US20150281183A1 - Method and system for enabling anonymous communications between two or more interested parties - Google Patents
Method and system for enabling anonymous communications between two or more interested parties Download PDFInfo
- Publication number
- US20150281183A1 US20150281183A1 US14/670,892 US201514670892A US2015281183A1 US 20150281183 A1 US20150281183 A1 US 20150281183A1 US 201514670892 A US201514670892 A US 201514670892A US 2015281183 A1 US2015281183 A1 US 2015281183A1
- Authority
- US
- United States
- Prior art keywords
- sender
- recipient
- server computer
- anonymous
- communications server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
- H04L63/0421—Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations
- H04L12/18—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
- H04L12/1813—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
- H04L12/1818—Conference organisation arrangements, e.g. handling schedules, setting up parameters needed by nodes to attend a conference, booking network resources, notifying involved parties
-
- H04L51/28—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/48—Message addressing, e.g. address format or anonymous messages, aliases
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
-
- H04L67/28—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42008—Systems for anonymous communication between parties, e.g. by use of disposal contact identifiers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/18—Service support devices; Network management devices
- H04W88/184—Messaging devices, e.g. message centre
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Multimedia (AREA)
- Telephonic Communication Services (AREA)
Abstract
A method and system for communicating anonymously between two parties until such time that the parties may wish to reveal their identities to each other. This is accomplished by using a portable device that enables anonymous communications between a sender (operating a sender device such as a smartphone) and a recipient (operating a recipient device such as a smartphone) via an anonymous communications server computer.
Description
- This invention relates to a method and system that enables two or more parties to communicate with each other anonymously via an intermediate computer acting as a bridge or proxy between the parties.
- Often times people encounter others in a social or even business setting in which they would like to meet the other person, but are too shy or reserved to initiate a formal introduction of themselves to that person. That is, they would like to meet but in an anonymous manner so that if the meeting is not fruitful they may cutoff any further communication without fear of subsequent unwanted contact. In the alternative, a person may sense that the other person may have similar fears and may wish to give that person the opportunity to engage in an anonymous communication if desired.
- The present invention is therefore a method and system for communicating anonymously between two (or more) parties until such time that the parties may wish to reveal their identities to each other. This is accomplished by using a portable device that enables anonymous communications between a sender (operating a sender device such as a smartphone) and a recipient (operating a recipient device such as a smartphone) via an anonymous communications server computer. First, a sender identification tag that enables the anonymous communications server computer to communicate with the sender device is stored on a portable device. The portable device is provided to a recipient, which may be as simple as the sender handing it to the recipient in an anonymous manner.
- The recipient may interconnect the portable device with a recipient device, such as by plugging it into the recipient device. After interconnection, the portable device will transfer the sender identification tag to the recipient device, and recipient device initiates communications with an anonymous communications server computer (e.g. by using anonymous communications server computer contact properties obtained from the portable device) and transmits the sender identification tag to the anonymous communications server computer. The anonymous communications server computer uses sender device contact properties associated with the sender identification tag to initiate communication with the sender device and then executes an anonymous communication session between the recipient device and the sender device. Thus, the anonymous communications server computer acts as a bridge between the recipient and the sender whereby the recipient can initiate communications with the sender even though he or she does not know his identity or specific contact information, and the recipient can maintain his or her anonymity if desired.
- In one embodiment, the sender ID tag contains the sender device contact properties that enable the anonymous communications server computer to initiate communication with the sender device. In an alternative embodiment, the anonymous communications server computer uses the sender ID tag to lookup in a sender database the sender device contact properties that enable the anonymous communications server computer to initiate communication with the sender device.
- For example, the sender device contact properties may include a sender device telephone number, and the anonymous communications server computer initiates communication with the sender device by calling the sender device using the sender device telephone number. In this case, the anonymous communication session is an anonymous telephone call between the recipient device and the sender device that is bridged through the anonymous communications server computer such that the sender device is unable to determine the telephone number of the recipient device and the recipient device is unable to determine the telephone number of the sender device.
- In another example, the sender device contact properties may include a sender device telephone number, and the anonymous communications server computer initiates communication with the sender device by sending a recipient text message to the sender device using the sender device telephone number. In this case, the anonymous communication session is an anonymous text messaging session between the recipient device and the sender device that is bridged through the anonymous communications server computer such that the sender device is unable to determine the telephone number of the recipient device and the recipient device is unable to determine the telephone number of the sender device. This may be accomplished by the sender device receiving the recipient text message from the anonymous communications server computer, the sender device generating a response text message and sending the response text message to the anonymous communications server computer, and the anonymous communications server computer receiving the response text message and sending the response text message to the recipient device.
- In another example, the sender device contact properties may include a sender device email address, and the anonymous communications server computer initiates communication with the sender device by sending a recipient email message to the sender device using the sender device email address. In this case, the anonymous communication session is an anonymous email messaging session between the recipient device and the sender device that is bridged through the anonymous communications server computer such that the sender device is unable to determine the email address of the recipient device and the recipient device is unable to determine the email address of the sender device. This may be accomplished by the sender device receiving the recipient email message from the anonymous communications server computer, the sender device generating a response email message and sending the response email message to the anonymous communications server computer, and the anonymous communications server computer receiving the response email message and sending the response email message to the recipient device.
- The recipient device may for example be a smartphone such as an IPHONE (or a tablet such as an IPAD) that has a dock connector. The portable device would then have a mating connector, such that the recipient may insert the mating connector of the portable device into the dock connector of the smartphone to enable communications between these devices. This allows the sender identification tag to be transferred to the recipient device and causes the recipient device to initiate communications with the anonymous communications server computer.
