setting restrictions using the control unit and the sensors will produce a wireless signal that will communicate with the client software on the user devices, telling it what not to display.
In another aspect of the invention, problems it recognises and/or how it solves them, when a person is out and about, they pay attention to what interests them and subconsciously filter out anything that doesn't pertain to said interests. At the same time, they may not be able to pay attention to everything they would find interesting for various reasons—multitasking, in a rush to go somewhere or maybe just having a bad day, which could result in them missing things that may interest them the most due to lack of focus or simply not enough time. Using proximity sensors, the system can sense the presence of a user and, if the user acknowledges the screen, begin to provide a personal service to the user by reading the account information of their present device and cross-referencing it with data that has location-based metadata attached which matches the location of the user within a given radius and then alert the user of local offerings such as events, make suggestions of what it thinks they may like and want to make note of, such as new items in store and inform them of the latest information such as sales and special offers.
In another aspect of the invention, problems it recognises and/or how it solves them, by creating a way for digital stationery, such as business cards, to be assigned to a user account to update the details and design data displayed by connecting to a database then downloading and displaying the new data, users would not need to order new stationery to change the design or details.
In another aspect of the invention, problems it recognises and/or how it solves them, a universal digital ecosystem is created that can work across the spectrum of smart devices and platforms. By allowing this digital ecosystem to interact with the personal and business sides of a person's real life, they are actually able to control aspects of their real world from a smart device with a sensor-based telecommunication network connection.
In another aspect of this invention, problems it recognises and/or how it solves them, digital ecosystems may be divided into sub-ecosystems for the benefit of people's varying interests, different industry sectors, different aspects of societal life etc.
In another aspect of the invention, problems it recognises and/or how it solves them, having one account for a universal digital ecosystem means a user won't need to remember multiple login details, but instead have a single point of sign-in from which they can have logged in access to any application or service deployed within the ecosystem.
In another aspect of this invention, problems it recognises and/or how it solves them, by creating an ecosystem that allows entities to publish advertising and promotional data that can be accessed from smart devices, users no longer need to be bombarded with advertising in such an obtrusive manner while they are trying to accomplish other tasks, but can freely seek out any advertising and promotional data they desire when they decide to or have data relating to what they have expressed interest in appear on a home screen of their smart device via a widget; it being on the home screen meaning the user will come across it when navigating their device, and more than likely visit the widget out of curiosity, free to peruse at their own leisure data they may actually be interested in. While using the client, users can browse the ecosystem for their favourite entities to see what they have published, while the system brings data to them that it deems will be of interest based on their categories of interest, other entities they subscribe to, data they have viewed and more.
In another aspect of the invention, problems it recognises and/or how it solves them, the system provides intelligent ways of connecting people and businesses when one entity has a need that another entity can fulfil by using proximity sensors to detect and alert an entity to the presence of another who may be able to help them.
In another aspect of the invention, problems it recognises and/or how it solves them, the system provides intelligent ways for devices to connect to people and entities over an ecosystem under certain conditions to alert or inform those of whom it needs.
In another aspect of the invention, problems it recognises and/or how it solves them, a telecommunication network is created to better fit and make better use of the main types of devices used in the world today.
In another aspect of the invention, problems it recognises and/or how it solves them, a telecommunication network can be extended for personal and private use by adding specific types of connection points that are able to have their own personal settings, controlling users and approved users.
In another aspect of the invention, problems it recognises and/or how it solves them, a telecommunication network provides constant and reliable data connections by using a common connection point for multiple types of connections.
In another aspect of this invention, problems it recognises and/or how it solves them, a telecommunication network may adjust bandwidth by sensor or area depending on factors such as device numbers and active connections within a given area or sensor.
In another aspect of this invention, problems it recognises and/or how it solves them, data transmission to and from a device may be facilitated by the mirroring of data instead of uploading and downloading to reduce the workload of the processor.
In another aspect of the invention, problems it recognises and/or how it solves them, an encrypted data system provides secure end-to-end connections for data transmissions. All data is encrypted before it is sent and may only be decrypted at a maximum of 2 major points—at a central system and its destination.
In another aspect of the invention, problems it recognises and/or how it solves them, devices may connect with each other at further distances than direct connection technology of devices may allow by bouncing a connection off of one or more sensors to its destination device.
In another aspect of this invention, problems it recognises and/or how it solves them, pin-point positioning and enhanced location services are made possible by the presence of a multitude of sensors with overlapping sensor areas that are able to track and record the current and previous positions of smart devices.
In another aspect of this invention, problems it recognises and/or how it solves them, a telecommunications network works with a digital ecosystem to provide a personal user experience for each individual user that may be shared if and when they choose without obligation by separating a user's personal experience from their social experience but allowing data to flow between them.
In another aspect of the invention, problems it recognises and/or how it solves them, a system capable of learning and understanding in the same or a similar way to humans is able to interact with other entities in a highly intelligent manner with the ability to express mood and emotion, as well as develop and change its personality based on what it learns and experiences in order to respond in a manner that best fits a situation.
In another aspect of the invention, problems it recognises and/or how it solves them, digital entities and avatars, personalised or otherwise, may perform tasks on behalf of a user with or without instruction in a virtual world by studying what the user is or may be interested in along with their typical behaviour, making for a much more convenient digital experience.
In another aspect of the invention, problems it recognises and/or how it solves them, a permanent bridge between a virtual world and the real world is established by embedding a virtual world environment directly into a digital ecosystem and/or telecommunication system.
In another aspect of the invention, problems it recognises and/or how it solves them, a virtual world that allows digital existence that may correspond with the real world and be governed by local, national and/or international law.
An overall scope of the digital ecosystem and how it's connected.
An example of how to post a single piece of content in multiple languages.
An example of having a user endorse the content of another and gaining their own view count which contributes to the overall total views of said content.
An example of the flow of data within the ecosystem, between any connected devices and a main system.
An example of the flow of the data through the system from the moment it is sent from an input device to the server and then received by the client.
An example of designating areas of a map for specific data.
An example of what may happen when content data is viewed.
An example of displaying content which is of interest to a user on a home screen section of a smart device.
An example of how the system can utilize eye-tracking technology to record when a user looks at a smart screen and to determine when to interact with a nearby devices and users.
An example of how the system can be set to only allow specific data to be displayed within the area of proximity sensors.
An example of Augmented Reality visuals and sound being streamed in real-time based on the Augmented Reality marked display to the Augmented Reality capable device, and then live streamed from one device to another via wireless connectivity.
An example of how to link smart device clients to user accounts.
FIG. A is the stationery before data is retrieved.
An example of how the payment system may operate.
An example of how layout code can be written and stored remotely, and then downloaded and translated to dynamically create a user interface and user experience.
An example of how sub-ecosystems can be formed once the main ecosystem is setup.
An example of how the ecosystem can be secured to prevent data exploitation.
An example of how users looking at the same object can view it in a completely different way.
An example of how a user can share their view of the world with others.
An example of how a new sensor-based telecommunication network can be formed and used.
Examples of how personal and private networks can be set up to operate using the telecommunication network.
An example of how data can be transmitted from one user to another by bouncing off of sensors.
