SYSTEMS, APPARATUSES AND METHODS FOR VERIFYING CONSUMER ACTIVITY AND PROVIDING VALUE TO CONSUMERS BASED ON CONSUMER ACTIVITY
Systems, apparatuses and methods of verifying consumer activity and providing value to consumers based on consumer activity are provided. In some examples, consumer activity may occur on a mobile electronic device and verification of the activity on the mobile electronic device may be performed. Value may be provided to the consumer after the activity is verified. Numerous types of activity may be performed by the mobile electronic device such as, for example, entering a location, scanning a product or image, or purchasing a product. Such activity may be verified in a variety of manners including, but not limited to, a verification element or rescanning a purchased product at a designated location. Systems, apparatuses and methods disclosed herein may also be utilized with other applications (“Apps”) to provide value to users of the other App.
Latest CHECKPOINTS LLC Patents:
The present application claims the benefit of co-pending U.S. Provisional Patent Application No. 61/421,380, filed Dec. 9, 2010, the entire contents of which are incorporated herein by reference.
FIELD OF THE INVENTIONThe present invention generally relates to providing value to consumers based on their consumer activity and verifying the consumer activity and, more particularly, to providing value to consumers performing consumer activity with their mobile electronic devices and verifying the consumer activity performed with the mobile electronic devices.
BACKGROUNDCurrently, people are taking their mobile electronic devices everywhere with them in their daily lives and, therefore, uses and applications of mobile electronic devices are increasing at a rapid pace to accommodate people anywhere throughout their daily lives. Users of mobile electronic devices are also consumers and many of the new uses and applications of mobile electronic devices are in some manner associated with the consumer activity of the users. In some instances, a consumer may opt to use the mobile electronic device during consumer activity.
Thus, a need exists for systems, methods, and/or apparatuses that encourage and verify authenticity of the consumer's activity. In addition, a need exists for systems, methods, and/or apparatuses that provide value to consumers based on their consumer activity.
SUMMARYIn one example, a system is provided for providing value to a consumer based on consumer activity.
In another example, a system is provided for verifying consumer activity.
In yet another example, a method of providing value to a consumer based on consumer activity is provided.
In still another example, a method of verifying consumer activity is provided.
In a further example, an apparatus is provided for providing value to a consumer based on consumer activity.
In yet a further example, an apparatus is provided for verifying consumer activity.
In still a further example, a method of providing value to a consumer is provided and includes performing an action with a mobile electronic device, generating data associated with the action, communicating the data to a server via a network, storing the data in a storage device, identifying value using the data, and providing the value to a consumer.
In another example, a method of providing value to a consumer is provided and includes performing a first action associated with a mobile electronic device, communicating data associated with the first action to a server, performing a second action associated with the mobile electronic device, communicating data associated with the second action to the server, verifying authenticity of at least one of the first action and the second action using the data associated with the first action and the second action, and providing value to the consumer if the at least one of the first action and the second action is determined to be authentic.
In yet another example, a method of verifying a location of a mobile electronic device is provided and includes providing a verification element in a location, the verification element including a memory, a plurality of unique communications stored in the memory, and a broadcast element, broadcasting one of the plurality of unique communications with the broadcast element, receiving the one of the plurality of unique communications with the mobile electronic device, communicating the one of the plurality of unique communications to a server with the mobile electronic device via a network, and verifying the one of the plurality of unique communications is associated with the verification element.
In a further example, a method of verifying a location of a mobile electronic device is provided and includes providing a verification element in a location, the verification element may include a memory, a unique id and secret key for generating non-predictable codes from an algorithm, a battery backup clock, a plurality of unique codes generated on the fly or stored in the memory, and a broadcast element broadcasting and periodically changing one of the plurality of unique codes with the broadcast element, receiving the one of the plurality of unique codes with the mobile electronic device, communicating the one of the plurality of unique codes to a server with the mobile electronic via a network, and verifying the one of the plurality of unique codes is associated with the verification element.
In still another example, a method of providing value to a consumer is provided and includes performing an action with a mobile electronic device when the mobile electronic device is without access to a network, the mobile electronic device including a data storage device, generating data associated with the action, storing the data in the data storage device in the mobile electronic device, gaining access to a network with the mobile electronic device, communicating the data to a server via the network when the mobile electronic device has access to a network, and providing value to the consumer.
In a further example, a method of providing value to a consumer is provided and includes communication data to a mobile electronic device via a network when the network is accessible by the mobile electronic device, the mobile electronic device including a data storage device, storing the data in the data storage device of the mobile electronic device, wherein the data is associated with an action opportunity, prompting a consumer via the mobile electronic device of the action opportunity when the mobile electronic device does not have access to a network, performing an action, with the mobile electronic device, associated with the action opportunity when the mobile electronic device does not have access to a network, and providing value to the consumer.
In still a further example, a method of providing value to a consumer is provided and includes operating an application on a mobile electronic device, performing an action with the mobile electronic device when the application is not operating on the mobile electronic device, generating data associated with the action, communicating the data to a server via a network, identifying value using the data, wherein the value is associated with the application, and providing the value to the consumer.
In yet a further example, a method of verifying product interaction is provided and includes providing a product, capturing an image associated with the product with a mobile electronic device, transmitting the image over a network for verification, and verifying that the image is associated with the product.
Before any independent features and embodiments of the invention are explained in detail, it is to be understood that the invention is not limited in its application to the details of the construction and the arrangement of the components set forth in the following description or illustrated in the drawings. The invention is capable of other embodiments and of being practiced or of being carried out in various ways. Also, it is understood that the phraseology and terminology used herein is for the purpose of description and should not be regarded as limiting.
DETAILED DESCRIPTIONDisclosed herein are systems, methods, and apparatuses for interacting with consumers during consuming activity, providing value to the consumers based on their consumer activity, and verifying the authenticity of the consumer activity. The disclosed systems, methods, and apparatuses may also be used to strategically market to and/or survey the consumers based on their consumer activity and/or based on stated or implied preferences.
With reference to
With continued reference to
The exemplary system also includes a conventional GPS 28, which is well known in the art and, therefore, will not be described herein in great detail. The mobile electronic device 24 communicates with the GPS 28 to determine the global coordinates of the mobile electronic device 24. Cellular tower and/or WI-FI triangulation via the internet may be utilized to determine the location of the mobile electronic device 24. Such triangulation is also well known in the art and will not be described herein in great detail. These methods for determining the location of the mobile electronic device 24 may be used individually or may be used in any combination.
