System and Method for Targeted Marketing and Consumer Resource Management
Systems and methods are provided for providing targeted marketing to goods and services provides and consumer resource management services to consumers. An example system and method for targeted marketing comprises collecting transaction data from point-of-sale (POS) terminals and using a consumer identifier in the transaction data to access stored information about the consumer. This information may be used to target offers and advertisement to the consumer. In an example system for consumer resource management, a consumer may configure a consumer account on the enterprise infrastructure via a web-site. The consumer may use the consumer account to purchase and configure gift cards that may be used for purchasing goods and services. A universal transaction identifier may be associated with the consumer account and used to purchase goods and services from more than one selected goods and services providers.
Latest Blackhawk Network, Inc. Patents:
This application is a continuation application of, and claims priority to U.S. patent application Ser. No. 14/017,518 filed Sep. 4, 2013 which is a continuation application of U.S. patent application Ser. No. 14/017,114 filed Sep. 3, 2013 which is a continuation application of U.S. patent application Ser. No. 13/842,540 filed Mar. 15, 2013 which is a continuation application of U.S. patent application Ser. No. 13/833,817 filed Mar. 15, 2013 which is a continuation application of U.S. patent application Ser. No. 13/828,017 filed Mar. 14, 2013 which is a continuation application of U.S. patent application Ser. No. 13/799,624 filed Mar. 13, 2013, which is a continuation application of U.S. patent application Ser. No. 13/670,124 filed Nov. 6, 2012, which is a continuation application of U.S. patent application Ser. No. 13/619,664 filed Sep. 14, 2012, which is a continuation application of U.S. patent application Ser. No. 12/375,377 filed on Nov. 30, 2009, which is a filing under 35 U.S.C. 371 of International Application No. PCT/US07/16922 filed Jul. 27, 2007, entitled “System and Method for Targeted Marketing and Consumer Resource Management,” claiming priority of U.S. Provisional Patent Application No. 60/833,555 filed Jul. 27, 2006, which applications are incorporated by reference herein in their entirety.
BACKGROUND OF THE INVENTION1. Field of the Invention
The present invention relates to systems and methods for using computer network technology to provide consumers with resource management capabilities and to provide retailers, service providers and manufacturers with enhanced marketing channels.
2. Description of Related Art
The Internet has evolved into an entire marketplace offering consumers the ability to shop for goods and services and make transactions electronically without leaving their home. The Internet has also expanded distribution channels and ways of reaching consumers through advertising for retailers, service providers and manufacturers. The Internet and a number of more evolutionary technologies have also evolved to provide retailers, service providers and manufacturers (“retailers”) with ways to attract consumers to their traditional sources of goods. For example, many retailers sell gift cards that may be redeemed at the retailers' stores for a predetermined amount. Many retailers have also established loyalty programs, or awards programs, and some have provided consumers with access to accounts over the Internet. Retailers have also used the Internet to provide consumers with coupons, and directed notices of offers and savings. Retailers may obtain Marketing information about consumers to help them determine what's selling and what's not.
Despite the revolutionary growth of the Internet as a market place, there are frustrations faced by both consumers and retailers alike. Consumer frustration primarily centers on resource management issues (managing information, gift cards, coupons, receipts, spam, loyalty program cards, rebates, etc.). While gift cards have become popular, they've also become a source of confusion and clutter. A consumer cannot know the balance on most gift cards without visiting the store, and often, a consumer will have many gift cards from a wide variety of retailers. Keeping track of the gift cards requires meticulous record-keeping. Many gift cards often end up being unused, providing no advantage to the consumer and little advantage to the retailer. In addition to gift cards, consumers often experience frustration with having to store receipts, or receiving unsolicited offers by email, or having to keep track of many passwords to access many accounts for loyalty programs or award programs.
Retailer frustration centers on having poor access to consumer attention and information. Consumers faced with an overwhelming number of offers and ads find it difficult to take advantage of such offers and ads leaving retailers clueless as to how successful their campaigns are, or what products are selling as a result of the campaigns, or who is buying what products. Furthermore, retailers often direct a campaign to a particular consumer that is wholly uninterested in the product or service, or is uninterested at that particular time. Retailers generally over communicate with consumers, hoping to catch them at a time when they will be interested, leading to consumers being inundated with irrelevant communications. These frustrations are not only related but are literally caused by the opposing party. Trying to solve the needs of one without simultaneously addressing the needs of the other is an exercise in futility.