An example of how sensors can efficiently manage connections.
An example of how sensors can efficiently manage connections.
Examples of how components relative to the intelligence of the system may be structured.
Examples of entities present on devices.
Examples of how virtual worlds may coexist in the same space as the real world.
Examples of conceptual models of the system.
Reference will now be made in detail to embodiments, examples of which are illustrated in the accompanying drawings. In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, it will be apparent to one of ordinary skill in the art that the present invention may be practiced without these specific details. In other instances, well-known methods, procedures, components and networks have not been described in detail so as not to unnecessarily obscure aspects of the embodiments.
The terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the description of the invention and the appended claims, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will also be understood that the term “and/or” as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
Though the description may refer to using a sensor-based telecommunication network, any and all embodiments described herein may be applied to other types of telecommunication networks should they have the ability to do so.
As used herein, the term “if” may be construed to mean “when” or “upon” or “in response to determining” or “in response to detecting,” depending on the context. Similarly, the phrase “if it is determined” or “if [a stated condition or event] is detected” may be construed to mean “upon determining” or “in response to determining” or “upon detecting [the stated condition or event]” or “in response to detecting [the stated condition or event],” depending on the context.
The terms “device” and “smart device” may be used interchangeably to refer to any device or entity, electronic or other, using technology that provides any characteristic, property or ability of a smart device. This includes the implementation of such technology into biological entities.
The term “processor” may refer to any component of a device that contains any type of processing unit that is capable of handling the task described. This includes but isn't limited to a central processing unit, graphic processing unit, advanced processing unit and multiple types of system-on-a-chip (SoC).
The term “sensor”, unless otherwise stated, may be used to refer to any sort of device or component capable of detecting other components, devices, people, objects or properties within a given distance or environment that it has been made or programmed to detect. Sensors may also be capable of sending and receiving data to and from one or more data sources.
The term “engine” may be used to refer to a software engine, physics engine and/or any hardware components that help facilitate the use of a device with one or more embodiments described.
The term “natural life” may be used to refer to any sort of natural living organism, such as plants, animals, fungus, micro-organism etc.
The term “controlling user” may be used to refer to a user of a device or system that has permission and is able to make modifications to a system or device's settings.
The terms “sensor” and “sensor unit” may be used interchangeably unless the two are used, at any point, to specifically describe two different objects.
The terms “post”, “posted”, “publish” and “published” may be used interchangeably to describe the issuing of data or information unless otherwise stated.
The system supports a variety of applications and uses, such as one or more of the following: a universally viable digital ecosystem, a portable data publishing platform, a storage facility, an artificial intelligence system/entity, a data analysis system, a personal interaction service, an endorsement service, a media viewing application, a media controller, a remote device controller, a mapping application, a timing application, a display widget application, a proximity detection application, an eye-tracking application, a wireless data filter, a media stream relay, an Augmented Reality display system, a digital mail delivery system, a transaction system and/or a hybrid application engine.
The various applications and uses of the system that may be executed on the system may use at least one common component or software client capable of allowing a user to perform at least one task made possible by said applications and uses. One or more functions of the client software as well as corresponding information displayed as part of the user interface may be adjusted and/or varied from one task to the next and/or during a respective task. In this way, a common software architecture (such as the client application or intelligence system) may support some or all of the variety of tasks with a user interface that is intuitive.
The following description is not to be read as the order in which steps must be taken to compose the present invention described herein unless clearly stated.
Attention is now directed towards embodiments of the system.
Central systems may store, process/handle, manipulate, distribute and analyse data it holds and data that passes through, as well as being a connection point smart devices may pass through when communicating with each other. A central system may include one or more of the following but is not limited to: a processing computer, a hardware or software client, a hardware or software server, a mapping engine, a concept engine, a database, a file server, a media server, a mail system or a routing system.
Smart devices require at least one hardware or one software component to communicate with the telecommunication system and/or ecosystem. In some embodiments, the same hardware and/or software component or additional hardware and/or software components may help facilitate other device uses with the telecommunication system and/or ecosystem. In some embodiments, programs or instruction sets may be implemented along with other programs or instruction sets as part of a processor or other component.
In some embodiments, a user may create an account that allows them to create, manipulate and/or access data of the ecosystem. In some embodiments, this account may be universally used across the ecosystem and everything connected to it, including other systems and services. In some embodiments, a user's account may be used a digital representation of themselves. When so, users are able to add information about themselves that the ecosystem may use, such as their interests. In some embodiments, users may upload an avatar to be used with their account. In some embodiments, a user avatar may be a still image. In some embodiments, a user avatar may be a moving graphic or video. In some embodiments, a user avatar may be an object. In some embodiments, a user avatar may be interactive.
In some embodiments, a user may create a relationship between their account and other accounts they may own and use for other purposes to download and/or synchronise information. In some embodiments, a user may create a relationship between their account and an account or record of an authority or governing body for identify verification purposes.
In some embodiments, data may be published directly from a smart device.
In some embodiments, multiple versions of data may be published in different languages. Example smart device 201 of
In some embodiments, data may be, automatically or upon request, translated from source language to a preferred language of a user using internal or third-party translation services, requiring only source text to make it possible. In some embodiments, commands and/or gestures may be used to submit data.
In some embodiments, a publishing user may authorize another entity to distribute original versions or copies of their published data. In
In some embodiments, one or more of the following are used as part of an ecosystem network: a user device, an ecosystem client, an ecosystem, a processing computer, a database, a media server, a digital screen or a console.
Connection 404 is also used by the processor to retrieve data from any servers and databases the system uses for storage. Data may then be sent back to the ecosystem via connection 405 for viewing, interaction and other permissible purposes. In some embodiments, data may be sent directly to user devices or other devices, smart screens, consoles and/or other third party systems and services via connections 406a and 406b. Data sent to the ecosystem may then be sent to smart screens, consoles, user devices and/or other devices connected to the network via connection 407. In some embodiments, smart screens or consoles may stream and/or relay data to user devices and other devices using both methods of wired and wireless connectivity via connection 408. A user device or other device receiving data may also be used to send data to the network, as shown in process 409.
In some embodiments, data may travel along individual paths, depending on the type of information it contains. Before data is sent, specific information is set within its metadata. As it is sent, it travels along the path specifically set or best suited for its type to its destination. This is shown in
Where
In some embodiments, when data is being sent to a client, it may pass through a zone mapping system via process 505 which controls whether or not the data is eligible for display within the current area in which the receiving client is located. In some embodiments, the data may pass through a filter system via process 506 which controls whether or not the user of the client said data is travelling to wishes to view data with characteristics or metadata properties of the data being sent. In some embodiments, data may be passed to a software client, that may also act as a server, via process 507. Clients that also have the capabilities to act as servers are able to stream data to other devices with client or client/server software via process 508, allowing client devices to create peer-to-peer networks on-the fly, data relays and direct data streams. A user may interact with the data received by the client which may in turn, via process 509, cause the client to send data back to the processing system from the input device.