As illustrated in
The plurality of servers 40 illustrated in the exemplary system of
With further reference to the exemplary system illustrated in
The exemplary verification element 48 illustrated in
With continued reference to
A variety of systems, methods, and apparatuses may be used to verify authenticity of consumer activity and provide value to consumers based on their consumer activity. The following description includes only some of the many systems, methods, and apparatuses capable of verifying authenticity of consumer activity and providing value to consumers based on their consumer activity, and is included for exemplary and illustrative purposes and is not intended to be limiting upon the present invention.
Referring now to
It should be understood that the steps provided in the flowcharts of
With reference to
The consumer's information and mobile electronic device may be authenticated in a variety of different manners and at a variety of different times such as, for example, during account creation, during location declaration, before, during or after consumer activity, during purchases, during value redemption, etc. The following exemplary embodiments of authentication are for illustrative and exemplary purposes and are not intended to be limiting. Other authentication embodiments are possible and are intended to be within the spirit and scope of the present invention.
In one exemplary embodiment, verification may be transparent to the consumer such that verification occurs without their active involvement. In other words, information and device verification occurs in the background. For example, upon establishing communication between the mobile electronic device and the one or more servers via the one or more networks, the one or more servers may communicate with the consumer's mobile electronic device to verify that the device is authentic. Various types of background verifying communication may occur between the one or more servers and the mobile electronic device. These may include communications relying on an active connection to a mobile telecommunication carrier's network to ensure that the electronic device is active, unique, and corresponds with the identifying information provided by the user. For example, a push notification or short message service (SMS) may be sent to the device 24 using its device token, UDID, telephone number, telephony ID, MAC address, etc. This allows verification via a unique identifier on the network. It also eliminates multiple accounts on a verified device 24 and permits permanent banning of fraudulent accounts. This verification enables banning of a particular device, which is not feasible on personal computers via the internet. Personal computers are not tied to their communication platform with a unique identifiable number. While a particular IP address can be isolated on a network with a personal computer, the personal computer itself can be moved to a new network connection or a proxy server to generate a new IP address.
In another exemplary embodiment, upon establishing communication between the mobile electronic device and the one or more servers via one or more networks, the one or more servers may send a communication to the mobile electronic device that is displayed on the mobile electronic device and requires a response from the consumer. Such communications may include, but are not limited to, emails, short message service (SMS) communications such as text messages, or any other type of communication. In such exemplary embodiments, a challenge activity may be presented to the consumer and the consumer must respond in a particular manner in order for the mobile device to be authenticated. For example, the consumer may be required to answer a question, input a passcode, take a picture of himself/herself, take a picture of a particular item, scan a barcode that may be recorded for future verification via automated or manual methods, etc. If the consumer responds properly, then the mobile electronic device is authenticated and may be used in accordance with the present invention. If the consumer responds improperly or does not respond, the mobile electronic device is not authenticated and may not be used in accordance with the present invention until such time that it is authenticated.
In yet another exemplary embodiment, upon establishing communication between the mobile electronic device and the one or more servers via the one or more networks, the one or more servers may send an automated telephone call to the mobile electronic device or an individual may place a manual call to the mobile electronic device (i.e., if the mobile electronic device is enabled for telephone communication). The consumer is required to respond to the automated or manual telephone call in a particular manner in order for the mobile device to be authenticated. For example, the consumer may be required to answer a question, provide additional information, enter a code, etc. If the consumer provides a proper response, then the mobile electronic device is authenticated and may be used in accordance with the present invention. If the consumer provides an improper response or the telephone call is not answered, the mobile electronic device is not authenticated and may not be used in accordance with the present invention until such time that it is authenticated.
In a further exemplary embodiment, the consumer may be near a verification element 48 and the verification element 48 may authenticate the consumer's information and mobile electronic device as an authentic device. For example, the verification element may verify that the mobile electronic device is at a certain location through the use of modulating unpredictable communications or codes (described in more detail below). By this method, individuals cannot predict the verification element's current communication or code and misreport their presence. The mobile electronic device will receive, process, and transmit the securitized communication or code from the verification element to the one or more servers via the one or more networks. The one or more servers will compare the transmitted securitized communication or code, the location, and time transmitted to the expected code in order to verify the mobile electronic device's presence.
Referring now to
The verification element 48 may be a wide variety of different verification elements and the following examples of verification elements are not intended to be limiting. The system is capable of including other verification elements and such other verification elements are intended to be within the spirit and scope of the present invention.
Referring now to
The integrated circuit cooperates with the timing device, such as a clock, to retrieve codes from the memory at appropriate times and communicates the retrieved codes to the broadcast element for interaction with a user and his/her mobile electronic device. The integrated circuit retrieves and broadcasts codes in a manner that is unpredictable to users, but is understood by the one or more servers such that when the user's mobile electronic device communicates verifying data to the one or more servers via the one or more networks, the one or more servers recognizes the verifying data and verifies the authenticity of the user's mobile electronic device.
The integrated circuit may retrieve codes from memory and communicate the codes to the broadcast element in any time increment and be within the intended spirit and scope of the present invention. For example, the integrated circuit may retrieve a new code from memory and communicate the new code to the broadcast element every 10 minutes, 30 minutes, hour, day, week, month, or any other period of time. Continually modulating verification codes inhibits fraudulent activity.
Instances may arise where the main power supply is not available for the verification element. The on-board secondary power supply may provide sufficient power to the verification element in order to maintain a desired level of operability. In some exemplary embodiments, the secondary power source may power the verification element in a manner that facilitates complete operability of the verification element. In other exemplary embodiments, the secondary power source may only power the timing device to ensure that the timing device continues to run and keep accurate time in instances where the main power supply is not available.
It should be understood that broadcasting a unique code is only one of the many manners of communication between the verification element and a mobile electronic device. Many other types of unique and secure communication may occur between the verification element and a mobile electronic device and be within the spirit and scope of the present invention. For example, other types of unique and secure communication between the verification element and a mobile electronic device include visual images, sonic communications through in-audible high frequency sound, changing WIFI identification such as, for example, MAC address, through IP based communication, RFID or NFC, etc.
