System and method for estimating bags necessary for items purchased by a consumer

ABSTRACT

A system and method for estimating a number of bags used in a purchase is disclosed. A method can comprise receiving a transmission indicating an intention by a consumer to purchase an item. Information about the item is retrieved from a database. The information about the item is associated with the consumer in a transaction. The number of bags used for the transaction is estimated. The estimation can be created using the weight and volume of a transaction. The estimation can also take into consideration the fragility, crushability, temperature-sensitivity, or cross-contamination possibility of the item. The estimated number of bags is forwarded to a mobile device. The estimated number of bags is used to determine the likelihood of unpurchased items being taken by the consumer. Other embodiments are also disclosed herein.

TECHNICAL FIELD

This disclosure relates generally to retail businesses, and relates moreparticularly to security at retail businesses.

BACKGROUND

Typically, when a consumer desires to purchase an item at certain typesof retail businesses, the consumer chooses his items, then brings themto a cashier, who determines the amount owed by the consumer. In someinstances, the consumer may perform his own check-out duties. In a newmethod of checking out, a user can utilize handheld technology topurchase items. There is a desire to have security over the new methodsof checking out.

BRIEF DESCRIPTION OF THE DRAWINGS

To facilitate further description of the embodiments, the followingdrawings are provided in which:

FIG. 1 illustrates a front elevation view of a computer system that issuitable for implementing at least part of a central computer system;

FIG. 2 illustrates a representative block diagram of exemplary elementsincluded on the circuit boards inside a chassis of the computer systemof FIG. 1;

FIG. 3 illustrates a representative block diagram of a system, accordingto an embodiment;

FIG. 4 is a flowchart illustrating a method according to an embodiment;

FIG. 5 is a flowchart illustrating a method according to an embodiment;

FIG. 6 is a block diagram illustrating a system capable of performing amethod according to an embodiment.

For simplicity and clarity of illustration, the drawing figuresillustrate the general manner of construction, and descriptions anddetails of well-known features and techniques might be omitted to avoidunnecessarily obscuring the present disclosure. Additionally, elementsin the drawing figures are not necessarily drawn to scale. For example,the dimensions of some of the elements in the figures might beexaggerated relative to other elements to help improve understanding ofembodiments of the present disclosure. The same reference numerals indifferent figures denote the same elements.

The terms “first,” “second,” “third,” “fourth,” and the like in thedescription and in the claims, if any, are used for distinguishingbetween similar elements and not necessarily for describing a particularsequential or chronological order. It is to be understood that the termsso used are interchangeable under appropriate circumstances such thatthe embodiments described herein are, for example, capable of operationin sequences other than those illustrated or otherwise described herein.Furthermore, the terms “include,” and “have,” and any variationsthereof, are intended to cover a non-exclusive inclusion, such that aprocess, method, system, article, device, or apparatus that comprises alist of elements is not necessarily limited to those elements, but mightinclude other elements not expressly listed or inherent to such process,method, system, article, device, or apparatus.

The terms “left,” “right,” “front,” “back,” “top,” “bottom,” “over,”“under,” and the like in the description and in the claims, if any, areused for descriptive purposes and not necessarily for describingpermanent relative positions. It is to be understood that the terms soused are interchangeable under appropriate circumstances such that theembodiments of the apparatus, methods, and/or articles of manufacturedescribed herein are, for example, capable of operation in otherorientations than those illustrated or otherwise described herein.

The terms “couple,” “coupled,” “couples,” “coupling,” and the likeshould be broadly understood and refer to connecting two or moreelements mechanically and/or otherwise. Two or more electrical elementscan be electrically coupled together, but not be mechanically orotherwise coupled together. Coupling can be for any length of time,e.g., permanent or semi-permanent or only for an instant. “Electricalcoupling” and the like should be broadly understood and includeelectrical coupling of all types. The absence of the word “removably,”“removable,” and the like near the word “coupled,” and the like does notmean that the coupling, etc. in question is or is not removable.

As defined herein, two or more elements are “integral” if they arecomprised of the same piece of material. As defined herein, two or moreelements are “non-integral” if each is comprised of a different piece ofmaterial.

As defined herein, “approximately” can, in some embodiments, mean withinplus or minus ten percent of the stated value. In other embodiments,“approximately” can mean within plus or minus five percent of the statedvalue. In further embodiments, “approximately” can mean within plus orminus three percent of the stated value. In yet other embodiments,“approximately” can mean within plus or minus one percent of the statedvalue.

DESCRIPTION OF EXAMPLES OF EMBODIMENTS

Some embodiments include a method. The method can comprise: receiving atransmission indicating an intention by a consumer to purchase an item;retrieving information about the item from a database; associating theinformation about the item and the consumer in a transaction; estimatinga number of bags used for the transaction; and forwarding the estimatednumber of bags to a mobile device to determine the likelihood ofunpurchased items taken by the consumer.

Some embodiments include a system. The system can comprise: a user inputdevice; a display device; one or more processing modules; and one ormore non-transitory storage modules storing computing instructionsconfigured to run on the one or more processing modules and perform theacts of: receiving a transmission indicating an intention by a consumerto purchase an item; retrieving information about the item from adatabase; associating the information about the item and the consumer ina transaction; estimating a number of bags used for the transaction; andforwarding the estimated number of bags to a mobile device.

Further embodiments include at least one non-transitory memory storagemodule having computer instructions stored thereon executable by one ormore processing modules to: receive a transmission indicating anintention by a consumer to purchase an item; retrieve information aboutthe item from a database; associate the information about the item andthe consumer in a transaction; estimate a number of bags used for thetransaction; and forward the estimated number of bags to a mobiledevice, to determine the likelihood of unpurchased items being taken bythe consumer.

Turning to the drawings, FIG. 1 illustrates an exemplary embodiment of acomputer system 100, all of which or a portion of which can be suitablefor (i) implementing part or all of one or more embodiments of thetechniques, methods, and systems and/or (ii) implementing and/oroperating part or all of one or more embodiments of the memory storagemodules described herein. As an example, a different or separate one ofa chassis 102 (and its internal components) can be suitable forimplementing part or all of one or more embodiments of the techniques,methods, and/or systems described herein. Furthermore, one or moreelements of computer system 100 (e.g., a monitor 106, a keyboard 104,and/or a mouse 110, etc.) can also be appropriate for implementing partor all of one or more embodiments of the techniques, methods, and/orsystems described herein. Computer system 100 can comprise chassis 102containing one or more circuit boards (not shown), a Universal SerialBus (USB) port 112, a Compact Disc Read-Only Memory (CD-ROM) and/orDigital Video Disc (DVD) drive 116, and a hard drive 114. Arepresentative block diagram of the elements included on the circuitboards inside chassis 102 is shown in FIG. 2. A central processing unit(CPU) 210 in FIG. 2 is coupled to a system bus 214 in FIG. 2. In variousembodiments, the architecture of CPU 210 can be compliant with any of avariety of commercially distributed architecture families.