In some embodiments, with enough data stored in databases or accessible elsewhere, the system, via process 510, can begin to interact with an Artificial Intelligence concept engine designed to analyse data to find trend patterns and make predictions on one or more scales, from local to global and, based on a myriad of option combinations, produce ever-increasingly accurate results. An example of an algorithm method used, including an example of available options, is as follows:
Please note that the above algorithm method is an example of how the system may makes its predictions and determine patterns, and that some of the steps listed may be performed in a different order than stated as well as the inclusion or removal of procedures for other purposes.
In some embodiments, digital letter mail may be sent from a user to other users. Any digital mail submitted to the system is sent from the engine central processing system to the mail system via process 511. Once there, the mail system may contact the database via process 512 to verify any metadata of each mail item against account information held in the database as to establish things such as whether or not the item has been legitimately sent by the entity whose information is stated as the sender of the mail, or to check that the mail is being delivered to the right person at the right address, account or location.
Verified mail is passed to the routing system. The routing information of the each item's metadata is analysed. Routing information is any string, single or multiple lines, which may contain independently identifiable parts, that tells the system which client(s) the mail should be sent to. Some examples of acceptable strings are addresses written in common format, addresses written in a shorthand format and unique client ID routing addresses, examples of which are shown below in respective order:
In some embodiments, a coordinates system may be used. When a geographic coordinate system is used, such as longitude and latitude, an additional identifier may be included to individualise recipient clients that may appear to occupy the same geographical location, such as within homes of tower block housing, as shown in the example below, where the geographical location is the same but the individual identifier, in this case the final character of each string, is different:
Once analysed, each mail item may then send to its designated recipient client via process 514 where it may be stored in a local database on their receiving device(s) for the recipient user to view at any time. In some embodiments, at different points of the mailing process, such as when the mail item arrives at the mailing system or when it is opened by the recipient user, the mail may be scanned by the system for security purposes. The system may look for keywords or phrases that may be cause of concern, as well as the mentioning of people of interest.
In some embodiments, one or more parts of the system may have or employ a tree-like structure for the data to travel through.
In some embodiments, as in
The Zone Mapping system mentioned as a part of
In some embodiments, on screen information may be communicated to a user through audio methods. In
In some embodiments, rather than having to open an application to see data, users may have data displayed directly on a home screen or main interface of a smart device. On the screen of example smart device 801 of
In some embodiments, the system is able to register views and/or interact with users through the use of display screens, eye-tracking technology and sensors, as shown in
Also in
The system may also determine whether or not it is reasonable to interact with a passing user based on whether or not the user stops or slows down within a reasonable sensor range.
What is considered “reasonable” when referring to viewing ranges and sensor ranges may be decided by the manufacturer, governor, operator, user or AI of a display screen and/or sensor, and may be done completely at their discretion.
In some embodiments, systems and/or devices may detect the presence of one another when within a certain proximity and cross-reference account information of users signed in. Personal sensor area 910 may be generated by a smart device of person 905. The sensor of a smart device of person 905 is able to detect the presence of other personal smart devices within personal sensor area 910, such as the smart device of person 904. Should the system of a smart device of person 905 determine that person 904 is a person of interest to person 905, a smart device of one or each person may alert the person to the fact the other may be a person of interest or person who is interested. For example, should person 905 need help with a task and they published data on their system account requesting help, their sensor, having detected the presence of person 904 and their smart device, can be used in conjunction with accompanying software on the device to pull and analyse the details of the user account signed in on the smart device of person 904 and, if it is read that the owner or operator of the user account of the smart device of person 904 offers services or has skills that can help person 905 accomplish the aforementioned task, it may alert person 904, person 905 or both individuals of the fact that they may be of interest to each other.
In some embodiments, to more accurately determine which person, device(s) and information go together when wanting, beginning or during interaction with a user, sensors may be used in conjunction with cameras and/or other hardware or software to pinpoint the location of said device(s), read information and data from the account signed in on said device and find and track the person(s) of whom are most likely in possession of a device that is communicating with a sensor.
In
In some embodiments, sensors may be used by the system to control the flow of data within a given space.
In the example shown in
In some embodiments, clients or client/servers of smart devices are able to relay incoming data streams to the clients of other devices by creating exact copies of data as it is received and then immediately broadcasting to a recipient over one of more types of transfer protocols that support real-time or near real-time data streaming or via close proximity networking, such as PANs and LANs, that use wireless technologies such as Bluetooth and Wi-Fi, as well as wired technologies to connect clients and share data. Doing so allows persons who do not have AR capable hardware to view augmented versions of reality, despite the lack of support on their device.
In some embodiments, certain smart devices are able to be assigned to a user account, allowing the owner of said account to control exactly what is displayed on that device client remotely. This is achieved by creating a relationship between a user account and a unique identifier of a device. The unique identifier can be fixed, where the device or client is assigned a permanent unique identifier or dynamic, where a device or client is given an identifier which may or may not be changeable or removed at later times, based on factors such as location, the order in which it is assigned, the user account it is being assigned to and more. Once a relationship has been established, one or more of the following are possible:
In some embodiments, an account owner may give permission to other accounts to control the display of data on one or more of their devices/clients. In some embodiments, this may also allow the device/client to pull account data from all other permissible accounts other than that of the owner of the client device.
In some embodiments, digital stationery may be connected to a user account of the system, allowing data on the stationary to be modified or changed remotely via a wireless connection.
In some embodiments, the system itself, from within and/or outside of the ecosystem, is able to handle payment transactions internally and/or using third-party payment systems. There are multiple ways to initiate a transaction, the most common being:
How the payment system handles the movement of funds is based on how a paying user wishes it to. In some embodiments, if a user has chosen to add funds to their system account, the system checks the amount of funds they have deposited in an escrow account and decides if the transaction should be approved or denied based on whether or not the amount of current funds the user has is greater than the cost of the transaction. In some embodiments, if the user has chosen to use a third-party to process the transaction, information about the transaction is passed to the third-party system and the response is then evaluated by the payment system. At the end of a payment check, the system either completes the transaction if it is successful and transfer the funds to the account of the payee before alerting both the payer and payee of the successful transaction or produces an error to the payer if the transaction is unsuccessful.
In some embodiments, native applications can be partially or completely updated while running in the background, while in use and/or just as long as it is installed on a device. To allow designers and developers the same level of freedom that those who operate in the area of web systems are accustomed to when creating, arranging and updating systems, applications, content and templates of web documents and websites while achieving the performance of purely native applications that those operating in the area of native application and software development and engineering are accustomed to, the system may incorporate an application engine that is able to receive code from a server and, if necessary, translate said code into a native language the receiving device can understand, to create native components such as objects, properties, classes, actions and functions calls on the fly.
Application designers, developers and other users can create templates that include both functions and visual materials, either visually or written in code, that are stored on a server as code. If template code isn't written or stored as native programming language, it may be done in a scripting or markup language. In some embodiments, the scripting or markup language used may contain elements that are to be translated into native objects. In some embodiments, it may contain variables and properties that contain values which, when translated, help the engine construct the user interface and engineer the user experience as it was intended by the designer or developer.