The verification element may be located in a wide variety of venues having a wide range of spaces. It may be desirable to have the verification element broadcast codes in an area complementary to the area of the venue in which the verification element is positioned. A big box store may have a large retail space footprint, while a small convenience store may have a small retail space footprint. It may not be desirable to have the broadcast element output a signal of similar strengths for the big box retail store and the small convenience store. Thus, the verification element may include an adjustable output strength device for adjusting the output strength of the signal broadcast by the broadcast element. The adjustable output strength device may be appropriately adjusted so that the verification element broadcast a stronger signal for a big box store and a weaker signal for a small convenience store, thereby coordinating the strength of the broadcast signal with the environment in which the verification element is located. The adjustable output strength device may be adjustable in a variety of manners such as, for example, manually via a user interface, automatically with the integrated circuit, through the network from a location other than the venue in which the verification element is located, or any of a variety of other manners, all of which are intended to be within the intended spirit and scope of the present invention.
Referring now to
In this exemplary illustrated embodiment, the integrated circuit cooperates with the unique identifier, the encryption key, and the timing device to generate unpredictable codes, apply an encryption to the codes, and communicate the codes to the broadcast element for interaction with a user and his/her mobile electronic device. The integrated circuit retrieves, encrypts, and broadcasts codes in a manner that is unpredictable to users, but the broadcast codes will match unpredictable codes derived by one or more servers utilizing a similar process and algorithm such that when the user's mobile electronic device communicates verifying data to the one or more servers via the one or more networks, the one or more servers recognizes the verifying data and verifies the authenticity of the user's mobile electronic device.
Each verification element has a unique identifier and encryption key which are never broadcast. The integrated circuit transforms the unique identifier using the encryption key and the precise time to regularly modulate unpredictable codes. Since it is not possible for someone receiving the unpredictable code to determine the original unique identifier and encryption key, all codes remain unpredictable except to the servers that can generate its own matching codes because they have the unique identifier, encryption key, and current time. Periodically, the server may compare the received unpredictable code to its expected and internally generated unpredictable code at a particular date and time. If the code does not match exactly for the particular time, but matches another expected code in a designated window before or after, the server may incorporate a time offset to sync the verification element's clock with its own. For example, the timing device of the verification element may not be in sync with the timing device of the one or more servers (e.g., the timing devices may be off a few seconds, minutes, hours, etc). Thus, the code generated by the verification element and communicated by the user's mobile electronic device may not match the code generated by the one or more servers. This syncing capability accommodates such inconsistent codes and may still authenticate the code sent by the user's mobile electronic device, thereby ultimately authenticating the user's mobile electronic device.
The integrated circuit may retrieve, encrypt, and communicate codes to the broadcast element in any time increment and be within the intended spirit and scope of the present invention. For example, the integrated circuit may retrieve, encrypt, and communicate a new code to the broadcast element every 10 minutes, 30 minutes, hour, day, week, month, or any other period of time. Continually modulating verification codes inhibits fraudulent activity.
Instances may arise where the main power supply is not available for the verification element. The on-board secondary power supply may provide sufficient power to the verification element in order to maintain a desired level of operability. In some exemplary embodiments, the secondary power source may power the verification element in a manner that facilitates complete operability of the verification element. In other exemplary embodiments, the secondary power source may only power the timing device to ensure that the timing device continues to run and keep accurate time in instances where the main power supply is not available.
Similarly to the exemplary verification element illustrated in
The broadcast element described herein and illustrated in
The following is an example of a WI-FI, WLAN, or antenna enabled broadcasting device. A periodically modulating SSID verification element may be a wireless router type of device capable of automatically changing its wireless network name (service set identifier, SSID, etc.) or MAC address, which can be picked up and transmitted via a WI-FI, WLAN, or other antenna equipped electronic device to one or more servers. These strings may correspond to a code periodically and securely sent to the verification element over one or more networks such as, for example, the internet. Alternatively, without need for a network or internet connection, these strings may be a non-predictable code that is independently algorithmically generated both at the one or more servers and the verification element from a fixed code and encryption key, corresponding to the electronic mobile device, and one or more dynamic variables, based on the current time. The one or more servers compare the non-predictable code to the code sent from the electronic mobile device to verify if the electronic mobile device is near a particular verification element at a given time. Alternatively, the verification element and one or more servers may have a preset schedule of codes unique to each particular verification element at a given time. This signal can be transmitted by the electronic mobile device to one or more servers for verification. The modulating SSID verification element may also include a method to calibrate the intensity of signal transmission so that the range of the verification element may be adjusted to fit the eligible parameters of the venue. This modulating SSID verification element may take the form of a wireless router with the notable exception that it does not need to be connected to the internet as it only needs to broadcast its identifying information via SSID and/or MAC address to the electronic mobile device. The modulating SSID verification element may include an internal clock, battery, and preset unique codes. The modulating SSID verification element may also include a method to calibrate the intensity of signal transmission so that the range of the device may be adjusted to fit the eligible parameters of the venue. By way of example, a large store with the verification element in the middle of the store might have the signal intensity set to a maximum. A small store or one with the verification element placed near an entryway might have the transmission intensity set to a minimum.
The following is an example of a sonic broadcasting device. A periodically modulating high frequency sonic verification element is a device capable of generating ultrasound outside of human hearing at particular pitches in particular patterns. These patterns correspond to a code that can be modulated automatically as described below. This auditory signal can be picked up via microphone on a mobile electronic device and transmitted to one or more servers for verification via one or more networks. The sonic verification element may also include a method to calibrate the intensity of signal transmission so that the range of the verification element may be adjusted to fit the intended eligible parameters of the venue. By way of example, a large store with the verification element in the middle of the store might have the signal intensity set to a maximum. A small store or one with the verification element placed near an entryway might have the transmission intensity set to a minimum.
The following is an example of the broadcasting device comprising an electronic display or monitor. A periodically modulating barcode producing verification element may include a display that displays a periodically changing barcode. This barcode may be a one dimensional barcode, a QR code, a two dimensional barcode, a universal product code (UPC), etc. The consumer may scan the displayed barcode with the mobile electronic device's on-board camera and the mobile electronic device may send the captured scan to one or more servers via one or more networks for identification. The system will be able to verify the location of the mobile electronic device based on the scanned barcode. It should be understood that the periodically changing barcode may be modulated at any desired increment. It should also be understood that the barcode may instead be other images and such other images may be modulated at any desired increment.