- In an optional embodiment, a sender information file may be loaded onto and stored on the portable device. The sender information file may include an image file, video file, audio file and/or text file, which would provide some information about the sender to the recipient without revealing his or her identity or contact information. The recipient device would then be enabled to access the sender information file when the recipient device is interconnected to the portable device.
- In a similarly optional embodiment, the recipient device may transmit a recipient information file to the sender device via the anonymous communications server computer. The recipient information file may include an image file, video file, audio file and/or text file, which would provide some information about the recipient to the sender without revealing his or her identity or contact information. The sender device would then be enabled to access the recipient information file from the anonymous communications server computer.
- Optionally, in a first multi-party embodiment operating in a series mode, the following additional steps are carried out. The recipient stores on the portable device a second sender identification tag that enables communication with the recipient device, and provides the portable device to a second recipient. The second recipient interconnects the portable device with a second recipient device. The portable device provides the second sender identification tag to the second recipient device, which initiates communications with the anonymous communications server computer. The second recipient device transmits the second sender identification tag to the anonymous communications server computer, which uses second sender device contact properties associated with the second sender identification tag to initiate communication with the recipient device. The anonymous communications server computer executes an anonymous communication session between the sender device, the recipient device, and the second recipient device.
- Alternatively, in a second multi-party embodiment operating in a parallel mode, the following additional steps are carried out. The sender identification tag is stored on a second portable device, which is then provided by the sender to a second recipient. The second recipient interconnects the portable device with a second recipient device, which provides the sender identification tag to the second recipient device. The second recipient device initiates communications with the anonymous communications server computer and transmits the sender identification tag to the anonymous communications server computer. The anonymous communications server computer uses sender device contact properties associated with the sender identification tag to initiate communication with the sender device, and the anonymous communications server computer executes an anonymous communication session between the sender device, the recipient device, and the second recipient device.
- Either or both of these multi-party modes would thereby form an anonymous social network.
-
FIG. 1 is a block diagram of the preferred embodiment system of the present invention. -
FIG. 2 is a flowchart of the preferred embodiment method of the present invention. -
FIG. 3 is a block diagram of the portable device used in the present invention. -
FIG. 4 is an illustration of an anonymous social network that may be formed using the present invention. - The present invention enables two parties to communicate with each other in an anonymous manner until such time that either or both of the parties wishes to reveal to the other his or her identity or contact information. Communications in this anonymous manner may take place by telephone call, text message, email messages or the like, as may be desired by either or both of the parties. The anonymous communications are made via an anonymous communications server computer which acts as a bridge or proxy between the parties. It is noted that although the present invention is described with respect to two parties, more than two parties may communicate with each other anonymously in the same manner. This will be described below as anonymous social networking.
- The preferred embodiment is now described with respect to the block diagram of
FIG. 1 and the flowchart ofFIG. 2 . A shown onFIG. 1 , the major components of the system are aportable device 102, arecipient device 104, an anonymouscommunications server computer 106, asender database 108, and asender device 110, all of which are now described in detail with respect to a teaching but non-limiting example of the usage of this system and methodology. - The preferred embodiment of the present invention finds usefulness in a situation in which one person (referred to as a sender) wishes to meet with and engage in communications with another person (referred to as a recipient), such as when the sender sees the recipient in social setting such as at a bar or party. In many situations the sender may be too shy and reserved to initiate a conversation with the recipient, and/or the sender may fear that the recipient may be too shy to engage in conversation at that time. With this invention, the sender is able to provide the recipient with a token (the portable device 102) that will enable the recipient to initiate an anonymous communication with the sender at a subsequent time. For example, the sender could simply walk up to the recipient and hand the
portable device 102 to the recipient and then walk away without conversing or engaging in any other communications. If the recipient is interested in the sender (perhaps due to across the room eye contact), then the recipient can use the portable device in the manner described herein. - As shown in
FIG. 3 , theportable device 102 is a small token such as a keyfob that hasmemory 302,processing circuitry 304, and aconnector 112. In a preferred embodiment, theconnector 112 is a 30-pin connector that will interface in a known manner with the 30-pin dock connector found in an IPHONE device (or an IPAD tablet device). This would enable theportable device 102 to be easily inserted into and communicate with a recipient device that is an IPHONE as well as asender device 110 that is an IPHONE. The portable device may have additional or alternative connectors, including but not limited to an ANDROID phone connector, a USB connector, a mini-USB connector, a micro-USB connector, etc. In the alternative, theportable device 102 may havewireless circuitry 306 for wireless communication capabilities that would not require a physical connection with therecipient device 104 or thesender device 110, such as BLUETOOTH, NFC, and the like. - As a
preliminary step 202, the sender (the party who originally has the portable device 102) will store a sender identification (ID) tag 308 in thememory 302 of theportable device 102. This may be accomplished by inserting theportable device 102 into thesender device 110; in particular by interconnecting theportable device connector 112 with the matingsender device connector 114. Once theportable device 102 is docked with thesender device 110, an application executing on thesender device 110 will enable the sender to enter his or her sender device contact properties into thesender device 110. This may for example be a telephone number, a mobile telephone number, and/or an email address of the sender. In the preferred embodiment, the sender device contact properties are included in the sender ID tag directly in an encrypted or otherwise obfuscated manner so that the recipient device will be unable to display them to the recipient or otherwise use them without aid of the anonymous communications server computer. In an alternative embodiment to be described later, the sender device contact properties are not placed into the sender ID tag, but rather a sender code is placed into the sender ID tag that is later matched to the sender device contact properties by the anonymous communications server computer. Once the sender has caused the sender device contact properties to be stored in the sender ID tag, the sender ID tag is transferred into thememory 302 of theportable device 102. - Additionally, an anonymous communications