There is a need for consumers to manage and consolidate shopping resources. In addition, a need exists to provide retailers with access to consumers in an informed and focused way. There is a need as well for systems and methods that would accomplish both improved consumer resource management and improved access to those consumers for retailers.
SUMMARYIn view of the above, methods are provided for consumer resource management. In accordance to one example method, a consumer interface is provided on a network terminal available to a consumer. The consumer provides consumer input at the network terminal and the consumer input is communicated to an enterprise infrastructure. A consumer account is configured based on the consumer input at the enterprise infrastructure. The consumer account includes a partner interface to access a plurality of selected goods and services providers. The consumer account is also configured to set fund balances for at least one selected goods and services provider. The consumer then purchases a gift card from the enterprise infrastructure to enable purchases from at least one selected goods and services provider.
In another aspect of the invention, another example of a method for providing consumer resource management includes generating a universal transaction identifier from the enterprise infrastructure, the universal transaction identifier corresponding to the consumer account to enable purchases from a plurality of the selected goods and services providers.
In another aspect of the invention, a method is provided for targeted marketing by a goods and services provider. According to the example method, transaction data is collected from point-of-sale (POS) terminals processing transactions. The transaction data includes a consumer identifier for each consumer involved in the transactions. The transaction data is sent to an enterprise infrastructure. For each transaction, a consumer account is accessed in the enterprise infrastructure for each consumer based on the consumer identifiers. The transaction data is then recorded in the corresponding consumer accounts. The goods and services provider is provided with the information relating to consumers that purchased goods and services from the goods and services provider. The goods and services provider may then use the information to target consumers to receive offers, coupons, and savings.
Various advantages, aspects and novel features of the present invention, as well as details of an illustrated embodiment thereof, will be more fully understood from the following description and drawings.
Other systems, methods and features of the invention will be or will become apparent to one with skill in the art upon examination of the following figures and detailed description. It is intended that all such additional systems, methods, features and advantages be included within this description, be within the scope of the invention, and be protected by the accompanying claims.
The invention can be better understood with reference to the following figures. The components in the figures are not necessarily to scale, emphasis instead being placed upon illustrating the principles of the invention. In the figures, like reference numerals designate corresponding parts throughout the different views.
In the following description of preferred embodiments, reference is made to the accompanying drawings that form a part hereof, and which show, by way of illustration, specific embodiments in which the invention may be practiced. Other embodiments may be utilized and structural changes may be made without departing from the scope of the present invention.
I. Targeted Marketing and Consumer Resource ManagementThe example system 100 shown in
The providers 108, 110 in the system 100 in
In the system 100 in
The enterprise infrastructure 102 may work with consumers as members, subscribers, or customers having an account with the enterprise infrastructure 102. Consumers may access, configure and use tools available on a consumer front-end interface to their accounts. The consumers may purchase gift cards or configure a universal transaction identifier 120, 122 to represent those gift cards having a balance for making purchases associated with it. The universal transaction identifier 120, 122 may be similar to a gift card. However, while gift cards are made for purchases from specific retailers, service providers or manufacturers; the universal transaction identifier 120, 122 may be configured to permit a consumer to purchase goods from different providers 108, 110. The POS terminals 112, 114 may be equipped with a universal transaction identifier 120, 122 reading device to associate the universal transaction identifier 120, 122 with a consumer account in the enterprise infrastructure 102. The consumer account may include data relating to the partners 108, 110 from which goods may be purchased and balances or limits on the gift card amounts that may be used for purchasing goods from each partner 108, 110.
It is noted that the universal transaction identifier 120, 122 includes identifying information that is keyed to the consumer's account in the enterprise infrastructure 102. The identifying information is recorded on the magnetic strip of the universal transaction identifier (card) 120, 122 similar to a credit card. The identifying information may however be stored on something other than a card such as, a radio frequency identifying transmitter (RFID), a barcode, or any other suitable form. The identifying information may also be a thumbprint image that may be compared with a consumer's thumbprint image that may be scanned at the POS terminal 112, 114 or any other biometric identifier. In addition, access to the system may also be accomplished using an identification proxy such as a user's telephone number or some other means of unique identification.
For purposes of this application, a universal transaction identifier may be also be referred to as universal transaction card, neither of which require the use of a physical card to function as an identifier. Both a universal transaction identifier and universal transaction card shall mean any mechanism for identifying a consumer and associating such identification with a consumer's account in the enterprise infrastructure 102. Further, when referencing the purchase or use of a universal transaction identifier or universal transaction card, it is not required that the purchase of any physical structure be made to function as a universal transaction identifier and universal transaction card.