As used herein, the term “scan” may be interpreted to include any type of scanning technology for scanning any type of image and/or may be interpreted to be any type of digital imaging such as, for example, a digital picture taken with a digital camera. In addition, a “scan” may be, among other things, an image captured with a user electronic device and may include a digital picture of the image as well as the decoded string of data from the image. Further, a “scan” may be any image or any data captured by a user electronic device.
Modulating codes transmitted by verification elements protect against fraudulent reproduction of their signal to gain undeserved value. Such verification elements are modulated in a manner so that the one or more servers can match a particular code from a particular verification element at a particular time, while other people cannot predict that code. Several methods exist to synchronize these codes and such methods are unpredictable so that fraudulent value is not obtained. These strings may correspond to a code periodically and securely sent to the verification element over one or more networks such as, for example, the internet. Alternatively, without need for an internet connection, these strings may be a non-predictable code that are independently algorithmically generated both at the one or more servers and the verification element from a fixed code, corresponding to the electronic mobile device, and one or more dynamic variables, based on the current time. The one or more servers compare its non-predictable code to the code sent from the electronic mobile device to verify if the electronic mobile device is near a particular verification element at a given time. Alternatively, the verification element and one or more servers may have a preset schedule of codes unique to each particular verification element at a given time. These methods may require a clock, battery power supply for the clock, active or passive storage for underlying code, list of codes, and/or algorithm for generating codes. In addition, a method for calibrating the one or more servers and the timing device may need to occur. This code will be transmitted by the mobile electronic device to one or more servers for verification via one or more networks.
Once the system identifies the location of the consumer, the mobile electronic device may display the action opportunities 124 near the location of the consumer. For example, if the consumer is near a grocery store, one of the displayed action opportunities may relate to performing an action associated with the grocery store. Once the action opportunities are displayed on the mobile electronic device, the consumer selects one or more of the action opportunities 128. Next, the consumer satisfactorily performs the action(s) associated with the selected action opportunity(ies) 132. Satisfactorily performing actions associated with action opportunities will be described in more detail below. Upon satisfactory performance of the action, the consumer receives value 136. Such value may be a wide variety of different types of value including, but not limited to, advertising, redeemable/reward points, coupons, special offers, gift certificates, money, consumer goods, charitable contributions, sweepstakes entries, airline miles, features in an App, product review information, storing grocery list, sweepstakes, or anything else of value.
Exemplary consumer activity relating to
A variety of different types of actions may be generated and such actions may have different requirements for performing and/or completing the actions satisfactorily. The following paragraphs relating to
Referring now to
Exemplary consumer activity relating to
Referring now to
Exemplary consumer activity relating to
Referring now to
Exemplary consumer activity relating to
Referring now to
Exemplary consumer activity relating to
Other exemplary consumer activities that may relate to
Referring now to
Exemplary consumer activity relating to
As indicated above, a variety of different actions and value opportunities exist beyond the exemplary actions and value opportunities described herein. Another exemplary action and value opportunity includes receiving value for referring another user to the system. Referral actions and value receipt for the referral actions may be achieved in a variety of different manners. For example, a current user may provide a referral code to a new prospective user and, upon registration of the new user, the new user enters the referral code and the current or first user receives value. Also, for example, a current user may provide a registration link to a new prospective user and the new prospective user may follow the registration link to ultimately register as a new user. If the new user follows the link and becomes a new registered user, the current or first user receives value.
Unfortunately, in instances where consumers receive any type of value, there will be those people who perform fraudulent activity in order to deceive the system and receive value to which they are not entitled. Thus, the present invention includes numerous systems, methods, and apparatuses to provide an audit trail of actions, verify authentic consumer activity, provide value for such authentic activity, and also identify fraudulent activity and withhold value for such fraudulent activity. The following examples of verifying authentic activity are provided for exemplary and illustrative purposes and are not intended to be limiting. In addition, the following examples are only some of the many possible manners of verifying authentic activity, all of which are intended to be within the intended spirit and scope of the present invention.
With reference to
Exemplary verification of consumer activity as it relates to
As indicated above, the examples provided herein for verifying authentic activity are only exemplary and many other examples of verifying authentic activity are intended to be within the spirit and scope of the present invention. For example, the steps provided in the example illustrated in
In the illustrated exemplary embodiment of
Exemplary verification of consumer activity as it relates to
With reference to
With continued reference to
It may also be desirable to verify the authenticity of the scan taken by the camera of the mobile electronic device. Fraudulent scans may be an artificially generated barcode, picture of a product barcode instead of the actual barcode on the product, or other fraudulent manners attempting to receive undeserved value from fraudulent activity. Authenticity of the scan may be verified in a variety of different manners. The following exemplary embodiments are provided for illustrative and exemplary purposes, and are not intended to be limiting. Other exemplary embodiments of authenticating scans taken by a mobile electronic device are possible and are intended to be within the spirit and scope of the present invention.
With respect to the exemplary embodiment illustrated in
In one exemplary embodiment, the authenticity of a scan may be performed manually. In such an embodiment, step 292, as well as any other scanning or picture taking step, may be replaced or followed by a step of an individual visually inspecting the second scan. If the individual believes the second scan is authentic, the individual will then determine if the second scan is taken of the same product from which the first scan is taken. This manual determination occurs at query step 296 in
In another exemplary embodiment, the authenticity of a scan may be performed automatically by a computer system without manual interaction. For example, such a computer system may include network, servers, storage media with databases of scanned pictures, CPU, memory, temporary drive or memory for performing image comparisons. In such an exemplary embodiment, step 292, as well as any other scanning or picture taking step, may be replaced by or followed by a step of automated image duplication detection. This detection discovers if one or more users are submitting similar scans of a picture of a product or a generated barcode rather than an actual product barcode. Methods of verifying authenticity include ensuring uniqueness by comparing the entire image to scans of the same product submitted by the same and/or other users to detecting identical shading and lighting (this will occur if a user is scanning the same photograph of a barcode that he or another user submitted). Uniqueness may also be confirmed by comparing scans of the same product submitted by the same and/or other users by examining portions of the image in the background outside of the barcode. This method will detect if multiple scans of the same photograph of a barcode are submitted. To increase the possibility that portions of the background are included in the image taken by the camera of the mobile electronic device, the display or screen of the mobile electronic device seen by the consumer shows less than the full image that will be captured by the camera when the camera takes the image. For example, the image displayed on the screen of the mobile electronic device will be smaller than the actual size of the image captured by the camera. That way, the consumer will be unaware that more image will be captured then he/she expects. Yet another method for verifying the authenticity of a scan may include comparing the scan to one or more known verified versions of the product. This will confirm that the barcode is not artificially generated via a fraudulent method such as reproducing a barcode via a printer, electronic monitor, etc. Since the scans of true products will appear similar because packages are the same, artificially created barcodes will not match the actual product. Artificially created barcodes may be of the wrong color, and/or include pixilation, may not include background images from packaging, etc. Thus, this method will find scans that are not of the actual product. Using these methods of verifying similarity to actual products and/or dissimilarity to previously submitted scans, automated methods can rate the fraudulent likelihood of a given scan. To make an actual comparison, the one or more servers may divide up an image into a set of many smaller images and compare similarity of the entire image, a subset of only the barcode portion, or a subset excluding the barcode portion.