server computer tag 310 that includes anonymous communications server computer contact properties is stored in thememory 302 of theportable device 102. The anonymous communications server computer contact properties contains the information required by the recipient device to ultimately communicate with the anonymouscommunications server computer 106 in an automatic and anonymous manner. The anonymous communications server computer contact properties may for example be a telephone number of the anonymouscommunications server computer 106, an IP address, a URL, etc. The anonymous communications server computer tag may be preloaded onto theportable device 102 prior to use by the sender, or the tag may be transferred from thesender device 110 in the same manner as the sender ID tag. In any event, thesender ID tag 308 and the anonymous communicationsserver computer tag 310 will be stored in thememory 302 of theportable device 102, and then theportable device 102 may be undocked from thesender device 110. The sender may then place the portable device in his pocket or otherwise carry it until he or she is ready to use it. - At some subsequent time, the sender will see someone with whom he would like to initiate an anonymous conversation, such as at a bar or party, who is called the recipient. The sender would give the portable device to the recipient in any desired manner at
step 204. He may simply walk up to the recipient and give her theportable device 102. There may be an instruction printed on the portable device urging the recipient to insert it into her IPHONE device, or pair with it by BLUETOOTH communications, etc. Assuming that the recipient is intrigued by this, she will take out her IPHONE (the recipient device 104) and atstep 206 interconnect theportable device 102 in the same manner as the sender had previously docked theportable device 102. This will cause theportable device 102 to interoperate with therecipient device 104 in the following manner. - The
portable device 102 will sense that the recipient's IPHONE is arecipient device 104 and cause an application stored on theportable device 302 to execute that will prompt the recipient to allow anonymous communications with the sender, such as by displaying a message on the display of therecipient device 104 such as - “The person who gave you this would like to meet you anonymously—if you are interested press here”
- By pressing a designated button on the touchscreen display of the
recipient device 104, the recipient indicates her acquiescence to the subsequent anonymous communications. This will cause the recipient device to initiate communications with the anonymouscommunications server computer 106. This may be done by by using anonymous communications server computer contact properties obtained from the anonymous communicationsserver computer tag 310 in the portable device. The portable device will be caused by the application to provide thesender ID tag 308 to therecipient device 104, and therecipient device 104 will atstep 208 transmit thesender ID tag 308 to the anonymouscommunications server computer 106 without the recipient being able to understand any of the information contained within thesender ID tag 308 due to its encryption or obfuscation. - The anonymous
communications server computer 106 then receives thesender ID tag 308 from therecipient device 104. Since, in this embodiment, the sender device contact properties are included directly within thesender ID tag 308, the anonymous communications server computer will read the sender device contact properties from the sender ID tag. Since thesender ID tag 308 has been encrypted or obfuscated, the tag data must be decrypted or deobfuscated by the anonymouscommunications server computer 106. Once this process has occurred, the anonymouscommunications server computer 106 will use the sender device contact properties taken from thesender ID tag 308 to initiate communication with thesender device 110 atstep 212 and execute an anonymous communication session between therecipient device 104 and thesender device 110 atsteps - In the case in which the
sender ID tag 308 includes the telephone number of the sender device as the sender device contact property, then the anonymouscommunications server computer 106 will initiate communication with thesender device 110 by calling the sender device using the sender device telephone number. In this case, the anonymous communication session is an anonymous telephone call between therecipient device 104 and thesender device 110 that is bridged through the anonymous communications server computer such that thesender device 110 is unable to determine the telephone number of therecipient device 104 and therecipient device 104 is unable to determine the telephone number of thesender device 110. The anonymous communications server computer acts as a proxy in that the communication sessions are held between therecipient device 104 and the anonymouscommunications server computer 106 and between the anonymouscommunications server computer 106 and thesender device 110, in real time. For example, the call may be set up as a conference call whereby the respective parties may be bridged to each other without being able to discern the other party's telephone number. This ensures anonymity and encourages each party to join the conversation without fear of being identified until they want to be identified. - Optionally, the telephone call could be scheduled by the anonymous
communications server computer 106 to occur at a time agreed to by both parties. The recipient would enter into therecipient device 104 desired dates and times for placing the call to thesender device 110, and the telephone number of the recipient device may be obtained by the anonymouscommunications server computer 106 through caller ID information as well known in the art, or the recipient would specify the telephone number for the anonymouscommunications server computer 106 to use for the call. The anonymous communications server computer would then contact thesender device 110 and propose a date and time for a call with the recipient based on the data provided by therecipient device 104. Or, the sender could enter into thesender device 110 desired dates and times for having the call with therecipient device 104. In that case the anonymous communications server computer would review the available dates and times entered by both parties and determine a date and time that suits both parties. The anonymous communications server computer would inform both parties of the selected date and time for the call, and then when that date and time arrives the anonymous communications server computer would call both parties and bridge the calls so that the parties may speak with each other anonymously. - Optionally, in this case in which the
sender ID tag 308 includes the telephone number of the sender device as the sender device contact property, then the anonymouscommunications server computer 106 may initiate communication with thesender device 110 by sending a recipient text message to the sender device using the sender device telephone number rather than placing a direct telephone call. In this case, the anonymous communication session is an anonymous text messaging session between therecipient device 104 and thesender device 110 that is bridged through the anonymous communications server computer such that thesender device 110 is unable to determine the telephone number of therecipient device 104 and therecipient device 104 is unable to determine the telephone number of thesender device 110. The anonymous communications server computer acts as a proxy in that the communication sessions are held between therecipient device 104 and the anonymouscommunications server computer 106 and between the anonymouscommunications server computer 106 and thesender device 110. Since text messaging is asynchronous in nature, there is no need to schedule the session as with the telephone call example. That is, thesender device 110 receives the recipient text message from the anonymouscommunications server computer 106. Then at any desired time, thesender device 110 may generate a response text message and send the response text message to the anonymouscommunications server computer 106. The anonymouscommunications server computer 106 receives the response text message and sends the response text message to therecipient device 104. The process may continue in the same manner as desired by the parties while maintaining the desired anonymity. - In another case, the