Continuing with FIG. 2, system bus 214 also is coupled to a memorystorage unit 208, where memory storage unit 208 can comprise (i)volatile (e.g., transitory) memory, such as, for example, read onlymemory (ROM) and/or (ii) non-volatile (e.g., non-transitory) memory,such as, for example, random access memory (RAM). The non-volatilememory can be removable and/or non-removable non-volatile memory.Meanwhile, RAM can include dynamic RAM (DRAM), static RAM (SRAM), etc.Further, ROM can include mask-programmed ROM, programmable ROM (PROM),one-time programmable ROM (OTP), erasable programmable read-only memory(EPROM), electrically erasable programmable ROM (EEPROM) (e.g.,electrically alterable ROM (EAROM) and/or flash memory), etc. The memorystorage module(s) of the various embodiments disclosed herein cancomprise memory storage unit 208, an external memory storage drive (notshown), such as, for example, a USB-equipped electronic memory storagedrive coupled to universal serial bus (USB) port 112 (FIGS. 1-2), harddrive 114 (FIGS. 1-2), CD-ROM and/or DVD drive 116 (FIGS. 1-2), a floppydisk drive (not shown), an optical disc (not shown), a magneto-opticaldisc (now shown), magnetic tape (not shown), etc. Further, non-volatileor non-transitory memory storage module(s) refer to the portions of thememory storage module(s) that are non-volatile (e.g., non-transitory)memory.

In various examples, portions of the memory storage module(s) of thevarious embodiments disclosed herein (e.g., portions of the non-volatilememory storage module(s)) can be encoded with a boot code sequencesuitable for restoring computer system 100 (FIG. 1) to a functionalstate after a system reset. In addition, portions of the memory storagemodule(s) of the various embodiments disclosed herein (e.g., portions ofthe non-volatile memory storage module(s)) can comprise microcode suchas a Basic Input-Output System (BIOS) operable with computer system 100(FIG. 1). In the same or different examples, portions of the memorystorage module(s) of the various embodiments disclosed herein (e.g.,portions of the non-volatile memory storage module(s)) can comprise anoperating system, which can be a software program that manages thehardware and software resources of a computer and/or a computer network.The BIOS can initialize and test components of computer system 100(FIG. 1) and load the operating system. Meanwhile, the operating systemcan perform basic tasks such as, for example, controlling and allocatingmemory, prioritizing the processing of instructions, controlling inputand output devices, facilitating networking, and managing files.Exemplary operating systems can comprise one of the following: (i)Microsoft® Windows® operating system (OS) by Microsoft Corp. of Redmond,Wash., United States of America, (ii) Mac® OS X by Apple Inc. ofCupertino, Calif., United States of America, (iii) UNIX® OS, and (iv)Linux® OS. Further exemplary operating systems can comprise one of thefollowing: (i) the iOS® operating system by Apple Inc. of Cupertino,Calif., United States of America, (ii) the Blackberry® operating systemby Research In Motion (RIM) of Waterloo, Ontario, Canada, (iii) theWebOS operating system by LG Electronics of Seoul, South Korea, (iv) theAndroid™ operating system developed by Google, of Mountain View, Calif.,United States of America, (v) the Windows Mobile™ operating system byMicrosoft Corp. of Redmond, Wash., United States of America, or (vi) theSymbian™ operating system by Accenture PLC of Dublin, Ireland.

As used herein, “processor” and/or “processing module” means any type ofcomputational circuit, such as but not limited to a microprocessor, amicrocontroller, a controller, a complex instruction set computing(CISC) microprocessor, a reduced instruction set computing (RISC)microprocessor, a very long instruction word (VLIW) microprocessor, agraphics processor, a digital signal processor, or any other type ofprocessor or processing circuit capable of performing the desiredfunctions. In some examples, the one or more processing modules of thevarious embodiments disclosed herein can comprise CPU 210.

In the depicted embodiment of FIG. 2, various I/O devices such as a diskcontroller 204, a graphics adapter 224, a video controller 202, akeyboard adapter 226, a mouse adapter 206, a network adapter 220, andother I/O devices 222 can be coupled to system bus 214. Keyboard adapter226 and mouse adapter 206 are coupled to keyboard 104 (FIGS. 1-2) andmouse 110 (FIGS. 1-2), respectively, of computer system 100 (FIG. 1).While graphics adapter 224 and video controller 202 are indicated asdistinct units in FIG. 2, video controller 202 can be integrated intographics adapter 224, or vice versa in other embodiments. Videocontroller 202 is suitable for monitor 106 (FIGS. 1-2) to display imageson a screen 108 (FIG. 1) of computer system 100 (FIG. 1). Diskcontroller 204 can control hard drive 114 (FIGS. 1-2), USB port 112(FIGS. 1-2), and CD-ROM drive 116 (FIGS. 1-2). In other embodiments,distinct units can be used to control each of these devices separately.

Network adapter 220 can be suitable to connect computer system 100(FIG. 1) to a computer network by wired communication (e.g., a wirednetwork adapter) and/or wireless communication (e.g., a wireless networkadapter). In some embodiments, network adapter 220 can be plugged orcoupled to an expansion port (not shown) in computer system 100 (FIG.1). In other embodiments, network adapter 220 can be built into computersystem 100 (FIG. 1). For example, network adapter 220 can be built intocomputer system 100 (FIG. 1) by being integrated into the motherboardchipset (not shown), or implemented via one or more dedicatedcommunication chips (not shown), connected through a PCI (peripheralcomponent interconnector) or a PCI express bus of computer system 100(FIG. 1) or USB port 112 (FIG. 1).

Returning now to FIG. 1, although many other components of computersystem 100 are not shown, such components and their interconnection arewell known to those of ordinary skill in the art. Accordingly, furtherdetails concerning the construction and composition of computer system100 and the circuit boards inside chassis 102 are not discussed herein.