Exemplary verification of consumer activity as it relates to
As indicated above, the examples provided herein for verifying authentic activity are only exemplary and many other examples of verifying authentic activity are intended to be within the spirit and scope of the present invention. For example, the steps provided in the example illustrated in
With reference to
Exemplary verification of consumer activity as it relates to
Referring now to
The image may be a wide variety of types of images. For example, the image may be a barcode, a code consisting of letters, numbers, and/or characters, an image of a product (either the product being purchased or some other product), an image associated with the venue (e.g., a trademark associated with the venue, abbreviation or acronym of the venue, etc.), a QR code, or two-dimensional barcode, or any other type of image.
After receipt generation, the consumer receives the image 348. The consumer activates his/her camera 352 on the mobile electronic device and performs a scan of the image on the receipt with the camera 356. Then, the mobile electronic device sends the scan of the receipt image 360 to one or more servers via one or more networks for verification 364. The authenticity of the receipt image may be verified in any of the manners described herein such as, for example, manually, automatically, etc., or any other manner, all of which are intended to be within the spirit and scope of the present invention. This verification step attempts to determine if the receipt image corresponds to the purchased product and/or the venue of purchase 368. If the receipt image corresponds to the purchased product and/or venue, the consumer receives value 372. If the receipt image does not correspond to the purchased product and/or the venue, the consumer does not receive value 376. Step 372 in
Exemplary verification of consumer activity as it relates to
Now that numerous examples of action generation and action verification have been described, at least one example of value redemption will be described herein. The exemplary value redemption described herein is not intended to be limiting. Many other manners of value redemption may be performed and are intended to be within the spirit and scope of the present invention.
As shown in
It should be understood that the consumer may redeem value on user electronic devices other than mobile electronic devices such as, for example, personal computers, laptops, or any other electronic device capable of communicating with the one or more servers via one or more networks.
Returning to step 388, if the consumer does not see a desired redemption opportunity displayed on the mobile electronic device, the consumer may initiate a search for value redemption opportunities 416. In the alternative, the consumer may desire to perform a search for value redemption opportunities at the onset of attempting to redeem value. Such an alternative may be desirable if the consumer does not want to look through the full list of redemption opportunities. After initiation of the search, the consumer enters information into the mobile electronic device related to a desired redemption opportunity 420. The consumer then executes the search 424 with the mobile electronic device after entering desired information. The mobile electronic device communicates the entered search criteria to one or more servers via one or more networks 428. The one or more servers communicate search results related to the search criteria to the mobile electronic device via one or more networks 432. The mobile electronic device then displays the search results for viewing by the consumer 436. Next, the consumer determines if a desired value redemption opportunity is displayed 440. If not, a new search may be initiated 444. If a desired value redemption opportunity is displayed, the consumer selects the desired redemption opportunity as illustrated at step 400 in
An example of value redemption as it relates to
The system is capable of having real-time or substantially real-time operation and nonreal-time operation. Real-time or substantially real-time operation may occur when the user electronic device is capable of communicating with one or more networks and the one or more networks are continuously or substantially continuously available. With these capabilities, the system is capable of performing necessary steps and actions as such steps and actions are required. The system may operate in a nonreal-time manner for a variety of reasons. Some exemplary reasons include, but are not limited to, when one or more networks are not available (e.g., no internet access, poor or no cellular coverage, etc.), when the user electronic device is capable of communicating with only a particular type of network (e.g., iPod Touch™ is not cellular capable and is only internet capable) and such particular type of network is not available (e.g., internet not available), or a variety of other reasons.
In instances where non-real time operation is necessary, the system stores or caches data to allow the user to utilize his/her mobile electronic device to receive value associated with the present system. The system is capable of storing or caching data in a variety of different manners and the following described manners are only exemplary manners of storing or caching data. While not explicitly described herein, the system is capable of performing other manners of storing or caching data and such other manners are intended to be within the spirit and scope of the present invention.
For example, an instance may arise where the consumer is in an area having poor or no cellular coverage and no WI-FI or WLAN availability. In such an instance, the user's mobile electronic device may not communicate with one or more servers via one or more networks. However, the user may be in a location where an action may be performed to receive value.
With reference to
A real-world example of enabling a user to obtain value when in a location lacking communication with one or more networks will be described herein for illustrative purposes and is not intended to be limiting upon the present invention. The present example will utilize a grocery store environment and a user attempting to scan a particular product to receive value. Before the user enters the grocery store, the mobile electronic device may communicate with a verification element and the mobile electronic device may store or cache data in its memory associated with the verification element for use when a network is not available. The user may then proceed to an aisle in a store with a network not available, view stored or cached opportunities, and scan the barcode of a particular item. The mobile electronic device may store or cache transmission data associated with the scanned item when a network is not available. The user may then decide to purchase the scanned item and leaves the grocery store. As the user travels home, the user may drive into an area having good cellular coverage. After entering the good cellular coverage area, the mobile electronic device communicates the stored or cached data associated with the verification element and the stored or cached data associated with the scanned item to the one or more servers via the now available cellular network. Upon the one or more servers' receipt and verification of the stored or cached data, the user receives the deserved value. Had the mobile electronic device not stored or cached data of the opportunities available and/or the user action when it was out of communication with one or more networks, the user would not have received value obtained during the period of non-communication.
