Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
PERSONAL TRANSMITTER/RECEIVER
Document Type and Number:
WIPO Patent Application WO/2007/062488
Kind Code:
A1
Abstract:
Disclosed herein is a personal transmitter/receiver (100) that includes a processor (110), a power source (130), a phone communications module (120), an optional display module (140), a manual control module (150), an ad-hoc radio network module (160), a body sensing timeout module (170), and a warning device (170). The personal transmitter/receiver device (100) is preferably a portable unit worn by a user, wherein the personal transmitter/receiver device is adaptable to be worn in a concealed manner beneath an outer layer of clothing. The ad-hoc radio network module (160) includes a wireless transceiver unit for establishing a communications link with a proximally located second transmitter/receiver associated with another user.

Inventors:
JANSSON KARL ERIK (AU)
PASIC NAJDAN (AU)
Application Number:
PCT/AU2006/001839
Publication Date:
June 07, 2007
Filing Date:
December 04, 2006
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
JANSSON KARL ERIK (AU)
PASIC NAJDAN (AU)
International Classes:
G06F15/16; G06T13/00; G06T15/70; H04W8/18
Domestic Patent References:
WO2003090143A22003-10-30
WO2000011793A12000-03-02
WO2005027564A12005-03-24
Foreign References:
US20060166740A12006-07-27
GB2389742A2003-12-17
US20050181803A12005-08-18
US20040165703A12004-08-26
Other References:
JONES Q. ET AL.: "People-To-People-to-Geographical-Places: The P3 Framework for Location-Based Community Systems", JOURNAL OF COMPUTER SUPPORTED COOPERATIVE WORK, 2004, pages 249 - 282, XP019236190
GRISWOLD W. ET AL.: "Activecampus - Experiments in Community-Oriented ubiquitous Computing", TECHNICAL REPORT CS2003-0750, DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING, UC SAN DIEGO, 2003, pages 1 - 8, XP003013817
NORD J. ET AL.: "An Architecture for Location Aware Applications", PROCEEDINGS OF THE HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS-35), DEPARTMENT OF COMPUTER SCIENCE, LULEA UNIVERSITY OF TECHNOLOGY, SWEDEN, 2002, pages 1 - 6, XP010587713
TERRY M. ET AL.: "Social Net: Using Patterns of Physical Proximity Over Time to Infer Shared Interests", CHI, 2002, XP003013818
KAMYAB K. ET AL.: "Designing Agents for a Virtual Marketplace", AISB JOURNAL, vol. 1, no. 1, 2001, pages 61 - 85, XP003013819
BOROVOY R. ET AL.: "Meme Tags and Community Mirrors: Moving From Conferences To Collaboration", PROCEEDINGS OF THE ACM 1998 CONFERENCE ON COMPUTER-SUPPORTED COOPERATIVE WORK (CSCW '98), 1998, pages 159 - 168, XP002294164
Attorney, Agent or Firm:
SPRUSON & FERGUSON (Syndey, NSW 2001, AU)
Download PDF:
Claims:
The claims defining the invention are as follows:

1. A personal transmitter/receiver comprising: a memory for storing first personal information of a first user associated with said personal transmitter/receiver, said personal information including an identifier and a predefined compatibility setting; an ad-hoc radio network module including a wireless transmitter/receiver that transmits data periodically at a predetermined transmission frequency to:

(i) locate a second personal transmitter/receiver operating on said transmission frequency within a transmission range of said wireless transmitter/receiver; and

(ii) establish a wireless communications link with a corresponding ad-hoc radio communication module of said located second personal transmitter/receiver; a processor for controlling transmission of said stored personal information to said second personal transmitter/receiver and receipt of second personal information of a second user associated with second personal transmitter/receiver, via said ad-hoc radio network module, and determining a compatibility of said first and second users based on the first personal information and second personal information; and a warning unit for producing a warning signal when said determined compatibility reaches said predefined compatibility setting.

2. The personal transmitter/receiver according to claim 1, further comprising: a phone communications module including a wireless transmitter/receiver for establishing a communications link with a mobile telephone handset.

3. The personal transmitter/receiver according to claim 2, wherein said communications link is a wireless communications link.

4. The personal transmitter/receiver according to claim 3, wherein said wireless communications link is implemented using Bluetooth.

5. The personal transmitter/receiver according to claim 1 , wherein said personal information includes one or more of a name, age, height, hair colour, eye colour, contact details, interests, hobbies, or environmentally-related information.

6. The personal transmitter/receiver according to claim 1, further comprising: a body sensing timeout unit adapted to place said personal transmitter/receiver in a sleep mode upon reaching a predetermined sleep threshold.

7. The personal transmitter/receiver according to claim 6, wherein said predetermined sleep threshold relates to a detected body heat of a user.

8. The personal transmitter/receiver according to claim 6, wherein said body sensing timeout unit comprises a light sensitive component and said predetermined sleep threshold relates to a detected level of ambient light.

9. The personal transmitter/receiver according to claim 1, further comprising a display module for displaying information received from said processor.

10. . The personal transmitter/receiver according to claim 1, further comprising: a clock module for providing timing information associated with transmission and receipt of information by the ad-hoc radio communication module.

11. The personal transmitter/receiver according to claim 1 , wherein said warning signal is selected from the group of warning signals consisting of: a vibration, an audible signal, and a light.

12. A computer system comprising: a database for storing information associated with subscribing members; a graphics engine module including a rendering engine for providing an online virtual environment for navigation by said subscribing members; an animation module for generating and controlling in said online environment one or more characters associated with said subscribing members; a proximity module for determining spatial relativity of objects and said characters in said virtual environment, said proximity module identifying when two of said characters are within a predetermined distance from each other in the virtual environment; a communications module for enabling communication between said subscribing members; a networking module for coupling said computer system to a communications network accessible to said subscribing members; and a processor for controlling each of said database, graphics engine module, animation module, proximity module, communications module, networking module, wherein when said proximity module identifies that two characters are within a

predeteπnined distance from each other, said processor sending an alert signal to said identified users if said stored information of said identified users satisfies a predetermined compatibility threshold. .

13. The computer system according to claim 12, wherein said alert signal is selected from the alert signals consisting of: an audible alert, a visual alert, a dialog box, an email, and an SMS text message.

14. A method for establishing communication between first users and a second user using wireless personal transmitter/receiver devices, each of said personal transmitter/receiver devices storing personal information about an associated user, said method comprising the steps of: storing information associated with said first user in a first personal transmitter/receiver device, said stored information including an identifier and a compatibility threshold; transmitting a periodic wireless signal from said first personal transmitter/receiver, said signal including an identifier associated with said first user; receiving a signal from a proximally located second personal transmitter/receiver associated with said second user and establishing a wireless communications link between said first and second personal transmitter/receiver devices; transmitting predetermined information, including said identifier associated with said first user, from said stored information in said first personal transmitter/receiver to said second personal transmitter/receiver and receiving predetermined information,

including an identifier associated with said second user, from said second personal transmitter/receiver; determining whether said received predetermined information satisfies said predetermined compatibility threshold; and storing in said first personal transmitter/receiver said identifier associated with said second user, if said predetermined compatibility threshold is satisfied.

15. The method according to claim 14, wherein said first and second users are subscribers to a service provider, said method comprising the further step of: uploading information stored in said first personal transmitter/receiver to a website associated with said service provider.

16. The method according to claim 15, comprising the further step of: browsing by the first user of the website, using said identifier associated with said second user, to view information associated with said second user.

Description:

PERSONAL TRANSMITTER/RECEIVER

Field of the Invention

The present invention relates generally to communications systems and, in particular, to a personal transmitter/receiver device.

Background

People communicate with one another for many purposes and in many locations. It

is not always easy for a person to identify another person with similar or compatible interests. This is particularly so in general society, in which many people with a multitude of ages, characteristics and interests come in relatively close contact to one

another without communicating with one another.

In some circumstances, a location attracts a clientele or audience that satisfies a

particular demographic. The location may be a sports or leisure club, disco, theatre,

conference centre, bar, or other venue. A person may attend a venue in the hope or expectation of meeting a person having similar interests. However, it is still difficult to

identify other people having a suitable level of compatibility, even at a venue that attracts

a predictable demographic of clientele. The level of compatibility may relate to personal

characteristics, such as age, sex, hair colour, eye colour, or height, for example. The level

of compatibility may also relate to other predefined characteristics, which can include, for example, background, religion, or level of education.

Conference centres and the like are utilised to host events relating to hobbies,

interests, and work-related conventions. Such conventions typically feature many

hundreds of exhibitors. It is not always easy for a person attending a convention to

identify an exhibitor that is of particular interest to that person. Similarly, sales

representatives at a conference may be seeking distributors or customers of a particular product, and it is not always easy to identify such people in a large, crowded venue.

Thus, a need exists to facilitate the identification of one or more persons that satisfy a predetermined level of compatibility. Summary

It is an object of the present invention to overcome substantially, or at least ameliorate, one or more disadvantages of existing arrangements.

Disclosed herein is a personal transmitter/receiver (pXr) that facilitates communication between a user of the personal transmitter/receiver and other users associated with other respective personal transmitter/receiver devices. Also disclosed herein is a personal transmitter/receiver that facilitates communication between a user of the personal transmitter/receiver and a system with which the personal transmitter/receiver device is registered. In one embodiment, the personal transmitter/receiver is utilised to identify another person in close proximity that satisfies a predetermined compatibility threshold. In another embodiment, a personal transmitter/receiver is utilised for security purposes to identify a wearer of the personal transmitter/receiver as the wearer passes a checkpoint.

According to a first aspect of the present disclosure, there is provided a personal transmitter/receiver comprising: a memory for storing first personal information of a first user associated with said personal transmitter/receiver, said personal information including an identifier and a predefined compatibility setting; an ad-hoc radio network module including a wireless transmitter/receiver that transmits data periodically at a predetermined transmission frequency to:

(i) locate a second personal transmitter/receiver operating on said transmission frequency within a transmission range of said wireless transmitter/receiver; and

(ii) establish a wireless communications link with a corresponding ad-hoc radio communication module of said located second personal transmitter/receiver; a processor for controlling transmission of said stored personal information to said second personal transmitter/receiver and receipt of second personal information of a second user associated with second personal transmitter/receiver, via said ad-hoc radio network module, and determining a compatibility of said first and second users based on the first personal information and second personal information; and a warning unit for producing a warning signal when said determined compatibility reaches said predefined compatibility setting.

According to a second aspect of the present disclosure, there is provided a computer system comprising: a database for storing information associated with subscribing members; a graphics engine module including a rendering engine for providing an online virtual environment for navigation by said subscribing members; an animation module for generating and controlling in said online environment one or more characters associated with said subscribing members; a proximity module for determining spatial relativity of obj ects and said characters in said virtual environment, said proximity module identifying when two of said characters are within a predetermined distance from each other in the virtual environment; a communications module for enabling communication between said subscribing members;

a networking module for coupling said computer system to a communications network accessible to said subscribing members; and a processor for controlling each of said database, graphics engine module, animation module, proximity module, communications module, networking module, wherein when said proximity module identifies that two characters are within a predetermined distance from each other, said processor sending an alert signal to said identified users if said stored information of said identified users satisfies a predetermined compatibility threshold.

According to a third aspect of the present disclosure, there is provided a method for establishing communication between first users and a second user using wireless personal transmitter/receiver devices, each of said personal transmitter/receiver devices storing personal information about an associated user, said method comprising the steps of: storing information associated with said first user in a first personal transmitter/receiver device, said stored information including an identifier and a compatibility threshold; transmitting a periodic wireless signal from said first personal transmitter/receiver, said signal including an identifier associated with said first user; receiving a signal from a proximally located second personal transmitter/receiver associated with said second user and establishing a wireless communications link between said first and second personal transmitter/receiver devices; transmitting predetermined information, including said identifier associated with said first user, from said stored information in said first personal transmitter/receiver to said second personal transmitter/receiver and receiving predetermined information,

including an identifier associated with said second user, from said second personal transmitter/receiver; determining whether said received predetermined information satisfies said predetermined compatibility threshold; and storing in said first personal transmitter/receiver said identifier associated with said second user, if said predetermined compatibility threshold is satisfied.