sender ID tag 308 includes an email address associated with thesender device 110 as the sender device contact property, and the anonymouscommunications server computer 106 may then initiate communication with thesender device 110 by sending a recipient email message to the sender device using the sender device email address. In this case, the anonymous communication session is an anonymous email messaging session between therecipient device 104 and thesender device 110 that is bridged through the anonymous communications server computer such that thesender device 110 is unable to determine the email address of therecipient device 104 and therecipient device 104 is unable to determine the email address of thesender device 110. The anonymous communications server computer acts as a proxy in that the communication sessions are held between therecipient device 104 and the anonymouscommunications server computer 106 and between the anonymouscommunications server computer 106 and thesender device 110. Since email messaging is asynchronous in nature, there is no need to schedule the session as with the telephone call example. That is, thesender device 110 receives the recipient email message from the anonymouscommunications server computer 106. Then at any desired time, thesender device 110 may generate a response email message and send the response email message to the anonymouscommunications server computer 106. The anonymouscommunications server computer 106 receives the response email message and sends the response email message to therecipient device 104. The process may continue in the same manner as desired by the parties while maintaining the desired anonymity. - Virtually any type of electronic communications may be established between the parties in an anonymous manner using the anonymous
communications server computer 106 as a bridge or proxy so that neither party can discern the identity or contact information of the other party. This would include Twitter, Facebook, iChat, Yahoo Messenger, AOL Messenger, and the like. - As explained above, in an alternative embodiment, the sender device contact properties are not placed into the sender ID tag, but rather a sender code is placed into the sender ID tag that is later matched to the sender device contact properties by the anonymous communications server computer. In this embodiment, the anonymous communications server computer uses the sender code of the sender ID tag to access a
sender database 108 atstep 210 as shown inFIG. 1 . Thesender database 108 is pre-populated with sender device contact properties as shown. For example, if the sender wants the recipient to initiate an anonymous telephone call, he would insert thesender ID tag 12867, and the anonymous communications server computer would lookup the telephone number 555-555-1234 and call that number when the sender ID tag is received from therecipient device 104 as previously described. Similarly, if the sender wants the recipient to initiate an anonymous tex messaging session, he would insert thesender ID tag 90967, and the anonymous communications server computer would lookup the telephone number 555-555-9888 and send the recipient text message to that number when the sender ID tag is received from therecipient device 104. Finally, if the sender wants the recipient to initiate an anonymous email session, he would insert thesender ID tag 78352, and the anonymous communications server computer would lookup the email address sender@anonymous.com and send the recipient email message to that email address when the sender ID tag is received from therecipient device 104. - There may be situations where the sender would like to provide the recipient with some information about the sender in order to entice her to use the portable device to initiate the anonymous communications session. This may also be useful in a situation wherein the recipient may receive multiple portable devices from various senders, and would need to be provided with clues as to which portable device was provided from which sender. Thus, in an alternative embodiment of the invention, a sender information file 312 may be stored in the
memory 302 of theportable device 102 as shown inFIG. 3 . This sender information file may originate on thesender device 110, and then loaded into memory of theportable device 102 as desired. The sender information file may include an image file, a video file, an audio file and/or a text file, which would provide some information about the sender to the recipient without revealing his or her identity or contact information. For example, the sender information file may be a picture of the sender along with a text description of the sender. After receipt of theportable device 102 from the sender, the recipient device would then be enabled to access the sender information file 312 when the recipient device is interconnected to the portable device. For example, the image file may be displayed on the recipient device to remind the recipient of the sender who gave her the portable device. - Similarly, there may be situations where the recipient would like to provide the sender with some information about the recipient. This may also be useful in a situation wherein the sender may hand out multiple portable devices to various recipients, and would need to be provided with clues as to which portable device was provided to which recipient. Thus, in an alternative embodiment of the invention, a recipient information file 116 may generated on the
recipient device 104, and then transmitted to the anonymous communications server computer along with the sender ID tag as previously described. The recipient information file may include an image file, a video file, an audio file and/or a text file, which would provide some information about the recipient to the sender without revealing his or her identity or contact information. For example, the recipient information file may be a picture of the recipient along with a text description of the recipient. After receipt of the sender information file 116 from the anonymous communications server computer, the image file may be displayed on the sender device to remind the sender of the recipient to whom he gave the portable device. - In an alternative embodiment, the
portable device 104 may be re-used by the recipient by reprogramming it with the appropriate information to make the recipient become a sender. This may be referred to as a multi-party embodiment operating in series mode. Then the recipient may hand out the portable device to someone else, and a series chain of anonymous communications may propagate. That is, each successive person may if desired be tied in with the prior parties in the chain, so that a series of anonymous communications may be made between two or more parties in the chain. In this series multi-party mode, the recipient behaves as a sender and stores on the portable device a second sender identification tag that enables communication with the recipient device (acting as a second sender device as well), and provides the portable device to a second recipient. The second recipient interconnects the portable device with a second recipient device. The portable device provides the second sender identification tag to the second recipient device, which initiates communications with the anonymous communications server computer. The second recipient device transmits the second sender identification tag to the anonymous communications server computer, which uses second sender device contact properties associated with the second sender identification tag to initiate communication with the recipient device. The anonymous communications server computer executes an anonymous communication session between the sender device, the recipient device, and the second recipient device. - Similarly, a sender may hand out multiple portable devices to multiple recipients, all of whom could communicate anonymously back to the sender or even amongst each other. This may be referred to as a multi-party embodiment operating in parallel mode. Here, the sender identification tag is stored on a second portable device, which is then provided by the sender to a second recipient. The second recipient interconnects the portable device with a second recipient device, which provides the sender identification tag to the second recipient device. The second recipient device initiates communications with the anonymous communications server computer and transmits the sender identification tag to the anonymous communications server computer. The anonymous communications server computer uses sender device contact properties associated with the sender identification tag to initiate communication with the sender device, and the anonymous communications server computer executes an anonymous communication session between the sender device, the recipient device, and the second recipient device.