As another example, the user may have a mobile electronic device that is only win internet capable and is not cellular capable (e.g., tablet computer, iPod Touch™, etc.). In such an instance, the user may have internet access at home, but may not have internet access away from his/her home. When the user is at home, the mobile electronic device may store or cache data or preload data into its memory associated with actions and value receiving opportunities within a particular area. Such a particular area may be, for example, a particular radius from the user's home, a particular city, county, state, nation, or any other area. In the present example, the predetermined area will be a 50 mile radius from the user's home. Thus, the system stores or caches data associated with all the actions and value receiving opportunities within the 50 mile radius of the user's home.
When the user leaves his/her home and travels within the 50 mile radius, the various actions and value receiving opportunities are displayed on the user's mobile electronic device. The user may desire to perform an action and a value receiving opportunity within the 50 mile radius. For exemplary purposes, assume the user is in a grocery store within the 50 mile radius and the user wants to scan a particular product to receive value. When the user enters the grocery store, the mobile electronic device may communicate with a verification element and the mobile electronic device may store or cache data in its memory associated with the verification element. The user may then proceed to a particle aisle and scan the barcode of a particular item. The mobile electronic device may store or cache data associated with the scanned item. The user may then decide to purchase the scanned item and leaves the grocery store for home. As the user arrives at his/her home, the user enters into his/her WI-FI, WLAN, or other network range. After entering the user's network range, the mobile electronic device communicates the stored or cached data associated with the verification element and the stored or cached data associated with the scanned item to the one or more servers via the now available home network. Upon the one or more servers' receipt and verification of the stored or cached data, the user receives the deserved value. Had data not been stored or cached or preloaded into the mobile electronic device when the mobile electronic device was in communication with the internet and had the mobile electronic device not stored or cached data when it was out of communication with the internet, the user would not have received value for his/her activities performed out of communication with the internet.
As consumers move from place to place, the mobile electronic device will gain and loose access to networks. The present invention accommodates such gain and loss of networks and still facilitates proper functionality. With reference to
With reference to
An exemplary manner of marketing to a consumer based on the consumer's own activity is described herein. The exemplary manner is not intended to be limiting and many other manners of marketing to consumers based on the consumers' own activity are intended to be within the spirit and scope of the present invention. In addition, the steps provided in the illustrated exemplary embodiment may occur in a variety of different orders and the illustrated exemplary manner of marketing to a consumer may include more or fewer steps, all of such possibilities are intended to be within the spirit and scope of the present invention.
For example, a consumer may be presented with an activity to scan specific products or specific categories of products at a designated location such as, for example, the consumer's home. The consumer may scan specific products or categories of products for value which, along with other data, may trigger targeted advertisements, action opportunities, and/or other forms of value. In some instances, it may be desirable for the system to discern a designated location from a nearby store. The system may choose to make ineligible a designated location within a radius of the venue from which products were purchased by the consumer, or within radii of venues offering the same product. The designated location, if it is a consumer's home, may be verified in a variety of manners such as, for example, credit card address verification, a postcard send, and/or other address confirmation methods. When a consumer scans previously purchased products at home, data associated with the scanned products will be stored in a history of that consumer's purchases along with the time scanned. These purchases made by the consumer may be combined with database information from POS systems and verified shopping trips to create a more comprehensive buying history. This database may also be combined with demographics of the consumer. Based on these demographics and/or buying history and/or immediate scans, triggers can be created resulting in customized experiences for particular consumers. These triggers may result in targeted advertisements, action opportunities, and/or other forms of value that could appear immediately or at a later time such as, for example, when a consumer enters a location, when the consumers is in other smartphone Apps on the mobile electronic device, when the consumer is performing smartphone web browsing on the mobile electronic device, and/or upon scanning a future purchased product. Triggers, by way of example, may include marketing a competing brand of soda to a consumer that scanned a different brand at home. Another trigger may be identifying a coffee drinker and marketing a new type of instant coffee to the coffee drinker. Another trigger may be identifying a family with baby food in the house and marketing a brand of diaper. Another trigger may include identifying an elderly user via demographics and offering value upon completing a survey on vitamins designed for older individuals. These are only a few of the many possible types of marketing triggers and are provided for exemplary and illustrative purposes only. Any possible triggers are intended to be within the spirit and scope of the present invention.
The many possible manners of marketing to consumers based on their own activity may allow targeted advertisements to reach a consumer based on specific demographics, product ownership, and/or location visits. Additionally, these manners of marketing to consumers do not require, but may work with, connection to a POS system. Consumers may receive the targeted value, action opportunities, etc., at many times such as, for example, when the consumer is actively shopping or before a purchase is made. Reaching consumers prior to purchase may be a more effective manner of marketing than targeting a consumer post-sale as the consumers are leaving the store and are less likely to retain any value, coupons, etc. for a return visit. Consumers also have opportunities to earn value without making a purchase by, for example, scanning a product, entering a particular location, etc. Engaging a consumer without requiring a purchase may increase the likelihood that a consumer will take an action such as, for example, scanning a product, entering a location, etc. Upon finding a product, entering a location, etc., the consumer is further down the purchasing path and can be marketed again to evaluate the offer and ultimately make a purchase. With this process, the consumer may be motivated to at least travel to the product or location, collect value, and gain more information about the product's fit for the consumer. To the contrary, post-purchase targeting such as coupons for random products may be simply and outright dismissed by the consumer because the consumer is not interested in the product. The process of target marketing consumers based on the consumer's activity facilitates surveying of consumer activity at critical decision making times in response to triggers.
Further, users may receive value in response to purchase interest or history. Users may interact with products they have purchased within product categories to provide value. Users may also indicate interest in products, services, or stores via clicks or selections on digital coupons, offers, grocery list creation, loyalty card history, specific stores visited, etc. Value received by the user may include triggered value advertising or offers targeted to specific categories of products and/or stores through mobile electronic experiences. Such triggered value may occur immediately after a triggering event or it may occur at a later time. Such triggered value may also occur in another application (App) on the mobile electronic device or on another electronic device in a household. Such value may occur outside of the system or application where the action occurred and may include, for example, targeted messaging or advertising appearing via push, SMS message, email, in another application, on a web browser, or another device within the same household. The triggered value may be triggered by a specific store, a specific product, or a range of stores and products. Also, the triggered value may attempt to market the user a competing, a complementary, or a similar category.
As can be seen above, a user may be required to perform any number of steps in order to satisfactorily perform an action and receive value. In some instances no steps and/or actions are required to receive value, while in other instances numerous steps and/or actions are required to receive value. It should be understood that, in instances where numerous steps are required, a user may receive value only after satisfactorily performing all steps, a user may receive value after satisfactorily performing each step, or a user may receive value after satisfactorily performing any number of the various required steps. In instances where a user may receive value after satisfactorily performing individual steps or other numbers of steps less than the total number of steps, the user may receive value even if the user does not satisfactorily perform all the steps.