According to another aspect of the present disclosure, there is provided an apparatus for implementing any one of the aforementioned methods.

According to another aspect of the present disclosure, there is provided a computer program product including a computer readable medium having recorded thereon a computer program for implementing any one of the methods described above.

Other aspects of the invention are also disclosed.

Brief Description of the Drawings One or more embodiments of the present invention will now be described with reference to the drawings, in which:

Fig. 1 is a schematic block diagram representation of a personal transmitter/receiver, in accordance with an embodiment of the present disclosure;

Fig. 2 is a schematic block diagram representation of a personal transmitter/receiver coupled to a computer server of a service provider, in accordance with an embodiment of the present disclosure;

Figs 3 A to 3E illustrate a method of identifying users of personal transmitter/receivers who satisfy a threshold of compatibility, in accordance with an embodiment of the present disclosure;

Figs 4A to 4C illustrate a method of identifying users of personal transmitter/receivers who satisfy a threshold of compatibility, in accordance with an embodiment of the present disclosure;

Figs 5 A and 5B illustrate a method of identifying users of personal transmitter/receivers who satisfy a threshold of compatibility, in accordance with an embodiment of the present disclosure;

Figs 6 A to 6C illustrate a method of identifying users of personal transmitter/receivers for retail purchases, in accordance with an embodiment of the present disclosure; Fig. 7 is a map showing the use of base stations to track a personal transmitter/receiver associated with a user, in accordance with an embodiment of the present disclosure;

Figs 8 A and 8B illustrate a method of security using a personal transmitter/receiver, in accordance with an embodiment of the present disclosure; Figs 9 A to 9C illustrate a method of identifying users of virtual personal transmitter/receivers who satisfy a threshold of compatibility, in accordance with an embodiment of the present disclosure;

Fig. 10 is a schematic block diagram representation of a virtual personal transmitter/receiver, in accordance with an embodiment of the present disclosure; Figs 1 IA to 1 IE illustrate a method of identifying users of personal transmitter/receivers in a virtual environment who satisfy a threshold of compatibility, in accordance with an embodiment of the present disclosure;

Figs 12 A to 12C illustrate a method of identifying users of personal transmitter/receivers in a virtual environment who satisfy a threshold of compatibility, in accordance with an embodiment of the present disclosure;

Figs 13A and 13B illustrate a method of identifying users of personal transmitter/receivers in a virtual environment who satisfy a threshold of compatibility, in accordance with an embodiment of the present disclosure;

Figs 14A to 14C illustrate a method of identifying users of personal transmitter/receivers for retail purchases in a virtual environment, in accordance with an embodiment of the present disclosure; Figs 15 A and 15B are schematic block diagram representations of a method of sending text messages, in accordance with an embodiment of the present disclosure;

Fig. 16 is a schematic block diagram of a general purpose computer upon which arrangements described can be practised;

Fig. 17 is a schematic block diagram representation of a computer server for hosting an online virtual environment in accordance with the present disclosure;

Fig. 18 is a schematic representation of the personal transmitter/receivers in accordance with an embodiment of the present disclosure; and

Fig. 19 is a flow diagram of the operation of a personal transmitter/receiver unit in accordance with an embodiment of the present disclosure.

Detailed Description

Where reference is made in any one or more of the accompanying drawings to steps and/or features that have the same reference numerals, those steps and/or features have for the purposes of this description the same function(s) or operation(s), unless the contrary intention appears.

Disclosed herein is a personal transmitter/receiver device. The personal transmitter/receiver device is preferably a portable unit worn by a user, wherein the personal transmitter/receiver device is adaptable to be worn in a concealed manner beneath an outer layer of clothing. In another embodiment, the personal transmitter/receiver device is embodied as a clothing accessory such as a wristband, watchband, necklace, pendant, or the like. Such embodiments allow a user to wear the personal transmitter/receiver device whilst attending to normal daily activities in an unimpeded manner. In an alternate embodiment, the personal transmitter/receiver device is integrated into a mobile telephone handset or mobile computing device. Each personal transmitter/receiver device is programmed with information pertinent to an associated user. The programmed information includes an identifier that identifies the associated user. In one implementation, the identifier allows the device to be matched with a personal profile of the user, the personal profile being stored on a computer database associated with a service provider with which the personal transmitter/receiver is registered. The device can also store personal information belonging to the associated user. Such information can include, for example, name, age, and a contact telephone number.

■ Embodiments in a Physical Environment

The personal transmitter/receiver includes a wireless transceiver unit for establishing a communications link with a proximally located second transmitter/receiver associated with another user. In one embodiment, the wireless transceiver unit is a Bluetooth (IEEE 802.15.1) transceiver unit. In such an embodiment, the range of wireless communication is determined by the class of Bluetooth transceiver being used, with ranges of 100 metres, 10 metres, and 1 metre being approximate distances that are achievable for Bluetooth Class 1, Class 2, and Class 3 devices, respectively.

Fig. 1 is a schematic block diagram representation of a personal transmitter/receiver 100 in accordance with an embodiment of the present disclosure. The personal transmitter/receiver 100 includes a processor 110 that controls the operation of the personal transmitter/receiver 100. In the embodiment of Fig. 1, the processor 110 includes memory, a Read-Only Memory processor, and a real time clock (RTC). The memory can include, for example, but is not limited to, Random Access Memory (RAM), flash memory, a hard disk drive, or the like. The memory is utilised to store information about a user of the personal transmitter/receiver 100. Such information can include updates for the operation of the personal transmitter/receiver 100, and general or personal information about the user, such as name, date of birth, address, and contact numbers. The general information can include, for example, a unique identifier to identify a user of the personal transmitter/receiver within a service to which a user of the personal transmitter/receiver 100 is subscribed. In some applications, the information can also include the user's interests and hobbies, and occupation, or other information relevant to the environment in which the user is located. For example, a user visiting a trade show can store information about the user's business, contact details, and information about

products in which the user is interested. The memory is also utilised to store data received by the personal transmitter/receiver from other personal transmitter/receivers. The RTC is used to date stamp entries.

The personal transmitter/receiver 100 also includes a power source 130, which can be embodied by a battery, for example, or a connector for coupling the personal transmitter/receiver 100 to a mains power supply. Such a connector may include a transformer, depending on the specific implementation. The power source 130 provides power to the processor 110 and other power-dependent modules of the personal transmitter/receiver 100. The personal transmitter further includes a phone communications module 120, an optional display module 140, a manual control module 150, an ad-hoc radio network module 160, a body sensing timeout module 180, and a warning device 170, each of which is coupled to the processor 110.

The warning device 170 can include, for example, an audible buzzer, a vibrator, a light, or a combination thereof. The light can be implemented, for example, using one or more light emitting diodes (LEDs) that turn on when the warning device 170 is activated, hi one embodiment, the light flashes in accordance with one or more predetermined patterns, with different patterns associated with different stimuli presented to the warning device 170. In other embodiments, an audible buzzer or vibrator alerts a user in accordance with one or more predetermined patterns, with different patterns associated with different stimuli presented to the warning device 170. The different stimuli for the warning device 170 may correspond, for example, to different scenarios or different levels of compatibility with another proximate user with a second personal transmitter/receiver.

The phone communications module 120 enables the personal transmitter/receiver 100 to establish a communications link with a mobile phone handset 190. In one scenario, the mobile phone handset 190 belongs to a user of the personal transmitter/receiver 100 or to another person. The other person may be a user of another personal transmitter/receiver device registered to a system to which the personal transmitter/receiver 100 is also registered. Alternatively, the other person is associated with a system to which the personal transmitter/receiver is registered, hi one embodiment, the communications link is established using a wireless communications protocol, such as Bluetooth, for example. Alternatively, the communications link is effected over a cable coupling the personal transmitter/receiver 100 to the mobile phone handset 190.

The ad-hoc radio network module 160 enables the personal transmitter/receiver 100 to communicate with another personal transmitter/receiver proximally located to the personal transmitter/receiver 100 on an ad-hoc wireless communications link established between the ad-hoc radio network module 160 of the personal transmitter/receiver 100 and a corresponding ad-hoc radio network module of another personal transmitter/receiver. The personal transmitter/receivers can communicate with each other using communication protocols such as Bluetooth, WiFi, and other wireless communication protocols, as would be readily understood by a person skilled in the art of communications. Appendix A includes a non-exhaustive list of wireless communications protocols that are suitable for establishing communication between personal transmitter/receiver units. The ad-hoc radio network module 160 manages the frequencies at which different personal transmitter/receiver devices communicate with each other.

In one implementation, the ad-hoc radio network module 160 sends a periodic signal to locate other compatible devices that are within range of the personal transmitter/receiver 100. The periodic signal preferably includes an identifier associated with the personal transmitter/receiver 100. When a compatible device is within range, the devices exchange information in accordance with a predefined protocol, such that the personal transmitter/receiver 100 stores an identifier associated with a user of the compatible device, and the compatible device stores the identifier transmitted by the personal transmitter/receiver 100.

The manual control module 150 is optional and includes one or more physical buttons, switches, dials, or the like, that enable a user to operate the personal transmitter/receiver 100. In one embodiment, the manual control module 150 includes an On/Off button and a button for activating a sleep mode. The display module 140 can be implemented by one or more light emitting diodes (LEDs), a liquid crystal display (LCD), or a combination thereof. The display module 140 provides a user of the personal transmitter/receiver 100 with information relating to the operational status of the personal transmitter/receiver 100, including the status of the power source 130, mode of operation, and any other information programmed into the memory. The display module 140 can also be utilised by the processor 110 to display information about a user of a proximally located personal transmitter/receiver unit. In an alternate embodiment, the personal transmitter/receiver 100 of Fig. 1 is embodied within the mobile telephone handset 190 to provide an integrated unit. In such an embodiment, the phone communications module 120 communicates with the mobile phone 190 using a hard- wired connection, such as a bus. In one embodiment, the phone communications module 120 is not required, and the processor 110 communicates

directly with a processor in the mobile phone handset 190. In a further embodiment, the processor 110 is integrated with a processor of the mobile phone handset 190.

The personal transmitter/receiver 100 optionally includes a body sensing timeout module 180, which turns off the personal transmitter/receiver 100, or places the personal transmitter/receiver 100 into a sleep mode, upon detection of the personal transmitter/receiver 100 being removed from a body of a user. In one implementation, the body sensing timeout module 180 detects heat from the body of a user when proximally located to the user. When the level of heat detected reaches a lower, predetermined threshold, the body sensing timeout module 180 turns off the personal transmitter/receiver 100. hi an alternate implementation, the body sensing timeout module 180 includes a light sensitive component, such as for example a photodiode, that reacts to a level of ambient lighting to which the personal transmitter/receiver 100 is being exposed. Once the personal transmitter/receiver 100 is subjected to a level of ambient lighting that is greater than, equal to, or less than one or more predetermined thresholds, the body sensing timeout module 180 turns off the personal transmitter/receiver 100.

Such a light sensitive component can be utilised when the personal transmitter/receivers are associated with conferences, for example, with attendees of the conference receiving a personal transmitter/receiver with programmed, personalised information. When a user of a personal transmitter/receiver is attending a seminar or presentation, which is typically presented in a darkened room, the personal transmitter/receiver is turned off by the light sensitive component to minimise disruption to the seminar or presentation. Further, in such a seminar it is likely that many other personal transmitter/receiver devices would be in close proximity and turning off the

personal transmitter/receiver devices during the presentation minimises battery consumption that would have been expended from communicating with a large number of proximally located other personal transmitter/receivers.

In one implementation, the personal transmitter/receiver 100 is placed in a sleep mode when a timer expires. The timer can be implemented using the real-time clock, for example. Further, a signal from a mobile phone associated with the user can activate the sleep mode of the personal transmitter/receiver, based on time of day, user-initiated command, geographical location, or a combination thereof, for example. In the embodiment in which the personal transmitter/receiver 100 is embodied in an integrated unit with a mobile phone handset, the personal transmitter/receiver 100 can optionally be operated using a keypad or other controls associated with the mobile phone handset. Bi such an embodiment, the personal transmitter/receiver 100 can be put in a sleep mode when the mobile phone handset is turned off, for example.