The consumers may interact with the enterprise infrastructure 102 using a client application that connects to consumers' accounts with tools for assisting the consumer in managing consumer resources. The client application provides the consumer front-end to the enterprise infrastructure 102. At the consumer front-end, the consumer may perform functions such as: purchase gift cards, swap gift cards, track balances, subscribe to and manage loyalty programs, track offers and coupons from partners, store and sort receipts, rebate redemption and tracking, and other functions as described in more detail below with reference to
The enterprise infrastructure 102 may include a system network for performing a variety of services for both providers 108, 110 and consumers. The system network includes applications that provide the tools available to consumers on the consumer front-end and database storage systems for storing information relating to consumers and their accounts and for storing information relating to providers. The system network also includes hardware and software for implementing security measures to protect consumers' data as well as system data.
In an example system for targeted marketing and consumer resource management such as the system 100 in
The system 100 provides providers 108, 110 with focused access to consumers. Providers 108, 110, as partners with the enterprise, may target advertisement, offers, coupons and other information about their products and services to consumers who generate data used by the partners through their access via the consumer front-end. Providers 108, 110 thus obtain a more focused audience for their advertisement and information relating to the success or failure of their advertising campaigns. Providers 108, 110 also obtain more precise information regarding the ownership and use of their gift cards, including via the consumers' use of a universal transaction identifier. Provides 108, 110 may also target markets, and track consumer spending across multiple channels such as marketing (online, offline, direct marketing, etc.) and sales (B&M retailers, online retailers), both online and offline.
II Enterprise InfrastructureIn general, the system network 200 in
The system network 200 in
The layers of access are implemented as virtual local area networks (VLANs) having no real access to one another except through routing done by routing modules on the network switches. Each VLAN may be configured appropriately to limit access according to the appropriate level of security. The levels of security correspond in general to four tiers of network entities: the presentation tier, the business logic tier, the data access tier, and the data tier.
At the top level of access (for the consumer front-end), the presentation tier is responsible for delivery of data to end clients outside of the enterprise infrastructure. The end clients may be consumers or partners 220a, 220b, 220c. In the presentation tier, data is formatted for communication with the business logic tier of applications that processes requests and handles data delivery to the client applications. Data in the presentation tier may be in XML format along with XSLT stylesheets to allow rendering by client applications. The presentation tier operations, generally, in a layer of servers from the web server farm 202 that resides in a DMZ (DeMilitarized Zone) network. These servers in the DMZ network may be accessed using a web farm DMZ VLAN 230 and the Layer 7 switch farm 210. The DMZ network servers operate as proxy servers between consumers and the enterprise infrastructure.
The next layer of access includes servers in the web server farm 202 that form the business logic tier. The business logic tier includes application code (Beans) that will handle requests from client applications (such as web browsers) and make requests to the Data Access Tier for relevant data. It will then process the data and deliver it for presentation to the client applications. The business logic tier is kept separate from interaction with consumers to preserve integrity of the applications and access to the database 205. Added security may be provided by an outer web farm VLAN 232.
In the next layer, the data access tier may make requests directly to the Data Tier (or the database 205). The data access tier may be separate from the business logic tier of applications to differentiate how the data is stored and how it is retrieved from certain platforms. Security may be configured with an inner web farm VLAN 234.
The data tier is in the last layer of security, which includes the database 205, and which has the tightest security to protect the most critical data. Security may be configured with an internal access VLAN 236.
The system network 200 includes a general horizontal separation of EDI partnerships, which are logical VLANs that separate access by each partner 220a, 220b, 220c to the infrastructure of the example system for targeted marketing and consumer resource management implemented using the system network 200. In general, a partner may access their own private VLAN at 216 and 218 into the system network 200 infrastructure through a VPN concentrator or routed through a routing module on the backbone switch. This structure may isolate potential security breaches from single partners 220a, 220b, 220c. It may also prevent any partner 220a, 220b, 220c from being able to access rival partner data from the system network 200.
The EDI partner access to the system network 200 may also be layered vertically according to level of security. An EDI farm DMZ VLAN 240 provides the lowest level of security at the consumer front-end for access to the EDI server farm 206. The outer EDI farm VLAN 242 provides a higher level of security at a business logic level similar to the business logic tier described above with reference to the web server farm 202. The highest level of security is provided at the inner EDI farm VLAN 244 for access to more critical data via the database server farm 204.