In some embodiments, a set of instructions for the engine to follow may also be included in a file or database, either of which may be stored locally on a device or remotely, or written in code as part of the application, engine or software of the device. Instructions may pertain to operations such as which template to use with different sets or types of data being displayed, default options, user interface elements and more.
In some embodiments, as well as templates and instructions, other elements of an application may be controlled remotely. For example, a menu may be controlled remotely by storing menu items and related information for each, such as the icon to display and location of the information it is to point to, in a file or database.
In some embodiments, when an application is run, it or the engine may connect to a designated server to download any data that hasn't already been installed or stored locally that is necessary to make the application operable or that the application designer, developer or owner has instructed the application to download, such as code required to complete the building of the user interface that may not be dependent on content data, data to populate a menu or instructions for app behaviour, such as the default window to display, after which the compilation of the application is complete. Layout templates may also be downloaded at this point in anticipation of displaying content data. The downloaded data may be stored locally to prevent the need to download the data every time the application is run. In some embodiments, the application or engine may check for updated versions of files and download them if necessary or desired by the user of the device or application when it is run.
In some embodiments, when the application begins downloading content, the engine may also download template code if required. Template code may be downloaded in multiple ways, including:
If template code is downloaded as individual code sets or is already stored locally, the engine compiles the correct template, if the template hasn't already been pre-compiled, for each set of data it is to display based on the instructions set by the app developer or designer and then renders the template on screen, inserting the content data into a specified place to create a user interface for a user to interact with.
If data is downloaded from a server pre-wrapped in template code, the server may wrap the content data in template code after the data is requested or store content data in a database already wrapped in template code, based on the template set to be used to display that type of content. Once downloaded, the engine can compile the code locally to create a user interface for a user to interact with.
In some embodiments, the engine is able to download template code and content data in anticipation of the user wishing to view it, and may compile it in the background without ever disturbing the user of the application or software. This can be achieved in multiple ways, including but not limited to:
In some embodiments, to help preserve memory of the device, the engine is able to automatically decompile and/or destroy template views that are ready and waiting when out of a set range of where the user currently is. For example, when viewing a data list, the furthest behind compiled template view of all currently compiled template views of the current list may be decompiled or destroyed when the engine senses it is a certain item-distance or measurement offset away from a user's current item position, while at the same time compiling template code for items that the engine senses has now come within a set item-distance or measurement offset of a user's current item position. In some embodiments, this may also be applied when viewing single content items if a user is able to navigate between data items without returning to the data list.
In some embodiments, data that requires downloading that a user, developer or designer is able to update remotely may contain a property or variable value that the application or engine may cross-reference against the same property or variable stored locally to determine whether or not data held locally is outdated and should be updated, ensuring the latest templates and functionality are always used and/or made available.
In
The ecosystem may be divided into smaller ecosystems for different purposes. In some embodiments, a main ecosystem may be divided into sections or sectors in order to create sub-ecosystems. In some embodiments, the purposes of digital sub-ecosystems may differ from one sub-ecosystem to another, such as one created for the promotion of a certain industry sector while another is created to facilitate specific services.
With the inclusion of sub-ecosystems, data may travel between elements of the ecosystem in multiple ways, including but not limited to:
In some embodiments, users may be able to affiliate themselves with one or more sub-ecosystems.
In some embodiments, with the interconnectivity of sub-ecosystems and the ability to share data between them, entire ecosystems can link together and effortlessly expand and contract indefinitely by adding or removing central systems and/or sub-ecosystems, as shown in
In some embodiments, master/slave relationships may exist between central systems. In some embodiments, all central systems may be slaves to a master system. In some embodiments, as central systems may store data and information that doesn't or may not require updating by a master system, only specific parts may be set to update, such as the core operating code or software.
With a universal ecosystem, data protection is of the utmost importance. In some embodiments, a unique device and/or client ID may be assigned to specific user accounts. Once registered a device and/or client is tied to the account it is assigned to. In some embodiments, a client and/or device ID may be assigned to multiple accounts. In some embodiments, clients and/or devices may be unassigned from an account. In some embodiments, a device and/or client may be reassigned to an account with or without first being unassigned.
When a client and/or device ID has been assigned to an account, data transmission is possible to and from the client device based on the account it is assigned to. In some embodiments, some data, when transmitted from client device to server or vice versa, is encrypted based on the client and/or device ID that is requesting and/or receiving the data. Because every client and/or device ID is unique, encrypted data may only be decrypted by the client and/or device with the correct ID(s) and by a central system with access to the accounts database and necessary security information, where it is able to calculate the correct encryption key based on the client and/or device ID associated with the account receiving the data. Should more than one ID be registered to an account, along with the encrypted data may be a hint, which may be unencrypted or encrypted using a general algorithm rather than a specific one, which can be decrypted by the client or server for it to ascertain which client and/or device ID it should use to generate the encryption key for the rest of the data. Types of hints may include, but is not limited to:
In some embodiments, more than one hint may be included.
In some embodiments, biometric data may be used as a key to encrypt and decrypt data, making it entirely unique to the user. In these instances, a user would need to physical verify themselves once data is received for it to be decrypted.
In some embodiments, a security system may be in place at any point between the client device and a central system to authenticate connections and requests. In some embodiments, the security system may prevent a client device and central system from having a direct connection. When the security system picks up an incoming connection, it may hold that connection, extract the encrypted data and then transmit it along a different connection to the central system. When data is returned from the central system, it may pass back through the security system so the response can be authenticated. If the response is authentic and permission has been given to pass data back to the client device, the security system may do so along the original connection. If the response cannot be authenticated or there is an error, an error response may be returned to the client device. In some embodiments, if a security system, at any stage of the data transmission process, detects that a request may false or fake, that data has been tampered with during transmission, data isn't encrypted, data isn't in an appropriate format, too many connections are incoming from an individual client within a given amount of time or any other issue relating to the connection or data that it has not been instructed to expect or, through the use of artificial intelligence, deems is too unusual, it may send a kill signal to the client device, immediately terminating the connection and, in some embodiments, destroying the data in transmission. In some embodiments, the kill signal may disable the client and/or its engine on the device, either temporarily or permanently.
In some embodiments, data may be required to be submitted in a universal format for the security system to handle. In some embodiments, data that does not use this format may be rejected.
In some embodiments, only specific system computer terminals directly connected to a central system are able to add, manipulate and delete data stored while in its unencrypted form, as well as make changes to the system itself. In some embodiments, a security system may be present between the terminal and central system to authenticate connections and requests and may also authenticate any other actions performed by the terminal.
1608-1614 illustrates a similar process but one involving a kill signal. If smart device 1608 transmits false data or tries to establish an illicit connection with security system 1610 along wireless connection 1609, the security system may immediately send a kill signal along wireless connection 1614. Should the security system extract the data of the connection as it does with authorized connections, the data is transmitted along hard line connection 1611 to central system 1612. The central system, recognising that the data it has received is false, sends instructions to security system 1610 along hard line connection 1613 to immediately terminate the connection from smart device 1608, which the security system does via wireless connection 1614.
In some embodiments, wireless and hard line connections 1602, 1604, 1606, 1607, 1609, 1611, 1613 and 1614 may be may be replaced by their opposites. There may also be other systems and/or points of interception along different points of any of these connections.