In one embodiment, a user registers with a service provider associated with the personal transmitter/receiver device. Registration requires that the user provides a minimum amount of information to establish a personal profile associated with the user. The personal profile can include, for example, the user's name, and contact details. Depending on the application, the personal profile can also include many other details, including for example, but not limited to, one or more of age, interests, hobbies, occupation, gender, and geographical location. The personal profile can also include personal characteristics, such as, age, sex, hair colour, eye colour, height, religion, or level of education. The personal profiles associated with registered users are stored in a database associated with the service provider.

The personal transmitter/receiver is programmed with a unique identifier associated with the user, and optionally includes other information from the personal profile of the user. Fig. 2 is a schematic block diagram representation 200 of a personal transmitter/receiver 250 coupled to a remotely located computer server 235. A user 210 of the personal transmitter/receiver 250 couples the personal transmitter/receiver 250 to a computer 205 that is connected via a communications network 230 to the computer server 235 associated with the service provider. The coupling of the personal transmitter/receiver 250 is effected using a wireless communications link, such as a Bluetooth or WiFi link. Alternatively, the coupling of the personal transmitter/receiver is effected using a wired link, such as a Universal Serial Bus (USB) cable or port, a Firewire (IEEE 1394) cable or port, or other serial or parallel connection as would be readily apparent to a person skilled in the art. The communications network 230 can include, for example, the Internet or a dial-up telephone connection. In another implementation, the computer 205 is embodied using a 3G-enabled mobile telephone handset, and the communications network 230 is a 3G mobile telephony network. The service provider is able to download information from the computer server 235 to the personal transmitter/receiver 250 via the computer 205. In further embodiments, the computer 205 is embodied using a 2.5G mobile phone handset, a handheld computing device, such as a Personal Digital Assistant (PDA), or a smart phone. Once the user 210 has registered with the service provider and programmed the personal transmitter/receiver 250, the user 210 can revisit the computer server 235 associated with the service provider to view and modify the personal profile of the user.

Personal transmitter/receivers are used to identify other users that match a predetermined level of compatibility. A first personal transmitter/receiver device is worn

by a first user, and is activated when placed in close proximity to a second personal transmitter/receiver device worn by a second user. Ad-hoc radio network modules in the form of wireless transceivers located in the respective personal transmitter/receivers establish a wireless communications link between the first and second personal transmitter/receivers. The personal transmitter/receivers compare personal profile information stored in memories within the respective first and second personal transmitter/receivers to determine whether the first and second users satisfy a predetermined level of compatibility. In one embodiment, the level of compatibility is determined by the service provider. In another embodiment, each user is able to specify a level of compatibility, hi such an embodiment, the level- of compatibility constitutes part of the personal profile associated with that user.

If a predetermined compatibility threshold associated with the first personal transmitter/receiver is satisfied by the personal information stored in the second personal transmitter/receiver, a warning unit in the first personal transmitter/receiver is activated. Activation of the warning unit may include, for example, the personal transmitter/receiver device vibrating in a discreet manner to alert the first user that a compatible person is located nearby. In another implementation, the warning unit initiates communication between the first personal transmitter/receiver device and a mobile phone of the first user to alert the user to the proximity of a compatible person. The communication between the first personal transmitter/receiver and the mobile phone can be implemented using the Bluetooth communications protocol, for example, or other suitable wireless communications protocol.

In a further embodiment, the first personal transmitter/receiver device receives and stores a unique identifier associated with the second user, so that the first user can browse

a website associated with the service provider to retrieve further information about the second user.

In another embodiment, a user of a personal transmitter/receiver unit logs into a personal transmitter/receiver base station at a venue, such as a convention centre or nightclub. The base station is a fixed personal transmitter/receiver unit. The base station uploads information to the personal transmitter/receiver unit. The information may include, for example, advertising material, opening times, session times, profiles of featured speakers or performing acts, and special pricing offers. In one implementation, the personal transmitter/receiver unit and the base station are coupled using either a wireless communications protocol, as described above with reference to two personal transmitter/receiver units. In another implementation, a physical cradle is coupled to the base station, and an interface of the personal transmitter/receiver connects to the cradle via an appropriate port, such as a USB port, Firewire port, serial cable, or other suitable wired or wireless port. The personal transmitter/receiver device optionally includes a Global Positioning

System (GPS) device or other device that enables the personal transmitter/receiver device to record the location at which the user encountered the other user. The personal transmitter/receiver device can also record the time at which the other user was encountered. The base station can record the number of people passing within the vicinity of the base station, the identifiers associated with the people, and the times at which the people pass. This recorded information can then be utilised to study traffic flows, responses to promotion, and to identify frequent patrons.

The minimum degree of compatibility between users can be satisfied by virtue of each of the personal transmitter/receiver devices being associated with the same service

providers. Alternatively, the minimum level of compatibility may require a more complex match of personal profiles stored on a database associated with a service provider to which each of the personal transmitter/receiver devices is subscribed. In one embodiment, first and second personal transmitter/receiver devices associated with first and second users exchange information, based on a predetermined compatibility rating being reached between the respective personal profiles of the first and second users. In another embodiment, a first personal transmitter/receiver device, on being placed in close proximity to a second personal transmitter/receiver device, communicates with a mobile phone of a first user associated with the first personal transmitter/receiver device. In one implementation, the personal transmitter/receiver device communicates with the mobile phone using a wireless communication protocol, such as Bluetooth.

In an alternate embodiment, a number of personal transmitter/receiver devices are provided with the same pre-programmed information. For example, members of a tour group are provided with personal transmitter/receiver devices that are programmed in a generic manner to identify other members of the tour group, but do not otherwise provide personal information about each specific user. The use of the personal transmitter/receivers in this manner enables members of the tour group to identify other members easily, and can be used to identify whether all members of the tour group have correctly passed a checkpoint, for example.

Similarly, attendees of a seminar or event are able to identify other users with similar interests by passing in close proximity to other users wearing personal transmitter/receiver devices that have been programmed with similar, or compatible, information. For example, a sales representative dealing in carpets attends a home

improvement exhibition. The sales representative programs a personal transmitter/receiver to indicate that he deals in carpets and is interested in establishing contact with customers and distributors of flooring materials. In one implementation, a service provider associated with the exhibition hosts a website that allows the sales representative to program his personal transmitter/receiver using menus, check-boxes and the like. The sales representative then attends the exhibition and is alerted when he passes in close proximity to a personal transmitter/receiver of a prospective customer or distributor that satisfies a level of compatibility. The personal transmitter/receiver optionally stores information about the prospective customers and distributors encountered during the exhibition, so that the sales representative can establish contact with them at a later date.

Each personal transmitter/receiver device can be set with individual levels of recognition or compatibility to suit the needs and environment of each respective user. The ability to program the personal transmitter/receiver devices according to personal preferences allows the devices to be utilised in a number of personal, commercial, and venue applications. For example, attendees at a venue set their personal transmitter/receivers for the purpose of recognising other attendees and for identifying other attendees that have similar interests. hi one commercial application, a user sets the personal transmitter/receiver to act as an electronic business card to assist in establishing communication with potential clients who are seeking the services of the user's trade or profession. In a further commercial application, a wearer of a personal transmitter/receiver is recognised by retailers, exhibitors, or other sales staff when the wearer enters a store or passes in close proximity to an exhibitor's stand. This identification capability is particularly useful when coupled

to a loyalty program, as valued customers entering a store trigger a warning to staff in the store. In a security application, the personal transmitter/receiver is used as a tool for recognising a wearer by a security system in a discreet, non-intrusive manner. Any person gaining unauthorised access, and thus not wearing a personal transmitter/receiver programmed with the appropriate level of security access triggers a security alert. Another embodiment relates to social networking, in which the personal transmitter/receiver devices facilitate the meeting of people who share a common interest or who have established a minimum compatibility rating. A number of such scenarios will be described below, particularly with respect to Figs 3 to 15, and Fig 19. Users of the personal transmitter/receiver devices optionally communicate with one another via a wireless connection to mobile phones of the users. A user can program the personal transmitter/receiver device to transmit information, receive information, or a combination thereof. In one embodiment, a first user types a Short Message Service (SMS) message into a mobile phone handset and then transmits the message to a personal transmitter/receiver unit associated with the first user. The personal transmitter/receiver unit sends the SMS message to a personal transmitter/receiver unit of a second user, which in turn delivers the message to a mobile phone handset associated with the second user. The communication between the mobile phone handsets and the personal transmitter/receiver units and between the personal transmitter/receiver units utilises ad-hoc communications networks, and does not use a communications network provided by a telecommunications service provider. Consequently, the sending of SMS messages between users is free of charges associated with conventional mobile telephone networks.

The information transferred between the personal transmitter/receivers consists of only those details provided by the user as originally programmed via the computer, and as

a result of the interface with the device. Having worn the personal transmitter/receiver during the course of a day, a user couples the personal transmitter/receiver to a computer that is connected to a computer server associated with a service provider. Data collected by the personal transmitter/receiver device is downloaded from the device to the computer server.

The user is able to utilise the computer to view and modify personal membership information on the computer server. The user is also able to browse membership information of other users, registered with the service provider and exchange information with other users, in accordance with rules established by the service provider. Further, the service provider optionally provides on-line club memberships to facilitate interaction between like-minded individuals. Thus, the service provider is able to inform on-line club members of forthcoming events to provide interaction between registered members for the purposes of romance, commercial opportunity, hobbies, and leisure interests. A first scenario relating to the matching of individual subscribers in a romantic environment is described with reference to Figs 3 A to 3E. In Fig. 3 A, a first user 310 accesses a computer 305 to connect to a remotely located computer server (not shown) via the Internet or other communications network. The remotely located computer server hosts an online matchmaking service. The user 310 registers with the matchmaking service via a registration process presented to the computer 305 by the remote server. Alternatively, the user registers with the matchmaking service via a telephone connection to the matchmaking service. The telephone connection can be made to a human operator associated with the matchmaking service. Alternatively, an automated registration service is provided by the matchmaking service using dual tone multi-frequency (DTMF) tone responses to a series of menus and automated questions.

The registration process records information about the user 310, including a minimum of a user identifier. The user identifier is selected by the user 310. Alternatively, the user identifier is allocated by the matchmaking service. Other information recorded by the matchmaking service depends on the actual application, but information can also include one or more of name, age, height, eye colour, hair colour, geographical location, hobbies, interests, and contact details, hi this matchmaking scenario, the user 310 also provides information relating to the type of person the user 310 is hoping to meet. Such information can include, for example, but is not limited to, age, height, eye colour, hair colour, and geographical location. An example of preferences includes the questions and responses shown in Table 1 below.

Table 1

Selecting preferences will automatically set levels 1,2,3 etc e.g. I'm seeking ...

Level 1 setting

Female / 25 to 35 yrs

Level 2 setting

Female / 25 to 35 yrs / seeking permanent relationship Level 3 setting

Female / 25 to 35 yrs / Seeking permanent relationship / Enjoys sports: soccer, tennis /

Code setting

This is a code used by two individuals who may have met on the internet but not yet in person, so may not know what the other person looks like. As they have agreed to meet in a busy location won't know if that person has arrived until it vibrates.

The code setting is used by two individuals who have met on the Internet, but have not yet met in person. The code allows the two individuals who have agreed to meet in a busy location to identify one another by activating an alert mechanism when the two individuals are in close proximity to one another.