Meanwhile, when computer system 100 is running, program instructions(e.g., computer instructions) stored on one or more of the memorystorage module(s) of the various embodiments disclosed herein can beexecuted by CPU 210 (FIG. 2). At least a portion of the programinstructions, stored on these devices, can be suitable for carrying outat least part of the techniques and methods described herein.

Further, although computer system 100 is illustrated as a desktopcomputer in FIG. 1, there can be examples where computer system 100 maytake a different form factor while still having functional elementssimilar to those described for computer system 100. In some embodiments,computer system 100 may comprise a single computer, a single server, ora cluster or collection of computers or servers, or a cloud of computersor servers. Typically, a cluster or collection of servers can be usedwhen the demand on computer system 100 exceeds the reasonable capabilityof a single server or computer. In certain embodiments, computer system100 may comprise a portable computer, such as a laptop computer. Incertain other embodiments, computer system 100 may comprise a mobiledevice, such as a smartphone. In certain additional embodiments,computer system 100 may comprise an embedded system.

Skipping ahead now in the drawings, FIG. 3 illustrates a representativeblock diagram of a system 300, according to an embodiment. System 300 ismerely exemplary and embodiments of the system are not limited to theembodiments presented herein. System 300 can be employed in manydifferent embodiments or examples not specifically depicted or describedherein. In some embodiments, certain elements or modules of system 300can perform various methods and/or activities of those methods. In theseor other embodiments, the methods and/or the activities of the methodscan be performed by other suitable elements or modules of system 300.

As further described in greater detail below, in these or otherembodiments, system 300 can proactively (e.g., prospectively) and/orreactively (e.g., responsively) determine and/or communicate theconsumer product information to the consumer, as desired. Proactive actscan refer to acts (e.g., identification, determination, communication,etc.) performed without consideration of one or more acts performed bythe consumer, and reactive acts can refer to acts (e.g., identification,determination, communication, etc.) performed with consideration of(i.e., in response to) one or more acts performed by the consumer. Forexample, in some embodiments, the act(s) can comprise an act ofidentifying a selection of a consumer product by the consumer.

Meanwhile, as also described in greater detail below, system 300 can beimplemented in brick-and-mortar commerce and/or electronic commerceapplications, as desirable. Further, in many of these or otherembodiments, system 300 can communicate the consumer product informationto the consumer substantially in real-time (e.g., near real-time). Nearreal-time can mean real-time less a time delay for processing (e.g.,determining) and/or transmitting the relevant consumer productinformation to the relevant consumer. The particular time delay can varydepending on the type and/or amount of the consumer product information,the processing speed(s) of the processing module(s) of system 300, thetransmission capability of the communication hardware (as introducedbelow), the transmission distance, etc. However, in many embodiments,the time delay can be less than approximately one, five, ten, or twentyminutes.

Generally, therefore, system 300 can be implemented with hardware and/orsoftware, as described herein. In some embodiments, part or all of thehardware and/or software can be conventional, while in these or otherembodiments, part or all of the hardware and/or software can becustomized (e.g., optimized) for implementing part or all of thefunctionality of system 300 described herein.

Specifically, system 300 comprises a central computer system 301. Inmany embodiments, central computer system 301 can be similar oridentical to computer system 100 (FIG. 1). Accordingly, central computersystem 301 can comprise one or more processing modules and one or morememory storage modules (e.g., one or more non-transitory memory storagemodules). In these or other embodiments, the processing module(s) and/orthe memory storage module(s) can be similar or identical to theprocessing module(s) and/or memory storage module(s) (e.g.,non-transitory memory storage modules) described above with respect tocomputer system 100 (FIG. 1). In some embodiments, central computersystem 301 can comprise a single computer or server, but in manyembodiments, central computer system 301 comprises a cluster orcollection of computers or servers and/or a cloud of computers orservers. Meanwhile, central computer system 301 can comprise one or moreinput devices (e.g., one or more keyboards, one or more keypads, one ormore pointing devices such as a computer mouse or computer mice, one ormore touchscreen displays, etc.), and/or can comprise one or moredisplay devices (e.g., one or more monitors, one or more touch screendisplays, etc.). In these or other embodiments, one or more of the inputdevice(s) can be similar or identical to keyboard 104 (FIG. 1) and/or amouse 110 (FIG. 1). Further, one or more of the display device(s) can besimilar or identical to monitor 106 (FIG. 1) and/or screen 108 (FIG. 1).The input device(s) and the display device(s) can be coupled to theprocessing module(s) and/or the memory storage module(s) of centralcomputer system 301 in a wired manner and/or a wireless manner, and thecoupling can be direct and/or indirect, as well as locally and/orremotely. As an example of an indirect manner (which may or may not alsobe a remote manner), a keyboard-video-mouse (KVM) switch can be used tocouple the input device(s) and the display device(s) to the processingmodule(s) and/or the memory storage module(s). In some embodiments, theKVM switch also can be part of central computer system 301. In a similarmanner, the processing module(s) and the memory storage module(s) can belocal and/or remote to each other.

In many embodiments, central computer system 301 is configured tocommunicate with one or more consumer computer systems 302 (e.g., aconsumer computer system 303) of one or more consumers. For example, theconsumer(s) can interface (e.g., interact) with central computer system301, and vice versa, via consumer computer system(s) 302 (e.g., consumercomputer system 303). Accordingly, in many embodiments, central computersystem 301 can refer to a back end of system 300 operated by an operatorand/or administrator of system 300, and consumer computer system(s) 302can refer to a front end of system 300 used by one or more users ofsystem 300 (i.e., the consumer(s)). In these or other embodiments, theoperator and/or administrator of system 300 can manage central computersystem 301, the processing module(s) of computer system 301, and/or thememory storage module(s) of computer system 301 using the inputdevice(s) and/or display device(s) of central computer system 301. Insome embodiments, system 300 can comprise consumer computer system(s)302 (e.g., consumer computer system 303).

Like central computer system 301, consumer computer system(s) 302 eachcan be similar or identical to computer system 100 (FIG. 1), and in manyembodiments, each of consumer computer system(s) 302 can be similar oridentical to each other. In many embodiments, consumer computersystem(s) 302 can comprise one or more desktop computer devices, one ormore wearable user computer devices, and/or one or more mobile devices,etc. At least part of central computer system 301 can be locatedremotely from consumer computer system(s) 302.