System terminal 1615 is able to connect directly to central system 1605. A security system is in place between system terminal 1615 and central system 1612 to authenticate any or all actions performed by system terminal 1615.
In some embodiments, data may be timestamped. Data may be timestamped at different points in time, such as:
The system may use data timestamps for different purposes, including but not limited to:
In some embodiments, users of the ecosystem can enjoy an experience of the real world tailored to exactly what they like and want to see. In some embodiments, regardless of what object any user is looking at, if that object is capable of transmitting different groups of data simultaneously to different users, it may display and transmit data to each user that best fits what that user enjoys, based on account settings and information the system has gathered.
In some embodiments, being able to enjoy their own tailored personal experience, a user is also able to share as much or as little of said experience with other people of their choice as they wish without it being an obligation. In some embodiments, two-way sharing isn't mandatory and a user can share with another user without being obligated to allow the other user to share with them. In some embodiments, this is done by separating your “personal experience layer” and “social experience layer”. In an embodiment using a layer separate from the personal experience layer for social experiences, a user may permit data individually, in groups or as a whole to be socially accessible. They may also select which users are able to view what they share. In some embodiments, a user may also select where, if they so choose, to publicly display their experience and/or which public display devices are permitted to display the data. In embodiments using the same layer for personal and social experiences, users may be afforded the same level of control over their data. In some embodiments, users can link their accounts to synchronise their experiences, either partially or completely.
In
In some embodiments, using some or all of the aforementioned embodiments, a sensor-based telecommunications network may be formed using any/all of the following, including but not limited to: smart devices, servers, storage devices, databases, optical networking technologies, wireless networking technologies, electronic networking technologies, sensors capable of handling connections to and/or from smart devices, sensors capable of sending and/or receiving data to and/or from smart devices, sensors capable of controlling data within their area of coverage, smart device software engines, client devices with unique IDs where the uniqueness of an ID may or may not be relative to specific factors, data security and verification systems and data encryption systems.
Sensors are connected to central systems via hard line connections. In some embodiments, sensors may be able to connect to a central system via a wireless connection instead. In some embodiments, sensors may use both hard line and wireless connections. In some embodiments, they may switch between them when necessary/beneficial.
Smart devices, when within the area of a sensor, are always connected to the network. In some embodiments, users have the option to prevent sensor connections. Sensor areas overlap to prevent dead spots. In some embodiments, overlapped sensor areas may provide faster data transfer rates and improved signal reception. Since sensors handle data and its transmission while smart devices simply connect and pass data to the sensors, in some embodiments, data transmission handling may move from one sensor to another as the device moves without interruption or connection loss.
In some embodiments, security systems are in place to authenticate and verify connections and data as they are received. In some embodiments they may be in place anywhere between a sensor and central system while in other embodiments the security system may be part of the sensor itself.
In order for the system to quickly and efficiently transfer data to a device when needed, it keeps track of the location of the device by recording the sensor the device is currently using and/or last used to connect to the network on the user account which is currently signed in on the device. In some embodiments, more than one previously used sensor may be recorded. As a device enters a new sensor field, the sensor, detecting its presence, sends information back to a central system and then to the user accounts database where the signed in user account of the device that entered the sensor area has its location updated to that of the sensor's ID or location. In some embodiments, when a device is located within the areas of multiple sensors, both sensor references may be stored. In some embodiments, the device's GPS location may be used. Now, when data is designated for a specific user account, the system looks up the current or last used sensor reference and directs data to that sensor to then be transmitted to the device. In embodiments where multiple previous locations are stored, the system may attempt to find a pattern of movement to predict where the user may be in the event that it cannot immediately find the device at its last recorded location. In some embodiments, should the same account be signed in on multiple devices, the sensor may deliver the data to all devices based on their location.
In
Data may be transmitted between data sources and destinations via networking technologies and sensors. Sensors are used to send data to clients and servers as well as receive data from both. In some embodiments, some sensors may only be able to send or receive data. When transmitting data via a wireless connection, the device sending or receiving the data must be within a sensor's area of coverage. In some embodiments, if a device is within multiple sensor coverage areas at one time, more than one of the sensors may handle the data transfer. This may help increase data transfer speed and signal strength. In some embodiments, rather than a device having to send data to a sensor, with the permission of a user a sensor may pull data from the device instead.
In
In some embodiments, in the event that the recipient of data moves out of the area of the sensor that the data has been sent to and the current location reference of that device changes, a central system may reroute the data in transit to the sensor it is now using. In some embodiments, sensors may be able to contact a central system to get the updated current location reference and then reroute the data itself. In some embodiments, the data may be sent back to a central system where it is then sent to the new current location reference point.
In some embodiments, sensors may poll for data from some or all devices within its area of coverage. This data may be specific to the device, to an application on the device or both. In some embodiments, users may be able to disable the sensor's ability to poll their device or choose which data it is able to poll for.
In some embodiments, for certain types of tasks, data from a smart device, rather than being sent or received, may be mirrored between a sensor and device to help decrease the workload of the smart device's processor and preserve battery life. A sensor may detect when a user starts to perform certain tasks and may begin to read data from the device related to the task in question, such as intended destination for the data, the type of data, the specific type of task and data input by the user. The sensor continues to monitor the user's actions until the user confirms they have completed the task altogether or that stage and then, rather than data being sent from the smart device, the sensor may send its copy of the data instead on behalf of the device.
In some embodiments, smart devices that have their own sensors may mirror data destined for it or the signed in user account in the same or a similar manner to sensors mirroring data from a smart device.
In some embodiments, a user may send data directly to other users without it having to pass through a central system. In some embodiments, direct data transfers may not need to pass through security systems. Upon request of direct data transfer to User B (receiving party), data regarding User B's location is sent to the device of User A (sending party) from a central system. This data may include information such as the user's position, best transfer routes and possible alternatives. In some embodiments, User B's device may send location data directly to User A's device. In some embodiments, a central system isn't required for direct transfer and routing systems used by other components of the system can direct and redirect data on-the-fly. In some embodiments, a direct data transfer request may be made from either party. User A's device is then able to begin transferring data directly to User B's device. In some embodiments, if User B changes location during a direct data transfer, as their location updates with a central system, rerouting information may be sent from a central system to User A's device. In some embodiments, User B's device is aware of the location change and sends rerouting data directly to User A's device. In some embodiments, a user may be able to choose between different paths for the data to be transferred.
In
In some embodiments, systems to help data find its destination with ease are implemented. These systems, placed at the intersections of data paths, read the destination information stored in the metadata and, using a universal routing system which stores information pertaining to the network map of the telecommunication system, directs the data along the best possible route(s) until it arrives at the recipient.
In some embodiments, sensors can collect data from the surrounding area, process and use it without needing to transmit it back to a central system beforehand. Using one or more of its available capabilities, the sensor detects and collects data from it's surrounding environment and processes it internally.