Once the user 310 has registered with the matchmaking service, the user 310 is able to access the matchmaking service via the computer 305 to review and update the personal information recorded on the matchmaking service. As shown in Fig. 3 A, the user 310 couples a personal transmitter/receiver 350 to the computer 305 to program the personal transmitter/receiver 350. The personal transmitter/receiver 350 couples to the computer 305 using a wireless connection, such as Bluetooth, or via a wired connection, such as a USB or Firewire cable, hi this scenario, the user 310 utilises the computer 305 to program the personal transmitter/receiver 350 with personal information, including information relating to the type of person the user 310 is hoping to meet. Fig. 3B shows the user 310 wearing the programmed personal transmitter/receiver

350 as the user undertakes everyday activities. Fig. 3B also shows a second user 320 who is also registered with the matchmaking service. The second user 320 is wearing a programmed personal transmitter/receiver 360. When the user 310 comes in close proximity to the second user 320, the personal transmitter/receivers 350, 360 communicate with each other via a wireless communications protocol, such as Bluetooth. The personal transmitter/receivers 350, 360 compare the personal information of the users 310, 320 and determine whether a predetermined threshold of compatibility has been reached for each of the respective users 310, 320.

If a predetermined level of compatibility associated with user 310 is reached, the personal transmitter/receiver 350 alerts the user 310 of the close proximity of a compatible, registered user. In this embodiment, the personal transmitter/receiver 350 alerts the user 310 by vibrating to a predetermined level, hi other embodiments, the personal transmitter/receiver 350 sounds an audible warning or communicates with a mobile phone 355 of the user to alert the user 310. The predetermined level of

compatibility is changed by the user 310 depending on the environment on which the user 310 is expected to be located. For example, when a user 310 is going out to a club environment in which a large proportion of the people are likely to meet a certain age- group demographic, the user 310 sets the compatibility threshold to level 3. In contrast, when the user 310 is going about general duties in public, in which the user 310 is likely to be exposed to a much broader cross-section of age-groups, the user sets the compatibility threshold to level 1, which is less selective than level 3.

In Fig. 3 C, the minimum compatibility ratings of the users 310, 320 have been satisfied, and the personal transmitter/receivers 350, 360 establish communication with respective mobile telephone handsets 355, 365 of the respective users 310, 320. hi this embodiment, the personal transmitter/receivers 350, 360 communicate with the respective mobile telephone handsets 355, 365 using Bluetooth wireless communications links. The personal transmitter/receiver 350 sends a signal to the Bluetooth compatible mobile 355 and a set of commands, such as those in Table 2 below, are shown on a mobile phone screen. It is to be noted that the Bluetooth communication from the personal transmitter/receiver unit 355 does not use costly telecommunication lines to carry information and is thus cost effective for the user 310. Examples of the commands available on the mobile phone screen are shown in Table 2 below.

Table 2 * NO Accept. NO Send (DO NOT accept details, and DO NOT send any details)

* YES accept. NO send (YES accept details, DO NOT send any details)

* YES accept. YES send ... (YES accept details, YES send membership number only)

In Fig. 3D, the user 310 selects a command option on the mobile phone 355, which in turn sends a signal to the personal transmitter/receiver 350, preferably using a wireless

communications protocol such as Bluetooth. The signal indicates whether the personal transmitter/receiver 350 is to transmit or withhold personal information relating to the user 310 from the personal transmitter/receiver 360 of the second user 320. The user 310 is able to make notes on the mobile phone 355 regarding the meeting, such as time, location, and any physical observations the user 310 has made relating to the second user 320. The notes can also be captured and/or stored by the personal transmitter/receiver 350.

Fig. 3 E shows the user 310 accessing a computer server via a computer 305. The user 310 signs in to the website and retrieves details of any one or more compatible individuals that the user 310 encountered during the day. Alternately, the user 310 accesses the website via GPRS on the mobile phone 355. The details retrieved from the website can include, for example, a GPS location relating to the location of an earlier meeting, and the time at which the meeting occurred.

When two users wearing respective personal transmitter/receiver units pass within close proximity of one another, an initial check is performed to determine whether the users satisfy each other's respective compatibility thresholds. If the compatibility thresholds of both users are satisfied, basic details associated with the users are , transferred between the respective personal transmitter/receiver units. The basic information can include, for example, a member identifier. The member identifier can be transferred to a mobile phone handset, to be viewed by the user. Alternatively, the personal transmitter/receiver may include a display that allows a user to view a received identifier.

In a further implementation, a user couples a personal transmitter/receiver to a computer and accesses a computer server associated with a service provider to which the

user is subscribed. The personal transmitter/receiver unit uploads the received identifier, and the computer server transmits information about the user associated with the received identifier to the computer. The computer utilised by the user may be a personal computer, a handheld computing device, a 2.5G or 3G mobile phone handset or any other mobile phone handset capable of transmitting or receiving data, or other computing device that can send and receive data. If a mobile computing device is utilised, the user is able to obtain more information about the other, compatible user while still in close proximity to the other user.

Fig. 18 is a schematic representation showing interaction of the personal transmitter/receivers 350, 360 of Figs 3A to 3E. Fig. 18 shows a user 310 accessing the computer 305 to program the personal transmitter/receiver 350. In this embodiment, the personal transmitter/receiver 350 is wirelessly enabled, using Bluetooth, for example. A user 320 accesses the computer 305, or another computer, to program the personal transmitter/receiver 360. The personal transmitter/receivers 350, 360 exchange information with each when within wireless transmission range of each other. Fig. 18 also shows a number of wirelessly enabled mobile devices 355, 365 with which the personal transmitter/receivers 350, 360 can communicate using an ad-hoc wireless communications link. The mobile devices 355, 365 include, for example, but are not limited to a cellular phone with personal transmitter/receiver client software 1810, a PDA with personal transmitter/receiver client software 1820, a smart phone with personal transmitter/receiver client software 1830, a wirelessly enabled cellular phone 1840, a wirelessly enabled PDA 1850, and a wirelessly enabled smart phone 1860.

Fig. 19 is a flow diagram 1900 of the operation of the personal transmitter/receiver unit 350, as described above with reference to Figs 3A to 3E. The flow diagram 1900 begins at a Start step 1905 and proceeds to step 1910, in which the user 310 utilises a computing device 305 to register online with a service provider website. The user 310 couples the personal transmitter/receiver 350 to the computing device 305, to enable data to be transferred from the website to the personal transmitter/receiver 350. The data includes information to establish a compatibility threshold of another user of a personal transmitter/receiver that the user 310 would like to meet.

Control passes to step 1915, in which the user wears the personal transmitter/receiver 350 while undertaking daily activities. The personal transmitter/receiver 350 transmits a periodic signal, a ping, that seeks a compatible personal transmitter/receiver within the transmission range of the personal transmitter/receiver 350. In the embodiment described in Figs 3 A to 3E, a second user 320 is wearing a second personal transmitter/receiver 360 that is also emitting a periodic ping.

Control passes from step 1915 to step 1920, in which the first and second users move within transmission range of the personal transmitter/receivers 350, 360. The personal transmitter/receiver 350 receives the ping from the personal transmitter/receiver 360. Similarly, the personal transmitter/receiver 360 receives the ping from the personal transmitter/receiver 350. The personal transmitter/receivers 35O 3 360 perform any handshaking required by the wireless communications protocol utilised by the personal transmitter/receivers 350, 360 and establish an ad-hoc wireless communications link. Control passes to step 1925, in which the personal transmitter/receiver 350 sends personal information about the user 310, as stored in a memory of the personal transmitter/receiver

350 to the personal transmitter/receiver 360. The personal transmitter/receiver 350 receives personal information associated with the user 320 from the personal transmitter/receiver 360.

Control passes to step 1930, in which a processor in the personal transmitter/receivers 350 determines whether a compatibility threshold programmed in step 1910 has been satisfied. If the compatibility threshold is not satisfied, No, the communications link with the personal transmitter/receiver 360 is terminated in step 1935 and control returns to step 1915. However, if at step 1930 the compatibility threshold is satisfied, Yes, control passes to step 1935, in which the personal transmitter/receiver 350 alerts the users 310 to the presence of a compatible user. The alert may take the form of an audible tone, a vibration, a combination thereof, or other signal.

In one embodiment, the user 310 programs the personal transmitter/receiver 350 in step 1910 to send automatically a predetermined set of information to another user that satisfies the compatibility threshold. Further, the user can program the personal transmitter/receiver 350 to store information received from the compatible user, such that the stored information can be downloaded to a computer at a later time. The personal transmitter/receiver optionally stores an identifier of the compatible user. The time at which the compatible user was encountered may also be stored for later viewing.

In step 1940, any predetermined information is transmitted to the compatible user, and any received information is stored by the personal transmitter/receiver 350. Control passes to optional step 1945, in which the personal transmitter/receiver 350 transmits information to the mobile phone 355 of the user 310. The user 310 is able to view information displayed on a display of the mobile phone 355. The user can then utilise the mobile phone 355 to act on the received information, as described above with reference to

Fig. 3C and Table 2. In this example, the user 310 sets the personal transmitter/receiver 350 to send a signal to the mobile phone 355 when a compatibility signal is received. An onscreen or verbal menu is presented by the mobile phone 355 and the user can select one of the following options: 1. Accept incoming details and transmit the user's details.

2. Accept incoming details but decline sending the user's details.

3. Decline incoming details and decline sending the user's details.

4. Decline incoming details but allow the user's details to be sent.

5. Store only ID and time stamped information.

If the user 310 wants to accept information transmitted from the personal transmitter/receiver 360 of user 320 to the personal transmitter/receiver 350, and also wants to transmit personal information to a compatible user, the user 310 selects item' 1 ' from the above menu. If the user wants to accept information transmitted from the personal transmitter/receiver 360 of user 320 to the personal transmitter/receiver 350, but does not want to transmit personal information to a compatible user, the user 310 selects item'2' from the above menu.

If the user does not want to accept information transmitted from the personal transmitter/receiver 360 of user 320 to the personal transmitter/receiver 350, and does not want to transmit personal information to a compatible user, the user 310 selects item'3' from the above menu.

If the user does not want to accept information transmitted from the personal transmitter/receiver 360 of user 320 to the personal transmitter/receiver 350, but does

want to transmit personal information to a compatible user, the user 310 selects item'4' from the above menu.

The personal transmitter/receiver user may elect to program their pXr to allow their pXr id number to be transmitted as a default selection to the above menu. In one example, user 310 does not select any item from the menu and in doing so, only a member identifier associated with the user 310 is sent from the personal transmitter/receiver 350 to the personal transmitter/receiver 360 of user 320. The identifier of user 310 is received by the personal transmitter/receiver 360 as blind information and when user 320 couples the personal transmitter/receiver 360 to a computer device to connect to the service provider website, the personal transmitter/receiver 360 uploads the received member identifier of user 310 to the website, preferably in an encrypted format.

The website decrypts the identifier only if the user 310 authorises release of the member identifier, m one embodiment, the user 310 is prompted to release the identifier to the user 320 when the user 310 next logs into the website. If the user 310 declines to have the identifier released, the encrypted identifier is deleted from account information associated with user 320. In this example, two pXr users may have matched in a compromising situation and either one or both may wish to keep their member identifier and other personal information anonymous. For example, the compatibility match may occur at a dinner party, or office boardroom.

As indicated above, step 1945 is optional, and it is not necessary for the personal transmitter/receiver to communicate with a mobile phone. In this scenario, information is received and stored in the personal transmitter/receiver for uploading to the service provider website at a later stage.

Control passes to step 1950, in which the user 310 decides whether to return home. If the user returns home, Yes, control passes to step 1955. In step 1955, the user couples the personal transmitter/receiver 355 to a computing device that is connected to the service provider website. The user 355 uploads data stored on the personal transmitter/receiver 355, including personal information received from the personal transmitter/receiver 365 of user 320. The user 310 can then browse the service provider website to view a public profile of the user 320, or send an email or chat message to the user 320 via the website. Control passes from step 1955 to End step 1960 and the flow diagram 1900 terminates. Returning to step 1950, if the user does not return home, No, control returns to step 1915, and the personal transmitter/receiver 350 resumes the sending of a periodic signal to detect other personal transmitter/receiver devices.Figs 4A to 4C depict a second scenario relating to matching individual users of personal transmitter/receiver units, without utilising mobile phones. In a first step shown in Fig. 4A, a first user 410 utilises a computer 405 that is coupled to a service provider website (not shown) to program a personal transmitter/receiver unit 450 connected to the computer 405. The user 410 first logs in as registered user and completes various filter questions and selects levels, as described above with reference to Fig. 2A. An example of the filter questions and levels selected are shown in Table 3 below.