In some embodiments, a mobile device can refer to a portable electronicdevice (e.g., an electronic device easily conveyable by hand by a personof average size) with the capability to present audio and/or visual data(e.g., images, videos, music, etc.). For example, a mobile device cancomprise at least one of a digital media player, a cellular telephone(e.g., a smartphone), a personal digital assistant, a handheld digitalcomputer device (e.g., a tablet personal computer device), a laptopcomputer device (e.g., a notebook computer device, a netbook computerdevice), a wearable user computer device, or another portable computerdevice with the capability to present audio and/or visual data (e.g.,images, videos, music, etc.). Thus, in many examples, a mobile devicecan comprise a volume and/or weight sufficiently small as to permit themobile device to be easily conveyable by hand. For examples, in someembodiments, a mobile device can occupy a volume of less than or equalto approximately 1790 cubic centimeters, 2434 cubic centimeters, 2876cubic centimeters, 4056 cubic centimeters, and/or 5752 cubiccentimeters. Further, in these embodiments, a mobile device can weighless than or equal to 15.6 Newtons, 17.8 Newtons, 22.3 Newtons, 31.2Newtons, and/or 44.5 Newtons.

Exemplary mobile devices can comprise (i) an iPod®, iPhone®, iTouch®,iPad®, MacBook® or similar product by Apple Inc. of Cupertino, Calif.,United States of America, (ii) a Blackberry® or similar product byResearch in Motion (RIM) of Waterloo, Ontario, Canada, (iii) a Lumia® orsimilar product by the Nokia Corporation of Keilaniemi, Espoo, Finland,and/or (iv) a Galaxy™ or similar product by the Samsung Group of SamsungTown, Seoul, South Korea. Further, in the same or different embodiments,a mobile device can comprise an electronic device configured toimplement one or more of (i) the iPhone® operating system by Apple Inc.of Cupertino, Calif., United States of America, (ii) the Blackberry®operating system by Research In Motion (RIM) of Waterloo, Ontario,Canada, (iii) the Palm® operating system by Palm, Inc. of Sunnyvale,Calif., United States, (iv) the Android™ operating system developed bythe Open Handset Alliance, (v) the Windows Mobile™ operating system byMicrosoft Corp. of Redmond, Wash., United States of America, or (vi) theSymbian™ operating system by Nokia Corp. of Keilaniemi, Espoo, Finland.

Further still, the term “wearable user computer device” as used hereincan refer to an electronic device with the capability to present audioand/or visual data (e.g., images, videos, music, etc.) that isconfigured to be worn by a user and/or mountable (e.g., fixed) on theuser of the wearable user computer device (e.g., sometimes under or overclothing; and/or sometimes integrated with and/or as clothing and/oranother accessory, such as, for example, a hat, eyeglasses, a wristwatch, shoes, etc.). In many examples, a wearable user computer devicecan comprise a mobile device, and vice versa. However, a wearable usercomputer device does not necessarily comprise a mobile device, and viceversa.

In specific examples, a wearable user computer device can comprise ahead mountable wearable user computer device (e.g., one or more headmountable displays, one or more eyeglasses, one or more contact lenses,one or more retinal displays, etc.) or a limb mountable wearable usercomputer device (e.g., a smart watch). In these examples, a headmountable wearable user computer device can be mountable in closeproximity to one or both eyes of a user of the head mountable wearableuser computer device and/or vectored in alignment with a field of viewof the user.

In more specific examples, a head mountable wearable user computerdevice can comprise (i) Google Glass™ or a similar product by GoogleInc. of Menlo Park, Calif., United States of America; (ii) the Eye Tap™,the Laser Eye Tap™, or a similar product by ePI Lab of Toronto, Ontario,Canada, and/or (iii) the Raptyr™, the STAR 1200™, the Vuzix SmartGlasses M100™, or a similar product by Vuzix Corporation of Rochester,N.Y., United States of America. In other specific examples, a headmountable wearable user computer device can comprise the Virtual RetinalDisplay™, or similar product by the University of Washington of Seattle,Wash., United States of America. Meanwhile, in further specificexamples, a limb mountable wearable user computer device can comprisethe iWatch™, or similar product by Apple Inc. of Cupertino, Calif.,United States of America, the Galaxy Gear or similar product of SamsungGroup of Samsung Town, Seoul, South Korea, the Moto 360 or similarproduct of Motorola of Schaumburg, Ill., United States of America,and/or the Zip™, One™, Flex™, Charge™, Surge™, or similar product byFitbit Inc. of San Francisco, Calif., United States of America.

In further embodiments, central computer system 301 can be configured tocommunicate with software (e.g., one or more web browsers, one or moremobile software applications, etc.) of the consumer computer system(s)302 (e.g., consumer computer system 303). For example, the software canrun on one or more processing modules and can be stored on one or morememory storage modules (e.g., one or more non-transitory memory storagemodules) of the consumer computer system(s) 302 (e.g., consumer computersystem 303). In these or other embodiments, the processing module(s) ofthe consumer computer system(s) 302 (e.g., consumer computer system 303)can be similar or identical to the processing module(s) described abovewith respect to computer system 100 (FIG. 1). Further, the memorystorage module(s) (e.g., non-transitory memory storage modules) of theconsumer computer system(s) 302 (e.g., consumer computer system 303) canbe similar or identical to the memory storage module(s) (e.g.,non-transitory memory storage module(s)) described above with respect tocomputer system 100 (FIG. 1). Exemplary web browsers can include (i)Firefox® by the Mozilla Organization of Mountain View, Calif., UnitedStates of America, (ii) Internet Explorer® by the Microsoft Corp. ofRedmond, Wash., United States of America, (iii) Chrome™ by Google Inc.of Menlo Park, Calif., United States of America, (iv) Opera® by OperaSoftware of Oslo, Norway, and (v) Safari® by Apple Inc. of Cupertino,Calif., United States of America.

Meanwhile, in many embodiments, central computer system 301 also can beconfigured to communicate with one or more databases 312. The databasecan comprise a product database that contains information about productssold by a retailer. Database(s) 312 can be stored on one or more memorystorage modules (e.g., non-transitory memory storage module(s)), whichcan be similar or identical to the one or more memory storage module(s)(e.g., non-transitory memory storage module(s)) described above withrespect to computer system 100 (FIG. 1). Also, in some embodiments, forany particular database of database(s) 312, that particular database canbe stored on a single memory storage module of the memory storagemodule(s) and/or the non-transitory memory storage module(s) storingdatabase(s) 312 or it can be spread across multiple of the memorystorage module(s) and/or non-transitory memory storage module(s) storingdatabase(s) 312, depending on the size of the particular database and/orthe storage capacity of the memory storage module(s) and/ornon-transitory memory storage module(s).