Many other applications (also referred to as “Apps”) exist that may be operated on mobile electronic devices or other electronic devices. The systems, apparatuses, and methods disclosed herein may be utilized with other Apps to provide users of the other Apps with value. Such other Apps may be developed by an application developer, which may be any of an individual person, a company or business entity, a software or program capable of developing Apps. The systems, apparatuses, and methods disclosed herein may be utilized with the other Apps in a variety of different manners and value may be provided to users of the other Apps and/or to the application developer in a variety of different forms and manners. For example, value provided to a user may include currency in a game app, phone minutes, advertising removal, etc. Also, for example, value that may be provided to an application developer may include monetary value. The following exemplary scenarios are for illustrative purposes only and are not intended to be limiting upon the present invention. Rather, any possible utilization between the systems, apparatuses, and methods disclosed herein and other Apps, and any manner of providing value to users of the other Apps are intended to be within the spirit and scope of the present invention.
In some exemplary embodiments, an exemplary secondary or other App may include free operation and may include upgraded operation requiring payment to gain access to the upgraded operation. Rather than make a monetary payment for the upgraded operation, a user of the secondary App may have the option to perform functionality associated with the systems, apparatuses, and methods disclosed herein. For example, a user of the secondary App may be able to perform an action such as, for example, checking into a location, scanning product(s) at a particular location, or scanning product(s) at home, etc., similarly to those manners described and illustrated herein, and the user may receive access to the upgraded operation by satisfactorily performing such an action(s). In addition, the application developer of the secondary App may receive monetary value from business entities when the user performs the above listed actions.
It should be understood that the present disclosure may be incorporated with any other or secondary Apps, may be incorporated into other or secondary Apps in any manner, and may provide value to users of the other or secondary Apps in any form, all of which are intended to be within the spirit and scope of the present invention.
It should also be understood that a variety of different manners of interaction between mobile electronic devices and products are disclosed herein, and many other manners of interaction between mobile electronic devices and products are contemplated and are intended to be within the spirit and scope of the present invention. For example, mobile electronic devices may interact with a product by taking a picture of the product or a portion of the product, scanning a barcode or 2D code on the product, radio frequency identification (RFID) or near field communication (NFC) interaction, etc.
The foregoing description has been presented for purposes of illustration and description, and is not intended to be exhaustive or to limit the invention to the precise form disclosed. The descriptions were selected to explain the principles of the invention and their practical application to enable others skilled in the art to utilize the invention in various embodiments and various modifications as are suited to the particular use contemplated. Although particular constructions of the present invention have been shown and described, other alternative constructions will be apparent to those skilled in the art and are within the intended scope of the present invention.
Claims
1. A computer implemented method of providing value to a consumer, the method comprising:
- receiving notification an action was performed by a user with a mobile electronic device;
- authenticating that the action was performed in accordance with one or more predetermined criteria;
- identifying value associated with performance of the action; and
- providing the consumer with the value if the action was performed in accordance with the one or more predetermined criteria.
2. The method of claim 1, wherein the action includes interacting with a product.
3. The method of claim 2, wherein the action includes at least one of a scan of a barcode on a product, a picture of the product, RFID communication, and near field communication.
4. The method of claim 1, wherein the action includes the consumer indicating interest in one of products and stores through at least one of coupons, offers, grocery lists, loyalty card history, receipt, point of sale system, and stores visits.
5. The method of claim 1, wherein the action includes entry of the mobile electronic device into a venue.
6. The method of claim 1, wherein the action includes purchasing a product.
7. The method of claim 1, wherein the network is a cellular network.
8. The method of claim 1, wherein the network is the internet.
9. The method of claim 1, wherein the value includes at least one of an advertisement, an offer, reward points, a feature in an application, a coupon, price comparison information, product review information, discount, removal of advertising, storing grocery list, and sweepstakes.
10. The method of claim 9, wherein the advertisement occurs at one of immediately after performing the first action, at a later time after performing the first action, in a distinct application on the mobile electronic device, and on another electronic device.
11. The method of claim 1, wherein the value is associated with the action.
12. The method of claim 11, wherein the action and the value are similar in type and brand.
13. The method of claim 11, wherein the action and the value are similar in type and are different in brand.
14. The method of claim 11, wherein the action is of a related interest type as the value.
15. The method of claim 14, wherein the action relates to a diaper and the value relates to baby food.
16. The method of claim 14, wherein the action relates to interacting with a romantic comedy DVD and the value relates to an advertisement for a theatrical release of a romantic comedy playing near the consumer.
17. A computer implemented method of providing value to a consumer, the method comprising:
- receiving notification that a first action was performed by a mobile electronic device;
- receiving notification that a second action was performed by the mobile electronic device;
- using performance of the second action to verify whether or not the first action was performed in accordance with one or more predetermined criteria; and
- providing value to the consumer if an action was performed in accordance with one or more predetermined criteria.
18. The method of claim 17, wherein the first action includes purchasing a product and the second action includes scanning the purchased product with the mobile electronic device.
19. The method of claim 18, wherein verifying if the criteria is met further comprises verifying that the scanned product is the same as the purchased product.
20. The method of claim 19, wherein verifying that the scanned product is the same as the purchased product is performed manually.
21. The method of claim 19, wherein verifying that the scanned product is the same as the purchased product is performed automatically.
22. The method of claim 18, wherein providing value further includes providing value associated with the product.
23. The method of claim 22, wherein the product is a first product, and wherein the value includes an advertisement for a second product.
24. The method of claim 23, wherein the second product is the same type and brand as the first product.
25. The method of claim 23, wherein the second product is of the same type and different brand than the first product.
26. The method of claim 23, wherein the second product is of a related interest type as the first product.
27. The method of claim 26, wherein the first product is a tortilla chip bag and the second product is a salsa.
28. The method of claim 18, wherein the product is purchased at a first location and the product is scanned at a second location different than the first location.
29. The method of claim 28, wherein verifying further comprises verifying that the second location is different than the first location.
30. The method of claim 28, wherein verifying further comprises verifying that the second location is a designated location.