Connectivity to the system network 200 may be provided by co-location facilities hosting the remote infrastructure. Connectivity may be provided by Tier 1 Internet Backbone providers to ensure access to most networks without having to transcend networks in order to provide the shortest network path from Leverage Consumer to Leverage Infrastructure. Besides utilizing connectivity to Tier 1 providers and managing complex BGP routes to the Internet Backbone, a backup connection to InterNAP will also be established.
In the example system for targeted marketing and consumer resource management, the complex backbone connections force the infrastructure to appear “local” to the consumers accessing the system network 200 via their host ISPs. This prevents the consumer from transcending networks between peer networks and eventually experience degraded network performance.
A. Web Server FarmThe web server farm 202 includes two banks of servers for serving either static or dynamic content. Each bank may be designated as either the static web farm or the dynamic web farm. The static web farm may service client requests for static content that is neither database generated nor does it use any type of server content processing and generation before being transmitted through the Internet to the client applications (e.g. web browser). Such examples of content would be images, video, or web templates. The dynamic web farm may be designed to serve dynamic content generated in multiple ways, whether that is done via XML/XLS transformation, server-side scripting, or through middle-tier applications that directly interfaces with the database 205.
The web server farm 202 may be implemented using any suitable hardware and software systems implementing server functions. In one example implementation, the web server farm 202 is implemented with Sun multiprocessor blade servers running either the Solaris™ operating system or Red Hat Linux Enterprise™ operating system. The example implementation of the web server farm 202 also includes the Zeus™ Web Server (ZWS) application. Like the Apache™ Web Server application, the ZWS is a robust, commercial-grade, full-featured and highly efficient web server software. However, ZWS is multi-threaded to leverage the symmetric multiprocessing nature of multi-cored hardware platforms, which increases the response times and load servicing for client requests. The web server farm 202 will also house the Java™ application server software that operates the applications to service consumer requests on the enterprise website. The Java™ Application Server software may be a combination of Apache Tomcat for simple java applications and JBoss Application Server software for J2EE applications.
It is to be understood that specific implementations of the web server farm 202 may use any suitable hardware and software systems. The hardware and software systems described above are merely examples of the types of hardware and software systems that may be used.
B. Database Server FarmThe database server farm 204 may store data specific to consumer front-end interactions and the EDI partner data collected from partners 220a, 220b, 220c. The database server farm 204 may be implemented using any suitable hardware and software systems configured to operate as database servers. In one example implementation, the database server farm 204 is implemented using Sun multiprocessor Enterprise servers banked with multi-core processors and full redundant power and mirrored drives for the operating system and database application. Depending upon the nature of the application and the database 205 that is needed to interface against such applications, the database server farm 204 may run either the Oracle Database Server product or the MySQL Database server product. Also, depending upon the nature of the data that is being stored, highly complex relational database tables may use Oracle while simplistic database schemas may use MySQL. The database server applications may be clustered to ensure high availability and fault tolerance. This will also provide application load balancing among the database server farm 204.
The database 205 for the database server farm 204 may reside in a SAN (Storage Area Network) solution that will offer both high availability and fault tolerance.
It is to be understood that specific implementations of the database server farm 204 may use any suitable hardware and software systems. The hardware and software systems described above are merely examples of the types of hardware and software systems that may be used.
C. EDI FarmThe EDI (Electronic Data Interchange) farm 206 may be designated in the system network 200 to communicate with partners 220a, 220b, 220c. The EDI farm servers 206 may have different applications and permissions from the web server farm 202 to access and process, as well as store, data within the database farm 204. The nature of the applications operating on the EDI farm servers 206 may have more direct access to the database 205 to increase efficiency in data processing and storage. The EDI farm servers 206 may reside in a private VLANs (Virtual Local Area Networks) that can only be accessed via VPN (Virtual Private Network) Concentrators or through specific Point-to-Point access into the VLAN as shown at 216 and 218.
The EDI farm servers 206 may be implemented using any suitable hardware and software system configured to operate server functions. In an example implementation, the EDI server farm 206 is implemented using the same platform as that of the web server farm 202 or by running IBM Mainframes. The EDI farm servers 206 software in the example implementation may also be similar to that of the web server farm 202 software. If the EDI farm servers 206 include IBM Mainframes, then the hardware will run IBM AIX operating systems, and the EDI farm servers 206 will run IBM Websphere Application Server software.
It is to be understood that specific implementations of the EDI server farm 206 may use any suitable hardware and software systems. The hardware and software systems described above are merely examples of the types of hardware and software systems that may be used.
D. Internal AccessThe internal access farm servers 208 may also resemble the web server farm 202 in platform, software, and resource architecture. However, like the EDI farm servers 206, the applications will be tailored for internal access from an enterprise Intranet. Such applications may include data mining and statistical information for marketing and sales.