In these or other embodiments, the memory storage module(s) of centralcomputer system 300 can comprise some or all of the memory storagemodule(s) storing database(s) 312. In further embodiments, some of thememory storage module(s) storing database(s) 312 can be part of consumercomputer systems 302 and/or one or more third-party computer systems(i.e., other than central computer system 301 and consumer computersystems 302), and in still further embodiments, all of the memorystorage module(s) storing database(s) 312 can be part of consumercomputer systems 302 and/or the third-party computer system(s). Likecentral computer system 301 and consumer computer system(s) 302, whenapplicable, each of the third-party computer system(s) can be similar oridentical to computer system 100 (FIG. 1). Notably, the third-partycomputer systems are omitted from the drawings to better illustrate thatdatabase(s) 312 can be stored at memory storage module(s) of centralcomputer system 301, consumer computer system(s) 302, and/or thethird-party computer systems, depending on the manner in which system300 is implemented.

Database(s) 312 each can comprise a structured (e.g., indexed)collection of data and can be managed by any suitable databasemanagement systems configured to define, create, query, organize,update, and manage database(s). Exemplary database management systemscan include MySQL (Structured Query Language) Database, PostgreSQLDatabase, Microsoft SQL Server Database, Oracle Database, SAP (Systems,Applications, & Products) Database, and IBM DB2 Database.

Meanwhile, communication between central computer system 301, consumercomputer system(s) 302 (e.g., consumer computer system 303), and/ordatabase(s) 312 can be implemented using any suitable manner of wiredand/or wireless communication. Accordingly, system 300 can comprise anysoftware and/or hardware components configured to implement the wiredand/or wireless communication. Further, the wired and/or wirelesscommunication can be implemented using any one or any combination ofwired and/or wireless communication network topologies (e.g., ring,line, tree, bus, mesh, star, daisy chain, hybrid, etc.) and/or protocols(e.g., personal area network (PAN) protocol(s), local area network (LAN)protocol(s), wide area network (WAN) protocol(s), cellular networkprotocol(s), powerline network protocol(s), etc.). Exemplary PANprotocol(s) can comprise Bluetooth, Zigbee, Wireless Universal SerialBus (USB), Z-Wave, etc.; exemplary LAN and/or WAN protocol(s) cancomprise Institute of Electrical and Electronic Engineers (IEEE) 802.3(also known as Ethernet), IEEE 802.11 (also known as WiFi), etc.; andexemplary wireless cellular network protocol(s) can comprise GlobalSystem for Mobile Communications (GSM), General Packet Radio Service(GPRS), Code Division Multiple Access (CDMA), Evolution-Data Optimized(EV-DO), Enhanced Data Rates for GSM Evolution (EDGE), Universal MobileTelecommunications System (UMTS), Digital Enhanced CordlessTelecommunications (DECT), Digital AMPS (IS-136/Time Division MultipleAccess (TDMA)), Integrated Digital Enhanced Network (iDEN), EvolvedHigh-Speed Packet Access (HSPA+), Long-Term Evolution (LTE), WiMAX, etc.The specific communication software and/or hardware implemented candepend on the network topologies and/or protocols implemented, and viceversa. In many embodiments, exemplary communication hardware cancomprise wired communication hardware including, for example, one ormore data buses, such as, for example, universal serial bus(es), one ormore networking cables, such as, for example, coaxial cable(s), opticalfiber cable(s), and/or twisted pair cable(s), any other suitable datacable, etc. Further exemplary communication hardware can comprisewireless communication hardware including, for example, one or moreradio transceivers, one or more infrared transceivers, etc. Additionalexemplary communication hardware can comprise one or more networkingcomponents (e.g., modulator-demodulator components, gateway components,etc.)

For convenience, the functionality of system 300 is described herein asit relates particularly to consumer computer system 303 and a singleconsumer, but in many embodiments, the functionality of system 300 canbe extended to each of consumer computer system(s) 302 and/or tomultiple consumers. In these extended examples, in some embodiments,single consumers can interface (e.g., interact) with central computersystem 301 with multiple consumer computer systems of consumer computersystem(s) 302 (e.g., at different times). For example, a consumer couldinterface with central computer system 301 via a first consumer computersystem (e.g., a desktop computer), such as, for example, wheninterfacing with central computer system 301 from home, and via a secondconsumer computer system (e.g., a mobile device), such as, for example,when interfacing with central computer system 301 away from home.

In many types of retail businesses, the retail business uses a checkoutmodel for purchases. A consumer chooses one or more items that he/shewishes to purchase. The consumer then presents the one or more items toan employee of the retail business. The employee proceeds to determinethe total cost of the items, receives payment from the consumer, thenprovides the items to the consumer.

There are various alternative arrangements for allowing a consumer topurchase items from a brick and mortar retail business. For example,there is the “self-checkout” model. In the self-checkout model, after aconsumer selects the goods he wishes to purchase, the consumer scansitems for purchases. Generally, there are one or more self-checkoutstands in one area of the brick and mortar retail business. Thus, oneemployee can monitor the check-out of multiple consumers at the sametime, instead of needing one employee for each line of consumers.

A novel method of allowing consumers to shop is a technology that someretailers call scan and go. Briefly, in a scan and go methodology, aconsumer uses a mobile device to indicate his purchases as he travelsthrough a retailer. When he wants to leave the retailer, he performs acheckout. To more thoroughly describe this process, refer to FIG. 4.

A flowchart illustrating the operation of a scan and go methodology 400is presented in FIG. 4. Method 400 is merely exemplary and is notlimited to the embodiments presented herein. Method 400 can be employedin many different embodiments or examples not specifically depicted ordescribed herein. In some embodiments, the procedures, the processesand/or the activities of method 400 can be performed in the orderpresented. In other embodiments, the procedures, the processes, and/orthe activities of method 400 can be performed in any other suitableorder. In still other embodiments, one or more of the procedures, theprocesses, and/or the activities of method 400 can be combined orskipped. In some embodiments, portions of method 400 can be implementedby computer system 100 (FIG. 1).