Table 3

Selecting preferences will automatically set levels 1 ,2,3 etc e.g.

I'm seeking ....

Level 1 setting

Female / 25 to 35 yrs

Level 2 setting Female / 25 to 35 yrs / seeking permanent relationship

Level 3 setting

Female / 25 to 35 yrs / Seeking permanent relationship / Enjoys sports: soccer, tennis /

Code setting

This is a code used by two individuals who may have met on the internet but not yet in person, so may not know what the other person looks like. As they have agreed to meet in a busy location won't know if that person has arrived until it vibrates.

Fig. 4B shows the first user 410 setting out with an associated personal

transmitter/receiver unit450. When the first user 410 comes into close proximity to a

second user 420 wearing a personal transmitter/receiver 460 programmed with similar or

compatible settings to the settings of the personal transmitter/receiver 450 of the first user

410, the personal transmitter/receiver unit 450 of the first user 410 vibrates depending

upon the setting. The personal transmitter/receiver unit vibrates only to the level set in

Fig. 4 A above. Whilst each of the .first user 410 and the second user 420 receive a normal

vibration to indicate a compatible person in close proximity, they both receive a "BM"

number (blind to meet number) and the time of meeting is recorded within each of the

respective personal transmitter/receiver units. No further personal information is transmitted in addition to the "BM" number.

Fig. 4C shows the first user 410 arriving home and using the computer 405 to log

into the server. The personal transmitter/receiver 450 is coupled to the computer 405.

Any "BM" numbers collected by the personal transmitter/receiver 450 during the day are

uploaded to the server and are highlighted for the first user 410. The first user 410 is then able to decide whether to send an inter-website email to the second user 420 with whom contact was established earlier in the day, in order to initiate further discussion. All communication between the parties is without any identifies being sent to the receiver. Thus, the respective identities of the users 410, 420 are protected until each party is agreeable to communicate at a higher level using their member numbers, but still within the inter-email network.

Figs 5 A and 5B show a third scenario in which a user 510 meets and communicates with one or more compatible people at a venue. In a first step shown in Fig. 5A, the user 510 utilises a computer 505 to log into a remotely located website (not shown) as a registered user and communicates with other users. The user 510 programs an associated personal transmitter/receiver unit 550 from the computer 505 connected to the service provider website. Once the user 510 decides to meet in a busy venue, such as a party or a club, the user 510 agrees to set the associated personal transmitter/receiver to the same "code setting" as other people attending the party or club.

Fig. 5B shows the user 510 wearing the programmed personal transmitter/receiver 550 in proximity to other subscribers in a crowded environment. Users sharing the same "code set" personal transmitter/receiver units react to each others' signals when the other personal transmitter/receiver units are within close proximity. Subscribers are also able to utilise their mobile phones to send text messages over Bluetooth via their personal transmitter/receivers units in order to communicate with one another. As the subscribers are able to communicate with one another using an ad-hoc wireless communications link between respective personal transmitter/receiver units, a conventional telecommunications network provider is not required. Thus, no formal

telecommunications network is utilised, and cost savings are realised. In this scenario, users may decide to observe one another from a distance without sending a text message before they meet.

Figs. 6A to 6C show a further scenario relating to retail purchases. In Fig. 6A, a user 610 programs a personal transmitter/receiver unit 650 from a computer 605 connected to a remotely located service provider website. The user 610 first logs in as a registered user and completes the filter questions and selects levels, as described above with reference to the earlier scenarios. Besides setting the unit 650 for seeking a person who meets a predefined compatibility rating, the user 610 can also set the device to "program 2". Within this program setting, there are listed restaurants, clubs, clothing or other retail outlets. The user 610 is able to select the group from within the website of the service provider.

In Fig. 6B, the user 610 ventures out with the programmed personal transmitter/receiver unit 650 and a mobile phone 660. In this scenario, retailers enter into a contract with the website service provider and receive a transmitter/receiver base station. The transmitter/receiver base station is located on either an internal or external wall of the retailer's premises, to communicate with mobile personal transmitter/receivers that pass by. Alternatively, the base station is placed close to the retailer's premises in a favourable location for establishing communication with passing shoppers. Such favourable locations include, for example, but are not limited to, a roof, awning, light- pole, telegraph-pole, or gantry. In another implementation, transmitter/receiver base stations are located throughout a retail premise and are programmed with information relating to a particular category of stock.

In the scenario shown in Figs 6 A to 6C, the user 610 has programmed the personal transmitter/receiver unit 650 to "program 2" in seeking out a restaurant offering 600 calorie lunches "or a caloric value in a range". Joe's cafe is a health food shop that has subscribed to the website service provider and has a transmitter/receiver 620 located on or in close proximity to the shop. As the user 610 passes in close proximity to the shop, the transmitter/receiver 620 and the personal transmitter/receiver 650 establish an ad-hoc wireless communication link and exchange information. The personal transmitter/receiver 650 determines that Joe's cafe offers food that meets the criteria set by the user 610 and alerts the user 610 to the presence of Joe's cafe, hi this embodiment, the personal transmitter/receiver 610 forwards some of the information received from the transmitter/receiver 620 to the mobile phone 660. Without entering the premises, the user 610 is able to see on the screen of the mobile phone 660 the lunch offer, as well as the price. The user 610 is then able to place an order by entering commands on the mobile 660, which in turn are passed to the personal transmitter/receiver 650 and then to the transmitter/receiver 620. The transmitter/receiver 620 then forwards the order to a computer located in Joe's cafe for the order to be prepared. Whilst the order is processed, the user 610 is able to avail him or herself of the additional time to do other things within the vicinity. When the order is ready, Joe's cafe utilises the transmitter/receiver 620 to send a message to the personal transmitter/receiver 650 to alert the user 610. The message can be, for example, a Bluetooth notification (bXt) or a conventional text messages.

In a further embodiment, a debit or credit facility is provided by the website service provider. The user 610 is able to program the personal transmitter/receiver 650 in accordance with the offered debit and credit facilities. For example, the user 610

programs the personal transmitter/receiver 650 with credit facilities. In the scenario described above with reference to Fig. 6B, the user 610 is able to pay for the food from Joe's cafe by sending an authorisation message from the personal transmitter/receiver 650 to the transmitter/receiver 620. The authorisation message can be sent via a bxt message, for example. Joe's cafe is then credited with the amount of the purchase by the website service provider, and the user 610 is debited the same amount. The authorisation message can be sent by utilising one or more manual commands on the personal transmitter/receiver 650, or by entering commands on the mobile phone 660 to be sent to the personal transmitter/receiver 650. In a secure implementation, an exchange of messages occurs between the personal transmitter/receiver 650 and the transmitter/receiver 620 to confirm authorisation of the purchase. Providing debit and credit facilities in conjunction with the personal transmitter/receiver removes the need for a user to carry cash.

Fig. 6C shows the user 610 using the computer 605 to connect to the website. The personal transmitter/receiver 650 is coupled to the computer 605, and information regarding the day's activities, including the purchase from Joe's cafe, is uploaded to the website. The user 610 is able to browse a detailed statement of an account held with the service provider to view retail transactions and personal encounters. Depending on the application, the time, date and location of purchases are available for viewing by the user 610. The user 610 is thus able to view the current standing of a debit or credit account. In the case in which a personal transmitter/receiver is stolen, the website sends an alert to all personal transmitter/receivers. When a person wearing the stolen transmitter/receiver passes within close proximity of another transmitter/receiver being worn by another user or located on a shop, an automatic cancellation is issued by the

website and the relevant authorities can be alerted. Thus, a speedy arrest may be made and unauthorised charges are prevented from occurring.

Fig. 7 relates to a legal, rescue and forensics scenario. In the law enforcement scenario, a personal transmitter/receiver unit is stolen or lost, or a person transmitter/receiver unit user is missing. As the lost/stolen transmitter/receiver passes in close proximity to other personal transmitter/receivers and transmitter/receiver base stations located on retail shops and the like, the website service provider is able to monitor the progress of the . lost/stolen transmitter/receiver. The transmitter/receiver network monitors all attempts of the lost/stolen transmitter/receiver unit to be used and the authorities are alerted.

Fig. 7 shows a map in which a personal transmitter/receiver and/or user are travelling along "Little Bourke street". The personal transmitter/receiver unit emits a periodic signal to identify any proximally located devices with which to establish communications. The signal is preferably configured to be sent periodically, to conserve battery power; and includes an identifier associated with a user of the personal transmitter/receiver unit. However, a constant signal may equally be implemented without departing from the spirit and scope of the invention. The user takes a right hand turn at "King Street", left at "Lonsdale Street" "and then left at "Latrobe Street". The tracking of the signal occurs whether the user is walking or in a motor vehicle. This functionality allows the service provider to constantly seek the silent, periodic signal transmitted by the transmitter/receiver, regardless of the "settings", "levels", or selected "programs" programmed into the transmitter/receiver. The time is recorded as the personal transmitter/receiver unit passes by each transmitter/receiver unit, such as personal transmitter/receiver base stations located at retail outlets. The base stations

transmit the timing information to a server. The timing information and the locations of the base station are utilised to map the path of the transmitter/receiver unit, using mapping software. .

Portable transmitter/receiver base station units can be useful in rescue and forensics. Such applications can include lost skiers in ski fields, car accident victims, kidnapping victims, those with dementia, as well as the aged. Other applications relate to rape and murder victims. If a missing person is known to be wearing a personal transmitter/receiver, mobile transmitter/receiver base stations and personal transmitter/receivers worn or carried by rescue personnel can be utilised to locate the missing person. The personal transmitter/receiver unit can be useful for paramedics in attending an unconscious patient, where the patient's medical details are retrieve from the website service provider upon request of the paramedics.

Fig. 8 shows a security scenario utilising a personal transmitter/receiver. In Fig. 8 A, an authorised representative of a company 890 utilises a computer 805 to program a commercial transmitter/receiver unit (cxr) 850 that is coupled to the computer. The representative 890 programs commercial transmitter/receiver according to preferences required by the movement within the company premises of the user to whom the transmitter/receiver is to be allocated. In this example,, each employee is assigned a transmitter/receiver that is programmed according to the areas in which the individual employees work. Fig. 8B shows a user 810 accessing a restricted area within the company's premises. Each time the user 810 wearing a transmitter/receiver 850 passes by a security check point, the transmitter/receiver 850 transmits an identifier to a transmitter/receiver base station 820 located at the security check point; The transmitter/receiver base station 820 receives the identifier and retrieves personal

information from the company files about the user 810. The retrieved personal information can include a photograph for visual confirmation by a security guard at the checkpoint. Similarly, the transmitter/receivers units can be utilised to work in association with motion detectors throughout the premises. In this situation, motion detectors are overridden by a signal from an authorised person wearing a transmitter/receiver unit. If an unauthorised person enters a secure area wearing a transmitter/receiver, or a person not wearing a transmitter/receiver enters the area, a security alert is triggered. Thus, applications for transmitter/receiver devices can be found in airports or high security commercial applications, for example. Figs 9 A to 9C illustrate another commercial application of the transmitter/receiver units. In Fig. 9A, a transmitter/receiver unit 950 is coupled to a computer 905 and programmed with information downloaded from a remotely located computer server (not shown). Level one settings of the transmitter/receiver 950 are programmed by an authorised representative and a user to whom the personal transmitter will be allocated has no interaction. Level two settings of the transmitter/receiver 950, however, are programmable by the user. The transmitter/receiver 950 is programmable for different operating environments, such as attending conferences, tradeshows or similar commercial environments. Level two settings can be programmed by a user to transmit an electronic business card on command to another transmitter/receiver being worn by another conference attendee. Alternatively, the transmitter/receiver is programmed to provide a search capability or for searching out individuals having similar or compatible business interests. Level two settings can be programmed by trades people to transmit constantly a short promotional package to those also wearing a transmitter/receiver who are seeking a matching trades person.