III. Partner Interfaces to the Enterprise Infrastructure A. Retail Partner InfrastructureThe retail partner infrastructure provides partners with connectivity to the enterprise infrastructure 100 (in
Consumers may purchase goods at the retail partner location 320 using gift cards via swiping their universal transaction identifier 120 (in
At the enterprise infrastructure 310, an appropriate application for the retail partner processes the transaction by looking up an account associated with the universal transaction identifier. The account is checked to determine if the balance associated with any gift cards relating to the retail partner is sufficient to cover the transaction. If the balance is sufficient, and the consumer chooses to use the balance, the transaction is processed and recorded. The balance associated with the retail partner gift card represented by the universal transaction identifier is reduced accordingly. Other functions may be performed during the transaction before it is finalized at the POS terminal 314a-d, including transmitting data regarding offers and savings relating to the transaction and the use or accrual of rewards associated with a loyalty program.
The retail partner infrastructure 300 leverages the existing network infrastructure setup between each retail location 320 to the corporate office's NOC 306. Data may be channeled through the NOC 306 to establish a network path providing a central point of contact into the enterprise infrastructure 308. In the retail partner infrastructure 300 in
As described above with reference to
Of the 4 most common enterprise infrastructure interfaces, three are interfaces to a hardware device. The remaining enterprise infrastructure application interfaces against the enterprise infrastructure at the application or higher level.
Referring to
The flow diagrams 600 and 700 in
The enterprise infrastructures 606, 706 may distribute an application that runs on each POS terminal 602, 702 and “attach” to the scanner devices 604, 704. The enterprise infrastructure 606, 706 may then “listen” on each item scan and collect the UPC bar code or SKU information for each item. By capturing this information, the enterprise infrastructure 606, 706 may record each item purchased by the consumers.
The PIN pad interface of the magnetic strip reader 804 in
Referring to
Transaction data may also be collected and communicated by a POS application that may run on POS terminals or within the POS host controller 312 (in
The retail POS terminal environment 904 includes components that may operate in POS terminals: a PUS application 908, a magnetic stripe reader (MSR) 910, a scanner 912, and a PIN pad device 914. The retail POS environment 902 may implement interfaces to the enterprise infrastructure 902 described above with reference to
The data collected may be in multiple formats, depending upon the nature of the devices interfaced. The enterprise infrastructure 902 may support binary formats as well as default ASCII formats inherent to the devices. In one example, the data collected may be translated into XML for ease of transport and parsing.
The enterprise infrastructure 902 includes partner EDI servers 930, internal application servers 940, web servers 950, and a data store 980. The partner EDI servers 930 are the servers in the EDI server farm 206 described above with reference to
As shown in
The data collected may be in multiple formats, depending upon the nature of the devices interfaced. The enterprise infrastructure 902 may support binary formats as well as default ASCII formats inherent to the devices. In one example, the data collected may be translated into XML for ease of transport and parsing; specifically the NRF IXRetail POSLog format.
VI. Consumer Front-EndWhen a consumer desires to join as a system member, the consumer will be prompted to enter basic personal information into the system, which can later be displayed and modified by accessing the personal profile section 1002 of the consumer's personal account. In particular, the consumer will be asked to provide basic profile information, including, but not limited to, demographic information, such as age, gender, zip code preference information regarding consumer likes and dislikes and information about friends and family for whom the consumer may purchase gifts or items. As illustrated in
In the illustrated example, the consumer, via the features section 1004 of the consumer interface may view offers and savings, may purchase gift cards, may exchange gift cards, may exchange store credit, may initiate and track rebate redemptions, among other things. Further, in the illustrated example, the consumer, via the personal management section 1006, may view his/her personal gift cards and special offers marked as being of particular interest. Additionally, through a consumer's personal management section 1006, the consumer may view his/her participating loyalty programs and rewards earned, his/her available store credits and digital receipts from recent purchase from participating retailers.
As will be described further below in connections with
The gift cards may be combined and accessed via a single universal transaction identifier (described above with reference to
As illustrated in
Campaigns may be characterized by, for example, expiration dates, co-branding/short message service campaigns, offers searchable by non-target consumers, offers transferable among consumer members, on-line vs. off-line redemption, to name a few. To identify which consumer should be targeted for a particular offer or part of a campaign, targeting methods may include demographic, geographic, profile preferences/psychographics, recent purchases/uses, gift card/store credit ownership, loyalty program memberships, event calendar, travel calendar, word of mouth/previous campaign participation. Those skilled in the art will recognize that other targeting methods may be utilized and the targeting methods are not limited to those recited above and other campaign characterization categories may be utilized, along with the offer details, to help identify the target consumers.