A consumer installs an app on a mobile device (block 402). Referringback to FIG. 3, the mobile device can be one of consumer computersystem(s) 302. As described above, a variety of different mobile devicescan be used. A smartphone would be the most common type of portableelectronic device that would be used in such a scenario. Other mobiledevices such as phablets, tablets, portable music players,special-purpose scanning devices, wearable electronic devices, and otherelectronic devices that have internet connectivity also can be used. Insome embodiments, instead of a consumer installing an app on his mobiledevice, a consumer can use a special-purpose electronic device. In someembodiments, such a special-purpose electronic device can be provided bythe retailer.

Returning to FIG. 4, the consumer then travels through a retailer'sstore to find items he wishes to purchase. When he finds an item hewishes to purchase, he uses the mobile device to indicate the desire topurchase the item (block 404). This indication can be accomplished inone of a variety of different manners.

For example, as described above, there can be an application (also knownas an “app”) in a mobile device that can provide a consumer with theability to scan items to be purchased. The app would use a camera of themobile device to scan or to take a photograph of the universal productcode (UPC), international standard book number (ISBN), or other uniqueidentifier of the product that the consumer wishes to purchase. Withreference to FIG. 3, the mobile device (e.g., consumer computer system303) can be in communication with central computer system 301. Centralcomputer system 301 is in communication with one or more databases 312.Among databases 312, there can be a product database containinginformation about each product sold by the retailer.

Returning to FIG. 4, the app then searches a database (such as a productdatabase) to find the product and displays information about the producton the mobile device (block 406). The user can be provided with anopportunity to confirm the purchase. In some embodiments, the app canalso provide suggestions to the consumer (block 408). For example, theapp can inform the consumer that a different size of the product is onsale. The app can suggest products that are often purchased with thechosen product (e.g., suggesting fabric softener when a consumer choosesa laundry detergent). Many other features also can be present.

After the consumer finishes shopping, the consumer approaches a checkoutarea of the retailer. However, because the consumer already scanned eachof the items he wishes to purchase using the mobile device, in someembodiments, he does not need to scan the items again. Instead, in suchembodiments, the consumer needs only to pay for the items. The consumerbegins the checkout process (block 410). This can involve using themobile device to enter payment information. In some embodiments, theconsumer has the capability to provide and store payment informationinto the mobile device. For example, the consumer can store credit cardinformation (such as an account number, an expiration date, and a cardsecurity code) in the mobile device. In that type of situation, theconsumer can indicate his desire to apply the previously entered paymentinformation to the purchase. The consumer also can pay for the selectedgoods using cash or a check through a terminal at the retailer. Theconsumer will typically place the purchase products in plastic bags,paper bags, reusable bags, boxes, and the like for ease in transportingthe goods.

In some uses, a consumer would be able to select goods and pay for thegoods without any interaction with employees of the retailer. While sucha feature can make the shopping experience faster for the consumer,there can be an increased risk of shoplifting and other types of theft,both intentional and inadvertent. Because no employee looked at theconsumer's shopping cart or at their payment transaction, it is possiblethat a consumer could fill a shopping cart with goods, pay for only aportion of the goods, then walk out of the retailer's store with goodsthat were not paid for.

One method of reducing such a risk is to place an employee at an exit ofthe retailer. The employee would be tasked with comparing the receipt ofthe consumer with the purchases. Several retail businesses use such amodel. However, in general, such a practice is limited to warehouseclubs such as Sam's Club, Costco, and BJs Wholesale Club. The number ofconsumers in a retail store might make it too time consuming toinvestigate the purchases of all the consumers. Finally, in someembodiments, not all of the consumers use such a scan and go system.There will be a significant percentage of consumers who make purchasesin a traditional manner, where one or more employees have already lookedat the consumer's purchases. It would be desirable to have a method thatreduces and discourages shoplifting and is relatively unobtrusive toconsumers.

A flowchart illustrating the operation of a theft deterrence methodology500 is presented in FIG. 5. Method 500 is merely exemplary and is notlimited to the embodiments presented herein. Method 500 can be employedin many different embodiments or examples not specifically depicted ordescribed herein. In some embodiments, the procedures, the processesand/or the activities of method 500 can be performed in the orderpresented. In other embodiments, the procedures, the processes, and/orthe activities of method 500 can be performed in any other suitableorder. In still other embodiments, one or more of the procedures, theprocesses, and/or the activities of method 500 can be combined orskipped. In some embodiments, portions of method 500 can be implementedby computer system 100 (FIG. 1).

As above, an app produces a transmission from a consumer indicating adesire to purchase an item. Information regarding the item istransmitted to a central computer system (block 504). The transmissioncan be from a mobile device that is configured to transmit informationbased on scanning a unique identifier (such as a UPC or ISBN) of theitem. The information being transmitted to the central computer systemcan comprise the unique identifier.

Information about the item is retrieved from a database that is accessedby the central computer system (block 506). The database can be one ormore of database(s) 312 from FIG. 3. Thereafter, information about theitem is associated with a transaction, along with information about theconsumer (block 508). When the consumer begins a checkout process, theinformation about all items in the transaction are retrieved such thatthe consumer can initiate a payment process (block 510). The informationabout the items in the transaction can include a variety of differenttypes of information. For payment purposes, the price of the item willbe included in the information. Also included in the information can bea variety of aspects of the product(s) that can be used to produce anestimate of the number of bags used by a consumer.

The information about the items in the present purchase used to producean estimate of the number of bags can include volume information, weightinformation, size of the packaging of the item, and likelihood of theproduct being placed with other products.

Volume and weight can be used to determine the likelihood of an itembeing placed in a bag with other items. In a simple formulation, thetotal volume of the goods in the transaction can be calculated and thetotal weight of the goods in the transaction can be calculated and thetotal volume and the total weight of the goods can be divided by thevolume and weight capacity of the bags. Volume can mean the physicalsize occupied by the packaging of the item. Volume also can mean theamount of liquid being in a unit of an item. Some items can be large inboth volume and weight. For example, a large bottle of laundry detergentor a large bag of pet food can be too large to be placed in a bag withother goods and, in some cases, can be too big to be placed in a bag.

This total can be adjusted based on the types of goods in thetransaction. As discussed above, some items can be too large to beplaced in bags, so the estimate of the number of bags used can beadjusted to reflect that fact. In many types of retail stores, there canbe certain types of goods that will likely be placed in a bag withoutother goods. Examples can include fragile items (e.g., eggs, items withglass, or a bag of potato chips), crushable items (e.g., a loaf of breadcan be crushed if something heavy is placed on top of it),temperature-sensitive items (e.g., one might not wish to place frozenfood items with hot items, such as already prepared food items, toprevent the temperatures of the items from changing drastically), itemscapable of cross-contamination, (e.g., raw meat items might not beexpected to be placed in a bag with other goods.) The estimate of thetotal number of bags used can be increased if such items are in thetransaction.