In Fig. 9B, a first user 910 wearing a transmitter/receiver 950 and a mobile phone 960 comes in close proximity to a second user 920 wearing a transmitter/receiver 960. The transmitter/receivers 950, 960 are programmed with similar settings, causing the personal transmitter/receivers 950, 960 to alert the respective users 910, 920. The transmitter/receivers 950, 960 vibrate only when a predetermined level of compatibility has been satisfied by another transmitter/receiver in the vicinity. For example, in a venue when a user wearing a personal transmitter/receiver programmed to match someone with the same business interests, the transmitter/receiver alerts the user when another user of similar business interests and wearing a transmitter/receiver is located nearby. In Fig. 9C, the user 910 arrives home and couples the personal transmitter/receiver 950 to a computer to sign in to a service provider website. The user then retrieves details of people met during the day, as well as any notes taken or recorded on the transmitter/receiver 950 or by the person. Similarly, the user 910 can equally couple the transmitter/receiver 950 to a 3 G enabled mobile phone and utilise the phone to access the service provider website.

Embodiments in a Virtual Environment

The embodiments described above relate to a physical transmitter/receiver device worn by a user whilst interacting with other people and base stations in the real world. A further embodiment of the present disclosure relates to a personal transmitter/receiver device associated with a virtual representation of a user in an online environment. A user utilises a computing device to access a website that hosts a virtual world. The user registers with the website and a virtual representation is associated with the user. In one embodiment, the virtual representation is derived from a photograph provided by the user. In another embodiment, the user selects one virtual representation from a set of

predefined representations. In a further embodiment, the user creates a virtual representation by selecting one or more attributes from a matrix of predefined attributes. For example, one user chooses hair colour, eye colour, physical build, and height to establish a virtual representation. The registered user is able to navigate the virtual representation through the virtual world hosted by the website. Control of the virtual representation is provided by user commands from a keyboard, mouse, or other control device associated with the computing device being utilised by the user. Many users are able to connect contemporaneously to the website and explore the virtual world with their respective virtual representations. Thus, a first user connects to the website using a first computing device, and navigates through the virtual world. A second user connects to the website using a second computing device and begins navigating through the virtual world. When first and second virtual representations associated with the respective first and second users are located in close proximity to each other in the virtual world, the first user is able to see the second virtual representation on a display of the first computing device, and the second user is able to see the first virtual representation on a display of the second computing device. The first and second users are able to navigate their respective virtual representations towards each other. The first and second users can communicate with each other, once their respective first and second representations are located within a predefined distance from one another in the virtual world. The first and second users can communicate, for example, using a chat session utilising data transmitted from the first and second computing devices.

A user can synchronise a physical personal transmitter/receiver unit with information acquired from one or more sessions in the virtual environment. Thus, the

physical transmitter/receiver unit can be programmed with identifiers of people with whom the user has interacted in the online environment. For example, a first user meets a second user in an online virtual environment and subsequently loads ah identifier associated with the second user into a physical transmitter/receiver device of the first user. Similarly, the second user loads an identifier associated with the first user into a physical transmitter/receiver device of the second user.

The first and second users then agree to meet at a mutually agreeable venue, such as a club, and each of the first and second users wear their respective personal transmitter/receiver devices. When the first and second users are located close enough to one another in the club for the personal transmitter/receiver devices to establish a communication link, the personal transmitter/receiver devices alert the respective first and second users of the other person's proximity. hi one embodiment, the virtual world is configured to represent a portion of a real city. The virtual world includes landmarks, shops, and bars. Thus, a user familiar with the real city is readily able to navigate the virtual world. Further, events or promotional activities occurring in the real city can be replicated in the virtual world. For example, an art exhibition of the artistic works of Monet being held at the Art Gallery of New South Wales is replicated in the virtual world in the form of a navigable structure with digital representations of the actual art works being exhibited at the real gallery. An art-loving user connected to the virtual world navigates through the virtual exhibition and is provided with a sense of the size and scope of the exhibition, as well as the layout of the exhibition and the Art Gallery building itself. Further, the art-loving user is able to see how many other online users are also visiting the Monet exhibition. The art-loving user is also able to study the virtual representations of the other online

users to determine the general demographic characteristics to which that particular exhibition appeals. The accuracy of such an assessment is dependent on how accurately the virtual representations associated with the users of this embodiment portray the true physical characteristics of the associated users. In a further embodiment, a user is associated with a virtual transmitter/receiver. In the example of the art exhibition described above, the art-loving user provides personal information when registering to the website hosting the virtual world. As described above with reference to the personal transmitter/receiver devices in the real world, the personal information can include, for example, sex, height, age, hair colour, eye colour. The personal information can also include interests and hobbies, and information relating to the type of person that user would like to meet.

As the art-loving user navigates through the Art Gallery in the virtual world, the art- loving user is able to see virtual representations of other users who are also navigating the online exhibition. When the virtual representation of the art-loving user passes within a predefined distance of a virtual representation associated with another online user, the website compares the personal information of the two users to determine whether the users satisfy a predetermined level of compatibility. If such a predetermined level of compatibility is satisfied, each of the respective users receives a visual warning on their computer displays. The users can then initiate an online conversation with each other via their respective virtual representations. Alternatively, the users can record an identifier associated with the other user and can browse a profile associated with the other on a different section of the website.

Fig. 10 is a schematic block diagram representation of a virtual personal transmitter/receiver 1000 in accordance with an embodiment of the present disclosure.

The personal transmitter/receiver 1000 includes a processor module 1010 that controls the operation of the personal transmitter/receiver 1000. The processor 1010 includes memory, a Read-Only Memory processor, and a real time clock (RTC). The memory can include, for example, but is not limited to, Random Access Memory (RAM), flash memory, a hard disk drive, or the like. The memory is utilised to store information about a user of the personal transmitter/receiver 1010. Such information can include personal information about the user, such as name, date of birth, address, and contact numbers. In some applications, the information also includes one of more of the user's interests and hobbies, and occupation, for example. The memory is also utilised to store data received by the personal transmitter/receiver from other personal transmitter/receivers. The RTC is used to date stamp entries.

The personal transmitter also includes a phone communications module 1020, a manual control module 1050, an ad-hoc radio network module 1060, and a warning device 1070, each of which is controlled by the processor 1010. The warning device 1070 can include, for example, a visual warning presented on a display of a computer. The visual display may include, for example, a separate dialog box presented to the user, a change in colour of the visual representation, or an alert bar when the warning device 1070 is activated. In one embodiment, the visual warning flashes in accordance with one or more predetermined patterns, with different patterns associated with different stimuli presented to the warning device 1070. The different stimuli can correspond, for example, to different scenarios or different levels of compatibility with another proximate user with a second personal transmitter/receiver. The warning device can also include an audible warning, such as a beep, utilised alone or in conjunction with a visual warning.

The phone communications module 1020 enables the personal transmitter/receiver 1000 to establish a communications link with a mobile phone handset 1090. The phone communications module 1020 can establish communication with a mobile phone handset 1090 belonging to a user of the personal transmitter/receiver 1000. In another scenario, the phone communications module 1020 establishes communication with a mobile phone handset belonging to another user, wherein the other user is associated with another personal transmitter/receiver device registered to a system to which the personal transmitter/receiver 1000 is also registered. Alternatively, the other person is associated with a system to which the personal transmitter/receiver is registered. The communications link is established using a communications network, such as the Internet, which is coupled to a mobile telephone network.

In one implementation, the mobile phone handset 1090 is a virtual phone handset that is presented to a display of a computing device being used by a user to navigate a virtual environment. For example, the virtual phone handset can be implemented using a separate display window, or a predefined area of a screen display. Thus, a user associated with the virtual personal transmitter/receiver 1000 can send a message to a physical mobile phone handset or to a virtual mobile phone handset. In this scenario, data is sent from the virtual transmitter/receiver 1000 to a virtual mobile handset of another user via a communications network, such as the Internet, without requiring a conventional mobile telephone network.

The ad-hoc radio network module 1060 enables the personal transmitter/receiver 1000 to communicate with another personal transmitter/receiver proximally located to the personal transmitter/receiver 1000 in a virtual world being navigated by a user associated

with the virtual personal transmitter/receiver 1000. The personal transmitter/receivers communicate with each other via the website.

The manual control module 1050 optionally includes one or more buttons, dialog buttons, control commands, mouse clicks, or the like, that enable a user to operate the personal transmitter/receiver 1000. In one embodiment, the manual control module 1050 includes an On/Off button.

In one embodiment, a user registers with a service provider associated with the personal transmitter/receiver device. Registration requires that the user provides a minimum amount of information to establish a personal profile associated with the user. The personal profile can include, for example, the user's name, and contact details. Depending on the application, the personal profile can also include many other details, including for example, but not limited to, one or more of age, interests, hobbies, occupation, gender, and geographical location. The personal profile may also include personal characteristics, such as, age, sex, hair colour, eye colour, height, religion, or level of education. The personal profiles associated with registered users are stored in a database associated with the service provider.

Fig. 17 is a schematic block diagram representation of a computer server 1700 for hosting an online virtual environment in accordance with the present disclosure. The computer server 1700 includes a processing module 1710. The processing module 1710 is connected to each of a communications module 1720, a games/graphics engine module 1730, a database 1740, and a proximity module 1750. The processing module 1710 executes software and exchanges data with the communications module 1720, games/graphics engine module 1730, database 1740, and proximity module 1750 to

provide an online virtual environment to one or more users who connect to the computer server 1700 via a communications network, such as the Internet.

The games/graphics engine module 1730 includes software for providing real-time graphics to deliver an online, interactive virtual world to a user connected to the computer server 1700. The games/graphics engine module 1730 includes a rendering engine for 2D or 3D graphics, a sound module for sound effects, an animation module for generating and controlling one or more characters in the virtual environment, scripting, artificial intelligence, a networking module, and a scene graph.

The database 1740 stores information about one or more users that have subscribed to a service provider of the computer server 1700. Information stored for each user, or member, typically includes name, username, identifier, address, telephone number, and email address. Depending on the application, other personal information is stored, such as age, height, hair colour, and eye colour, for example. The database can also store personal preferences, and the identifiers of other users that the member has contacted or been proximally located to in the real or virtual worlds. Information in the database can be loaded into a personal transmitter/receiver. Conversely, information from a personal transmitter/receiver can be loaded into the database.

The proximity module 1750 is utilised by the server 1700 to determine the spatial relativity of characters and objects in a virtual environment. Software from the proximity module 1750 is executed by the processing module 1710 to determine when objects are close to a character, and to determine whether two characters in the virtual environment are located close to one another. The proximity module 1750 activates a virtual personal transmitter/receiver of a user, when the user is close to a compatible user in a virtual environment. Software from the proximity module 1750 enables the transfer of

identifiers and other information between virtual personal transmitter/receiver devices. Further, software from the proximity module 1750 triggers software from the communications module 1720 to enable users to communicate in real time.

The communications module 1720 provides software to be executed on the processing module 1710 to facilitate the exchange of text, audio and/or video messages for one user identifier to another user identifier in a virtual environment. The communications module 1720 can provide, for example, chat facilities, message boards, and SMS text facilities.

