WO2019043433A1 - Rule-based content sharing - Google Patents

Rule-based content sharing Download PDF

Info

Publication number
WO2019043433A1
WO2019043433A1 PCT/IB2017/055222 IB2017055222W WO2019043433A1 WO 2019043433 A1 WO2019043433 A1 WO 2019043433A1 IB 2017055222 W IB2017055222 W IB 2017055222W WO 2019043433 A1 WO2019043433 A1 WO 2019043433A1
Authority
WO
WIPO (PCT)
Prior art keywords
content
access
rule
recipient
batch
Prior art date
Application number
PCT/IB2017/055222
Other languages
French (fr)
Inventor
Fawzi TOBASHI
Jamal HEGAG
Mohamed Ramadan FARES
Original Assignee
Tobashi Fawzi
Hegag Jamal
Fares Mohamed Ramadan
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tobashi Fawzi, Hegag Jamal, Fares Mohamed Ramadan filed Critical Tobashi Fawzi
Priority to PCT/IB2017/055222 priority Critical patent/WO2019043433A1/en
Publication of WO2019043433A1 publication Critical patent/WO2019043433A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Definitions

  • the present disclosure relates to time/location based content exchange and sharing. More particularly, it relates to systems and methods for exchanging time-bounded and location- bounded prioritized content batches.
  • Content exchange and sharing systems and services are the cornerstone of the modern information and communications technology. At any given time, every system or user is flooded with a huge amount of contents generated by machines or humans. Content could be text, multimedia, programs, signals, etc.
  • Content could be text, multimedia, programs, signals, etc.
  • order and interaction are needed and sometimes crucial.
  • the subject lessons and assignments are organized in order and sequence from a time perspective. In many cases, these lessons are location bound too. Other dimensions sometimes are needed such as priorities and validity. Manual methods are error prone. Other workarounds are very complex and expensive.
  • Embodiments of the present invention relate to methods and systems for exchanging location- bounded and time-bounded prioritized content batches.
  • a server-implemented method comprises sending a tagged content from a sender's mobile device to a server via a communications network; redirecting the tagged content from the server to one or more recipients' mobile devices; and applying the access rules to determine the access rights of the recipients' mobile devices.
  • the method includes tagging the content by the sender's location and other chosen
  • the tags also include (but not limited to) validity period start date/time; validity period end date/time; specified location where to open/access the content; maximum access opportunities; and a sequence order.
  • the method updates and presents the tags information.
  • the method further includes applying multiple access and validity rules.
  • the sender sets some parameters that control these rules while the server and recipient mobile device apply these rules.
  • the server determines if all the rules are fulfilled or not, in order to present the content to the recipient. If any rule is violated, the server prevents the recipient from requesting and presenting the content.
  • the content is multimedia e.g. images, video clips, audio clips, text, or combinations of them.
  • the content is a script/s, a program/s, or both.
  • the sender may compose the content or share the content that is created by the system or a third party programs.
  • the mobile device may be a
  • the sender mobile device selects the recipients of the content. In some other embodiments, the sender may select to publish the content in a public environment and sets the access and validity rules.
  • a server is connected to the network.
  • the server is also configured to determine the access and validity rules associated with every content and recipient mobile device and perform the computational work in applying these rules.
  • the method determines the difference between the recipient's current location and the location information tag. To fulfill the location rule, this difference must be negligible.
  • the sender sets start date/time and end date/time of the validity period.
  • the sender chooses whether the validity period is single or there are several validity periods.
  • the sender sets the period type to be recurring or multiple.
  • the method allows the sender to define a count rule by setting the number of max. access opportunities to the content. If this number is equal to the number of recipients, the content is accessible to all recipients. When this number is less than the number of recipients, the count rule is checked at every access attempt to allow only a subset of the recipients to access the content using a priority rule.
  • the sender sends a batch of content elements with a sequence order and defines a priority rule to access the content. This sequence order is established by validity periods, sent dates/times or any other information. In some embodiments, the sender sets the sequence order manually. In some other embodiments, the sender may set an equal priority to all content elements. In some embodiments, the sequence order combined with the max. access opportunities determines several access rules. In some other embodiments, any recipient may access any content element until its max. access opportunities is reached. In other embodiments, any recipient may access only one content element and then is denied access to the rest of the batch. In some other embodiments, any recipient may access the first content element until it reaches its max. access opportunities. Then any other content element is available only to recipients who accessed its predecessor in the batch while the rest of recipients are denied access.
  • the order of the content elements in the batch is irrelevant and the max. access opportunities determines some access rules. In some embodiments, all recipients can access every content element without specific order until the max. access opportunities of that element is reached. In other embodiments, any recipient can choose to access only one content element from the batch if the max. access opportunities for that content element is not reached.
  • the batch has a common counter for max. access opportunities.
  • the server decreases by one the common counter for the whole batch. Any content element is accessible until the common counter reaches zero. If a recipient is authorized to access a content element, this recipient will have access authorization to the whole batch.
  • a method for utilizing a text or multimedia token as a key to access the content is described.
  • the sender adds a token to the tags of the content.
  • the recipient enters the token correctly upon fulfilling all other rules.
  • the server applies the token matching rule to check the similarities between both tokens.
  • the token may be a photo shot from the sent location, an alphanumeric code, or a sound clip.
  • FIG. 1 is a schematic block diagram of an example content exchange and sharing system in accordance with some embodiments of the present disclosure.
  • FIG. 2 is a flow diagram of a method for sharing a tagged content and applying the access rules in accordance with some embodiments of the present disclosure.
  • FIG. 3 is a flow diagram of a method for applying the location rule in accordance with some embodiments of the present disclosure.
  • FIG. 4 is a flow diagram of a method for applying the time validity rule in accordance with some embodiments of the present disclosure.
  • FIG. 5 is a flow diagram of a method for applying a token matching rule in accordance with some embodiments of the present disclosure.
  • the present disclosure relates to time/location based content exchange and sharing, and more particularly, to systems and methods for exchanging location-bounded and time- bounded prioritized content sequences and batches.
  • This server-implemented method comprises sending, from a first mobile device (i.e. the sender) to a central server (i.e. the server) via a communication network, a tagged content with parameters of access rules.
  • This method comprises also redirecting the tagged content by the server to a second mobile device (i.e. the recipient) to receive tags and the tagged content.
  • This method comprises also applying rules to determine access rights of the recipients.
  • Fig.l illustrates some embodiments where, the content exchange and sharing system is connected to a communications network 110 which may include wired or wireless communications networks, or combinations of both to provide wireless connectivity to mobile devices and any computing devices within the network.
  • the system includes one or more mobile devices.
  • a mobile device may be a communication device such as a cellular phone. According to known techniques, the mobile device can also measure the location information. The mobile device may send and receive communication signals over the network after the required network registration or activation procedures have been completed.
  • the mobile devices may be managed by a central
  • the management system includes a central server component 100, which administers and monitors the mobile devices, and a client component, which can be run on the mobile device to receive and execute management commands from the server component.
  • the management system enables the server to, among other functionalities, configure and update device settings, enforce policies and rules, and remotely deploy applications to different devices.
  • the mobile device includes a location measurement component.