Information about bagging products used by the retailer also can bestored in one of the databases 312 (FIG. 3) and used to create anestimate for the number of bags. For example, the capacity of the bag,both in volume and in weight—if a retailer's bag can hold 10 pounds, anembodiment can assume that any product more than 10 pounds will not bebagged. If a retailer has more than one type of bag, for example, bothplastic and paper bags, an embodiment, can provide an estimate in eachof the types of bag. Thus, an embodiment might estimate that eightplastic bags would be needed for a particular purchase, but only fivepaper bags would be needed. A retailer might have more than two types ofbags available and such bags would also be taken into account. Exemplaryother types of bags include small bags for small items (e.g., jewelry)and special purpose bags intended to designate specific items (e.g.,prescription bags and produce bags).

Using the volume, weight, and likelihood information, an estimate of thenumber of bags used by the consumer for this transaction is generated(block 512). This estimate can be forwarded to an employee stationed atan exit of the retailer (such as a greeter, auditor, or securitypersonnel) (block 514).

The employee can have a mobile device. The employee's mobile device canbe in communication with central computer system 301 (FIG. 3). Thecommunication can be in one of a variety of different methods. Exemplarymethods can include any type of wired or wireless technology describedabove (including, but not limited to Ethernet, WiFi, and cellularnetwork protocols).

The employee can then compare the estimate of the number of bags used bythe consumer to the number of bags actually used by the consumer todetermine whether or not the employee should conduct a more thoroughexamination of the consumer's purchases.

The operation of an embodiment can be explained further through the useof an exemplary consumer. An exemplary consumer can select the followingitems for purchase: a loaf of bread, a carton of eggs, a box of laundrydetergent, three bottles of spices, four shirts, six pairs of socks, aswimsuit, and a bag of potato chips. As the consumer travels through theretailer and scans in each of the above items, the characteristics ofeach item are also stored. When the consumer initiates the checkoutprocess, the consumer will input or authorize payment information andplace the items in a bag. An embodiment will generate an estimate of thenumber of bags used by the consumer. An embodiment might estimate thatthe bread, eggs, potato chips, and laundry detergent will each be inseparate bags. The bread might be in a separate bag so it does not getcrushed by other items. The eggs might be in a separate bag to avoidbeing broken. The potato chips might be in a separate bag to avoidbreaking the chips by crushing. The laundry detergent might be too large(either in volume or weight) to be placed with other items. Theembodiment might further estimate that, due to the size and weight ofthe spices, shirts, socks, and swimsuit, they can all be placed in asingle bag. Therefore, the embodiment will generate an estimate of fivebags used by the consumer. This estimate will be forwarded to anemployee at an entrance/exit to the retailer. When the consumer attemptsto exit the store, the employee at the entrance/exit of the retailerwill compare the number of bags in the consumer's shopping cart to theestimate. If the consumer has, for example, seven bags, the employee canbe prompted to initiate a more thorough examination of the consumer'spurchases, to ensure that the consumer accounted for all of his items inthe checkout process. But if the consumer has four bags, the employeecan be prompted to take no further action with that particular consumer,because the consumer has an appropriate number of bags for the items hepurchased. There can be some flexibility in the estimate of the numberof bags because some consumers are less efficient at bagging their itemsand others are more efficient. In addition, the grouping of items in abag might be a judgment call (for example, some consumers might preferthe potato chips to be in the same bag as the loaf of bread while otherconsumers might prefer that those items be placed in separate bags.

Using an employee (such as a greeter, auditor, or other securitypersonnel) at the exit to examine purchases can serve a variety ofdifferent purposes. First, the mere presence of an employee at an exitof a brick and mortar retail store can discourage people who might betempted to steal from the retail store. Second, the employee will beable to catch inadvertent instances of shoplifting, such as when aconsumer's child places items in a consumer's cart without the knowledgeof the consumer. The consumer might not realize that certain items inthe consumer's shopping cart were not purchased, but the extra bags inthe cart will be a sign to the employee.

Turning ahead in the figures, FIG. 6 illustrates a block diagram of asystem 600 that is capable of performing disclosed embodiments. System600 is merely exemplary and is not limited to the embodiments presentedherein. System 600 can be employed in many different embodiments orexamples not specifically depicted or described herein. In someembodiments, certain elements or modules of system 600 can performvarious procedures, processes, and/or acts. In other embodiments, theprocedures, processes, and/or acts can be performed by other suitableelements or modules.

In a number of embodiments, system 600 can include receiving module 604.In certain embodiments, receiving module 604 can perform block 504 (FIG.5) of receiving information from a consumer indicating a desire topurchase an item.

In a number of embodiments, system 600 can include first retrievalmodule 606. In certain embodiments, retrieving module 606 can performblock 506 (FIG. 5) of retrieving information about the item from adatabase.

System 600 can include association module 608. In certain embodiments,association module 608 can perform block 508 (FIG. 5) of associatinginformation about the item with a transaction.

System 600 can include second retrieval module 610. In certainembodiments, second retrieval module 610 can perform block 510 (FIG. 5)of retrieving information regarding a present transaction of theconsumer.

System 600 can include estimation module 612. In certain embodiments,estimation module 612 can perform block 512 (FIG. 5) of estimating anumber of bags used by the consumer for the present purchase.

System 600 can include forwarding module 614. In certain embodiments,ordering module 614 can perform block 514 of forwarding the estimatednumber of bags.

While the above description have been with reference to a scan and gosystem, elements of the above descriptions can be used in other types ofshopping experiences also. For example, estimating the number of bagsused for a transaction can be useful in traditional “self-checkout”methods as well as in checkout at a terminal by an retailer's employee.In such instances, an employee stationed at an exit (such as an auditor,greeter, or security personnel) can be forwarded an estimate of acustomer's number of bags via a mobile device as a means to double-checka customer's purchases.