31. The method of claim 28, wherein the first location is a venue of commerce and the second location is a residence.
32. The method of claim 28, wherein the second location must be beyond a predefined distance from the first location in order to provide value to a consumer.
33. The method of claim 17, wherein the first action includes identifying a location of the mobile electronic device and the second action includes one of scanning a product and purchasing a product.
34. The method of claim 33, wherein verifying further comprises verifying the second action occurred at the location of the mobile electronic device.
35. The method of claim 17, wherein the first action includes one of scanning a product and purchasing a product and the second action includes identifying a location of the mobile electronic device.
36. The method of claim 35, wherein verifying further comprises verifying the first action occurred at the location of the mobile electronic device.
37. The method of claim 17, further comprising providing an image with a point of sale system subsequent to performing the first action and prior to performing the second action.
38. The method of claim 37, wherein the first action includes purchasing a product and the second action includes scanning the image with the mobile electronic device.
39. The method of claim 37, wherein providing an image includes one of preprinting the image on receipt paper before the first action, printing the image on receipt paper after performing the first action, displaying the image on a display.
40. The method of claim 39, wherein the image is one of a barcode, a code containing letters, a code containing numbers, a code containing characters, a QR code, associated with a product, and associated with a venue of commerce.
41. A computer implemented method of verifying a location of a mobile electronic device, the method comprising:
- providing a verification element in a location, the verification element including a memory, a plurality of modulating communications stored in the memory, and a broadcast element;
- broadcasting one of the plurality of modulating communications with the broadcast element;
- receiving the one of the plurality of modulating communications with the mobile electronic device;
- communicating the one of the plurality of modulating communications to a server with the mobile electronic device via a network; and
- verifying the one of the plurality of modulating communications associated with the verification element.
42. The method of claim 41, wherein the plurality of modulating communications are a plurality of modulating codes, and wherein the verification element further includes an integrated circuit, an identifier unique to the verification element, an encryption key, and a timing device that cooperate to generate the plurality of modulating codes and apply an encryption to the plurality of modulating codes.
43. The method of claim 41, wherein the network is one of a cellular network and the internet.
44. The method of claim 41, wherein the verification element further includes an adjustable output strength device for adjusting broadcast strength of the broadcast element.
45. The method of claim 41, further comprising broadcasting a second one of the plurality of modulating communications subsequent to broadcasting the one of the plurality of modulating communications.
46. The method of claim 45, wherein the plurality of modulating communications are broadcast based on time.
47. The method of claim 41, wherein the plurality of modulating communications are one of a plurality of modulating codes, a plurality of modulating images, a plurality of modulating sounds, a plurality of modulating WIFI identifications, a plurality of modulating IP based communications, a plurality of modulating RFID communications, and a plurality of modulating near field communications.
48. A computer implemented method of providing value to a consumer, the method comprising:
- providing a mobile electronic device including a data storage device;
- storing first data in the data storage device, wherein the first data is associated with an action opportunity;
- prompting a consumer via the mobile electronic device of the action opportunity even if the mobile electronic device does not have access to a network;
- performing an action, associated with the action opportunity, with a mobile electronic device when the mobile electronic device is without access to a network;
- generating second data associated with the action;
- storing the second data in the data storage device in the mobile electronic device;
- gaining access to a network with the mobile electronic device;
- communicating the second data to a server via a network when the mobile electronic device has access to a network;
- authenticating that the action was performed in accordance with one or more predetermined criteria; and
- providing value to the consumer if the action was performed in accordance with the one or more predetermined criteria.
49. A computer implemented method of providing value to a consumer, the method comprising:
- operating an application on a mobile electronic device;
- performing an action with the mobile electronic device;
- generating data associated with the action;
- communicating the data to a server via a network;
- identifying value using the data, wherein the value is associated with the action;
- authenticating that the action was performed in accordance with one or more predetermined criteria; and
- providing the value to the consumer, provided that the action was performed in accordance with one or more predetermined criteria, through use of another application on one of the user's electronic devices.
50. The method of claim 49, wherein the value is triggered advertising including at least one of a push message, an SMS message, an email, a banner advertisement, and a video.
51. The method of claim 50, wherein one of the user's electronic devices can include, but is not limited to, one of the same application, another application on the mobile electronic device, a web browser on the mobile electronic device, another application on another mobile electronic device, and a web browser on another mobile electronic device.
52. A computer implemented method of providing a first value to an application user and a second value to an application developer, the method comprising:
- creating an application by an app developer;
- operating the application on a mobile electronic device by the application user;
- performing an action with the mobile electronic device;
- generating data associated with the action;
- communicating the data to a server via a network;
- identifying a first value and a second value using the data;
- providing the first value to the application user; and
- providing the second value to the application developer.
53. The method of claim 52, wherein the first value is one of virtual currency in a game, ring tones in a communication app, voice communication minutes, unlocked content, advertising removal, badges, price comparison information, a discount, an advertisement, an offer, reward points, features in an application, coupons, product review information, storing grocery list, and sweepstakes.
54. The method of claim 53, wherein the second value is monetary value.
55. A computer implemented method of providing value to a consumer, the method comprising:
- providing a product interaction opportunity at a location;
- interacting with the product with a mobile electronic device;
- communicating data associated with the product interaction to a server;
- verifying authenticity of the product interaction using the data associated with the product interaction; and
- providing value to the consumer if the product interaction is determined to be authentic.
56. The method of claim 55, wherein interacting with the product further includes capturing an image associated with the product with the mobile electronic device, the method further comprising transmitting the image over the network for verification, and verifying that the image is associated with the product.
57. The method of claim 56, wherein the image is a captured image and the mobile electronic device includes a screen, and wherein prior to capturing the captured image the method further comprises displaying a displayed image associated with the product on the screen of the mobile electronic device, and wherein a perimeter of the displayed image is cropped smaller than a perimeter of the captured image.
58. The method of claim 56, wherein verifying the image further comprises manually verifying that the image correctly corresponds to the product interaction opportunity.
59. The method of claim 56, wherein verifying the image further comprises verifying that the image correctly corresponds to the product interaction opportunity with an automated system.
Type: Application
Filed: Dec 9, 2011
Publication Date: Nov 7, 2013
Applicant: CHECKPOINTS LLC (Venice, CA)
Inventors: Mark P. Dipaola (Venice, CA), Todd J. Dipaola (Manhattan Beach, CA)
Application Number: 13/379,909
International Classification: G06Q 30/02 (20120101);