- In each of these cases, an anonymous social network is formed by distributing a portable device (or a group of portable devices) that enable anonymous communications amongst the parties via the anonymous communications server computer that acts as a bridge or proxy amongst all of the parties. This is illustrated in
FIG. 4 .Sender 1 provides a portable device pd1 torecipient 1, who re-uses the portable device pd1 and becomessender 2 by providing pd1 torecipient 2. This chain propagates through torecipient 4 in a similar manner.Sender 1 also provides additional portable devices pd2, pd3, and pd4 torecipients Recipient 7 continues the chain by providing pd4 torecipient 8, who in turn provides portable devices pd4, pd5 and pd6 torecipients
Claims (22)
1. A method of communicating anonymously comprising:
storing on a portable device a sender identification tag that enables communication with a sender device;
providing the portable device to a recipient;
the recipient interconnecting the portable device with a recipient device;
the portable device providing the sender identification tag to the recipient device;
the recipient device initiating communications with an anonymous communications server computer;
the recipient device transmitting the sender identification tag to the anonymous communications server computer;
the anonymous communications server computer using sender device contact properties associated with the sender identification tag to initiate communication with the sender device;
and
the anonymous communications server computer executing an anonymous communication session between the recipient device and the sender device.
2. The method of claim 1 wherein the recipient device initiates communications with an anonymous communications server computer by using anonymous communications server computer contact properties obtained from the portable device.
3. The method of claim 1 wherein the sender ID tag comprises the sender device contact properties enabling the anonymous communications server computer to initiate communication with the sender device.
4. The method of claim 1 wherein the anonymous communications server computer uses the sender ID tag to lookup in a sender database the sender device contact properties enabling the anonymous communications server computer to initiate communication with the sender device.
5. The method of claim 1 wherein:
the sender device contact properties comprise a sender device telephone number;
the anonymous communications server computer initiates communication with the sender device by calling the sender device using the sender device telephone number; and
the anonymous communication session is an anonymous telephone call between the recipient device and the seller device that is bridged through the anonymous communications server computer such that the sender device is unable to determine the telephone number of the recipient device and the recipient device is unable to determine the telephone number of the sender device.
6. The method of claim 1 wherein:
the sender device contact properties comprise a sender device telephone number;
the anonymous communications server computer initiates communication with the sender device by sending a recipient text message to the sender device using the sender device telephone number; and
the anonymous communication session is an anonymous text messaging session between the recipient device and the seller device that is bridged through the anonymous communications server computer such that the sender device is unable to determine the telephone number of the recipient device and the recipient device is unable to determine the telephone number of the sender device.
7. The method of claim 6 wherein the anonymous text messaging session between the recipient device and the seller device that is bridged through the anonymous communications server computer is executed by:
the sender device receiving the recipient text message from the anonymous communications server computer;
the sender device generating a response text message and sending the response text message to the anonymous communications server computer; and
the anonymous communications server computer receiving the response text message and sending the response text message to the recipient device.
8. The method of claim 1 wherein:
the sender device contact properties comprise a sender device email address;
the anonymous communications server computer initiates communication with the sender device by sending a recipient email message to the sender device using the sender device email address; and
the anonymous communication session is an anonymous email messaging session between the recipient device and the seller device that is bridged through the anonymous communications server computer such that the sender device is unable to determine the email address of the recipient device and the recipient device is unable to determine the email address of the sender device.
9. The method of claim 8 wherein the anonymous email messaging session between the recipient device and the seller device that is bridged through the anonymous communications server computer is executed by:
the sender device receiving the recipient email message from the anonymous communications server computer;
the sender device generating a response email message and sending the response email message to the anonymous communications server computer; and
the anonymous communications server computer receiving the response email message and sending the response email message to the recipient device.
10. The method of claim 1 wherein the recipient device is a smartphone comprising a dock connector and the portable device comprises a mating connector, and wherein the step of the recipient interconnecting the portable device with a recipient device comprises inserting the mating connector of the portable device into the dock connector of the smartphone.