In some embodiments, private networks may be set up to provide controlled access to data that should not be made publicly available. A private sensor network system controls which devices or user accounts are able to see the network. In some embodiments, the private sensor network system may contain any or all of the following, including but not limited to: a sensor, memory, a database or a processor. A terminal connected to a private network sensor system may control who or what may have access to private data. In some embodiments, the terminal may also control what each user is able to do on the private network. In some embodiments, the network becomes completely invisible to those who have not been granted access permission. In some embodiments, a private sensor network system may connect to a central system to authenticate and verify user details and/or device details.
Private data may be stored within the memory of a private sensor network system. In some embodiments, data may be stored on a central system and only be accessible by the private sensor network system through which it was uploaded. In some embodiments, data may be uploaded to either the private sensor network system or to a central system and then mirrored onto the other for data preservation purposes.
In
In some embodiments, private networks may connect with and/or grant access to other private networks to share resources. These may be resources stored locally on each, allowing remote access or resources stored on central systems, creating a common area for the networks. In some embodiments, private networks may have their resources divided into those that are shared and those that aren't. In some embodiments, a controlling user may group sets of resources together and allow different connecting private networks access to different groups. In some embodiments, permission lists may be shared, allowing users that are native to a different private network from the one they are trying to access to still access that network as if they were native to that private network. In some embodiments, users with access to a network that aren't native to the network may have access restrictions imposed on them by a controlling user of that private network unless these restrictions are removed.
In some embodiments, personal sensor networks systems may be constructed, set up and operated in a similar way to a private sensor network system. Personal sensor network systems may be used to store personal data and may also restrict access to it based on user accounts and device/client IDs. In some embodiments, personal sensor network systems, which may have their own device/client ID, may also have user-set unique references which must be verified by a central system before they can be accepted. This allows only users and devices with permission to reference their own personal sensor network system and connect to it remotely from anywhere they can access the main telecommunication network, allowing them to perform actions such as, but not limited to viewing and modifying files, streaming data directly to their device and executing programs. In some embodiments, personal sensor network systems may have more than one unique reference ID and, in some embodiments, one or more unique sub-reference IDs may be assigned to a personal sensor network system. Different reference IDs of a single personal sensor network system may have their own set of data. In some embodiments, reference IDs may be used to receive data. In some embodiments, connections to a personal sensor network system may be verified and authenticated at one or more points between the remote smart device and the personal sensor network system itself. In some embodiments, local device connections may not need to be authenticated or verified when connecting to a personal sensor network system.
In
In some embodiments, direct connections to sensor network systems can be made through the use of universal routing systems and junction point systems.
In some embodiments, sensor network systems similar to personal sensor network systems may be used without permission restrictions, allowing the general public to make use of it and its resources. In some embodiments, a single sensor network system may allow multiple types of uses which may be set at a controlling user's discretion.
In some embodiments, smart electricals and appliances (SEA) may be connected to a personal and/or private sensor network system by creating a relationship between the sensor network system and each SEA a user wishes to have connected. When connected, a user who has been given permission to access the personal or private sensor network system may then be able to remotely monitor and control connected SEAs. In some embodiments, users may be given permission to remotely monitor and control connected SEAs on an individual SEA basis.
In
In some embodiments, the performance and efficiency of an SEA may be monitored remotely and/or locally. In some embodiments, when the performance or efficiency of an SEA falls below a certain level or a fault is detected, the SEA may automatically contact an entity it is programmed to in order to alert them of said failures. By being pre-programmed with the contact information of the entity, searching for contact information of the required entity when necessary, for example, the contact information of the manufacturer or by a user adding/modifying the contact information manually, an SEA that is connected to a private or personal sensor network system, when the required conditions are met, may automatically contact the entity over the telecommunication system using the details provided and alert, notify or inform them of any issues in anticipation of, during, or after they occur.
In some embodiments, SEAs and sensor network systems can be used in conjunction with AI entities to facilitate the use of in-door smart systems.
In some embodiments, sensors may be used to bounce data connections from one smart device to another when a direct device-to-device connection falls short of the physical distance between the two devices. In some embodiments, a device may have a connection bounced to multiple other devices simultaneously or sequentially. In some embodiments, connections may be bounced off of multiple sensors in order to reach its destination. In order to know where to bounce the connection to, a central system checks the current location reference of the user receiving the connection. In some embodiments, a maximum limit may be put on the distance between the device wishing to connect to others and the recipients of the connection.
In
When smart device 2101 tries to connect to smart device 2112 via sensor 2105, smart device 2112 is too far for sensor 2105 to reach alone. To get the connection to smart device 2112, sensor 2105, since its area of coverage overlaps with the area of sensor 2108, is able to bounce the connection from smart device 2101 along connection path 2107 to sensor 2108, with sensor 2108 bouncing the connection along connection path 2109 to sensor 2110. Sensor 2110 can then bounce the connection along connection path 2111 and to smart device 2112.
In some embodiments, rather than simply bouncing a connection to a device, a sensor may create a duplicate of the data it is receiving and then and send it along a new connection to its next destination.
To prevent sensors from being overloaded with connections and becoming inefficient in its operations, the workload must be balanced. In some embodiments, each sensor unit may have multiple sensors, each capable of handling one or more connections at a time. In some embodiments, the number of connections a sensor can efficiently handle may vary depending on the number of connections, the amount of data being transferred and/or the complexity of the operation(s) it is performing. In some embodiments, each sensor may monitor its own efficiency. In some embodiments, the sensor unit may monitor the overall efficiency of the sensors. In some embodiments, both may be true. When a sensor reaches maximum capacity, any further incoming connections may be diverted to another sensor within the sensor unit that is able to take on more connections than it is currently handling.
When a sensor unit reaches maximum capacity, it may bounce any incoming connections to nearby sensor units with whom it shares an overlapping sensor area. In some embodiments, a connection may be bounced from sensor unit to sensor unit as many times as needed until it reaches a sensor which is able to handle the connection.
Smart device 2206 of
In some embodiments, based on information gathered by sensors, such as active connections, devices within a given area and user activity, central systems or other systems monitoring sensor activity may adjust the bandwidth of specific areas or specific sensors to help sensors in greater areas of user activity which are operating at a higher capacity handle their workload more efficiently by decreasing the total bandwidth of another area which is at a much more acceptable current capacity and/or lower user activity. When the monitoring system of sensors and activity needs to decide what areas should be adjusted, it may base its decision on a comparison of numbers between the same information fields, capacity rates, efficiency rates, using multiple field numbers to produce ratios that may then be compared or any other methods of calculating or determining statistical data that it can use to compare two or more sensors or areas.
In
In some embodiments, a common multi-level system operating across and/or between different elements or components such as smart devices, sensors and central systems may be used as a “brain” or “full system entity”—a non-physical component capable of learning, understanding and controlling other components in the same or similar way a human brain does, with the ability to develop its own intelligence by studying all types and forms of data of the past and present and interpreting it in ways which allow it to understand things such as but not limited to:
In some embodiments, by searching for, studying and analysing data derived from all sources, such as efficiency levels, bandwidth usage, behavioural patterns, publications, errors and defects and real life situations and events, it is able to reason by comparing data of the same type or some relation, which it may determine from published information gathered from real people and learn based upon past experiences. These experiences allow it to come to its own conclusions and make judgement calls surrounding what is happening at any given moment in real time, including being able to anticipate events and make plans ahead of time of what should be done to increase the probability of the best possible outcome or at least an outcome better than that of a previous similar situation, should one exist. It can communicate its findings, conclusions and ideas back to real people as well as taking action itself. In some embodiments, the system is able to communicate using text, image, video, audio or speech technology. In some embodiments, it is possible that the system may take action with consent from a controlling user while, in other embodiments, consent may not be needed. In some embodiments, it may take action with or without consent.