For example, as illustrated in
After viewing a particular offer's details or detail summary, at step 1114 of
A consumer may have the option of immediately deleting unwanted offers from their offer list. If, however, a consumer decides to do nothing with a particular offer, in the illustrated example, the offer will be deleted from the user's offer listing upon expiration of the offer, without notice to the consumer, step 1116.
At step 1118, if a consumer is interested in possibly using a particular offer, the consumer may activate the offer by moving the offer to the personal management section 1006 of the consumer's account. Once moved, the offer will appear in the personal management section 1006 under a tab of activated offers, which in the illustrated example is titled “My Special Offers.” In the illustrated example, at step 1120, once an offer expires, it will be removed from the consumer's personal management section 1006; however, the consumer will be notified of its expiration and deletion since special interest was shown in the particular offer.
Optionally, the system 100 may also allow a consumer to modify how he or she is targeted by a particular vendor, step 1122. In this regard, the vendor may be provided with a mechanism for sending feedback directly to a particular vendor. Furthermore, the consumer may seek more or less offers from a particular vendor, may seek offers of a particular type or category, or may seek to permanently or temporarily suspend the receipt of offers from a particular vendor.
Additionally, the system may be capable of gathering analytics and statistical data about the campaign performance and may provide such information to participating service providers, retailers and manufacturers.
B. Gift Card Purchase FeatureOnce the gift card purchase is complete, the consumer may receive either individual retailer gift cards or one universal transaction card configured for use as a gift card for the multiple retailers designated. The consumer may also have the universal transaction card sent to anyone designated by the consumer to receive the card as a gift.
C. Gift Card Registration FeatureAlso, as illustrated in the example shown in
In the illustrated example, once the account is established, a consumer may enter gift card information into the consumer's personal management section 1006. In this regard, the consumer will select an add gift card option in the consumer account. The system will then prompt the consumer to enter gift card information, such as vender information and card number, among other data, step 1314.
Additionally, someone may purchase a gift card for a consumer. If the consumer does not have an account with the system, the consumer may be notified by email, text message, mail or other notification method of the receipt of the gift card. This may then prompt the consumer to establish an account 1308, log on the system 1302, and use and or register the gift card 1302. Likewise, existing consumer account holders may receive notice of a gift card upon logging into their account by the gift card appearing in the consumer personal account, with notice to the consumer of the receipt of the gift, step 1312.
Whether a gift card is registered by gift or manually entered into the system 100 associated with a consumer account, in one example of an implementation, the system 100 may determine whether a particular gift card is eligible to bear interest.
As illustrated in
If, however, the system can verify the balance on a gift card, the system 100 can allow the accrual of interest for that gift card and will notify the consumer that the gift card is an interest bearing card so long as it carries a balance and the consumer remains an active system account holder, step 1324. The system will also notify the consumer of the interest rate. The gift card will then appear in the consumer's account, step 1326 and the system will automatically update the balance of the funds associated with the card upon each user login, step 1328. The balance information shall also include the accrued interest amount. Optionally, the system may allow the consumer different options on how to apply the interest. From these options, the consumer may then elect how to apply the interest, step 1330. For example, the interest may be added to the gift card, may be cashed out in the form of a check or funds transfer, may be moved to a system account for future purchases, or may be given to a designated charitable organization.
D. Gift Card Exchange FeatureOnce the consumer indicates which gift card he/she desires to trade and the value of the trade, the consumer must then indicate which gift card he/she desires to acquire in the trade and the value of the trade. Step 1508. For example, the trade may be a dollar for dollar trade, or, optionally, a consumer may offer a higher or lesser value trade for another gift card, i.e., $1.50 of the consumer card for a $1.00 on the trade. When electing which gift cards the consumer desires to acquire, the system 100 may seek a first choice trade and one or more alternative trade options.
Next, the system 100 will then determine if the trade can be immediately completed and if so, with which trade choice, e.g., the first trade choice or an alternative trade, step 1510. If no trade can be immediately completed, the system 100 may then give the user the option to cancel the trade or leave it pending until the desired trade can be completed. If the trade can be immediately completed, the system 100 will present the user with his trade options. The system will then give the user the option to complete the transaction, cancel the transaction or keep the transaction pending until another trade option becomes available. For example, if the first trade option is not available, but an alternative trade option is offered. The system 100 may allow the consumer to keep the trade pending until the first option becomes available for trade.