11. The method of claim 1 wherein the recipient device is a tablet computing device comprising a dock connector and the portable device comprises a mating connector, and wherein the step of the recipient interconnecting the portable device with a recipient device comprises inserting the mating connector of the portable device into the dock connector of the tablet computing device.
12. The method of claim 1 further comprising the steps of:
storing on the portable device a sender information file, and
enabling the recipient device to access the sender information file when the recipient device is interconnected to the portable device.
13. The method of claim 12 wherein the sender information file comprises an image file, and wherein the image file is displayed on the recipient device.
14. The method of claim 12 wherein the sender information file comprises a video file, and wherein the video file is played back on the recipient device.
15. The method of claim 12 wherein the sender information file comprises an audio file, and wherein the audio file is played back on the recipient device.
16. The method of claim 12 wherein the sender information file comprises a text file, and wherein the text file is displayed on the recipient device.
17. The method of claim 1 further comprising the recipient device transmitting a recipient information file to the sender device via the anonymous communications server computer.
18-21. (canceled)
22. The method of claim 1 further comprising executing an anonymous multi-party communication session in series by performing the additional steps of:
the recipient storing on the portable device a second sender identification tag that enables communication with the recipient device;
providing the portable device to a second recipient;
the second recipient interconnecting the portable device with a second recipient device;
the portable device providing the second sender identification tag to the second recipient device;
the second recipient device initiating communications with the anonymous communications server computer;
the second recipient device transmitting the second sender identification tag to the anonymous communications server computer;
the anonymous communications server computer using second sender device contact properties associated with the second sender identification tag to initiate communication with the recipient device;
and
the anonymous communications server computer executing an anonymous communication session between the sender device, the recipient device, and the second recipient device.
23. The method of claim 1 further comprising executing an anonymous multi-party communication session in parallel by performing the additional steps of:
storing the sender identification tag on a second portable device;
providing the second portable device to a second recipient;
the second recipient interconnecting the portable device with a second recipient device;
the second portable device providing the sender identification tag to the second recipient device;
the second recipient device initiating communications with the anonymous communications server computer;
the second recipient device transmitting the sender identification tag to the anonymous communications server computer;
the anonymous communications server computer using sender device contact properties associated with the sender identification tag to initiate communication with the sender device; and
the anonymous communications server computer executing an anonymous communication session between the sender device, the recipient device, and the second recipient device.
24. A system for communicating anonymously comprising:
a portable device comprising:
a memory for storing a sender identification tag; and
a portable device interface for interconnecting the portable device with a recipient device;
a recipient device comprising:
a recipient device interface for interconnecting the recipient device with the portable device and obtaining the sender identification tag from the portable device when the portable device is interconnected with the recipient device; and
a network interface for communicating via a communications network with an anonymous communications server computer and transmitting the sender identification tag obtained from the portable device to the anonymous communications server computer;
an anonymous communications server computer interconnected to the communications network and programmed to:
use sender device contact properties associated with the sender identification tag received from the recipient device to initiate communication with a sender device; and
execute an anonymous communication session between the recipient device and the sender device; and
a sender device for communicating with the recipient device through the anonymous communications server computer.
24-44. (canceled)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/670,892 US20150281183A1 (en) | 2012-02-17 | 2015-03-27 | Method and system for enabling anonymous communications between two or more interested parties |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/399,259 US9021032B2 (en) | 2012-02-17 | 2012-02-17 | Method and system for enabling anonymous communications between two or more interested parties |
US14/670,892 US20150281183A1 (en) | 2012-02-17 | 2015-03-27 | Method and system for enabling anonymous communications between two or more interested parties |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/399,259 Continuation US9021032B2 (en) | 2012-02-17 | 2012-02-17 | Method and system for enabling anonymous communications between two or more interested parties |
Publications (1)
Publication Number | Publication Date |
---|---|
US20150281183A1 true US20150281183A1 (en) | 2015-10-01 |
Family
ID=48983182
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/399,259 Active 2033-05-14 US9021032B2 (en) | 2012-02-17 | 2012-02-17 | Method and system for enabling anonymous communications between two or more interested parties |