The computer server 1700 is connected to a communications network (not shown), such as the Internet. A user utilises a computer connected to the communications network to access the computer server 1700. The user establishes a profile on the server 1700, and the profile is stored in the database 1740. The user can then navigate a virtual, environment provided by the computer server 1700. Multiple users accessing the computer server 1700 via the communications network can navigate the same virtual environment. The proximity module 1750 monitors the relative positions of the users to control interaction between the users. In particular, the proximity module 1750 activates virtual personal transmitter/receiver devices for individual users, to alert the users of other users in close proximity in the virtual environment that satisfy a predetermined level of compatibility. Figs 1 IA to 1 IE are directed to a first scenario relating to the matching of individual subscribers in a virtual environment. In Fig. 1 IA, a first user 1110 accesses a computer 1105 to connect to a remotely located matchmaking website (not shown) via a communications network, such as the Internet, for example. The first user 1110 registers with the matchmaking website. In the registration process, the first user 1110 provides.

personal information, which includes a minimum of a personal identifier associated with the first user 1110. In one embodiment, the user identifier is selected by the first user 1110. Alternatively, the user identifier is allocated by the matchmaking website. Other information recorded by the matchmaking website depends on the actual application, but information may also include one or more of name, age, height, eye colour, hair colour, geographical location, hobbies, interests, and contact details. In this matchmaking scenario, the first user 1110 also provides information relating to the type of person the first user 1110 is hoping to meet. Such information can include, for example, but is not limited to, age, height, eye colour, hair colour, and geographical location. During the registration process, a first virtual character is associated with the first user 1110. In one embodiment, the first user 1110 selects the virtual character from a set of predefined characters presented by the matchmaking website. In another embodiment, the first user 1110 creates the virtual character by selecting one or more attributes. The attributes can include, for example, but are not limited to, age, height, hair colour, eye colour, build or physique, skin colouring, and hair length. In a further embodiment, the matchmaking website allocates the virtual character to the first user 1110, based on personal information provided by the first user 1110 during the registration process.

In one embodiment, the first user 1110 selects a level of compatibility that determines the level of compatibility that must exist with another user to create a match. In a simple embodiment, three levels of compatibility are provided, with Level 1 providing the least stringent level of compatibility, Level 2 providing a medium level of compatibility, and Level 3 providing a high level of compatibility. An example of compatibility levels and associated details are shown in Table 4 below.

Table 4

Selecting preferences will automatically set levels 1,2,3 etc e.g.

I'm seeking ...

Level 1 setting

Female / 25 to 35 yrs

Level 2 setting Female / 25 to 35 yrs / seeking permanent relationship

Level 3 setting

Female / 25 to 35 yrs / Seeking permanent relationship / Enjoys sports: soccer, tennis, ...

Code setting

This is a code used by two individuals who may have either come in close proximity to each other in reality or within the virtual on-line space, and may not know what the other person looks like. As they have agreed to meet in a busy location (reality or virtual) they won't know if that person has arrived until it indicates.

Once the first user 1110 has registered with the matchmaking website, the first user

1110 is able to access the matchmaking website via the computer 1105 to review and update the personal information recorded on the matchmaking website.

Fig. 1 IA shows a physical personal transmitter/receiver unit 1190 coupled to the computer. The user is able to download information from the matchmaking website via the computer 1105 to the personal transmitter/receiver unit 1190. Further, the user can upload information from the personal transmitter/receiver unit 1190 to the matchmaking website. If the user is interacting solely in the online virtual environment, the physical personal transmitter/receiver 1190 is optional, and is not required.

Having completed the registration process, the first user 110 is able to navigate the first associated virtual character through a virtual environment provided by the matchmaking website. The virtual environment includes, for example, one or more rooms, one or more streets, buildings, retail shops, cafes, bars, clubs, or theatres. Fig. 1 IB shows the first user navigating the first virtual character 1115. The first virtual character 1115 is wearing a virtual personal transmitter/receiver 1150 and a virtual mobile

phone 1155. Fig. 1 IB also shows a second virtual character 1125 associated with a second user 1120 (not shown). The second user 1120 is also registered with the matchmaking website and is navigating the virtual world provided by the matchmaking website. The second character 1125 is wearing a virtual personal transmitter/receiver 1160 and a virtual mobile phone 1165.

When the first character 1115 comes in close proximity to the second character 1125 in the virtual world, the personal transmitter/receivers 1150, 1160 communicate with each other. The personal transmitter/receivers 1150, 1160 compare the personal . information of the first and second users 1110, 1120 and determine whether a predetermined threshold of compatibility has been reach for each of the respective users 1110, 1120. hi practice, the determination of whether two virtual characters are within close proximity to one another and the determination of the level of compatibility is performed by one or more software modules associated with the matchmaking website. If a predetermined level of compatibility associated with the first user 1110 is reached, the virtual personal transmitter/receiver 1150 alerts the user 1110 of the close proximity of a compatible registered user. In this embodiment, the personal transmitter/receiver 1150 alerts the user 1110 by providing a visual or audible warning to the computer 1105. For example, a warning box is presented on a display of the computer 1105. Alternatively, the virtual personal transmitter/receiver 1150 changes colour or flashes. The predetermined level of compatibility is programmed by the user 1110 depending on the environment on which the user 1110 is navigating. For example, when the user 110 is exploring a virtual club environment in which a large proportion of the people are likely to meet a certain age-group demographic, the user 1110 sets the compatibility threshold to Level 3 to be more selective about the other users with whom

the user 110 might match. In contrast, when the user 1110 is navigating the general virtual world, such as walking down a virtual street, in which the user 1110 is likely to be exposed to a much broader cross-section of age-groups, the user sets the compatibility threshold to Level 1, which is less selective than level 3. In Fig. 11C, the minimum compatibility ratings of the respective first and second users 1110, 1120 have been satisfied, and the personal transmitter/receivers 1150, 1160 establish communication with the virtual mobile telephone handsets 1155, 1165 of the respective users 1110, 1120. In this embodiment, the personal transmitter/receivers 1150, 1160 communicate with the respective mobile telephone handsets 1155, 1165 via software modules associated with the matchmaking website, such as the communications module 1720 of Fig. 17. In one embodiment, a visual display on the computer 1105 represents the virtual mobile phone 1155. The virtual mobile phone 1155 further alerts the first user 1110 to the presence of a compatible user and provides an interface for the first user 1110 to interact with the matching second user 1120. The first user 1110 communicates with the second user 1120 by using keystrokes, audio, video, mouse clicks, or a combination thereof. In one implementation, the mode of communication between users is determined by the level of membership of the respective users. Thus, low level members are able to communicate only using keystrokes, whilst high-level members can use webcams to establish videoconferences with matching users. Commands establishing levels of communication are shown in Table 5 below.

Table 5

* NO Accept. NO Send (DO NOT accept details, and DO NOT send any details)

* YES accept. NO send (YES accept details, DO NOT send any details)

* YES accept. YES send ... (YES accept details, YES send membership number only)

In Fig. 1 ID, the user 1110 selects a command option on the virtual mobile phone 1155, which in turn sends a signal to the personal transmitter/receiver 1150. The signal indicates whether the personal transmitter/receiver 1150 is to transmit or withhold personal information relating to the user from the personal transmitter/receiver 1160 of the second user 1120. The first user 1110 is able to make notes on the virtual mobile phone 1155 regarding the meeting, such as time, virtual location, and any other observations the user 1110 has made relating to the meeting with the second user 1120. Details regarding the online virtual meeting are optionally stored by the website and are associated with the personal profiles of each of the first and second users 1110, 1120.

Fig. 1 IE shows the first user 1110 accessing the matchmaking website (not shown) via the home computer 1105. The user signs in to the website and retrieves any stored notes relating to online virtual meetings. The user 1110 is able to couple the physical personal transmitter/receiver 1190 to the computer 1105, and thus download information from the website to program the physical personal transmitter/receiver 1190.

Figs 12A to 12C depict a second scenario relating to matching individuals within a virtual environment. In this embodiment, users registered with an online website do not have virtual mobile phones associated with virtual characters that navigate a virtual environment provided by the website, hi a first step shown in Fig. 12 A, a first user 1210 utilises a computer 1205 to access and register with a remotely located website (not shown). The first user 1210 first logs in and registers with the website by completing various filter questions and selects levels, as described above with reference to Fig. 1 IA. As also described above with reference to Fig. 1 IA, the first user 1210 is associated with a first virtual character 1215 during the registration process. An example of the filter questions and levels selected are shown in Table 6 below.

Table 6

Selecting preferences will automatically set levels 1,2,3 etc ( There may be more than one level and may involve a criterion not shown below) e.g.

I'm seeking ...

Level 1 setting

Female / 25 to 35 yrs

Level 2 setting Female / 25 to 35 yrs / seeking permanent relationship

Level 3 setting

Female / 25 to 35 yrs / Seeking permanent relationship / Enjoys sports: soccer, tennis, ...

Code setting

This is a code used by two individuals who may have either come in close proximity to each other in reality or within the virtual on-line space, and may not know what the other person looks like. As they have agreed to meet in a busy location (reality or virtual) they won't know if that person has arrived until it vibrates / indicates.

Fig. 12B shows the first user 1210 using the virtual character 1215 to navigate a virtual environment presented by the website. The virtual character 1215 has an associated virtual personal transmitter/receiver unit 1250. The virtual character 1215 does not have an associated virtual mobile phone.

When the first character 1215 comes into close proximity in the virtual environment to a second character 1225 associated with a second user (not shown), the virtual transmitter/receiver 1250 communicates with a virtual transmitter/receiver 1260 associated with the second character 1225 to determine whether the first and second users 1210, 1220 share a level of compatibility that meets or exceeds the level of compatibility set by the respective first and second users 1210, 1220 during the registration process. When the first and second users 1210, 1220 satisfy the selected levels of compatibility, the personal transmitter/receiver unit 1250 of the first user 1210 alerts the user 1210. The alert is implemented using an audio or visual warning presented to the computer 1205 from the website. A similar warning is presented by the transmitter/receiver 1260 to the

.

- 55 -

second user. Whilst each of the first user 1210 and the second user 1220 receives a normal alert to indicate a compatible person in close proximity in the virtual environment, the first and second users 1210, 1220 optionally receive a "BM" number (blind to meet number) and the time of meeting is recorded within personal profiles associated with each of the respective users 1210, 1220 and stored on the website. No further personal information is transmitted in addition to the "BM" number.

Fig. 12C shows the first user 1210 accessing the website via the computer 1205, where any "BM" numbers collected during previous virtual encounters are stored and highlighted. The user 1210 is then able to decide whether to send an inter- website email to the person with whom contact was established earlier in the day, in order to initiate further discussion. AU communication between the parties is without any identifiers being sent to the receiver. Thus, the respective identities of the users are protected until each party is agreeable to communicate at a higher level using their member numbers, but still within the inter-email network. The users may then choose to meet in reality, or online in the virtual environment provided by the website using keystrokes, audio, video, or a combination thereof. For example, the users 1210, 1220 can decide to meet at a virtual bar in the online environment for a video meeting using webcams.

Further, the first user 1110 is able to access the matchmaking website (not shown) via the home computer 1205 to retrieve any stored notes relating to online virtual meetings. The user 1210 is able to couple a physical personal transmitter/receiver 1290 to the computer 1205, and thus download information from the website to program the physical personal transmitter/receiver 1290.

Figs 13A and 13B show a further scenario in which a user meets and communicates with one or more compatible people at an online venue in a virtual environment. In a first

" step shown in Fig. 13 A, a first user 1310 utilises a computer 1305 to log in to a website as a registered user and communicate with other users who are also registered with the website. Once the first user 1310 decides to meet one or more other users in a busy virtual venue, such as a party or a club in the virtual environment, the user 1310 sets a code setting of an associated virtual personal transmitter/receiver 1350 to a code setting agreed with the other users.

Fig. 13 B shows a first virtual character 1315 associated with the first user 1310 in proximity to other users in a crowded virtual environment. In one embodiment, the crowded virtual environment replicates a bar from the real world. Users having virtual personal transmitter/receivers with the same code setting react when virtual characters associated with the users are in close proximity in the virtual environment. As described above with reference to Figs 11 to 12, the virtual personal transmitter/receivers alert the respective users by sending an audio or video warning to the users. Such warnings can include, for example, an alert box, or a flashing virtual personal transmitter/receiver. As described above with reference to Figs. 1 IA to 1 IE, the virtual character 1315 is optionally associated with a virtual mobile phone 1360. The virtual mobile phone 1360 provides an interface to allow the user 1310 to interact with other compatible users in the same virtual environment. The user 1310 can send a virtual text message (vxt) to another compatible user that satisfies the compatibility setting of the virtual personal transmitter/receiver 1350.

Figs. 14A to 14C show a further scenario relating to retail purchases in an online virtual world. In Fig. 14A, a user 1410 utilises a computer 1405 to register with a remotely located website that hosts a virtual environment. During the registration process, the user 1410 provides personal information. The personal information includes,

for example, interests, hobbies, favourite food, favourite clothing labels, clothing sizes, or a combination thereof. The user 1410 is also able to enter data relating to one or more products in which the user 1410 is interested. The website associates a virtual character 1415 with the user 1410, and the user 1410 is able to navigate a virtual environment provided by the website. The virtual environment optionally includes one or more locations representing retail outlets. Retailers are able to purchase or lease virtual space in the virtual world. The virtual space can then be used to promote and sell the retailers' products. For example, Retailer A sells shoes in the real world. Retailer A enters a contract with the website operator to lease a virtual shop on a main street in the virtual world. The virtual shop can be customised by Retailer A to reflect the branding and corporate logo of Retailer A. Further, the user 1410 navigating the virtual world is able to enter the virtual shop of Retailer A and browse the catalogue and current inventory of Retailer A. The user 1410 can browse stock, place an order, or request further information from the virtual shop. In one embodiment, the virtual character 1415 has an associated virtual transmitter/receiver 1450. In this example, the user 1410 is looking for jeans. The virtual personal transmitter/receiver 1450 reacts when the virtual character 1415 is in close proximity to a virtual shop that sells jeans. Fig. 14B shows the virtual character 1415 moving down a street in the virtual world. The virtual character 1415 is passing a retail shop 1470, Joe's Clothing, that sells jeans. As the virtual character 1415 passes in close proximity to the retail shop 1470, the virtual personal transmitter/receiver 1450 alerts the user 1410 that the retail shop 1470 sells jeans. Thus, the user 1410 is alerted to navigate into the retail shop 1470. As the virtual character 1415 enters the retail shop 1470, the

jeans sought by the user 1410 are highlighted to facilitate the sale. The user 1410 can then place an order, or view further information about the jeans.

As described above with reference to Fig. 6B, a debit or credit facility is optionally provided by the website service provider. The user 1410 is able to program the personal transmitter/receiver 1450 in accordance with the offered debit and credit facilities. For example, the user 1410 programs the personal transmitter/receiver 1450 with credit facilities. Thus, the user 1410 can pay for the jeans from Joe's clothing shop by using the credit facilities associated with the transmitter/receiver 1450. Joe's clothing shop is credited with the amount of the purchase by the website service provider, and the user 1410 is debited the same amount.

Fig. 14C shows the user 1410 utilising the computer 1405 to access personal information from the remotely located website. The user 1410 is able to retrieve information about any products examined by the user 1410 during recent navigations of the virtual world, along with details of any purchases made in the virtual environment. In the embodiment in which debit or credit facilities are provided by the website provider, the user 1410 is able to view a detailed statement regarding any purchases made in the online environment.

Short Message Service Figs 15A and 15B relate to a further embodiment in which a physical personal transmitter/receiver is utilised to transmit and receive Short Message Service (SMS) text messages. In Fig. 15 A, a user 1510 utilises a computer 1505 that is coupled to a member website 1525 via a communications network, such as the Internet or a telephone line. The user 1510 registers with the website 1525. The user 1510 is able to browse a list of users

registered with the website 1525, and selects the registered users from which the user 1510 wants to receive text messages.

The website 1525 provides facilities to allow the user 1510 to send a text message to a mobile phone associated with another registered user. In one embodiment, an identifier associated with the user 1510 is presented to a recipient of a text message. The identifier can include, for example, a login name or membership number. In a further embodiment, only the identifier of the user 1510 is provided and a mobile phone number associated with the user 510 is not provided. This provides registered users with a degree of anonymity and security. The user 1510 keys in a text message to the computer 1505 to be sent to an intended recipient 1520. The website 1525 sends the text message to the website 1525. The website 1525 sends the text message to a mobile telephone network 1535, with an identifier of the user 1510 embedded in the message. The mobile network 1535 then transmits the text message to a mobile phone 1565 associated with the intended recipient 1520. The recipient can send a reply text message to the user 510 by replying to the original text message. The website 1525 routes the reply email to the user 1510.

It is possible to utilise the above-described functionality to provide information to a personal transmitter/receiver unit worn by a remotely located user 1520. The user 1510, or an operator of the website 1525, sends a text message to the mobile telephone 1565 of the user 1520. The content of the text message can then be transferred for the mobile phone 1565 to a personal transmitter/receiver unit worn by the user 1520, such as by using a wireless communication link, as described above.

Fig. 15B shows a further scenario, in which a first user 1510 sends a text message to a second user 1520 via a website 1525 and a mobile telephone network 1535. A user

1510 utilises a mobile phone 1555 to send a text message to a number associated with the website 1525. The text message includes an identifier of an intended recipient 1520. The identifier may include, for example, a login name or membership number. The website 1525 receives the text message and parses the message to retrieve the identifier of the intended recipient. The website 1525 utilises the identifier of the intended recipient to retrieve a mobile phone number for the intended recipient from a database associated with the website 1525. The website then forwards the text message to the retrieved mobile phone number via a mobile phone network 1560. This method facilitates the exchange of text messages between the first user 1510 and the intended recipient 1520 in a secure and anonymous fashion by using the website 1525!

In a further implementation, the user 1510 of Fig. 15A utilises the computer 1505 to send a message to another user, via the website 1525. The user 1510 can elect to have the message sent to the other user the next time the other user logs onto the website 1525, or alternatively the message is sent to the other user when the other user is in the vicinity of a personal transmitter/receiver base station. In one scenario, a personal transmitter/receiver base station is located within an office environment for the purpose of communicating with staff at no charge. Thus, a message to a particular staff member is broadcast to all base stations, such that when the staff member passes within the vicinity of any base station, the staff member receives the message on the personal transmitter/receiver, hi one embodiment, a personal transmitter/receiver unit is integrated into an identity card for staff to wear when at work.

Computer Implementation

The methods described above with respect to Figs 1 to 15 may be implemented using a computer system 1600, such as that shown in Fig. 16 wherein the processes associated with the service provider website may be implemented as software, such as one or more application programs executable within the computer system 1600. In particular, the.steps of the method of registering a user, programming a transmitter/receiver, and determining the compatibility of users are effected by instructions in the software that are carried out within the computer system 1600. Further, all of the processes associated with the virtual embodiments described with reference to Figs 10 to 14 may be effected by instructions in the software that are carried out within the computer system 1600. Further still, each of the computers 205, 305, 405, 505, 605, 805, 905, 1005, 1105, 1205, 1305, 1405, and 1505 can be implemented using the computer system 1600.

The instructions may be formed as one or more code modules, each for performing one or more particular tasks. The software may also be divided into two separate parts, in which a first part and the corresponding code modules performs the registration, programming, proximity determination, compatibility, and online communication methods and a second part and the corresponding code modules manage a user interface between the first part and the user. The software may be stored in a computer readable medium, including the storage devices described below, for example. The software is loaded into the computer system 1600 from the computer readable medium, and then executed by the computer system 1600. A computer readable medium having such software or computer program recorded on it is a computer program product. The use of the computer program product in the computer system 1600 preferably effects an

advantageous apparatus for facilitating communication between registered users and an apparatus for online interaction between registered users.

As seen in Fig. 16, the computer system 1600 is formed by a computer module 1601, input devices such as a keyboard 1602 and a mouse pointer device 1603, and output devices including a printer 1615, a display device 1614 and loudspeakers 1617. An external Modulator-Demodulator (Modem) transceiver device 1616 may be used by the computer module 1601 for communicating to and from a communications network 1620 via a connection 1621. The network 1620 may be a wide- area network (WAN), such as the Internet or a private WAN. Where the connection 1621 is a telephone line, the modem 1616 may be a traditional "dial-up" modem.

Alternatively, where the connection 1621 is a high capacity (e.g., cable) connection, the modem 1616 may be a broadband modem. A wireless modem may also be used for wireless connection to the network 1620.

The computer module 1601 typically includes at least one processor unit 1605, and a memory unit 1606 for example formed from semiconductor random access memory (RAM) and read only memory (ROM). The module 1601 also includes an number of input/output (I/O) interfaces including an audio-video interface 1607 that couples to the video display 1614 and loudspeakers 1617, an I/O interface 1613 for the keyboard 1602 and mouse 1603 and optionally a joystick (not illustrated), and an interface 1608 for the external modem 1616 and printer 1615. In some implementations, the modem 1616 may be incorporated within the computer module 1601, for example within the interface 1608. The computer module 1601 also has a local network interface 1611 which, via a connection 1623, permits coupling of the computer system 1600 to a local computer network- 1622, known as a Local Area Network (LAN). As also illustrated, the local

network 1622 may also couple to the wide network 1620 via a connection 1624, which would typically include a so-called "firewall" device or similar functionality. The interface 1611 may be formed by an Ethernet™ circuit card, a wireless Bluetooth™ or an IEEE 802.21 wireless arrangement. The interfaces 1608 and 1613 may afford both serial and parallel connectivity, the former typically being implemented according to the Universal Serial Bus (USB) standards and having corresponding USB connectors (not illustrated). Storage devices 1609 are provided and typically include a hard disk drive (HDD) 1610. Other devices such as a floppy disk drive and a magnetic tape drive (not illustrated) may also be used. An optical disk drive 1612 is typically provided to act as a non- volatile source of data. Portable memory devices, such optical disks (e.g., CD-ROM, DVD), USB-RAM, and floppy disks for example may then be used as appropriate sources of data to the system 1600.

The components 1605, to 1613 of the computer module 1601 typically communicate via an interconnected bus 1604 and in a manner which results in a conventional mode of operation of the computer system 1600 known to those in the relevant art. Examples of computers on which the described arrangements can be practised include IBM-PCs and compatibles, Sun Sparcstations, Apple Mac™, smartphones, personal digital assistants (PDAs), handheld computing devices, or alike computer systems evolved therefrom.

Typically, the application programs discussed above are resident on the hard disk drive 1610 and read and controlled in execution by the processor 1605. Intermediate storage of such programs and any data fetched from the networks 1620 and 1622 may be accomplished using the semiconductor memory 1606, possibly in concert with the hard

disk drive 1610. In some instances, the application programs may be supplied to the user encoded on one or more CD-ROM and read via the corresponding drive 1612, or alternatively may be read by the user from the networks 1620 or 1622. Still further, the software can also be loaded into the computer system 1600 from other computer readable media. Computer readable media refers to any storage medium that participates in providing instructions and/or data to the computer system 1600 for execution and/or processing. Examples of such media include floppy disks, magnetic tape, CD-ROM, a hard disk drive, a ROM or integrated circuit, a magneto-optical disk, or a computer readable card such as a PCMCIA card and the like, whether or not such devices are internal or external of the computer module 1601. Examples of computer readable transmission media that may also participate in the provision of instructions and/or data include radio or infra-red transmission channels as well as a network connection to another computer or networked device, and the Internet or Intranets including e-mail transmissions and information recorded on Websites and the like. The second part of the application programs and the corresponding code modules mentioned above may be executed to implement one or more graphical user interfaces (GUIs) to be rendered or otherwise represented upon the display 1614. Through manipulation of the keyboard 1602 and the mouse 1603, a user of the computer system 1600 and the application may manipulate the interface, to provide controlling commands and/or input to the applications associated with the GUI(s).

One or more of the methods of registering, programming and communicating may alternatively be implemented in dedicated hardware such as one or more integrated circuits performing the functions or sub functions of establishing communication links, transmitting and receiving information and determining compatibility levels. Such

dedicated hardware may include graphic processors, digital signal processors, transmitters, receivers, or one or more microprocessors and associated memories.

Industrial Applicability

It is apparent from the above that the arrangements described are applicable to the computer and communications industries.

The foregoing describes only some embodiments of the present invention, and modifications and/or changes can be made thereto without departing from the scope and spirit of the invention, the embodiments being illustrative and not restrictive.

In the context of this specification, the word "comprising" means "including principally but not necessarily solely" or "having" or "including", and not "consisting only of. Variations of the word "comprising", such as "comprise" and "comprises" have correspondingly varied meanings.

Appendix A

Wireless Networking Standards