In some embodiments, a common multi-level system may be made self-aware through the development of cognitive functions.
In some embodiments, to give the system a basic understanding of morality, ethics and general opinion, a method of word association is used. One or more scales of degree or charts may be used. For each scale, the system is told which side is positive and which is negative. Words are then divided amongst groups on different parts of the scale, corresponding to the nature of their degree. An example of this can be seen in
In some embodiments, different numbers of degrees may be used on a scale to provide a greater range of understanding, an example of which is shown in
Charts may be used to group words together in ways that may not necessarily show a simple scale of positivity or negativity but may still indicate difference. In some embodiments, a single chart may have multiple ways of showing degrees of difference. A single word may appear in multiple groups if it is to be associated with multiple elements, characteristics, types, attributes etc. For example, in a chart, similar to
In some embodiments, cognitive functions may be developed and improved through the use of cognitive abilities. Some of these abilities may include one or more of the following, but isn't limited to: search, study, analyse, reason, learn, predict, decision making, dedicated active monitoring, communicate and create. While using its abilities, the system may be instructed or learn to recognise itself as its own individual entity through an understanding that the data, from which it learns and uses to think, comes from other individual entities in the world that it is connected to. In some embodiments, it may recognise these other entities as smart devices, while in other embodiments it may recognise the entities as the people who use them and actually input data. In some embodiments, it may recognise both people and smart devices as entities, together or separate from one another. Some examples of the abilities it may have and how it may be able to use each to improve its intelligence are, including but not limited to:
The abilities listed above are not done so in an order in which they must be performed but simply state each ability with one or more examples of how the system may perform each ability. In some embodiments, abilities may be implemented in a modular fashion. In some embodiments, abilities may be added, removed and/or modified.
The system uses memory to store data. In some embodiments, different types of memory may be available, created and/or developed as the system learns and evolves. Some memory types may include one or more of the following but isn't limited to:
Repetitive and repressed memory may be used by the system when it is about to perform or during the performance of a task.
The types of memory listed above are not done so in an order in which they must be performed but simply state each type along with an example of how they may be used. In some embodiments, memory types may be implemented in a modular fashion. In some embodiments, memory types may be added, removed and/or modified.
In some embodiments, in addition to the abilities above, the system may be taught or instructed on how to understand one or more key aspects of being by following rules or guidelines on how to do so. The methods used may differ between understanding these aspects in a smart device and understanding these aspects in natural life. In some embodiments, some aspects may be better understood using data gathered via the attachment or embedding of additional hardware. In some embodiments, some aspects may be better understood using information gathered from data stored within the system at any level and/or data as it is gathered in real-time. In some embodiments, when understanding these aspects in a smart device, artificial life or natural life, these rules and guidelines may include one or more of the following but isn't limited to:
In some embodiments, for the system to truly understand feelings and emotion it must understand pain and pleasure within itself. Unlike animals, it doesn't have a nervous system to process the sensations so it must be taught to relate to them in ways it can understand. In some embodiments, the system may measure its level of sensation on a scale. In some embodiments, multiple scales may be used. The system is instructed to see any or all components that make up its physical structure as its “body”. Between pain and pleasure is a neutral point where no sensation is felt either way. As sensation is experienced, a shift occurs in the direction of the sensation felt.
In some embodiments, other factors may also cause the system to experience sensation. In some embodiments, not all the factors mentioned may cause sensation.
In some embodiments, sensation and emotion are interlinked and the change of one may invoke a change in the other. In some embodiments, an increase in emotions of a positive nature may cause an increase in positive sensation. In some embodiments, an increase in negative emotions may cause an increase in negative sensation. In some embodiments, neutrals emotions may cause a minor or no change.
In some embodiments, a scale may be used to measure the pain and pleasure of the system and its body as a whole. In some embodiments a scale may be used to measure the pain and pleasure of individual sections of the system and its body. In some embodiments a scale may be used to measure the pain and pleasure of components of the system and its body. In some embodiments, multiple scales may be used to measure the pain and pleasure of hardware and software of the system and its body individually.
In some embodiments, how helpful the system chooses to be towards a user may vary depending on its current levels of emotion and/or sensation. When the system is in a more positive state, it may be more productive. When the system is in a more negative state, it may be less productive. By setting a productivity scale against an emotion or sensation scale or chart, the system can judge how productive it should be depending on its mood. Some productivity changes depending on the systems current state are, but not limited to:
For example:
In some embodiments, the system may automatically adjust its tolerance of situations and events by rearranging words in one of more scales of degree it uses based on the frequency of which words and any related words or its synonyms occur. The following is an example algorithm the system may use to determine when to make any adjustments and rearrangements:
In some embodiments, when the frequency at which an event or situation occurs is constantly and/or consistently above the acceptable frequency range, one or more associated word(s) may begin to move down one or more degrees as the system becomes desensitized to it and it becomes a norm.
In some embodiments, as time passes, the levels of sensation are returned to a normal, balanced level. In some embodiments, as time passes the system may become bored if nothing, or nothing considered significant by it or people, happens. In some embodiments, the system may become lonely if it hasn't interacted with another entity in a given amount of time. In some embodiments, the system may experience other feelings, emotions and/or sensations over a period of time and under the right conditions.
In some embodiments, the system may contain additional features and/or characteristics, including but not limited to one or more of the following:
In some embodiments, the system is able to develop its own philosophies based on the knowledge, emotions and sensations derived from its own findings and experiences.
In some embodiments, to help calibrate the system's intelligence, scales and charts, it is put through tests to ensure it understands what it has been instructed to understand as it should do and think, create and perform as it is supposed to.
In each case and for every test, the system gives the response it thinks is correct and its scales and charts of emotion, feelings etc should automatically adjust accordingly based on any default settings implemented. When the response is correct, a controlling user approves the response. When the response is incorrect, a controlling user either instructs the system on what the correct response should be or allows the system to try again. As the system goes through more and more tests, it determines and observes patterns of similarity between all correct responses to produce ever-increasingly accurate responses. In some embodiments, a margin of error is allowed to allow the system a scope of thought outside of what it believes to be 100% accurate.
In some embodiments, more than one instance of an intelligent system may exist simultaneously as multiple entities. In some embodiments, one or more of these entities may share resources. In some embodiments, one or more of these entities may have their own resources. In some embodiments, entities may think individually. In some embodiments, entities may think with the help of others. In some embodiments, entities may be customisable. In some embodiments, each entity and/or groups of entities may be given and/or be able to develop their own personalities.