  • the location measurement component measures the device location using one or more of positioning technologies e.g. GPS 150.
  • the location measurement component may use one or more hybrid algorithms for determining the location of the mobile device.
  • the location measurement component may be integrated with a graphical map interface module to display the relative position of the recipient mobile device 130 with respect to the location tag of the content sent by the sender mobile device 120
  • the content exchange and sharing system further includes a central server 100 connected to the network 110.
  • the server is configured to determine the access rules and validity rules associated with every content and recipient.
  • the server performs the computational work in applying these rules.
  • the server may be implemented as a collection of a plurality of server computers.
  • the server may store mobile devices information and their associated locations.
  • the server may contain a database of sender and recipients mobile devices information. This information may indicate one or more of: a device identifier (e.g., serial number, phone number), a user associated with the device, history of content shared or exchanged (including appropriate timestamps) and a current location of the device.
  • a device identifier e.g., serial number, phone number
  • a user associated with the device e.g., phone number
  • history of content shared or exchanged including appropriate timestamps
  • the server may not have device information for the mobile devices.
  • the server interacts with other systems, servers 170 and/or devices such as the mobile devices.
  • content type 14 the content includes a content header and a content body.
  • the content header comprises, but not limited to, unique identifier; tags; content type; sender identifier; and recipient identifier.
  • the content body is a text.
  • the content body is a multimedia e.g. images, video clips, audio clips, text, or combinations of them.
  • the content body is a script/s or a program/s. content get
  • the sender 120 creates the content body using the mobile device.
  • the sender may compose a text using a keypad, capture an image or a video clip using a camera, records an audio clip using a microphone, or creates a content using a third party programs.
  • the sender creates a script or a program that runs instructions on the recipient mobile device 130.
  • the sender may share content body which is created by the system or a third party.
  • the sender mobile device 120 exchanges or shares content which is tagged with location and time validity information and set by the sender at the time of sharing or sending the content.
  • the method includes setting multiple access and validity rules.
  • the sender sets the parameters that controls these rules.
  • the server 100 and recipient 130 apply these rules.
  • Fig.2 describes one embodiment of a method for applying some access rules.
  • the mobile device includes a transceiver for sending/receiving the content with its tags, a processor, and a memory, in communication with the processor, the memory being configured to store instructions that are executable by the processor to carry out various functions.
  • the instructions cause the sender's processor to get the content body, the tags, and the recipients' addresses.
  • the instructions further cause the sender's processor to determine the current location of the mobile device using a location component of the mobile device, and store it as a location tag in the content header.
  • the instructions also cause the sender's processor to determine the parameters for validity period/s and other access rules to be sent or shared via the transceiver to the server.
  • the instructions cause the server to forward the content header with its tags to the recipients.
  • the instructions then cause the recipient's processor to detect the content header being received via the transceiver.
  • the content accessibility is based on a current location of the recipient and other validity rules.
  • the instructions further cause the recipient's processor to determine its current location using a location component of the mobile device, and compare it with the location tag of the content to determine whether to access it or not. If the server determines that all rules are fulfilled, the instructions cause the recipient's processor to request the content body from the server and present the content body to the recipient's display. If any one of the rules is violated, the instructions cause the server to prevent the recipient from requesting and presenting the content body.
  • the sender chooses to set the parameters of the rules. In some other embodiments, some or all parameters of the rules are set by the server. location get
  • the sender determines the location information based on the sender location from which the content is sent. This information is included in the tags of the content and provides parameters to the location accessibility rule.
  • the sender sets the location information from which the recipients can access the content.
  • the present disclosure describes a method for sharing content which are tagged by the sender's location, a chosen validity period and other parameters.
  • the tags also include (but not limited to) a brief description; sequence order; sender details; creation date/time; validity period start date/time; validity period end date/time; specified location information (e.g. by GPS coordinates) where to open/access the content; number of total recipients; and preset max. access opportunities N.
  • the method updates the tags in the content header with the number of access opportunities and validity status.
  • the method further includes presenting all content header information sent or received by the user of the mobile device. recipients
  • the sender selects some users as recipients of the content. In some other embodiments, the sender may share the content with all users. share/net 23.
  • the present disclosure proposes methods to control sharing content between groups of users.
  • the sender publishes content in a common workspace or public bulletin environment and sets the parameters that controls the access and validity rules. location rule, location compare
  • the method determines the recipient current location information and compares it with the location information stored within the content header in order to grant access to the content. To fulfill the location rule, the difference between the stored and current location information must be negligible.
  • Fig.3 describes an example
  • the sender sets the validity period start date/time and end date/time and then sends the content.
  • the sender sets the period type to Once, Recurring, or Multiple.
  • the recurring period type includes hourly, daily, weekly, monthly, and yearly. Multiple period type allows the sender to set several validity periods.
  • the server 100 applies the time validity rule and updates the tags in the content header with validity time information.
  • the server sets an absolute timer for the time validity displayed at the recipient mobile device and checks periodically the validity status of the content. When the current validity period expires, the server then invalidates the time validity rule and renders the content inaccessible.
  • Fig.4 illustrates an example embodiment of the time validity rule when the period type is set to Once.
  • the sender sends the content and sets the period type to
  • the server sends the content header with the tags of the first period and checks every rule and condition. If the first period expires, the server makes the content inaccessible until the next period. When the next period arrives, the server then reinitiates all rules and conditions until this period expires and so on.
  • the sender sends the content and sets the period type to Recurring.
  • the sender sets also the recurring period type to hourly, daily, weekly, monthly, or yearly.
  • the sender can set the time interval length between the validity periods.
  • the sender sends the content and sets the period type to Multiple.
  • the sender sets also the number of periods.
  • the sender sets also the validity period start date/time and end date/time for every period. limited opportunities, count rule
  • a count rule is established when the sender sets the value of maximum (allowed) access opportunities. If this value is equal to the number of recipients, then the count rule is fulfilled for all recipients and the content body is accessible to all recipients given that other rules are fulfilled. The number of recipients is computed when the sender selects the recipients or a group of recipients.
  • the count rule is defined when the sender sets the value of max. access opportunities to less than number of recipients.
  • the server checks the count rule at every access attempt to allow only a subset of the recipients to access the content who fulfilled all rules and conditions before the rest of the recipients by using a priority rule such as first-come-first-served FCFS. In this case, the first recipients who fulfilled all other access and validity rules can access the content body. The rest of the recipients are denied the access to the content body.
  • the count rule is implemented by decreasing the max. access opportunities counter of the content after every successful access attempt and the server then presents the new max. opportunities counter to the sender and the recipients.
  • the server applies the count rule and grants access to the recipient if the max. access opportunities does not equal zero.