Although the above embodiments have been described with reference tospecific embodiments, it will be understood by those skilled in the artthat various changes can be made without departing from the spirit orscope of the disclosure. Accordingly, the disclosure of embodiments isintended to be illustrative of the scope of the disclosure and is notintended to be limiting. It is intended that the scope of the disclosureshall be limited only to the extent required by the appended claims. Forexample, to one of ordinary skill in the art, it will be readilyapparent that any element of FIGS. 1-6 can be modified, and that theforegoing discussion of certain of these embodiments does notnecessarily represent a complete description of all possibleembodiments. For example, one or more of the procedures, processes, oractivities of FIGS. 1-6 can include different procedures, processes,and/or activities and be performed by many different modules, in manydifferent orders.

Replacement of one or more claimed elements constitutes reconstructionand not repair. Additionally, benefits, other advantages, and solutionsto problems have been described with regard to specific embodiments. Thebenefits, advantages, solutions to problems, and any element or elementsthat can cause any benefit, advantage, or solution to occur or becomemore pronounced, however, are not to be construed as critical, required,or essential features or elements of any or all of the claims, unlesssuch benefits, advantages, solutions, or elements are stated in suchclaim.

Moreover, embodiments and limitations disclosed herein are not dedicatedto the public under the doctrine of dedication if the embodiments and/orlimitations: (1) are not expressly claimed in the claims; and (2) are orare potentially equivalents of express elements and/or limitations inthe claims under the doctrine of equivalents.

What is claimed is:
 1. A method comprising: receiving a transmission indicating an intention by a consumer to purchase an item; retrieving information about the item from a database; associating the information about the item and the consumer in a transaction; estimating a number of bags used for the transaction; and forwarding the estimated number of bags to a mobile device to determine a likelihood of unpurchased items taken by the consumer.
 2. The method of claim 1 further comprising: determining an actual number of bags used by the consumer; comparing the estimated number of bags to the actual number of bags used by the consumer; and indicating that a security search of the consumer should be performed based on the comparison.
 3. The method of claim 1 further comprising: receiving bag size information; and wherein: information about the item includes a weight of the item and a volume of the item; and estimating the number of bags for the transaction comprises: totaling a weight and a volume of each item in the transaction; and dividing the total weight and the total volume by the bag size information to estimate the number of bags used for the transaction.
 4. The method of claim 3 wherein: the bag size information includes information about a capacity of a bag.
 5. The method of claim 3 wherein: estimating the number of bags used for the transaction further comprises: for each item in the transaction, determining if the item is likely to be placed in a separate bag; and if the item is likely to be placed in a separate bag, increasing the estimate of the number of bags used for the transaction.
 6. The method of claim 5 wherein: determining if the item is likely to placed in a separate bag comprises analyzing criteria chosen from at least one of the following: a fragility of the item, a crushability of the item, a temperature-sensitivity of the item, or a cross-contamination possibility of the item.
 7. The method of claim 1 wherein: receiving the transmission indicating the intention for the consumer to purchase the item comprises receiving the transmission from a second mobile device, the second mobile device configured to transmit the intention to purchase the item based on scanning a unique identifier of the item.
 8. A system comprising: a user input device; a display device; one or more processing modules; and one or more non-transitory storage modules storing computing instructions configured to run on the one or more processing modules and perform the acts of: receiving a transmission indicating an intention by a consumer to purchase an item; retrieving information about the item from a database; associating the information about the item and the consumer in a transaction; estimating a number of bags used for the transaction; and forwarding the estimated number of bags to a mobile device.
 9. The system of claim 8 wherein the computing instructions are further configured to perform the acts of: determining an actual number of bags used by the consumer; comparing the estimated number of bags to the actual number of bags used by the consumer; and indicating that a security search of the consumer should be performed based on the comparison.
 10. The system of claim 8 wherein the computing instructions are further configured to perform the acts of: receiving bag size information; and wherein: information about the item includes a weight of the item and a volume of the item; and estimating the number of bags for the transaction comprises: totaling a weight and a volume of each item in the transaction; and dividing the total weight and the total volume by the bag size information to estimate the number of bags used for the transaction.
 11. The system of claim 10 wherein: the bag size information includes information about a capacity of a bag.
 12. The system of claim 10 wherein: estimating the number of bags used for the transaction further comprises: for each item in the transaction, determining if the item is likely to be placed in a separate bag; and if the item is likely to be placed in a separate bag, increasing the estimate of the number of bags used for the transaction.
 13. The system of claim 12 wherein: determining if the item is likely to placed in a separate bag comprises analyzing criteria chosen from at least one of the following: a fragility of the item, a crushability of the item, a temperature-sensitivity of the item, or a cross-contamination possibility of the item.
 14. The system of claim 8 wherein: receiving the transmission indicating the intention for the consumer to purchase the item comprises receiving the transmission from a second mobile device, the second mobile device configured to transmit the intention to purchase the item based on scanning a unique identifier of the item.
 15. At least one non-transitory memory storage module having computer instructions stored thereon executable by one or more processing modules to: receive a transmission indicating an intention by a consumer to purchase an item; retrieve information about the item from a database; associate the information about the item and the consumer in a transaction; estimate a number of bags used for the transaction; and forward the estimated number of bags to a mobile device to determine the likelihood of unpurchased items being taken by the consumer.
 16. The memory storage model of claim 15 wherein the computing instructions are further configured to: determine an actual number of bags used by the consumer; compare the estimated number of bags to the actual number of bags used by the consumer; and indicate that a security search of the consumer should be performed based on the comparison.
 17. The memory storage model of claim 15 wherein the computing instructions are further configured to: receive bag size information; and wherein: information about the item includes a weight of the item and a volume of the item; and estimating the number of bags for the transaction comprises: totaling a weight and a volume of each item in the transaction; and dividing the total weight and the total volume by the bag size information to estimate the number of bags used for the transaction.
 18. The memory storage model of claim 17 wherein: the bag size information includes information about a capacity of a bag.
 19. The memory storage model of claim 17 wherein: estimating the number of bags used for the transaction further comprises: for each item in the transaction, determining if the item is likely to be placed in a separate bag; and if the item is likely to be placed in a separate bag, increasing the estimate of the number of bags used for the transaction.
 20. The memory storage model of claim 19 wherein: determining if the item is likely to placed in a separate bag comprises analyzing criteria chosen from at least one of the following: a fragility of the item, a crushability of the item, a temperature-sensitivity of the item, or a cross-contamination possibility of the item.
 21. The memory storage model of claim 15 wherein: receiving the transmission indicating the intention for the consumer to purchase the item comprises receiving a transmission from a second mobile device, the second mobile device configured to transmit the intention to purchase the item based on scanning a unique identifier of the item. 