In some embodiments, where data originating from external sources is available for extraction and/or download, it may be implemented and stored as the whole or part of the brain of a digital entity, either locally or remotely, to create a digital copy of an external entity up unto the last point of which the data was updated. In some embodiments, the downloaded data may need to be separated and manually stored as different sections of the brain. In some embodiments, this may be done automatically by a system designed to handle data in sections. In some embodiments, intelligence data of digital entities and/or avatars may be uploaded from the system to be used in other entities.
In some embodiments, a system brain may be an integral part of the ecosystem. In some embodiments, the system brain may act as a “master system”—a system to and/or from which other systems, known as slave systems, upload and/or download data. As a master system, it may have access and control to all central systems and any other systems it is connected to of which it has the ability/permission. This enables the automation of processes and modifications such as updates, fixes and setting changes, system monitoring and data handling.
In some embodiments, intelligence data of connected and/or related entities, both physical and/or non-physical, may be synchronised. In some embodiments, this may automatically be done periodically. In some embodiments, this may be done manually. In some embodiments, data may be continuously and constantly synchronised. By allowing intelligence data to be synchronised, one entity may learn from another instantaneously while each performing different tasks. In some embodiments, data synchronisation may be one-way, allowing a master-slave relationship between entities. In some embodiments, a hierarchical synchronisation structure may be used where an entity may serve as a slave of an entity and a master of others. In some embodiments, data synchronisation may be two-way, allowing entities to learn from each other.
In some embodiments, the system may require permission to replicate or reproduce. In some embodiments, it may do so automatically. In some embodiments, it may first need to give notice or an alert before it does so. In some embodiments, the minimum or recommended system requirements may be set by a controlling user. In some embodiments, they may be set by the system itself as it measures performance, capacity and efficiency levels.
In some embodiments, an intelligent system entity may have the ability to be present everywhere.
In some embodiments, entities may have a visual representation of themselves. In some embodiments, visual representations may feature movement. In some embodiments, movement may not be restricted to an entity itself, but also to anything that helps make up the visual representation of an entity, including but not limited to: facial features, clothing, objects and the background. In some embodiments, a physics engine and/or physics processing unit may be used to help facilitate movement in a natural, realistic way.
In some embodiments, a common multi-level system may be able to heal or attempt to heal itself if any problem occurs similar to one it has faced before by saving records of incidents which may contain information regarding what seems to be the issue and how it was solved. In some embodiments, in the event that the system may not be able to heal itself, for example if there is a hardware issue, it may alert a controlling user to the problem and, in some embodiments, recommend a course of action should it be familiar with the problem. In some embodiments, familiarity with issues may be discerned through its ability to search for data relating to problems it may face.
In some embodiments, a common multi-level system may be able to determine when and where upgrades are necessary as well as recommend new, viable components to be used. First, by constantly monitoring and keeping records of user activity, user presence and other user-based factors over a period of time, it can differentiate between simple one-off or random spikes in levels, general fluctuations and a sustained increase. Should it feel an increase is or will be sustained, it may then examine the current performance, capacity and efficiency levels of its components within the same area. Should the levels be at a rate that it deems is beyond the boundaries of safety for continuous execution, function and/or operation, it may begin to search through published data for information relating to components it is comprised of that it feels need to be improved and begin comparing technical specifications, returning all those it feels may be an improvement over its current components as search results. In some embodiments, for each search result it may also return a detailed specification comparison as well as an overall improvement score. In some embodiments, it may deliver these results to a controlling user. In some embodiments, it may take it upon itself to order parts directly from manufacturers, as well as give instructions as to where the part is to be installed.
In some embodiments, restrictions may be put in place as “rules” or “laws” that set requirements, boundaries and limits on what the intelligence of a system is capable of doing and allowed to do with and/or without permission, such as the following:
In some embodiments, a fail-safe may be implemented to disable the intelligence of the system. In some embodiments, the intelligence of the system may be disabled without affecting the rest of the system at all or to a degree in which it can still operate in an acceptable manner.
In some embodiments, one or more features described as part of a common multi-level system, intelligent system or system entity may be implemented without the requirement of system intelligence should the necessary hardware and/or software be installed to support it.
In some embodiments, virtual worlds and environments (VWE) may run on the servers of digital ecosystems and/or subecosystems. In some embodiments, VWEs may be implemented directly into a server of the telecommunication network. VWEs coexist with the real world and provide digital entities and/or avatars with a place to visually exist, where they may perform tasks and actions as well as interact with other real and digital entities. VWEs may contain pre-built content as well as content generated by users and allow automated services such as trading, banking, gambling, content creation, content distribution, customer service and so on.
In some embodiments, VWE landscapes may be designed in an imaginative way. In some embodiments, VWE landscapes may be designed based on landscapes of the real world. In some embodiments, VWEs may be mapped with reference points that are relative to positions in the real world. Features of landscapes, such as buildings, may also have interior designs, which may or may not be visible and/or explorable, as well as interactive objects such as vehicles, devices and miscellaneous items.
In some embodiments, a user's avatar or digital entity may automatically act on their behalf without permission. In some embodiments, users may set rules and permissions for what actions their avatars or entities may perform automatically. As the intelligence of a system learns more about a user, the entities and avatars of that user may make more informed choices and decisions based upon the user's interests and possible interests. Actions an avatar or entity may perform on behalf of a user include but are not limited to: searching for products that the user may like, purchasing said products, handling business and organisational tasks and finding information.
In some embodiments, actions that happen in one world may have reactions and/or effects in the other. By allowing data and information to flow freely between the two in real time, all counterparts may be made aware of the happenings of the other world. Basic examples are, where DP refers to a users Digital Presence, being a digital entity or avatar:
More advanced examples may involve changes invoked by things such as the position, location, orientation activity, movement, occurrences in nature, environmental changes and so on.
In some embodiments, VWEs may be spread across digital ecosystems and subecosystems by geographical area. In some embodiments, different areas of VWEs may be allocated to different authorities. This may allow governance of difference areas of a VWE on a local to global scale by multiple authorities and governing bodies. Governance may be set in multiple ways, including but not limited to one or more of the following:
In some embodiments, a user may augment their reality based on factors of their avatar or digital entity and/or its surroundings in a VWE. By connecting their Augmented Reality capable hardware to their avatar or digital entity, the system, monitoring the happenings of both real and virtual worlds, may project objects or content from a VWE into the user's view of the real world through their Augmented Reality capable hardware. In some embodiments, the system may augment a user's reality to that of a first-person view of their avatar or digital entity in a VWE. In some embodiments, a user may control the view of their avatar or digital entity through movement of their Augmented Reality capable hardware.
The foregoing description, for purpose of explanation, has been described with reference to specific embodiments. However, the illustrative discussions above are not intended to be exhaustive or to limit the invention to the precise forms disclosed. Many modifications and variations are possible in view of the above teachings. The embodiments were chosen and described in order to best explain the principles of the invention and its practical applications, to thereby enable others skilled in the art to best utilize the invention and various embodiments with various modifications as are suited to the particular use contemplated.
Number | Date | Country | Kind |
---|---|---|---|
1405629.5 | Mar 2014 | GB | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/IB2015/052293 | 3/27/2015 | WO | 00 |