If the consumer indicates that he desires to complete a swap, step 1512, the system will then determine how best to complete the transaction and instruct the consumer accordingly, step 1514. For example, the system may complete the transaction by either instructing consumers to commence a physical swap, by canceling existing gift cards and issuing new gift cards or by digitally swapping vendors and associated values. A physical swap may occur through the system manager or may occur directly between the trading consumers.
When a digital swap is available, the system 100 will transfer the values associated with the vendor gift cards between the trading consumer accounts. The new gift cards and values will post on the respective consumer accounts and will be accessible via a universal transaction card or vendor gift card linked to the system 100 accessible via the consumer's account.
E Loyalty Programs Management FeatureOnce the consumer elects to join a new program, the system would then direct the user to the sign-up screen (not shown) where the consumer may search for available on-line loyalty programs by vendor name and or category, such as electronics, step 1706. The consumer would then elect which program(s) to join and complete the necessary enrollment information form to become a loyalty member, step 1708. Enrollment in the new program would then reflect in the system account, for example under the “My Loyalty Programs” tab in the personal management section 1006 of the consumer interface 1000, step 1710. The system manager may then send an associated loyalty card to the consumer, if required by the vendor, step 1712, or if the consumer has a universal transaction card for the system 100, that identified account will automatically begin to track loyalty transactions. In either case, the consumer may be required to use the loyalty card or the universal transaction card to track consumer transactions at point of sale and receive loyalty rewards and/or benefits, step 1714. Whenever a transaction is completed using a loyalty card or universal transaction card applicable to a loyalty program, the system 100 can then update the individual consumer's account to reflect recent loyalty account activity, step 1716.
Optionally, the system 100 may receive manual input of loyalty information and based upon the input of information, download associated loyalty information or provide an automatic link, for example, through a web browser, to the consumer's loyalty information on the vendors' website, as illustrated in
Under the calendar section the consumer will be provided with various options, which may include, but not be limited to, entering event and trip information. The consumer can then elect to enter either type of information into the consumer's personal profile, step 1906. If the consumer enters an event into his/her profile, for example, a wedding or an individual's birthday, step 1908, the system 100 will then prompt the consumer to associate a gift recipient with the event, 1910. If the recipient's profile is already in the system 100, the system 100 will then prompt the consumer to identify the recipient, step 1912. If the consumer is not in the system 100, the system 100 will then prompt the consumer to enter the recipient's profile information, step 1914. Optionally, the system 100 may also prompt the consumer to select a reminder date for the event, 1918.
Using the event information, user profile and gift recipient information, the system 100 can then work with vendors to obtain appropriate offers for gift recipients prior to the event placed on the calendar, step 1918. Such offers can then be transmitted to the consumer, which will then appear as part of the consumer's offers and will reference the offer receipt as associated with the particular event.
Alternatively, in the case of a trip, the consumer may enter travel information into the consumer's user profiles, such as dates of travel, travel method, destinations, mode of transportation, point of interest, etc. Similar to the event calendar, the system can then use this information to solicit offers from vendors that pertain to the trip dates, destinations and travel plans, step 1924. Such offers can then be transmitted to the consumer, which will then appear as part of the consumer's offer listing and will reference the offer receipt as associated with the particular trip, as illustrated in
In the illustrated example, when an advertisement is run, it would contain a system logo/identifier and directions that instruct consumer as to how to text a code to the system to receive more information about the advertisement and/or a special offer shown in the advertisement (step 2106). Such advertisements may include print advertisements, such as newspaper, magazine, email, mailing, outdoor advertisement, etc., or may be a radio, television or new media advertisement, among other types. Consumers can then text or SMS to transmit the code to the system manager at step 2108. The system will then receive the code from the user's mobile device at step 2110, match the code associated with the registered mobile number to a consumer account at step 2112 and post the requested information or offer to the consumer's account, step 2114. As illustrated in
As illustrated in
As illustrated in
Those skilled the in art will recognize that it is possible to design a consumer interface 1000 that has a very different look and feel from the example consumer interface illustrated above in connection with
As illustrated in
Additionally, while the system 100 may be implemented to allow consumers to initiate and track different retail transaction utilizing individual retailer offers, gift cards, coupon, store savings, etc. As discussed above, the system 100 may also be implemented with a universal transaction identifier associated with each consumer account that is capable of communicating with the system 100 such that specific vender information may be accessible utilizing the universal transaction identifier. Such information, when accessed, may then be applied to a consumer transaction with the associated vendor, through the use of the universal transaction identifier. By way of example, in one implementation, the universals transaction identifier, when used by a consumer, enables the point of sale vendor/retailer to identify the consumer, which allows access to the program, discount and monetary resources available to the consumer, such as gift cards, loyalty programs, saving, etc., as reflected in the system 100, that relate to the transaction as a whole or the items purchased during that transaction.