  • the server receives notification when a recipient accesses the content body. Upon receiving this notification, the server decreases the value of max. access opportunities by one and notifies the sender and all recipients. When the value of max. access opportunities reaches zero, the server invalidates this rule and renders the content inaccessible.
  • the sender selects 5 recipients and sets the max. access opportunities to 2.
  • the sender sends a batch of more than one content (i.e. a batch of content elements).
  • the sender chooses to define a sequence rule in order to access the content. Recipient will not access any content element unless it is the first of the sequence or the recipient has accessed its predecessor in the batch.
  • the content batch sequence is established by validity periods start and end dates/times. In other embodiments, the relative order is set by the sender.
  • the sender sets a validity period for the whole batch. In some other embodiments, the sender sets a validity period for each content element. priority rules
  • the method further includes determining the sequence order of a content in a batch of content elements based on selected priority rules.
  • the sender sends a batch of content elements and sets the sequence parameter for the priority rule. If the sequence parameter is set to False, the server sets an equal priority to all content elements. If the sequence parameter is set to True, the server applies a priority rule and a recipient will not access any content element unless it is the first of the sequence or the recipient has accessed its predecessor in the sequence.
  • the priority rule establishes the sequence order by validity periods start dates/times of each content element. Then, if two or more content elements have the same validity start date/time, the priority is established by validity period end dates/times. If two or more content elements have the same validity end date/time, the default priority is established by the sent and creation date/time, respectively.
  • the sequence parameter is set to True and the priority rule is based on sent date/time.
  • a recipient can only access the content element which is the earliest element by sent date/time or the recipient has accessed its predecessor in the sequence. batch sequence get 1 only
  • the order of the content elements in a batch combined with the number of max. access opportunities determines another access rule (i.e. a compound rule).
  • another access rule i.e. a compound rule.
  • the server resets the max. access opportunities for the next content element which is available only to the rest of the recipients. The server repeats the previous steps to all content elements sequentially.
  • the sender sends a content batch with number of content elements m, to a number of recipients n where max. access opportunities is set for each content element to N (where N ⁇ n) or is set individually to each element to Ni, N 2 , ... N m . Then the first set of recipients (N or Ni> to access the first element are not allowed to access the rest of elements. And the rest of recipients are now allowed to access the second element until another set of recipients (N or N 2 ) access the second element. At this point, the second content element is blocked the second set of recipients are denied access to the rest of elements in the batch of content.
  • the server repeats the previous steps to all content elements in the batch sequentially.
  • the compound rule is used to apply tiered discount campaigns or offers. batch sequence get all
  • the server when the content batch sequence is established and the max. number of access opportunities is reached for the first content element of the batch, this content element is blocked and replaced by the second content element in the batch.
  • the server resets the max. number of access opportunities for the second content element.
  • the second content element is then available to all recipients and the server applies the access rules.
  • the server repeats the previous steps to all content elements in the batch sequentially. batch sequence get lbyl
  • the server when the content batch sequence is established and the max. number of access opportunities is reached for the first content element, this content element is blocked and replaced by the second content element in the batch.
  • the server resets the max. number of access opportunities for the second content element.
  • the second content element is then available to the set of recipients who accessed the first content element.
  • the server applies the access rules.
  • the rest of recipients is denied access to the rest of content elements in the batch.
  • the server repeats the previous steps to all content elements in the batch sequentially. batch random get 1 only
  • the order of the content elements in the batch is not set and the number of max. access opportunities determines a compound rule. All content elements have the same priority. Any recipient selects to access only one content element from the batch. The server prevents the recipient which accessed any content element from accessing another content element. When the max. number of access opportunities is reached for any content element, this content element is blocked and this element is not accessible to the rest of recipients. batch random get all
  • the order of the content elements in the batch is not set and the number of max. access opportunities determines a compound access rule. All content elements have the same priority. Any recipient selects to access any number of content elements from the batch. The recipient can access a content element if the max. access opportunities of that content element is not reached. When that content element reaches its max. access opportunities, the server blocks the specified content element and makes the content element inaccessible to the rest of recipients. All recipients can access any other content element without specific order or sequence if the max. number of access opportunities of the content element is not reached. batch random get lbyl
  • the order of the content elements in the batch is not set and the number of max. access opportunities determines a compound rule. All content elements in the batch share the same priority. The batch shares a common counter for max. access opportunities. If any recipient fulfills all rules and accesses a specific content element, the server will decrease (decrement by one) the common counter of max. access opportunities for all content elements in the batch. Then the server adds the recipient to a white list of recipients with a compound rule authorization to the whole batch. When the server grants access of a content element to the recipient, the server validates this rule for this recipient to all other content elements in the batch. The server monitors and updates the white list and the value of max. access opportunities to control this right to all recipients. If the common counter of max. access opportunities reaches zero, the recipients in the white list are the only recipients who are allowed to access the batch (upon validating other rules). The rest of recipients are blocked and denied access to the whole batch. token rule
  • a method for utilizing a text or multimedia token as a key to access the content body is described.
  • the sender adds a token to the tags in the content header.
  • the recipient must enter the token after fulfilling all other access and validity rules.
  • the server applies a token matching rule and checks the similarity and likeness of the recipient's entered token to the attached token to validate this rule.
  • Fig.5 describes an example embodiment of the token matching rule.
  • the token is a photo shot taken by the sender from the content location.
  • the recipient can access this photo token and then tries to takes a similar photo shot by the mobile device camera at the same location.
  • the server applies the token matching rule and checks the similarity and likeness of the recipient's shot to the attached token to validate this rule.
  • the token is alphanumeric code which is set by the sender .
  • the recipient enters the code by the mobile device keypad and the server checks the similarity of the recipient's entered code to the sender's attached code to validate this rule.
  • the token is a sound clip recorded by the sender using the mobile device microphone.
  • the recipient records a clip using the mobile device microphone and the server matches the recipient's recoded clip to the sender's attached clip to validate this rule.
  • the system uses the token matching rules to apply pass code in gaming environments or to request answers in educational scenarios. In some other embodiments, the system uses the token matching rules to encrypt and decrypt the content or to secure content exchange methods.
  • the server sets default or permanent values for some or all parameters that control the rules.
  • the access and validity rules are used to define tasks and assignments for students and trainees in an educational environment such as schools or universities.
  • the access and validity rules are used to define tasks and assignments for field personnel in business environment.
  • the access and validity rules are used to create tasks and events for players in gaming and entertainments environment. 58. In some example embodiments, the access and validity rules are used to implement guided tours in tourism environment.
  • the access and validity rules are used to implement share and exchange content in a social network environment.

Abstract

Systems and methods for exchanging time-bounded and location-bounded prioritized content batches are described. The methods comprise sending a tagged content from a sender's mobile device via a server to one or more recipients, and applying the access rules to determine the access rights of the recipients. Multiple rules are defined such as count rule, priority rule, time validity rule, location rule, batch rule, compound rule, and token matching rule. The sender sets parameters to define these rules while the server and recipient apply these rules. All rules must be fulfilled. Otherwise, the server prevents the recipient from accessing the content. Compound rules combine different parameters to make the recipients compete to access content elements. The rules are used in education, workforce management, gaming, infotainments, or social networks environments.

Description

Description
RULE-BASED CONTENT SHARING
TECHNICAL FIELD
The present disclosure relates to time/location based content exchange and sharing. More particularly, it relates to systems and methods for exchanging time-bounded and location- bounded prioritized content batches.
BACKGROUND
Content exchange and sharing systems and services are the cornerstone of the modern information and communications technology. At any given time, every system or user is flooded with a huge amount of contents generated by machines or humans. Content could be text, multimedia, programs, signals, etc. In many real life contexts, order and interaction are needed and sometimes crucial. For example, in educational environment, the subject lessons and assignments are organized in order and sequence from a time perspective. In many cases, these lessons are location bound too. Other dimensions sometimes are needed such as priorities and validity. Manual methods are error prone. Other workarounds are very complex and expensive.
SUMMARY
Embodiments of the present invention relate to methods and systems for exchanging location- bounded and time-bounded prioritized content batches.
According to one aspect of the present disclosure, a server-implemented method comprises sending a tagged content from a sender's mobile device to a server via a communications network; redirecting the tagged content from the server to one or more recipients' mobile devices; and applying the access rules to determine the access rights of the recipients' mobile devices.
The method includes tagging the content by the sender's location and other chosen
parameters. The tags also include (but not limited to) validity period start date/time; validity period end date/time; specified location where to open/access the content; maximum access opportunities; and a sequence order. The method updates and presents the tags information.
The method further includes applying multiple access and validity rules. The sender sets some parameters that control these rules while the server and recipient mobile device apply these rules. In some embodiments, the server determines if all the rules are fulfilled or not, in order to present the content to the recipient. If any rule is violated, the server prevents the recipient from requesting and presenting the content.
In some embodiments, the content is multimedia e.g. images, video clips, audio clips, text, or combinations of them. In some other embodiments, the content is a script/s, a program/s, or both. The sender may compose the content or share the content that is created by the system or a third party programs.
According to another aspect of the present disclosure, the mobile device may be a
communication device that can send/receive communications signals over a communications network and can also measure the location information.
In some embodiments, the sender mobile device selects the recipients of the content. In some other embodiments, the sender may select to publish the content in a public environment and sets the access and validity rules.
According to another aspect of the present disclosure, a server is connected to the network. The server is also configured to determine the access and validity rules associated with every content and recipient mobile device and perform the computational work in applying these rules.
In some embodiments, the method determines the difference between the recipient's current location and the location information tag. To fulfill the location rule, this difference must be negligible.
In at least some embodiments, the sender sets start date/time and end date/time of the validity period. The sender chooses whether the validity period is single or there are several validity periods. In some other embodiments, the sender sets the period type to be recurring or multiple.
In some embodiments, the method allows the sender to define a count rule by setting the number of max. access opportunities to the content. If this number is equal to the number of recipients, the content is accessible to all recipients. When this number is less than the number of recipients, the count rule is checked at every access attempt to allow only a subset of the recipients to access the content using a priority rule.
In further embodiments, the sender sends a batch of content elements with a sequence order and defines a priority rule to access the content. This sequence order is established by validity periods, sent dates/times or any other information. In some embodiments, the sender sets the sequence order manually. In some other embodiments, the sender may set an equal priority to all content elements. In some embodiments, the sequence order combined with the max. access opportunities determines several access rules. In some other embodiments, any recipient may access any content element until its max. access opportunities is reached. In other embodiments, any recipient may access only one content element and then is denied access to the rest of the batch. In some other embodiments, any recipient may access the first content element until it reaches its max. access opportunities. Then any other content element is available only to recipients who accessed its predecessor in the batch while the rest of recipients are denied access.
In some embodiments, the order of the content elements in the batch is irrelevant and the max. access opportunities determines some access rules. In some embodiments, all recipients can access every content element without specific order until the max. access opportunities of that element is reached. In other embodiments, any recipient can choose to access only one content element from the batch if the max. access opportunities for that content element is not reached.
In some embodiments, the batch has a common counter for max. access opportunities. When any recipient accesses a specific content element, the server decreases by one the common counter for the whole batch. Any content element is accessible until the common counter reaches zero. If a recipient is authorized to access a content element, this recipient will have access authorization to the whole batch.
According to another aspect of the present disclosure, a method for utilizing a text or multimedia token as a key to access the content is described. The sender adds a token to the tags of the content. The recipient enters the token correctly upon fulfilling all other rules. The server applies the token matching rule to check the similarities between both tokens. In some embodiments, the token may be a photo shot from the sent location, an alphanumeric code, or a sound clip.
Other example embodiments of the present disclosure will be apparent to those of ordinary skill in the art from a review of the following detailed descriptions in conjunction with the drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
Reference will now be made, by way of example and not limitation, to the accompanying figures which show example embodiments of the present disclosure and in which:
FIG. 1 is a schematic block diagram of an example content exchange and sharing system in accordance with some embodiments of the present disclosure. FIG. 2 is a flow diagram of a method for sharing a tagged content and applying the access rules in accordance with some embodiments of the present disclosure.
FIG. 3 is a flow diagram of a method for applying the location rule in accordance with some embodiments of the present disclosure.
FIG. 4 is a flow diagram of a method for applying the time validity rule in accordance with some embodiments of the present disclosure.
FIG. 5 is a flow diagram of a method for applying a token matching rule in accordance with some embodiments of the present disclosure.
DETAILED DESCRIPTION
1. The present disclosure relates to time/location based content exchange and sharing, and more particularly, to systems and methods for exchanging location-bounded and time- bounded prioritized content sequences and batches.
2. This server-implemented method comprises sending, from a first mobile device (i.e. the sender) to a central server (i.e. the server) via a communication network, a tagged content with parameters of access rules. This method comprises also redirecting the tagged content by the server to a second mobile device (i.e. the recipient) to receive tags and the tagged content. This method comprises also applying rules to determine access rights of the recipients.
3. Fig.l illustrates some embodiments where, the content exchange and sharing system is connected to a communications network 110 which may include wired or wireless communications networks, or combinations of both to provide wireless connectivity to mobile devices and any computing devices within the network. The system includes one or more mobile devices.
4. In at least some embodiments, a mobile device may be a communication device such as a cellular phone. According to known techniques, the mobile device can also measure the location information. The mobile device may send and receive communication signals over the network after the required network registration or activation procedures have been completed.
5. In at least some embodiments, the mobile devices may be managed by a central
management system. The management system includes a central server component 100, which administers and monitors the mobile devices, and a client component, which can be run on the mobile device to receive and execute management commands from the server component. The management system enables the server to, among other functionalities, configure and update device settings, enforce policies and rules, and remotely deploy applications to different devices.
6. In some embodiments, the mobile device includes a location measurement component. The location measurement component measures the device location using one or more of positioning technologies e.g. GPS 150.