US14/670,892 Abandoned US20150281183A1 (en) | 2012-02-17 | 2015-03-27 | Method and system for enabling anonymous communications between two or more interested parties |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/399,259 Active 2033-05-14 US9021032B2 (en) | 2012-02-17 | 2012-02-17 | Method and system for enabling anonymous communications between two or more interested parties |
Country Status (1)
Country | Link |
---|---|
US (2) | US9021032B2 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180115527A1 (en) * | 2016-10-20 | 2018-04-26 | Oklahoma Blood Institute | System and method for anonymous provider to receiver communication |
US20180115526A1 (en) * | 2016-10-20 | 2018-04-26 | Oklahoma Blood Institute | System and Method for Anonymous Provider to Receiver Communication |
US11683325B2 (en) | 2020-08-11 | 2023-06-20 | Capital One Services, Llc | Systems and methods for verified messaging via short-range transceiver |
Families Citing this family (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9049238B2 (en) * | 2011-04-26 | 2015-06-02 | Jeffrey Scuba | System for creating anonymous social gatherings |
US9294913B1 (en) * | 2011-08-02 | 2016-03-22 | The United States of America as repressented by Secretary of the Navy | Android-based secure handheld network access device and micro-USB version of IEEE 802.15.4 bridge for ACSD networks |
US9071579B1 (en) * | 2012-05-25 | 2015-06-30 | T. Gregory Bender | System for sender/receiver to send or receive mood related, time sensitive or secretive content/messages |
CA2930481A1 (en) | 2012-08-31 | 2014-03-06 | Timeless Medical Systems Inc. | System and method for reporting and tracking incidents |
KR102049458B1 (en) * | 2012-08-31 | 2019-11-27 | 삼성전자주식회사 | System and method for providing service related to object |
US20140095618A1 (en) * | 2012-10-02 | 2014-04-03 | Mind Rocket, Inc. | Social Interaction Device |
US9306926B2 (en) * | 2013-03-15 | 2016-04-05 | Brian A. Truong | User authentication using unique hidden identifiers |
US20150020154A1 (en) * | 2013-07-10 | 2015-01-15 | Daniel Setton | Anonymous coupling platform method and system |
KR102115914B1 (en) * | 2013-09-17 | 2020-05-27 | 삼성전자주식회사 | Method for transmitting anonymous message and Message transmission system thereof |
CN104468070A (en) * | 2013-09-17 | 2015-03-25 | 鸿富锦精密工业(深圳)有限公司 | Network cluster establishment system and network cluster establishment method |
US9301110B1 (en) * | 2013-10-29 | 2016-03-29 | Google Inc. | Multimodal communication system and method |
EP3035608A1 (en) * | 2014-12-16 | 2016-06-22 | Edgard Cattan | Creating a connection between several communication addresses |
US11258903B2 (en) * | 2015-04-29 | 2022-02-22 | Secure Route, Inc. | System and method for secure call routing and queuing |
US11290428B2 (en) * | 2016-05-18 | 2022-03-29 | Cabanawire Inc. | Telecommunication method and system for simplifying communication such as conference calls |
US11373246B2 (en) * | 2016-05-24 | 2022-06-28 | Keyana Bowie | System for anonymous communication |
US10681218B2 (en) * | 2017-05-13 | 2020-06-09 | Cabanawire Inc. | Telecommunication method and system for simplifying communication such as conference calls |
US11044213B2 (en) * | 2017-12-19 | 2021-06-22 | Nice Ltd. | Systems and methods for invisible identification of agents participating in on-line communication sessions |
US11882112B2 (en) * | 2021-05-26 | 2024-01-23 | Bank Of America Corporation | Information security system and method for phishing threat prevention using tokens |
Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5884272A (en) * | 1996-09-06 | 1999-03-16 | Walker Asset Management Limited Partnership | Method and system for establishing and maintaining user-controlled anonymous communications |
US20010026609A1 (en) * | 1999-12-30 | 2001-10-04 | Lee Weinstein | Method and apparatus facilitating the placing, receiving, and billing of telephone calls |
US6665389B1 (en) * | 1999-12-09 | 2003-12-16 | Haste, Iii Thomas E. | Anonymous interactive internet-based dating service |
US20050174975A1 (en) * | 2004-02-11 | 2005-08-11 | Vicinity Messaging Corporation | System and method for wireless communication between previously known and unknown users |
US20060256959A1 (en) * | 2004-02-28 | 2006-11-16 | Hymes Charles M | Wireless communications with proximal targets identified visually, aurally, or positionally |
US20070106892A1 (en) * | 2003-10-08 | 2007-05-10 | Engberg Stephan J | Method and system for establishing a communication using privacy enhancing techniques |
US20070282621A1 (en) * | 2006-06-01 | 2007-12-06 | Flipt, Inc | Mobile dating system incorporating user location information |
US20080051033A1 (en) * | 2006-08-28 | 2008-02-28 | Charles Martin Hymes | Wireless communications with visually- identified targets |
US20080076418A1 (en) * | 2004-09-21 | 2008-03-27 | Beyer Jr Malcolm K | Method of establishing a cell phone network of participants with a common interest |
US20080154895A1 (en) * | 2006-12-23 | 2008-06-26 | Carmony Kevin B | System and method for anonymous dating compatibility determination |
US20090117883A1 (en) * | 2006-07-20 | 2009-05-07 | Dan Coffing | Transaction system for business and social networking |
US20100180009A1 (en) * | 2009-01-14 | 2010-07-15 | Michael Callahan | Anonymous Digital Identification |
US20110093340A1 (en) * | 2006-01-30 | 2011-04-21 | Hoozware, Inc. | System for providing a service to venues where people perform transactions |
US20130091209A1 (en) * | 2011-10-08 | 2013-04-11 | Broadcom Corporation | Ad hoc social networking |
US20130198281A1 (en) * | 2011-04-26 | 2013-08-01 | Jeffrey Scuba | System for Creating Anonymous Social Gatherings |
US20140136617A1 (en) * | 2007-02-15 | 2014-05-15 | Uri Singer | Method and system of one-way anonymous communication |
-
2012
- 2012-02-17 US US13/399,259 patent/US9021032B2/en active Active
-
2015
- 2015-03-27 US US14/670,892 patent/US20150281183A1/en not_active Abandoned
Patent Citations (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5884272A (en) * | 1996-09-06 | 1999-03-16 | Walker Asset Management Limited Partnership | Method and system for establishing and maintaining user-controlled anonymous communications |