The foregoing description of an implementation has been presented for purposes of illustration and description. It is not exhaustive and does not limit the claimed inventions to the precise form disclosed. Modifications and variations are possible in light of the above description or may be acquired from practicing the invention. For example, persons skilled in the art will understand and appreciate, that one or more processes, sub-processes, or process steps described in connection with
Claims
1. A system for providing logistics for an electronic gift card transaction, said system: receiving at a processor from a first consumer via an internet connection, a description of a gift card owned by said first consumer and the value desired by the first consumer for the gift card, wherein prior to providing the gift card description, the gift card has been enabled for purchases from at least one retailer of goods or services and wherein the first consumer is not said retailer;
- said system displaying to consumers via an internet connection, the gift card description and he value desired by the first consumer for the gift card;
- said system providing financial logistics and transfer logistics for completing the electronic gift card transaction; and
- transferring the gift card to a second consumer.
2. The system of claim 1 wherein the system transfers the gift card to the second consumer over a communications network.
3. The system of claim 1 wherein the system is configured to provide the first consumer the option to cancel the electronic gift card transaction prior to transferring the gift card to the second consumer.
4. The system of claim 1 wherein the system is configured to verify a balance associated with the gift card.
5. The system of claim 1 wherein the system is configured to make a determination that the gift card can be transferred electronically and based upon such determination, transferring the gift card electronically to the second consumer.
6. The system of claim 1 wherein said transfer logistics include transferring the gift card from a consumer account associated with the first consumer to a consumer account associated with the second consumer.
7. The system of claim 6 wherein the consumer account associated with the first consumer and the consumer account associated with the second consumer are maintained by the system.
8. The system of claim 1 wherein the system is configured to transmit data regarding one or more offers relating to the transaction.
9. The system of claim 1 wherein the system is configured to transmit data regarding the first consumer or second consumer to retailers.
10. The system of claim 1 wherein the system includes a user interface for interaction with consumers, including the first consumer and the second consumer, through an online web based program.
11. A computer-implemented method for providing logistics for a gift card transaction comprising an exchange between consumers comprising the steps of:
- receiving information at an enterprise infrastructure from a network terminal that a first consumer desires to exchange a gift card owned by said first consumer for a value;
- receiving from the first consumer, a description of a the gift card owned by said first consumer and the value desired by the first consumer for the gift card, wherein prior to receiving the information at an enterprise infrastructure the gift card has been enabled for purchases from at least one retailer of goods or services and wherein the first consumer is not the at least one retailer;
- displaying to consumers, information regarding the gift card, including the value desired by the first consumer for the gift card; and
- transferring the gift card to a second consumer.
12. The method of claim 11, further comprising providing the first consumer an option to cancel the transaction prior to transferring the gift card to the second consumer.
13. The method of claim 11, further comprising verifying a balance associated with the gift card.
14. The method of claim 11, further comprising making a determination that the gift card can be transferred electronically and based upon such determination, transferring the gift card electronically to the second consumer.
15. The method of claim 11, wherein the first gift card is canceled and a second gift card is issued and transferred to the second consumer.
16. The method of claim 13, wherein the value desired by the first consumer is less than the balance associated with the gift card.
17. The method of claim 11, wherein the gift card is electronically transmitted from a consumer account associated with the first consumer to a consumer account associated with the second consumer, wherein the consumer account associated with the first consumer and the consumer account associated with the second consumer are maintained by the enterprise infrastructure.
18. The method of claim 11, further transmitting data regarding one or more offers relating to the transaction.
19. The method of claim 11, further transmitting data regarding the transaction to at least one retailer.
20. The method of claim 11, wherein said displaying is through an online web based program.
Type: Application
Filed: Apr 15, 2014
Publication Date: Aug 14, 2014
Applicant: Blackhawk Network, Inc. (Pleasanton, CA)
Inventors: Mark E. Roberts (Santa Monica, CA), Jennifer K. Mathe (Irvine, CA), Khanh Nguyen (Lake Forest, CA)
Application Number: 14/253,364
International Classification: G06Q 30/02 (20060101); G06Q 30/06 (20060101);