7. In at least some embodiments, the location measurement component may use one or more hybrid algorithms for determining the location of the mobile device.
8. In some embodiments, the location measurement component may be integrated with a graphical map interface module to display the relative position of the recipient mobile device 130 with respect to the location tag of the content sent by the sender mobile device 120
9. In some embodiments, the content exchange and sharing system further includes a central server 100 connected to the network 110. The server is configured to determine the access rules and validity rules associated with every content and recipient. The server performs the computational work in applying these rules.
10. In at least some embodiments, the server may be implemented as a collection of a plurality of server computers.
11. In some embodiments, the server may store mobile devices information and their associated locations. For example, the server may contain a database of sender and recipients mobile devices information. This information may indicate one or more of: a device identifier (e.g., serial number, phone number), a user associated with the device, history of content shared or exchanged (including appropriate timestamps) and a current location of the device.
12. In some embodiments, the server may not have device information for the mobile devices.
13. In some embodiments, the server interacts with other systems, servers 170 and/or devices such as the mobile devices. content type 14. In at least some embodiments, the content includes a content header and a content body. The content header comprises, but not limited to, unique identifier; tags; content type; sender identifier; and recipient identifier. In some embodiments, the content body is a text. In other embodiments, the content body is a multimedia e.g. images, video clips, audio clips, text, or combinations of them. In some other embodiments, the content body is a script/s or a program/s. content get
15. In some embodiments, the sender 120 creates the content body using the mobile device. The sender may compose a text using a keypad, capture an image or a video clip using a camera, records an audio clip using a microphone, or creates a content using a third party programs. In some other embodiments, the sender creates a script or a program that runs instructions on the recipient mobile device 130. In some embodiments, the sender may share content body which is created by the system or a third party. mobile device/server/instruction/set default
16. In some embodiments, the sender mobile device 120 exchanges or shares content which is tagged with location and time validity information and set by the sender at the time of sharing or sending the content. The method includes setting multiple access and validity rules. The sender sets the parameters that controls these rules. The server 100 and recipient 130 apply these rules. Fig.2 describes one embodiment of a method for applying some access rules.
17. In some embodiments, the mobile device includes a transceiver for sending/receiving the content with its tags, a processor, and a memory, in communication with the processor, the memory being configured to store instructions that are executable by the processor to carry out various functions. The instructions cause the sender's processor to get the content body, the tags, and the recipients' addresses. The instructions further cause the sender's processor to determine the current location of the mobile device using a location component of the mobile device, and store it as a location tag in the content header. The instructions also cause the sender's processor to determine the parameters for validity period/s and other access rules to be sent or shared via the transceiver to the server. If the server determines that the content and all necessary tags are present, the instructions cause the server to forward the content header with its tags to the recipients. The instructions then cause the recipient's processor to detect the content header being received via the transceiver. The content accessibility is based on a current location of the recipient and other validity rules. The instructions further cause the recipient's processor to determine its current location using a location component of the mobile device, and compare it with the location tag of the content to determine whether to access it or not. If the server determines that all rules are fulfilled, the instructions cause the recipient's processor to request the content body from the server and present the content body to the recipient's display. If any one of the rules is violated, the instructions cause the server to prevent the recipient from requesting and presenting the content body.
18. In some embodiments, the sender chooses to set the parameters of the rules. In some other embodiments, some or all parameters of the rules are set by the server. location get
19. In some embodiments, the sender determines the location information based on the sender location from which the content is sent. This information is included in the tags of the content and provides parameters to the location accessibility rule.
20. In some other embodiments, the sender sets the location information from which the recipients can access the content. tags
21. In one aspect, the present disclosure describes a method for sharing content which are tagged by the sender's location, a chosen validity period and other parameters. The tags also include (but not limited to) a brief description; sequence order; sender details; creation date/time; validity period start date/time; validity period end date/time; specified location information (e.g. by GPS coordinates) where to open/access the content; number of total recipients; and preset max. access opportunities N. The method updates the tags in the content header with the number of access opportunities and validity status. The method further includes presenting all content header information sent or received by the user of the mobile device. recipients
22. In some embodiments, the sender selects some users as recipients of the content. In some other embodiments, the sender may share the content with all users. share/net 23. In one aspect, the present disclosure proposes methods to control sharing content between groups of users. The sender publishes content in a common workspace or public bulletin environment and sets the parameters that controls the access and validity rules. location rule, location compare
24. In some embodiments, the method determines the recipient current location information and compares it with the location information stored within the content header in order to grant access to the content. To fulfill the location rule, the difference between the stored and current location information must be negligible. Fig.3 describes an example
embodiment of the location rule. period rule and types
25. In at least some embodiments, the sender sets the validity period start date/time and end date/time and then sends the content.
26. In some embodiments, the sender sets the period type to Once, Recurring, or Multiple. The recurring period type includes hourly, daily, weekly, monthly, and yearly. Multiple period type allows the sender to set several validity periods.
27. In some embodiments, the server 100 applies the time validity rule and updates the tags in the content header with validity time information. The server sets an absolute timer for the time validity displayed at the recipient mobile device and checks periodically the validity status of the content. When the current validity period expires, the server then invalidates the time validity rule and renders the content inaccessible. Fig.4 illustrates an example embodiment of the time validity rule when the period type is set to Once.
28. In some other embodiments, the sender sends the content and sets the period type to
Recurring or Multiple. The server sends the content header with the tags of the first period and checks every rule and condition. If the first period expires, the server makes the content inaccessible until the next period. When the next period arrives, the server then reinitiates all rules and conditions until this period expires and so on.
29. In some embodiments, the sender sends the content and sets the period type to Recurring. The sender sets also the recurring period type to hourly, daily, weekly, monthly, or yearly. In some other embodiments, the sender can set the time interval length between the validity periods. 30. In some other embodiments, the sender sends the content and sets the period type to Multiple. The sender sets also the number of periods. The sender sets also the validity period start date/time and end date/time for every period. limited opportunities, count rule
31. In some embodiments, a count rule is established when the sender sets the value of maximum (allowed) access opportunities. If this value is equal to the number of recipients, then the count rule is fulfilled for all recipients and the content body is accessible to all recipients given that other rules are fulfilled. The number of recipients is computed when the sender selects the recipients or a group of recipients.
32. In other embodiments, the count rule is defined when the sender sets the value of max. access opportunities to less than number of recipients. The server checks the count rule at every access attempt to allow only a subset of the recipients to access the content who fulfilled all rules and conditions before the rest of the recipients by using a priority rule such as first-come-first-served FCFS. In this case, the first recipients who fulfilled all other access and validity rules can access the content body. The rest of the recipients are denied the access to the content body.
33. In some other embodiments, the count rule is implemented by decreasing the max. access opportunities counter of the content after every successful access attempt and the server then presents the new max. opportunities counter to the sender and the recipients. The server applies the count rule and grants access to the recipient if the max. access opportunities does not equal zero. The server receives notification when a recipient accesses the content body. Upon receiving this notification, the server decreases the value of max. access opportunities by one and notifies the sender and all recipients. When the value of max. access opportunities reaches zero, the server invalidates this rule and renders the content inaccessible.
34. For example, the sender selects 5 recipients and sets the max. access opportunities to 2. When the first recipient fulfills all other rules and accesses the content body, the server will decrement the max. access opportunities by 1 (2-1=1). When another recipient fulfills all rules and accesses the content, the server will update the max. access opportunities to 0 (1- 1=0). At that point, the server invalidates the count rule and renders the content
inaccessible to the rest of recipients. content batch 35. In further embodiments, the sender sends a batch of more than one content (i.e. a batch of content elements). The sender chooses to define a sequence rule in order to access the content. Recipient will not access any content element unless it is the first of the sequence or the recipient has accessed its predecessor in the batch. In some embodiment, the content batch sequence is established by validity periods start and end dates/times. In other embodiments, the relative order is set by the sender.
36. In some embodiments, the sender sets a validity period for the whole batch. In some other embodiments, the sender sets a validity period for each content element. priority rules
37. In some embodiments, the method further includes determining the sequence order of a content in a batch of content elements based on selected priority rules.
38. In some embodiments, the sender sends a batch of content elements and sets the sequence parameter for the priority rule. If the sequence parameter is set to False, the server sets an equal priority to all content elements. If the sequence parameter is set to True, the server applies a priority rule and a recipient will not access any content element unless it is the first of the sequence or the recipient has accessed its predecessor in the sequence.
39. In further embodiments, the priority rule establishes the sequence order by validity periods start dates/times of each content element. Then, if two or more content elements have the same validity start date/time, the priority is established by validity period end dates/times. If two or more content elements have the same validity end date/time, the default priority is established by the sent and creation date/time, respectively. sequence
40. In some embodiments, the sequence parameter is set to True and the priority rule is based on sent date/time. A recipient can only access the content element which is the earliest element by sent date/time or the recipient has accessed its predecessor in the sequence. batch sequence get 1 only
41. In some embodiments, the order of the content elements in a batch combined with the number of max. access opportunities determines another access rule (i.e. a compound rule). In a content batch sequence, when the max. number of access opportunities of the current content element is reached, this content element is blocked and replaced by the next content element in the batch. Then the server resets the max. access opportunities for the next content element which is available only to the rest of the recipients. The server repeats the previous steps to all content elements sequentially.
42. In some example embodiment, the sender sends a content batch with number of content elements m, to a number of recipients n where max. access opportunities is set for each content element to N (where N<n) or is set individually to each element to Ni, N2, ... Nm. Then the first set of recipients (N or Ni> to access the first element are not allowed to access the rest of elements. And the rest of recipients are now allowed to access the second element until another set of recipients (N or N2) access the second element. At this point, the second content element is blocked the second set of recipients are denied access to the rest of elements in the batch of content. The server repeats the previous steps to all content elements in the batch sequentially.
43. In some example embodiments, the compound rule is used to apply tiered discount campaigns or offers. batch sequence get all
44. In some embodiments, when the content batch sequence is established and the max. number of access opportunities is reached for the first content element of the batch, this content element is blocked and replaced by the second content element in the batch. The server resets the max. number of access opportunities for the second content element. The second content element is then available to all recipients and the server applies the access rules. The server repeats the previous steps to all content elements in the batch sequentially. batch sequence get lbyl
45. In some embodiments, when the content batch sequence is established and the max. number of access opportunities is reached for the first content element, this content element is blocked and replaced by the second content element in the batch. The server resets the max. number of access opportunities for the second content element. The second content element is then available to the set of recipients who accessed the first content element. The server applies the access rules. The rest of recipients is denied access to the rest of content elements in the batch. The server repeats the previous steps to all content elements in the batch sequentially. batch random get 1 only
46. In some embodiments, the order of the content elements in the batch is not set and the number of max. access opportunities determines a compound rule. All content elements have the same priority. Any recipient selects to access only one content element from the batch. The server prevents the recipient which accessed any content element from accessing another content element. When the max. number of access opportunities is reached for any content element, this content element is blocked and this element is not accessible to the rest of recipients. batch random get all
47. In some embodiments, the order of the content elements in the batch is not set and the number of max. access opportunities determines a compound access rule. All content elements have the same priority. Any recipient selects to access any number of content elements from the batch. The recipient can access a content element if the max. access opportunities of that content element is not reached. When that content element reaches its max. access opportunities, the server blocks the specified content element and makes the content element inaccessible to the rest of recipients. All recipients can access any other content element without specific order or sequence if the max. number of access opportunities of the content element is not reached. batch random get lbyl
48. In some embodiments, the order of the content elements in the batch is not set and the number of max. access opportunities determines a compound rule. All content elements in the batch share the same priority. The batch shares a common counter for max. access opportunities. If any recipient fulfills all rules and accesses a specific content element, the server will decrease (decrement by one) the common counter of max. access opportunities for all content elements in the batch. Then the server adds the recipient to a white list of recipients with a compound rule authorization to the whole batch. When the server grants access of a content element to the recipient, the server validates this rule for this recipient to all other content elements in the batch. The server monitors and updates the white list and the value of max. access opportunities to control this right to all recipients. If the common counter of max. access opportunities reaches zero, the recipients in the white list are the only recipients who are allowed to access the batch (upon validating other rules). The rest of recipients are blocked and denied access to the whole batch. token rule
49. According to another aspect of the present disclosure, a method for utilizing a text or multimedia token as a key to access the content body is described. The sender adds a token to the tags in the content header. The recipient must enter the token after fulfilling all other access and validity rules. The server applies a token matching rule and checks the similarity and likeness of the recipient's entered token to the attached token to validate this rule. Fig.5 describes an example embodiment of the token matching rule.
50. In some embodiments, the token is a photo shot taken by the sender from the content location. The recipient can access this photo token and then tries to takes a similar photo shot by the mobile device camera at the same location. The server applies the token matching rule and checks the similarity and likeness of the recipient's shot to the attached token to validate this rule.
51. In some embodiments, the token is alphanumeric code which is set by the sender .The recipient enters the code by the mobile device keypad and the server checks the similarity of the recipient's entered code to the sender's attached code to validate this rule.
52. In other embodiments, the token is a sound clip recorded by the sender using the mobile device microphone. The recipient records a clip using the mobile device microphone and the server matches the recipient's recoded clip to the sender's attached clip to validate this rule.
53. In some example embodiments, the system uses the token matching rules to apply pass code in gaming environments or to request answers in educational scenarios. In some other embodiments, the system uses the token matching rules to encrypt and decrypt the content or to secure content exchange methods.
54. In other example embodiments of the present disclosure, the server sets default or permanent values for some or all parameters that control the rules.
App fields
55. In some example embodiments, the access and validity rules are used to define tasks and assignments for students and trainees in an educational environment such as schools or universities.
56. In some example embodiments, the access and validity rules are used to define tasks and assignments for field personnel in business environment.
57. In other example embodiments, the access and validity rules are used to create tasks and events for players in gaming and entertainments environment. 58. In some example embodiments, the access and validity rules are used to implement guided tours in tourism environment.
59. In some example embodiments, the access and validity rules are used to implement share and exchange content in a social network environment. other example
60. It should be understood that the aforementioned implementations are merely example implementations, and that claimed subject matter is not necessarily limited to any particular aspect of these example implementations.

Claims

CLAIMS What is claimed is:
1. A server-implemented method for time/location based content exchange and sharing, comprising:
sending, from a first mobile device (i.e. the sender) to a server via a communications network, a content tagged with parameters of access rules;
redirecting the content header by the server to a second mobile device (i.e. the recipient); receiving the content header by the recipient;
applying rules by the server to determine access rights of the recipient; and
in response to applying rules, releasing the content body by the server to the recipient.
2. The method of claim 1, wherein
the content comprising:
a content body that contains the information to be shared including at least one of a text, an image, a video clip, an audio clip, a script, and a program; and
a content header comprising:
unique identifier;
sender identifier;
recipients identifiers;
batch parameters;
content type; and
tags that define parameters of access rules.
3. The method of claim 2, wherein
the tags comprising:
a brief description; sequence order; sender details; creation date and time; validity period start date and time; validity period end date and time; specified location information where to access the content; number of total recipients; and max access opportunities.
4. The method of claim 1, wherein
sending a content comprises:
getting the content body to be sent or shared;
selecting the recipients addresses; setting parameters that control multiple access and validity rules;
determining the sender's current location information;
storing the parameters and location information in the content header; and
forwarding the content to the server.
5. The method of claim 4, wherein
getting the content to be sent or shared comprises:
composing a text using a keypad;
capturing an image using a camera;
recording or a video clip using a video camera;
recording an audio clip using a microphone;
creating a content using a third party programs;
creating a script or a program that runs instructions on the recipient mobile device; and copying a content that is created by a third party.
6. The method of claim 4, wherein
selecting the recipients comprises at least one of:
identifying one or more users as recipients;
sharing the content with all users; and
sharing the content to predefined group of users;
7. The method of claim 4, wherein
setting parameters, to control multiple access and validity rules, comprises:
setting time validity parameters;
setting count rule parameters;
setting content batch parameters;
setting compound rule parameters; and
setting token rule parameters.
8. The method of claim 7, wherein
setting time validity parameters comprises:
setting the period type to Once, Recurring, or Multiple;
setting the recurring period parameters to define the frequency period and duration; setting the multiple period parameters to define several validity periods; and determining the validity period start date/time and end date/time.
9. The method of claim 7, wherein
setting count rule parameters comprises:
selecting, by the sender, the value of max access opportunities of the content; and
computing the number of recipients.
10. The method of claim 7, wherein
setting content batch parameters comprises:
notifying the server that the sender sends a batch of two or more contents, i.e., batch elements; counting the number of batch elements;
selecting if the batch elements share the count parameters or not; and
selecting if the batch elements share the time validity parameters or not.
11. The method of claim 10, wherein
setting content batch parameters further comprises setting sequence parameters to define how to access the batch elements and select whether the batch elements have an equal priority or the recipient must access batch elements in sequence.
12. The method of claim 7, wherein
setting compound rule parameters determines if a compound rule is selected or not from a list of rules comprising;
a rule to get one element from a batch sequence;
a rule to get all elements from a batch sequence
a rule to get elements one by one from a batch sequence;
a rule to get one element randomly from a batch;
a rule to get all elements randomly from a batch; and
a rule to get elements one by one randomly from a batch.
13. The method of claim 7, wherein
setting token rule parameters comprises;
determining if a token is required as a passkey to access the content or not;
setting the token type to at least one of a alphanumeric code, a photo shot, or an audio clip; and
entering the token by the sender using keypad, camera, or microphone.
14. The method of claim 13, wherein the token further comprising a photo or a sound clip recorded at the sent location to be matched with the recipient recorded photo or audio clip.
15. The method of claim 4, wherein
determining the sender's current location information based on the sender location from which the content is sent and to which the recipient must be to access the content.
16. The method of claim 1, wherein
redirecting the content header by the server to the recipient comprises:
determining by the server that the content and all parameters are present; and forwarding the content header by the server to the recipients.
17. The method of claim 1, wherein
receiving the content header by the recipient comprising;
acknowledging the content header being received;
determining the current time and date;
determining the current location of the recipient;
presenting all current information to the server; and
requesting access from the server to the content body.
18. The method of claim 1, wherein
applying rules by the server, to determine access rights of the recipient, comprises: applying the time validity rule;
applying the location rule;
applying the count rule;
applying the batch rule;
applying the compound rule;
applying the token matching rule
updating the parameters; and
presenting the parameters to the sender and the recipient;
19. The method of claim 18, wherein
applying the time validity rule comprises:
extracting the time validity parameters from the content header;
identifying the frequency and durations of all validity periods; setting timers by the server for the time validity start and end;
fulfilling the time validity rule if the current time lies between the time validity start and end; displaying regularly the time validity status to the recipient through the server;
invalidating the rule and rendering the content inaccessible when the current time passes the time validity end; and
reinitiating all rules and repeating the previous steps if there is more than one validity period.
20. The method of claim 18, wherein
applying the location rule comprises comparing the recipient's current location information with the content's location information and, in response to that, fulfilling the location rule if the difference between both informations is negligible.
21. The method of claim 18, wherein
applying the count rule is required when the max access opportunities is less than the number of recipients to grant access to only a subset of the recipients and it comprises:
maintaining a count for the successful access attempts;
checking the max access opportunities and the count at every access attempt;
granting access to the recipient if the count is less than the max access opportunities;
notifying the server after every successful access to increment the count; and
invalidating the count rule when the count reaches the max access opportunities.
22. The method of claim 18, wherein
applying the batch rule comprises:
determining if batch elements are in sequence and the order of the batch elements;
if requested, establishing the sequence by the sent date/time, creation date/time, validity periods start date/time, or manually by the sender; and
granting access to any available content if there is no sequence and, if there is a sequence, to the first eligible element in the batch.
23. The method of claim 22, wherein
the batch elements share the same validity period or the sender sets a different validity period for each batch element.
24. The method of claim 18, wherein applying the compound rule comprises determining the type of rule being selected and fulfilling all necessary conditions by using the sequence type of the batch and the max access opportunities in that rule.
25. The method of claim 24, wherein
the selected rule is to get one element from a batch sequence under which the server allows only one access opportunity per recipient, valid for a single batch element within its max access opportunities, and expires upon utilization to deny the recipient any access to the rest of the batch.
26. The method of claim 24, wherein
the selected rule is to get all elements from a batch sequence under which the server allows all recipient to attempt to access any element as long as that element is in sequence and does not reach its max access opportunities.
27. The method of claim 24, wherein
the selected rule is to get elements one by one from a batch sequence under which the server allows all recipients to access the first element until it reaches its max access opportunities and then, for the rest of elements, to replace it with the next element which is accessible only to recipients who successfully accessed its predecessor and as long as it does not reach its own max access opportunities.
28. The method of claim 24, wherein
the selected rule is to get one element randomly from a batch under which the server allows only one access opportunity per recipient, valid for any one batch element without order, and expires upon successful utilization to deny that recipient any access to the rest of the batch.
29. The method of claim 24, wherein
the selected rule is to get all elements randomly from a batch under which the server allows all recipient to attempt to access any element without order as long as that element does not reach its max access opportunities.
30. The method of claim 24, wherein
the selected rule is to get elements one by one randomly from a batch under which the server allows any recipients to access any element until the total successful access attempts to all elements reach the max access opportunities and then allows only the recipients, who previously accessed any element, to access the rest of the batch.
31. The method of claim 18, wherein
applying the token matching rule comprises:
ensuring that all other rules are fulfilled;
requesting an input from the recipient;
matching the recipient's token with the sender's token; and
in response to the successful matching result, granting access to the recipient.
32. The method of claim 31, wherein
applying the token matching rule further comprises identifying the sender's token type as a photo to request, from the recipient, a similar photo shot taken at the same location.
33. The method of claim 31, wherein
applying the token matching rule further comprises identifying the sender's token type as an audio clip to request, from the recipient, a similar audio clip recorded at the same location.
34. The method of claim 1, wherein
redirecting the content body by the server to the recipient comprises:
denying access to the content body until all rules are fulfilled;
sending the content body to the recipient to present it to the user;
receiving a notification of successful access from the recipient; and
updating the parameters;
35. A system for content exchange and sharing, comprising:
a first mobile device (i.e. The sender) configured to send and share tagged content with parameters of access rules;
a second mobile device (i.e. The recipient) configured to receive the content header and input the necessary parameters; and
a server connected to the sender and the recipient via a communication network, wherein the server is configured to:
receive, from the sender, the tagged content with parameters of access rules;
redirect the content header to the recipient;
apply the rules to determine the access rights of the recipient; and
in response to applying rules, releasing the content body by the server to the recipient.
36. The system of claim 35, wherein the mobile device includes a transceiver for
sending/receiving the content and its tags over the network after acquiring the network approval, a processor, a memory to store instructions to execute various functions, a location component to determine the current location, a display to present a graphical map showing the relative position of the recipient's location with respect to location sent by the sender.
37. The system of claim 35, wherein the server further includes one server computer or a collection of a plurality of server computers.
38. A non-transitory computer-readable medium storing processor-executable instructions for a server and at least one processor of a mobile device, to share and exchange location-bounded and time-bounded prioritized content batches and sequences, wherein the instructions comprise: instructions to send, from a first mobile device (i.e. the sender) to the server via a
communication network, a tagged content with parameters for access rules;
instructions to redirect, from the server, the tagged content and parameters to the second mobile device (i.e. the recipient);
instructions to receive the tagged content by the recipient; and
instructions to apply the rules to determine the access rights of the recipients.
PCT/IB2017/055222 2017-08-30 2017-08-30 Rule-based content sharing WO2019043433A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/IB2017/055222 WO2019043433A1 (en) 2017-08-30 2017-08-30 Rule-based content sharing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/IB2017/055222 WO2019043433A1 (en) 2017-08-30 2017-08-30 Rule-based content sharing

Publications (1)

Publication Number Publication Date
WO2019043433A1 true WO2019043433A1 (en) 2019-03-07

Family

ID=59982422

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2017/055222 WO2019043433A1 (en) 2017-08-30 2017-08-30 Rule-based content sharing

Country Status (1)

Country Link
WO (1) WO2019043433A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112351133A (en) * 2019-08-07 2021-02-09 华为技术有限公司 Media data sharing method and terminal
CN115292624A (en) * 2022-10-08 2022-11-04 成都同步新创科技股份有限公司 Universal message processing method and device based on HTTP (hyper text transport protocol)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7925592B1 (en) * 2006-09-27 2011-04-12 Qurio Holdings, Inc. System and method of using a proxy server to manage lazy content distribution in a social network
US20130290426A1 (en) * 2013-06-06 2013-10-31 Sky Socket, Llc Social Media and Data Sharing Controls
US20160142913A1 (en) * 2014-11-18 2016-05-19 Motorola Mobility Llc Methods and apparatus for content sharing between multiple mobile electronic devices

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7925592B1 (en) * 2006-09-27 2011-04-12 Qurio Holdings, Inc. System and method of using a proxy server to manage lazy content distribution in a social network
US20130290426A1 (en) * 2013-06-06 2013-10-31 Sky Socket, Llc Social Media and Data Sharing Controls
US20160142913A1 (en) * 2014-11-18 2016-05-19 Motorola Mobility Llc Methods and apparatus for content sharing between multiple mobile electronic devices

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112351133A (en) * 2019-08-07 2021-02-09 华为技术有限公司 Media data sharing method and terminal
CN115292624A (en) * 2022-10-08 2022-11-04 成都同步新创科技股份有限公司 Universal message processing method and device based on HTTP (hyper text transport protocol)
CN115292624B (en) * 2022-10-08 2023-08-04 成都同步新创科技股份有限公司 General message processing method and device based on HTTP protocol

Similar Documents

Publication Publication Date Title
JP7246052B2 (en) Customer relationship management system and method of handling customer service requests
US20210084144A1 (en) Communication Channel Enhancement
US10356091B2 (en) Communication enhancement methods
US10152718B1 (en) Agent initiated actions
JP5925373B1 (en) Communication support system
US11775939B2 (en) Calendar comparison system and method
US11265419B1 (en) Agent controlled menu
US11658887B2 (en) Illicit route viewing system and method of operation
CN110457629A (en) Permission processing, authority control method and device
US20170244805A1 (en) Systems and methods for coordinating events
WO2019043433A1 (en) Rule-based content sharing
EP3937097A1 (en) System and method for verifiably proving proximity
US10447630B2 (en) Method and system for anonymous and secure social linking during an event
KR20120132046A (en) Method for registering of lectures by using relay server, and system thereof
US20220417234A1 (en) Host-initiated authentication system and method
Ganesh et al. Protection of shared data among multiple users for online social networks
EP3491883B1 (en) Communication channel enhancement
US20220337541A1 (en) Differentiated message presentation in a communication platform
US20220270054A1 (en) Inferring meeting expense via a meeting expense and verification controller
US20160321439A1 (en) Connection Prediction As Identity Verification
Tolley Implementation and Evaluation of an Algorithm for User Identity and Permissions for Situational Awareness Analysis
JP2021157215A (en) Authorization device, authorization method and authorization program
US20160071222A1 (en) System and methods for managing relationships in a business network
KR20140115286A (en) A system comprising mobile membership notebook app

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17777379

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17777379

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 17777379

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 01/10/2021)