US6665389B1 (en) * | 1999-12-09 | 2003-12-16 | Haste, Iii Thomas E. | Anonymous interactive internet-based dating service |
US20010026609A1 (en) * | 1999-12-30 | 2001-10-04 | Lee Weinstein | Method and apparatus facilitating the placing, receiving, and billing of telephone calls |
US20070106892A1 (en) * | 2003-10-08 | 2007-05-10 | Engberg Stephan J | Method and system for establishing a communication using privacy enhancing techniques |
US20050174975A1 (en) * | 2004-02-11 | 2005-08-11 | Vicinity Messaging Corporation | System and method for wireless communication between previously known and unknown users |
US7545784B2 (en) * | 2004-02-11 | 2009-06-09 | Yahoo! Inc. | System and method for wireless communication between previously known and unknown users |
US20060256959A1 (en) * | 2004-02-28 | 2006-11-16 | Hymes Charles M | Wireless communications with proximal targets identified visually, aurally, or positionally |
US8014763B2 (en) * | 2004-02-28 | 2011-09-06 | Charles Martin Hymes | Wireless communications with proximal targets identified visually, aurally, or positionally |
US20080076418A1 (en) * | 2004-09-21 | 2008-03-27 | Beyer Jr Malcolm K | Method of establishing a cell phone network of participants with a common interest |
US20110093340A1 (en) * | 2006-01-30 | 2011-04-21 | Hoozware, Inc. | System for providing a service to venues where people perform transactions |
US20070282621A1 (en) * | 2006-06-01 | 2007-12-06 | Flipt, Inc | Mobile dating system incorporating user location information |
US20090117883A1 (en) * | 2006-07-20 | 2009-05-07 | Dan Coffing | Transaction system for business and social networking |
US20130276140A1 (en) * | 2006-07-20 | 2013-10-17 | Dan Coffing | Transaction system for business and social networking |
US20080051033A1 (en) * | 2006-08-28 | 2008-02-28 | Charles Martin Hymes | Wireless communications with visually- identified targets |
US20080154895A1 (en) * | 2006-12-23 | 2008-06-26 | Carmony Kevin B | System and method for anonymous dating compatibility determination |
US20140136617A1 (en) * | 2007-02-15 | 2014-05-15 | Uri Singer | Method and system of one-way anonymous communication |
US20100180009A1 (en) * | 2009-01-14 | 2010-07-15 | Michael Callahan | Anonymous Digital Identification |
US20130198281A1 (en) * | 2011-04-26 | 2013-08-01 | Jeffrey Scuba | System for Creating Anonymous Social Gatherings |
US20130091209A1 (en) * | 2011-10-08 | 2013-04-11 | Broadcom Corporation | Ad hoc social networking |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180115527A1 (en) * | 2016-10-20 | 2018-04-26 | Oklahoma Blood Institute | System and method for anonymous provider to receiver communication |
US20180115526A1 (en) * | 2016-10-20 | 2018-04-26 | Oklahoma Blood Institute | System and Method for Anonymous Provider to Receiver Communication |
US11038848B2 (en) * | 2016-10-20 | 2021-06-15 | Oklahoma Blood Institute | System and method for receiver to anonymous donor communications |
US11228567B2 (en) * | 2016-10-20 | 2022-01-18 | Oklahoma Blood Institute | System and method for receiver to anonymous donor communication |
US20220286437A1 (en) * | 2016-10-20 | 2022-09-08 | Oklahoma Blood Institute | System and method for anonymous provider to receiver communication |
US11683297B2 (en) * | 2016-10-20 | 2023-06-20 | Oklahoma Blood Institute | System and method for anonymous provider to receiver communication |
US20240073189A1 (en) * | 2016-10-20 | 2024-02-29 | Oklahoma Blood Institute | System and method for anonymous provider to receiver communication |
US11683325B2 (en) | 2020-08-11 | 2023-06-20 | Capital One Services, Llc | Systems and methods for verified messaging via short-range transceiver |
Also Published As
Publication number | Publication date |
---|---|
US20130218983A1 (en) | 2013-08-22 |
US9021032B2 (en) | 2015-04-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9021032B2 (en) | Method and system for enabling anonymous communications between two or more interested parties | |
US11362811B2 (en) | Secure telecommunications | |
US10362457B2 (en) | Method of sending messages to devices not configured to receive them | |
US11317240B2 (en) | Geo-location based event gallery | |
US9967245B2 (en) | User authentication using unique hidden identifiers | |
CN105704002B (en) | A kind of instant communicating method and device | |
CN109729005B (en) | Message processing method and device, computer equipment and storage medium | |
US20150096042A1 (en) | Method and apparatus for improved private messaging | |
EP2849411A1 (en) | Session establishment method, server, device, system and apparatus | |
CN106063256A (en) | Creating connections and shared spaces | |
US9705689B1 (en) | Integrated calendar callback feature for inviting to communication session | |
WO2018018726A1 (en) | Group file management method, user terminal, and group chat system | |
WO2020068155A1 (en) | Systems and methods for providing a flexibile and integrated communications, scheduling, and commerce platform | |
CN102281140B (en) | Acquisition method and system thereof for designated information | |
US9609116B2 (en) | Establishing an ad-hoc group based on addresses in an e-mail | |
US11575658B2 (en) | Encryption device, a communication system and method of exchanging encrypted data in a communication network | |
CN108564330B (en) | Information processing method and platform and computer readable medium | |
CN102132594A (en) | Communication authentication | |
JP2013105482A (en) | Video live chat system | |
JP2019028963A (en) | Encounter support system for matching user schedule | |
US20150156157A1 (en) | Association method and device for communications modes | |
KR101898546B1 (en) | Terminal and system for providing chatting service, and computer readable recorder medium storing a program for providing chatting service | |
TWI599249B (en) | Portable device, gateway device, electronic device and information transceiver system | |
WO2017058930A1 (en) | Delivering anonymous communication between customers at customer care site | |
Lin | MECHANISM FOR TRUE OPINION SHARING |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |