System and method for curating memories

ABSTRACT

Systems and methods are provided that include receiving a first image of a first portion of a greeting card wherein the first image includes identifying data useable to identify the first image, storing the identifying data in a datastore, associating the identifying data with a first user, determining characterization information from the first image that characterizes aspects of the first image, receiving from a computing device a second image of a second portion of the greeting card wherein the second image includes at least part of the first portion of the greeting card, utilizing the second image to identify the first user, correlating the characterization information of the first image to attributes of one or more product offerings, and communicating an indication of at least one of the product offerings to the computing device.

CROSS-REFERENCE TO RELATED APPLICATIONS

This claims the benefit of the following two provisional applications:(1) U.S. Provisional Patent Application No. 63/356,177 filed on Jun. 28,2022 entitled “SYSTEM AND METHOD FOR VIRTUALIZED OFFERINGS” and (2) U.S.Provisional Patent Application No. 63/460,248 filed on Apr. 18, 2023entitled “CURATING, ASSOCIATING, AND CONVEYING MEMORY REPRESENTATIONS.”This Application incorporates by reference for all purposes all of theaforementioned applications as well as U.S. Pat. No. 11,263,503 grantedon Mar. 1, 2022 and entitled “SIGNATURE-BASED UNIQUE IDENTIFIER” andU.S. patent application Ser. No. 16/874,414 filed on May 14, 2020entitled “SIGNATURE-BASED UNIQUE IDENTIFIER.”

BACKGROUND

Individual and shared experiences favorably contribute to people'smental health, sense of belonging, and life enjoyment. But curating andmemorializing representations of memories is difficult. For example, ifsomeone was planning on attending a wedding, became ill at the lastminute, and was unable to attend the event, they may still want toexperience aspects of the wedding. But finding photographs, videos,sound clippings, etc. of the wedding is currently difficult. The stateof the art could be improved by, among other things, providing a way tostore individual memories, selectively expose them to others, locateothers' memories, and contribute to them.

BRIEF DESCRIPTION OF THE DRAWINGS

The present disclosure is described in detail below with reference tothe accompanied drawing figures, wherein:

FIG. 1A is an illustrative computing device suitable for use in aspectsof embodiments of the disclosed technology;

FIG. 1B is an illustrative computing environment suitable for use inaspects of embodiments of the disclosed technology;

FIG. 2 provides illustrative user interfaces for optional operationalmodes such as scrapbook mode, diary mode, and treasures mode consistentwith one or more embodiments of the disclosed technology;

FIG. 3 provides illustrative user interfaces for optional operationalmodes such as scrapbook mode, diary mode, and treasures mode consistentwith one or more embodiments of the disclosed technology;

FIG. 4 . depicts an illustrative operating environment suitable forpracticing an embodiment of the disclosed technology;

FIGS. 5A-5C depicts illustrative digital writings or pictures amongfiducial markers suitable for practicing an embodiment of the disclosedtechnology;

FIG. 6 depicts an illustrative method of proposing or providingcontext-based digital offerings based on a received gift or other itemin accordance with an embodiment of the disclosed technology;

FIGS. 7-8 depict illustrative methods of proposing or providingreciprocal context-based digital offerings based on recipientinformation, sender information, or other historical demographic data inaccordance with an embodiment of the disclosed technology;

FIGS. 9A-9D and FIG. 10 depict illustrative shapes and objects that areuniquely identifiable and adapted to be associated with digitalpresentations in in accordance with an embodiment of the disclosedtechnology;

FIG. 11 depicts an illustrative operating environment for practicing anembodiment of the disclosed technology;

FIG. 12 depicts an illustrative data flow for practicing an embodimentof the disclosed technology;

FIGS. 13-15 depict illustrative methods for presenting a digital assetassociated with a physical object in accordance with an embodiment ofthe disclosed technology;

FIG. 16 depicts an illustrative system for presenting a digital greetingto a recipient in accordance with an embodiment of the disclosedtechnology; and

FIGS. 17-18 depicts illustrative methods of presenting a digitalgreeting to a recipient in accordance with an embodiment of thedisclosed technology.

DETAILED DESCRIPTION

The subject matter herein is described with specificity to meetstatutory requirements. But the description itself is not intended tolimit the scope of this patent inconsistent with the claims. Rather, theinventors have contemplated that the claimed subject matter might alsobe embodied in other ways, to include different steps or combinations ofsteps similar to the ones described in this document, in conjunctionwith other present or future technologies. Moreover, although the term“step” may be used herein to connote different elements of methodsemployed, the term should not be interpreted as requiring a particularorder among or between various steps herein disclosed unless and exceptwhen the order of individual steps is explicitly described.

As one skilled in the art will appreciate, embodiments of the disclosedtechnology may be embodied as, among other things: a method, system, orset of instructions embodied on one or more computer-readable media.Accordingly, the embodiments may take the form of a hardware embodiment,a software embodiment, or an embodiment combining software and hardware,including in a virtualized environment such as the metaverse. In oneembodiment, the disclosed technology takes the form of acomputer-program product that includes computer-usable instructionsembodied on one or more computer-readable media.

Memory Curation.

One aspect of the disclosed technology takes the form of amemory-curation app (such as a set of computer-executable instructions)embodied on one or more computer-readable media that are executable byat least one processor. When executed, the set of instructionsfacilitate multiple processes or sets of steps and expose a set offunctionalities to a user. The app enables representations of memories(sometimes referred to herein as just “memories”) to be curated in theaggregate from multiple users, captured by a single user, memorializedin connection with physical objects (such as heirlooms, relics,graduation invitations, wedding announcements, or any object that isimportant to a user), or combinations of the same. In one embodiment,the app provides multiple modes of operation to facilitatememory-curation capabilities. But in another embodiment, the functionalaspects are presented or selectable via a user interface of an appgenerally.

In one embodiment, the application operates in multiple modes. Forexample, three illustrative modes are scrapbook mode, diary mode, andtreasures mode. These modes can be entered into by way of receiving userinput via one or more controls, such as controls 314, 316, and 318depicted in FIG. 3 . The controls are presented on a user interface 312of a computing device 310 in one embodiment. Acting on control 314 willenter into a first mode 314A, such as scrapbook mode in one embodiment.Similarly, control 316 is usable to engage a second mode 316A, such asdiary mode. And control 318 is useable to enter treasures mode 318B,which stores pictures of physical objects that a user cares about. Forexample, a user might have been given a watch as an heirloom. The usercan take a picture 332 of the watch 334 to ensure that a picture of thewatch is preserved, for example, as well as associated memories aboutthe watch, such as the giver, why it is special, the occasion, etc.

In one embodiment, the app provides a way for users to interact withdigitized memories. Interactions include storing or adding new memories,manipulating the memories (e.g., annotating, modifying, etc.), findingstored memories, and sharing memories with others as well as outputtingthem to different media.

In scrapbook mode, memories are stored from multiple users. For example,memories can be accessed that are from other users besides a userassociated with a set of login credentials for the app. Numeral 302 ofFIG. 3 depicts an embodiment of the disclosed technology in scrapbookmode.

An aspect scrapbook mode, the app allows users to add photos, videos,voice recordings, text, or any other digital content to a shared albumby submitting those memories memorizations to a specific album nameassociated with the user who created the album, e.g., the album“creator”. Alternatively, the creator of the album can invitecontributors via a unique web link, code, QR code, string of digits,login credentials, or other invitation method. The other contributorsmay add, modify and interact with content in the album. The creator canset permissions for each contributor to the album or each can functionas a creator. Alternatively, the creator can maintain control of thescrapbook completely and contributors can then add the content intodatastore (such as virtual shoebox) from which the creator can pull thedigital content to curate the scrapbook. Scrapbooks can be “finalized”such that additional content adds or modifications cannot take place asthey were previously allowed. However, the scrapbook does not need to befinalized to be experienced by the contributors or other viewers. It canremain a consistently dynamic document and any links to it can alwayslead to the most recent state.

One example of the disclosed technology includes a creator setting up ashell for the scrapbook. The system can receive search criteria from auser. For example, the creator could add the tag (or a user can searchfor) #OrlandoSummerVacation2022 album, thereby enabling relevant albumsto be presented. The system allows users to scrolls albums to find theassociated with the name or attributes of a person they recognize. Userscan submit content for that album. Alternatively, users can submit arequest for access, which that be routed for permission, such as to thecreator. If the user does not find an album with that name, they maycreate one.

An aspect of the disclosed technology includes providing collections ofdigital assets around a common occasion, event, date, group of people,etc., including from multiple people or sources.

An embodiment can facilitate personal digital-asset association (howassets are themed for addition to the scrapbook), which can includecollaborative connections (allowing individual identification of relatedmemories and contribution to a single project); temporal connections(related memories identified based on time stamp of photos/assets);location-based connections (geolocation, related memories identifiedbased on location stamp of photos/assets such as “Paris or “our firsthome”); occasion-based connections (related memories identified based onvisually identifiable icons, colors, etc., such as red/green, holidayornaments, Christmas trees, tinsel, etc.); people-based connections(based on people's physically identifiable attributes, e.g., fac

The disclosed technology can also enhance content. For example, digitalfiles can be provided/included to complement a scrapbook based on assetinformation (noted above), e.g., digital stickers, graphical elements,font choices, words, etc. Templates can be provided for slideshows to beautomatically recommended based on the format, number, and type ofdigital memories. Background sound can be provided to match the tone ofthe content (e.g. color, location, occasion appropriate).

The disclosed technology can facilitate automatic attributions. Forexample, files can be added that are automatically attributed to acontributor (with an option to manually change the information).Attribution can be based on a contributor. Additional automaticattribution may also be included such as style influences of acontributor (e.g., contributors who have a history of adding cute animalstickers or GIFs to their content could have that style cataloged inassociation with a digital memory). Contributors can be invited throughthe app contacts or via a link sent through text, message, email, andthe like. Permissions can be set differently for different contributors(e.g., add content, edit format/order, view only, add additionalcontributors, share, etc.). If both an initiator and a contributor areparticipants in the app, specific details for the contributor canautomatically influence the automatic generation of a co-createdscrapbook.

An aspect of the disclosed technology can include a journal-typefeature, where collections of digital assets with related to a period oftime and curated by a single person in one embodiment (or jointly).Promptings can be provided. For example, updates/contributions based onpast engagements, profile information, life stage, occasions,seasonality, interactions with friends/contributors, scrapbook, journalentry automated analysis, etc. can be provided. Thought starters can bepresented in the future or saved for another day. Questionnaires thatdirect future prompts to the type of memories that the user wants tocapture can be provided. And aspects of the technology described in U.S.Pat. No. 9,449,350 can be utilized.

Other content enhancements can also be provided. For example, Captionscan be automatically suggested based on uploaded personal contentmetadata (e.g., photo taken after 6 P.M. adds a “night” specificcaption) or image recognition (e.g., two detected faces automaticallyincludes “we” captions). Digital imagery can be automatically includedto complement the scrapbook based on asset information, e.g., digitalfloral “stickers,” graphical elements such as borders, font choices,background colors, etc. Relationships can be identified through facialand emotional recognition and tagged with captions that includerelationship indicators such as sister, BFF, mother, grandmother, workfriend, etc. And the disclosed technology can facilitate transformationfrom one type of content to another (e.g., a still image extracted froma video file, text-to-voice, audio as soundtrack to still slide show,automatic animation of still images, etc.).

In diary mode, the app captures personal details about memories. Thepersonal details can take the form of specific photographs, video clips,and other digitized forms of memory representations. Numeral 304 of FIG.3 depicts an embodiment of the disclosed technology in scrapbook mode.

Diary mode can allow for entries by creators or include pre-populatedentries that can be edited. Following the response to prompts, contentcan automatically be enhanced with complementary design icons andeditorial captions. Moreover, aspects of the technology described inU.S. Pat. No. 9,449,350 (which is hereby incorporated by reference) canalso be leveraged.

In treasures mode, the app stores representations of physical objects.Each representation is indicated as being a representation of a physicalobject and is associated with the owner of the app via a set of usercredentials. Numeral 306 of FIG. 3 depicts an embodiment of thedisclosed technology in treasures mode.

One aspect of the disclosed technology provides a connection betweenimages (or other representations) of meaningful physical artifacts anddigital assets from those memories. The digital assets can be images,videos, audio or digital files associated with the same occurrence orevent in one embodiment. Or they can be compilations from relatedevents, relationships, experiences or places. For example, a physicalartifact serving as a souvenir may connect to photos from that same tripor also include any photos taken during any trip to that location.Alternatively, an artifact of a BFF necklace may connect to images ofthe user wearing that necklace but may also connect to images of theuser and the other holder of the other half of the necklace regardlessof whether they are both wearing them.

Treasures can include collections of digital assets representative ofphysical objects owned or experienced by a user. User digital-assetassociation (how user assets are associated with the image of thephysical keepsake object) can be provided. Image recognition can be usedwith images/videos with other views/perspectives of the representativeobject to automatically connect to memories and add to a videoslideshow. Or user input can be received that determine content to beadded to a slideshow (or remove what was automatically added).

The disclosed technology can facilitate purchase recommendations. A“SHOP+SHARE” feature can be tailored to the user's preferences asindicated by the images stored in “Treasures” (e.g., images of wearableitems may cause other wearable product formats to show higher in the“SHOP” category vs. displayable type items like framed sentiments orfigurines). An embodiment provides friends and collaborator usersassistance in purchasing gifts for a person based on the past item imagestorage history and identifiers associated with those items (e.g., itemtype—like wearable, displayable, etc., style—like traditional, modern,casual, etc., color—shades, specific colors, etc.). A gift-recommenderfunctional aspect can help find a gift that other users who havedocumented images have also preferred and may prevent purchases that aretoo similar (e.g., the tool may recommend an Arizona State T-shirt witha tradition logo on the pocket area instead of another sweatshirt).

One embodiment provides content related to objects in images. Forexample, an upload of a greeting card can leading to providing relatedcontent for use/customization of a user's app-based story/journalentries. For example, a user might upload a Rolex watch that unlockscontent provided by Rolex. Content can include digital stickers,recommendation words/copy/sentiment, transition slides/images (tofacilitate movement between images/content), sounds/music, animatedGIFs, videos or shorts, and the like.

The disclosed technology can facilitate data enhancements. For example,it can make asset recommendations, digital files available to complementmemories based on uploaded asset information. It can also proposenon-obvious complementary assets, such as digital images, videos,sounds, etc. that hold symbolic meaning or significance with theseemingly unrelated occasion, holiday or event (e.g., dandelion flowerwhen expressing sympathy or grief)

One aspect of the disclosed technology includes exposing the memories inthe app to others to enable them to select objects to present to the appowner based on the owner's memories. The app owner can control theamount of information shared. In one embodiment, information the owner'smemories information is shared on a blockchain in such a way that accesscan be granted while preserving anonymity of all or all otherinformation of the owner in a zero-trust environment.

Another aspect of the disclosed technology is to enrich the app owner'smemories information with historic contextual data to better providegift or interaction suggestions. For example, a datastore is providedthat stores historical information related to interacting with others,including, for example, information for performing analytics orassociated metrics such as recipient demographics, occasions, holidayinformation, personalization options, collections, tone, features, andcustomer ratings. This information can be cross-referenced with the appowner's stored memory information to suggest gifts, responses, and otherinteractions (both to the owner and others).

For example, say an app owner took pictures of flowers or otherwiseadded pictures of flowers to the app (such as in diary mode). Further,say that a third party wanted to give a gift to the app owner. The appwould know that the owner has included pictures of flowers, wouldidentify other users who have pictures of flowers in their memories,would identify the types of items those users gave to others (or markedas highly rated), and—in addition to or alone—present on a userinterface gift ideas for the owner.

The logic behind the gift proposals is more elaborate in someembodiments. For example, instead of or beyond considering only othergifts purchased or highly rated, the app would understand that flowersare associated with a certain tone, such as “loving,” and then suggestgifts that have been associated with that tone.

Illustrative recipient demographics include any boy, any girl, any man,any woman, any loved one, aunt, aunt & uncle, best man, big brother, bigsister, bonus brother, bonus dad, bonus daughter, bonus family, bonusmom, bonus son, bride, bride & bride, bride & groom, bride-to-be,brother, brother & family, brother & spouse, brother-in-law, bus driver,caregiver, clergy, clergy & spouse, coach, couple, cousin, co-worker,dad-to-be, daughter, daughter & family, daughter & spouse,daughter-in-law, dentist, doctor, everyone, family, father, father &spouse, father-in-law, fiancée, friend, goddaughter, godfather,godmother, godparents, godson, granddaughter, granddaughter & family,granddaughter & spouse, grandfather, grandmother, grandparents,grandson, grandson & family, grandson & spouse, great-granddaughter,great-grandfather, great-grandmother, great-grandparents,great-grandson, groom, groom & groom, healthcare professional, host,husband, kid, maid of honor, mail & package carrier, manager, mom-to-be,mother, mother & spouse, mother-in-law, neighbors, nephew, nephew &family, nephew & spouse, new mom, new parents, niece, niece & family,niece & spouse, nurse, parents, parents-to-be, salon professional, scoutleader, secret pal, service provider, significant other, sister, sister& family, sister & spouse, sister-in-law, son, son & family, son &spouse, son-in-law, spouse, stepdaughter, stepmother, stepson, teacher,teen, twins, uncle, veterinarian, wife.

Illustrative occasions include adoption, anniversary, baby shower,bachelorette party, baptism & christening, bar mitzvah, bat mitzvah,birthday, bridal shower, clergy appreciation, confirmation,congratulations, encouragement, engagement, first communion, friendship,get well, goodbye, good luck, graduation, hello, housewarming, love,military appreciation, miss you, new baby, nurses day, pregnancy,quinceañera, retirement, sorry, sympathy, teacher appreciation, thankyou, thinking of you, weddings, and the like.

Illustrative personalizations include a custom internal message, acustom photo, and a custom video.

Illustrative collections can include groupings based on movies,characters, theme parks, famous people, pets, television shows, videogames, and the like.

Illustrative tone information or categorizations includes cute, edgy,funny, heartfelt, inspirational, religious, romantic, short & simple,thought & nice, thoughtful & nice, and the like.

Illustrative features include add-photos capable, blank, detachablegift, lights, money/gift card holder, motion, plays song/sound, pop-up,unique format, year dated, and the like.

Illustrative customer ratings include customer feedback (e.g., 1-5stars), how well the recipient liked the gift, numbers sold, etc.

For example, one method of practicing the disclosed technology includesobtaining from a first user device a first representation (such as apicture) of a portion of a greeting card. The first image includes acustom image such as a handwritten marking made by a user and a set offiducial marks, a photograph, or other custom image. This custom imageis stored in the system on creation by a sender and thus lateridentifiable by the system upon request by a recipient. Thus, anembodiment of the method further includes utilizing the first image toidentify stored memories associated with a second user, identifying afirst set of one or more attributes associated with the stored memories,and presenting via a computing device one or more gift suggestions basedon the first set of attributes.

In one embodiment, the above method is facilitated by at least apartially closed environment. For example, the ability to us the firstimage portion as a lookup key is facilitated by having previously storedthe image portion such that it is recognizable at a later time. In otherwords, a first user, such as a person wanting to congratulate agraduate, adds a photograph to or writes a message in his or herhandwriting and among a set of fiducial marks and uploads the images toa datastore using a computing device such as a smartphone or PC. The appdescribed herein can access the datastore. Later the recipient (thegraduate) receives the card.

At this point, facilitating reciprocity (e.g., generally, responding toa gift giver) is difficult absent the disclosed technology. But in oneembodiment of the disclosed technology, the graduate uses the appdescribed herein. Thus, the recipient can utilize the app (running on acomputing device) to take a picture of the handwritten note and uploadit as a memory. Because the app has access to the datastore, the app canrecognize the handwriting of the note, identify the sender, and therebyaccess the sender's memories, other gifts give, gifts received, andother attributes of the send.

The app can then use those attributes of the sender to propose gifts andfacilitate reciprocity, improving the process of the graduate expressinghis or her gratitude for the graduation note. For example, if thegraduate would like to send a thank-you note, instead of sending a blandnote, the app would suggest a thank-you note whose front image reflectsan image based on the attributes of the sender's memories and otherattributes. The app knows the address of the sender because thatinformation was also gathered and stored in the datastore when thesender sent the initial gift. Thus, in one embodiment, the app presentsthe recipient an option to automatically mail a thank-you gift withoutthe recipient ever needing to provide (or even know) the sender'saddress, e.g., if the sender desires to keep his or her electronic orphysical address private.

In another embodiment, the app uses a uniquely identifiable imageinstead of a user's handwriting. One example includes a QR code.

As mentioned, aspects of the technology described herein can generate aunique identifier for a visual media that includes pre-printed visualindications on the visual media and a user's handwritten marking, suchas a signature, doodle, note, or drawing. The visual media includesprinted media, such as a greeting card, gift card, post card, pictureframe, Christmas ornament, or the like. The visual media can alsoinclude electronic media, such as an e-card, email, social media post,and the like.

The unique identifier is unique because of visual characteristicscreated by a user's handwritten marking in combination with the locationof the marking on the visual media. In one aspect, the marking is ahandwritten signature. In general, people have unique signatures whenthey are handwritten. For example, it would be rare for two people withthe same name to have visually identical signatures. That is especiallytrue because the signature is being analyzed by a computer imagingsystem, which can detect fine distinctions. As used herein, a signatureis a visible production of all or part of a user's name by hand using apen, pencil, stylus, finger, or other writing implement. The signaturecould be in cursive or printed letters. The signature can also compriseentirely a mark or marks the user commonly uses to identify himself orherself.

The location of the marking, such as a signature, on the visual mediacan be determined by including preprinted fiducial marks on the visualmedia. In general, it is beneficial for a fiducial marker to be a uniquepattern that is easy for the computer software to recognize as afiducial marker. It is also beneficial for the marker to beasymmetrical. It is easier to determine the relative positioning of thecamera and the marker if some aspect of the marker is asymmetrical. Anasymmetrical marker makes it possible for the vision software todetermine which way the marker is oriented.

The fiducial markers act as landmarks that allow the size and locationof the marking to be determined in absolute terms. The absolute size andlocation of the marking in combination with the handwritten markingitself can be used to create a unique identifier that in turn identifiesthe visual media to which the signature is affixed. In one aspect, a QRcode or other machine-readable indicia may be provided on the visualmedia to identify a SKU for the visual media, such as the greeting card.This machine-readable indicia may be used in combination with thehandwritten marking to create the unique identifier.

As used herein, the fiducial marks can be stand-alone marks, integratedmarks, or derived from the actual design on the visual media (i.e.,natural feature tracking). The stand-alone marks are visible apart froma design on the visual media. The examples herein are described in termsof stand-alone fiducial marks, but these examples are not intended to belimiting beyond the claims. Any type of fiducial mark or mark servingthe purposes of the fiducial mark described herein, regardless ofdesignation, may be used.

The fiducial marks can also be integrated. Integrated fiducial marks mayalso be described as aesthetic marks. Integrated fiducial marks areintegrated into a design or possibly designed around. The typical userwould not recognize the integrated fiducial marks as anything other thanthe design because they are often just shapes commonly seen in differentdesigns. For example, the integrated fiducial marks can be a pair ofcircles, ovals, or other shapes. The design development may be performedwith any color, texture, shape or other features as long as the circle(or other shape) pairs are integrated. The ratio of the radius of twocircles in a pair can uniquely identify an integrated mark from a lookup table. Other characteristics of the mark and associated visual media,if applicable, could be extracted from the look up table and used toperform operations described herein. For example, spatial informationcould be retrieved from the look up table and used to identifycharacteristics of a signature or other user mark on a visual media.

In one aspect, the fiducial marks use natural feature tracking. Naturalfeature tracking evaluates a design with machine vision technology andidentifies key points within a design that can serve as fiducial marks.For example, the features could include corners, edges, blobs, withoutusing specifically designed ID markers. These features allow the systemto identify the specific design, along with the spatial features of thevisual media on which the design is found. Understanding the spatialfeatures of the design allow for the spatial features of a signature orother mark to be identified, as described subsequently.

The unique identifier is then stored in computer memory on auser-experience server. The user-experience server can associate theunique identifier with a digital asset designated by the user. When theunique identifier is provided to the user-experience server a secondtime, the digital asset can be output to the computing device thatprovided the unique identifier the second time. For example, a recipientof a greeting card could scan the card to extract the unique identifierand then retrieve an associated digital asset, such as a personalizedgreeting video. Each time the unique identifier is provided, the digitalasset can be output. In one aspect, storing the unique identifierincludes storing an image of the handwritten marking along with othersize and location characteristics ascertained from an analysis of thehandwritten marking in relation to the fiducial markers. Supplementalinformation may be stored with the unique identifier, such as a SKU forthe visual media, sender information (e.g., a name or user ID), a timethe unique identifier was created, and the like.

The technology allows a sender of the visual media to associate theunique identifier with a digital asset, such a picture, audio file, orvideo file. The sender can then communicate the visual media to arecipient. The recipient uses an application to retrieve the digitalasset associated with the unique identifier. The digital asset can thenbe output for the recipient's enjoyment.

In the case of the printed media, a camera on a computing device, suchas smart phone, can be used by the sender to capture and store theunique identifier. Similarly, the recipient can use a smart phone tocapture an image of the unique identifier. The image may then beprocessed by an application on the smart phone and used to retrieve thedigital asset associated with the unique identifier. Alternatively, thephone can send the image to a cloud-based service that analyzes theimage and retrieves the digital asset, which is the communicated to thesmart phone.

FIG. 4 depicts an illustrative operating environment suitable forpracticing an embodiment of the disclosed technology. The varioushardware components have components such as those depicted in FIG. 1A.Although some components might be referenced in the singular forreadability, they could be plural. For example, the item referenced asserver 414 might actually be multiple servers or computing devices. Andnetwork 416 represents multiple networks that facilitate thecommunication of data.

At a high level, sender devices 410 and 412 communicate withmemory-curation server 414 through communications network 416 overwireless or wired links 422A. Sender device 410 and 412 are illustrativecomputing devices, which may be a smartphone, PC, or other computingdevice. Communications network 416 may be one or more communications orcomputing networks. Memory-curation server 414 is also an illustrativecomputing device suitable for performing methods claimed herein.

Sender device 410 includes a first instance of a memory-curationapplication 460, memory representations 462, and attributes of memoryrepresentations 416 (also referred to simply as “memories” herein forshort). Memory-curation application 460 is a set of computer-executableinstructions embodied on more or computer-storage media. It can interactwith the other components on sender device 410 as well as withmemory-curation server 414 and its components.

Memory-curation application 460 stores memories 462. Memories 462 can bephotographs, cherished voicemails or sound recordings, text messages,etc. They can be stored locally on sender device 410 or uploaded to aremote datastore such as datastore 418 (or both). Alternatively oradditionally, attributes 464 of memories 462 could be stored. Forexample, say a memory 462 is a picture of flowers. Memory-curationapplication 460 could recognize the image as being of flowers, extractattribute information associated with the flowers, and store thepicture, attributes, or both. The attributes can likewise be storedlocally on device 410 or remotely in datastore 418.

In one embodiment, information about memories 462 is made available forother to access. A user can decide how much information to share andwith whom it is shared. For example, a user could decide that picturesof individuals are to be kept confidential whereas pictures of inanimateobjects would be accessible by other people. In another embodiment, auser might decide to make all pictures accessible. In still anotherembodiment, only attribute information 464 (or a portion thereon) ismade available to others.

In an illustrative operation, the user of device 410 sends a memory 462to recipient device 412, which is similarly configured to sender device410. For example, recipient device 412 runs a second instance ofmemory-curation application 426, can store its own memoires 428 and/orattributes 430 of them.

Recipient device receives the memory item sent from sender device 410.As mentioned, the memory item can also be sored in datastore 420 by wayof memory-curation server 414 in one embodiment. The user of recipientdevice 412 can use aspects of the disclosed technology to reciprocallysend something to sender device.

In one embodiment, recipient device 412 sends the received image (orattributes of it) to memory-curation server 414. Memory-curation server414 incudes an image-feature extractor 432, an attribute-correlationengine 434, a digital-asset manager 436, and a handwritten-markingmanager 438 (all of which can include hardware and software aspects asreflected in FIG. 1A and its description). Not all of these must beincluded. Employing one or more of these components, server 414identifies the image received from recipient device 412 as the imagesent from sender device 410. In one embodiment, such identification isfacilitated by way of memory-curation server 414 having access to bothimages and/or attributes.

Memory-curation server 414 can then access data 420 to propose items tothe recipient application 426 that would be a good response to receivingthe memory from sender 410. This can be carried out in a number of ways.

For example, in one embodiment, data 420 in datastore 418 is correlatedwith other data to identify the items to propose. Illustrative data usedin the correlation includes past purchasing information about otherusers who have attributes in common with the first user, products ratedhighly by other users who have attributes in common with the first user,past purchasing information about purchases of the second user,attributes of the second user, attributes of the first user, attributesof other users who have attributes in common with the first user,attributes of other users who have attributes in common with the seconduser, or attributes of the first image.

By way of example, memory-curation server 414 could use the image datareceived from recipient device 412 to identify the sender from thesender's profile 440, which would make available information such as thesenders activity 448, the sender's memories 450 (which would be the sameas 462 if synced), attributes 452 of those memoires (which would be thesame as 414 if synced), or media pairs 454, which can include a digitalasset (such as a picture, audio file, or video file) and a uniqueidentifier associated with it.

Memory-curation server 414 could then refence the sender's data 450and/or attributes 452, 448, 442 etc., to determine a set of proposedreciprocity items to recipient 412. Alternatively or additionally,memory-curation server 414 could correlate such sender's data with data420 other users to determine the proposed items, using for example,correlation engine 434. For example, if sender 410 sent a picture offlowers to recipient 412, then memory-curation server 414 couldcross-reference other pictures of flowers in datastore 418, determineusers respectively associated with the other pictures of flowers,determine what those other users purchased or ranked, and factor usethat information to prepare the proposed-items list.

Memory-curation server 414 could also consider attributes of thereceiver to prepare the proposed-items list. Say, the sender sent theaforementioned picture of flowers to recipient 412. Memory-curationserver 414 would use the picture as a type of database key to identifythe sender and analyze the sender's memories 450 in connection with therecipient's memories 428. Such analysis might yield a mutual affinityfor a motion picture, such as “A Country Wedding.” Both the sender andrecipient might have saved the title to the movie, stored screengrabs offavorite scenes, or a note about the movie in their respective instancesof memory-curation application 460/426. In that case, memory-curationserver 414 might propose responding with a famous line from the movie,picture of a famous scene from the movie, a song from the movie, or evena link to retrieve the movie as a purchased gift. Thus, the disclosedtechnology includes proposing not only pre-existing gifts (such asmaterial items) but also, for example, promptings of what to write to arecipient. In one embodiment, the disclosed technology considers sendersmemories 462/450, profiles 440, attributes 464/452, the recipient'smemories 428 (including attributes 430), as well as information 420 fromother users who have similar attributes to generate proposed messagesthat a user 412 (who does not necessarily have to be a recipient) mightwrite to a sender 410. Such suggested writings might be inform a user412 what to write on a greeting card (that might be personal to theoriginal sender 410 turned recipient 410), what to say for a givensituation (such as bereavement), what to write on a hang tag on a giftbag, a customization panel on a customizable ornament, or any othercontext where a sender might desire help to prepare a message for anoccasion, a person, or combinations thereof. Thus, in one embodiment, inresponse to a recipient uploading an image of a received greeting cardor note for example, the system, in turnkey fashion, proposes an item(such as a specific ornament or greeting card) along with a tailoredproposed message and presents a “send now” button on a user interface ofa user's device 412, such that the recipient 412 can send the proposeditem and message with a single action, facilitated by the fact that thesystem was able to identify contact information of the sender via thesender's profile 420, which was identified based on the uploaded image,which was recognizable by memory-curation server 414 because it wasaware of the content at creation by sender 410. Sending can beconfigured to be immediate or delayed.

The list (or portion thereof) of the proposed items is sent frommemory-curation server 414 414 to recipient device 412. Recipient 412could then opt to act on the list of proposed items, all from withinmemory-curation application 426 in one embodiment. Thus, if a proposeditem was a customed thank-you note (customed by image or content basedon the memory 462 send by sender 410), recipient 412 could send thatcustomized note to sender device 410.

In other embodiments, custom handwriting (or other uniquely identifiableimage) is utilized. FIG. 5A shows a handwritten signature 512A. In oneembodiment, the signature is withing a set of fiducial markings 510A-Dthat facilitate determine absolute size and position of the handwriting,which can help it be later identified by the memory-curation server 414.Thus, say a sender mails a physical card to recipient 412. The recipientcould take a picture of the handwritten note 512A, upload it tomemory-curation server 414, which would identify the sender using thenote, and use the sender's memories data 450 or other correlated data(within data 420) to proposed a reciprocal response item.

In another embodiment, as reflected in FIG. 5B, a signature 512B andimage 514A are uploaded to memory-curation server 414 by recipientdevice 412 and attributes of both are used by memory-curation server 414to prepare a proposed list of reciprocal ideas to recipient 412.

In still another embodiment, an image alone, such as image 514B of FIG.5C, is used to the exclusion of a handwritten signature. In thisembodiment, a handwritten signature is not used at all. For example,image 514 B might be a picture of the front of a physical card that wassent by a sender to a recipient. The card could have been prepared usingdata accessible by memory-curation server 414 so as to enablememory-curation server 414 to identify the image when it is uploaded byrecipient device 412.

For example, the sender could have used memory-curation server 414 or asystem coupled to memory-curation server 414 to select the card from anonline platform that was further used to send the physical card to therecipient. Thus, the recipient would be able to upload an image of thecard to precipitate identifying the sender and using the sender'sattributes—or attributes of those who share attributes with thesender—to prepare the list of proposed reciprocal gift items.

FIG. 6 depicts an illustrative method of one embodiment of the disclosedtechnology. At a step 610, a first image of a first portion of agreeting card (digital or physical) is received wherein the first imageincludes identifying data useable to identify the first image. Forexample, sending device 410 sends a memory 462 or greeting-card portion(512A, 514A, 512B, 514B, etc.). The first image could include a set offiducial marks that are recognizable by a computer software program andallow the size and location of the image to be determined in absoluteterms.

At a step 612, the identifying data is stored in a datastore, such asdatastore 418. Storing the identifying data could include storing thefirst image itself or storing information about the first image.

At a step 614, the identifying data is associated with a first user.This can be accomplished by memory-curation server 414 using correlationdata 446, image-feature extractor, correlation engine 434 or acombination thereof.

At a step 616, characterization information is determined from the firstimage. The characterization data characterizes aspects of the firstimage in one embodiment.

At a step 618, a second image is received from a computing device, suchas from recipient device 412. The second image is of a portion of thegreeting card and includes at least part of the first portion of thegreeting card in one embodiment.

At a step 620, the first user is identified. Thus, for example, thesender associated with device 410 is identified. In one embodiment, suchidentification is carried out by utilizing the second image as a key tosearch the data in datastore 418 given that the image is unique andknown by memory-curation server 414. Utilizing the second image toidentify the first user is facilitated by comparing attributes of thesecond image and to attributes of the first image in one embodiment. Theattributes of both the first and second images are stored via acomputing device such as memory-curation server 414 in one embodiment.

At a step 620, the characterization information of the first image iscorrelated to attributes of one or more product offerings.Memory-curation server 414 can perform this correlation, which can beused to determine the product offerings.

At a step 622, an indication of at least one of the product offerings issent to the computing device that sent the image data.

FIG. 7 depicts another method of practicing the disclosed technologyaccording to one embodiment. At a step 710, a first image is receivedfrom a first computing device, such as sending device 410. At a step712, the first image is stored. The first image is stored in a datastoresuch as datastore 418 in one embodiment. At a step 714, the first imageis associated with a first user. For example, the first image could beassociated with the sender's profile 440.

At a step 716, a request is received to send the first image to a secondcomputing device (such as to recipient device 412). The request is madevia a first instance of a memory-curation application, such as via 460.At a step 718, the first image is sent to a second instance of thememory-curation application (e.g., 426) running on a receiving device,such as device 412.

At a step 718, a reciprocity-help request is received. This is a requestto help facilitate a reciprocal giving option, reciprocal to the sendersending the initial memory. Thus, one method includes receiving from thesecond instance of the memory-curation application 426 areciprocity-help request that includes a request to receive proposeditems to send to the first user 460/410 in response to receiving thefirst image.

At a step 720, proposed items are identified that the recipient couldsend to the sender. One way proposed items are identified includesreferencing a data store to determine the proposed items, where thedatastore stores one or more of the following: past purchasinginformation about other users who have attributes in common with thefirst user; products rated highly by other users who have attributes incommon with the first user; past purchasing information about purchasesof the second user; attributes of the second user; attributes of thefirst user; attributes of other users who have attributes in common withthe first user; attributes of other users who have attributes in commonwith the second user; or attributes of the first image.

The method of FIG. 7 can further include receiving from the secondinstance of the memory-curation application 426 a sending request tosend at least one of the proposed items to the first user andfacilitating the sending of the at least one proposed item to the firstuser. Thus, if memory-curation server 414 proposes sending a song tosender device 410, memory-curation application can provide for doingthat. Or if memory-curation server 414 proposes sending a GIF tailoredto sender 410, then the identified GIF is sent via memory-curationapplication 426 to memory-curation application 460.

And at a step 722, at least a portion of the proposed items is sent tothe second instance of the memory-curation application 426. For example,one method includes sending at least one proposed item to the first userby referencing a user profile associated with the first user to obtainaddress information of the first user; in the case where the at leastone proposed item is a digital item, sending the digital item to thefirst instance of the memory-curation application running on the firstcomputing device or to a digital address associated with the first user;and in the case where the at least one proposed item is a physical item,sending the physical item to a physical address associated with thefirst user.

FIG. 8 depicts another embodiment of a method of the disclosedtechnology. The method is performed by computer-executable instructionsthat are executed by a computing device (which can include multipleconstituent computing devices). The method includes, at a step 810receiving at a memory-curation server (e.g., 414) memories information(e.g., 462) related to a first set of images that are associated with afirst user, such as sender device 410 or memory-curation application460. The memories information is received through a communicationsnetwork (which can include multiple networks 416) and sent by a firstcomputing device 410.

The method in this embodiment further includes, at a step 812, receivingat the memory-curation server 414 a privacy indication that indicatesthat at least a portion of the memories information is allowed to beaccessed by others. Step 814 includes receiving at the memory-curationserver 414 a request for proposed gift ideas relevant to the first user.The request is received from a second computing device such as recipientdevice 412 in one embodiment.

Step 816 includes referencing a datastore, such as 420, that storeshistorical information about gift ideas including attributes ofpotential gifts. Step 818 includes correlating attributes of thememories information with the attributes of the potential gifts todetermining a set of proposed gifts. The correlating can also includeconsidering attributes of a second user, wherein the second-userattributes are associated with a user of the second computing device412.

Step 820 includes sending to the second computing device 412 giftinformation related to the set of proposed gifts. The method can furtherreceiving a request to send to the first user 410 a desired item basedon the gift information sent to the second computing device 412.

One embodiment of the disclosed technology facilitates a reciprocitypath even when a gift giver wishes to remain anonymous. For example, auser can use the memory-curation application 460 to prepare a gift, suchas a greeting card, including a physical card. The user signs the cardselects a unique image, such as a custom picture for the front of thecard as reflected in FIGS. 5A-5C. The user 460 requests that the card besent to a recipient anonymously, e.g., with no return address, anabstracted return address, or the return address of a company. Therecipient receives the card, scans the unique image via memory-curationapplication 426, which unique image is used as a key to identify thesender 440 without the receiver knowing. The receiver receives a list ofproposed items developed according to the disclosed technology orselects something custom. The recipient 426 can then send the responsiveitem to the sender, all with the initial sender 410 remaining anonymous.

Associating memory representations with physical objects.

Some embodiments of the disclosed technology include a method ofassociating representations of memories with uniquely identifiable itemsand additionally or alternatively, presenting such representations basedon the items, including, for example, based on receiving an image (e.g.,picture) or the physical item.

For example, a locket that is characterized by unique attributes couldcontain a physical picture. In accordance with an embodiment of thedisclosed technology, the Locket could also be associated with a digitalasset, such as a picture, video, text message, audio file etc. A usercould use a smartphone for example 2 scan the Locket, which would thenpresent the digital asset (variously referred to herein as a digitizedmemory, although, of course, the digital representation does not have tobe a memory per se).

The uniquely identifiable physical item could take on a variety offorms. For example, it could be a picture frame, jewelry item, keychain,keepsake item, wearable object, etc. FIG. 9A depicts a few illustrativeuniquely identifiable physical item 910A-L. The various shapes areillustrative and representative in nature. The physical item could havea different shape that is different than any of the items pictured inFIG. 9A. The geometric or color characteristics. Of. The physical. Item.Can alone, or in combination with other. Characteristics, make the item.Uniquely identifiable., which can include. Identifying a group. Orcategory of items. Jewelry item 910L includes an engraved handwrittenmessage 910M, which Is usable in some embodiments to facilitate theunique identification of the physical item.

Other aspects of this disclosure will be described in the context ofselecting one of the illustrative items 910A from FIG. 9A. For example,FIG. 9B depicts an illustrative uniquely identifiable physical item. Inthis embodiment, the item is composed of multiple layers or dimensionalaspects. This embodiment includes a void 912. The void is suitable forreceiving physical artifacts, such as a picture, textual message, etc.The multiple physical layers can contribute to the geometric aspects ofthe object so as to facilitate its unique identification.

FIG. 9C Depicts a side view of the physical item of FIG. 9B. As can beseen in FIG. 9C, one embodiment of the item includes a rear surface 914,a front surface 916, and a second layer 918. In the embodiment shown,void 912 is represented by broken lines. Thus, front surface 916 caninclude avoid defined by a raised edge 920, which is also shown in FIG.9B. In some embodiments, void 912 is not included.

FIG. 9 depicts illustrative characterizations that facilitate the uniqueidentification of a physical object in accordance with embodiments ofthe disclosed technology. For example, the physical item could include aset of markings 922. Markings 922 could take a variety of forms. They donot need to be two-dimensional or shapes as illustratively shown.Rather, they could be a series of markings that are understood by anidentification system so as to uniquely identify physical object 920.

In another embodiment, a QR code 924 is usable to facilitate the uniqueidentification of the physical object.

And still another embodiment, technology such as near fieldcommunications technology could be employed. For example, an NFC tag 926could be embedded in the physical object such that it facilitates orhelps facilitate the unique identification of the physical object whenit is scanned.

One embodiment of the disclosed technology allows a user to select auniquely identifiable physical object and associate a digitized memorywith it. FIG. 10 depicts an illustrative presentation 1010 that presentsvarious physical objects that can be selected and customized.Presentation 1010 can be presented on a user device such as a personalcomputer, tablet, smartphone, etc. Display 1010 allows a user to selectan object to be customized period

FIG. 52 depicts an illustrative operating environment suitable forpracticing one or more embodiments of the disclosed technology. Anidentification system 5210 identifies representations of uniquelyidentifiable physical objects, such as object 5232. In one embodiment,the identifying characteristics of item 1132 are known by and inputtedinto identification system 1110 such that those same characteristics areusable to identify item 1132 when it is later scanned.

Identification system 1110 is coupled to a data store 1112, which, insome embodiments stores attributes of the various physical items and/orlinks between physical items and their respective digital assets. Itsome embodiments, a physical item is linked to multiple digital assets,each of which can be presented or cycled through on a client device suchas device 1114 or 1116.

In one embodiment, client divides 1116 is a personal computer. It couldalso be a tablet or smartphone. It includes a client application 1118,which takes the form of a set of computer executable instructions thatare stored on non-transitory computer storage media. The devices andother hardware take the form of hardware items as described inconnection with FIG. 1 in some embodiments. For illustrative purposes,client device 1114 is depicted as a smartphone. It also includes a setof computer-executable instructions 1120. Client application 1120 caninclude captured utility 1122, user-interface controls 1124, andsettings 1126.

Capture utility 1122 facilitates the capturing of a representation ofphysical item 1132. Capture utility 1122 works with a camera of NCFreader, for example, of client device 1114. Application 1120, by way ofuser-interface controls 1124 can present a variety of controls on a userinterface of a display of client device 1114. For example, anillustrative control is shown by reference numeral 1128, which takes theform of a digital button. Control 1128 could also be a link, text item,gesture control, and the like.

When control 1128 is acted on, a capture window 1130 is presented on adisplay of client device 1114, which, for identification purposes, isrepresented by numeral 1114A. Numerals 1114A and 1114B depict differentphases of execution of application 1120. Capture window 1130 provides aborder to help guide a user to take a capture of physical item 1132.Numeral 1134 depicts a captured digital representation of physical item1132.

Representation 1134 is then usable by identification system 1110 toidentify the corresponding digital asset 1138 and present it on clientdevice 1114B. For example, perhaps physical item 1132 was given by agrandparent to a grandson who is associated with client device 1114 orclient application 1120. The grandparent could have associated his watchwith the physical device 1132, which takes the form of a picture framethat sits beside the child's bed. When the child uses his or her phone11142 to scan device 1132, it 1114 presents an image of thegrandfather's watch 1138 to remind the grandchild of his grandfather.Instead of a watch, digital asset 1138 could be a text message, words ofwisdom, digital greeting card, picture of the grandparent with thechild, a song, or combinations thereof.

FIG. 12 depicts an illustrative method in accordance with an embodimentof the disclosed technology. Four illustrative components are shown:identification system 1210, a first client device 1212, a datastore1214, and a second client device 1216. These devices are the same as orsimilar to the correspondingly named devices in FIG. 11 . “First” and“second” do not implicate any order or carry a temporal connotation;rather, they are used simply to be able to refer to various components(as is the case wherever such terms are used herein.

At a step 1218, identification system 1210 sends information 1220 to afirst client device 1212. The information facilitates presenting on adisplay of client device 1212 a representation of a uniquelyidentifiable physical item. Identification system 1210 is configured toidentify the physical item, including upon a subsequent presentation ofan image of the physical item.

At a step 1222, first client device 1212 displays one or morerepresentations of corresponding physical items on a display of firstclient device 1212. In one embodiment, the display is similar to thedisplay depicted in FIG. 10 .

At a step 1224, identification system 1210 receives an indication 1226of a digital asset to be associated with a selected physical item. Forexample, first client devise 1212 could have presented various physicalitems (as used herein, technically referring to representations ofcorresponding physical items) to a user. A user would then select one ofthe representations of a physical item to become associated with adigital asset, causing client device 1212 (or additionally system 1210)to receive and the indication of a selected physical item. For example,if a user wished to personalize a picture frame, then the user wouldselect a picture frame. Similarly, if a user desired to personalize ajewelry item, then the user would select a jewelry item. And althoughFIG. 12 depicts a selection indication 1226 as being sent from firstclient device 1212 to identification system 1210, in other embodiments,first client device 1212 itself receives the indication and facilitatesthe association of a digital asset with a physical item. Receiving anindication can include receiving a selection indication of one of theimages of the items, by a tap, click, etc.

In one embodiment of the disclosed technology, at a step 1228identification system 1210 associates the digital asset with theuniquely identifiable physical item, thereby creating a digital linkbetween the digital asset and the physical item. In one embodiment, thishappens remotely via a server system such as identification system 1210if a user is operating in a web-based environment. Alternatively, it canhappen locally on a client device, such as a smartphone.

One embodiment of the method continues at a step 1230 where the link1232 between the digital asset and the physical item is stored indatastore 1214. Alternatively or additionally, datastore 1214 storesidentifying indicia of the digital asset and identifying indicia of thecorresponding physical item, which is within the scope of storing a linkbetween the two as described herein.

At a step 1236, a request 1238 is received tat identification system1210 to present a digital asset. This request could also be received atthe client device 1236 itself. By way of example, any user of the app(e.g., 1118, 1120, etc.) could use a client device to scan a uniquelyidentifiable physical item according to an embodiment of the disclosedtechnology. Maybe a daughter scans (e.g., takes a picture) of a pictureframe using her smartphone. The phone itself could retrieve thedigitized memory associated with the picture frame, or it could send thescan to a server 1210, which accesses 1240 a digital asset via datastore1214.

Identification system 1210 receives 1244 the digital asset 1246 andsends 1248 it 1250 to the client device 1216, which renders it at a step1252. This can include showing a picture, playing a sound or song,presenting a text message, playing a video, etc.

FIG. 54 also depicts a method of an embodiment of the disclosedtechnology. With continuation reference also to FIG. 11 , step 5410includes presenting on a display of a computing device (e.g., 1116,1114) a representation 1117 (see also FIG. 10 ) of one or more uniquelyidentifiable physical items that are identifiable by identificationsystem 1110. Step 5412 includes receiving an indication of a digitalasset to be associated with the selected physical item. For example, auser could tap one of the physical items shown on user interface 1117and then, incident to a prompt, tap on a picture or video, type message,record a recording, identify a song, etc. that is to be tied to thephysical item.

Step 5414 includes associating the digital asset with the physical item.This can be carried out by storing the items in a database with a commonidentifier. It can also include storing a link that links the digitalmemory with the physical item in datastore 1112, which is accessible byidentification system 1110 such that the digital asset is retrievableincident receiving a request to present the digital asset based on asubsequent digital capture of the uniquely identifiable item.

Step 5418 includes receiving a request to present the digital asset. Forexample, a smartphone captures 1133 a physical object 1132. The step ofcapturing 1133 could include taking a picture of item 1132 as well asscanning an NCF tag or other reception of various forms of data (e.g.,beyond image data). The representation 1134 of the physical item 1132 isuseable (locally or remotely) to present, at a step 5420, the digitalasset 1138 that corresponds to the physical item. Presenting the digitalasset can include receiving a representation of the physical item, usingidentifying attributes of to physical item to identify the digitalasset, and retrieving the digital asset.

Physical item 1132 could be a piece of jewelry, a picture frame adaptedto receive a photograph, an electronic device adapted to play an audioor video message, a bottle, a packaging, a container, a keychain, andthe like.

The item 1132 could be uniquely identifiable by way of a set of specificgeometric characteristics, a set of specific markings, one or morecustom content items that are physically associated with the item, aspecific color, a near-field communication (NFC) tag, a QR code, and thelike, and combinations thereof.

FIG. 14 depicts another method in accordance with an embodiment of thedisclosed technology, including, in particular, a show a digitizedmemory (digital asset) in response to capturing a representation of auniquely identifiable physical item. Step 1410 includes presenting via acomputing device a scan control that is useable to initiate capturing animage of a physical uniquely identifiable item. The scan control 1128can be a digital button, a digital link, a textual command, a gestureoption, a handwritten message, a physical button, or an audio command.

Step 1412 includes receiving an indication that the scan control hasbeen initiated—for example a button pressed, a link followed, a gestureoccurred, etc.

Step 1414 includes presenting a capture area 1130 on the display 1114A.The capture area 1130 is defined by a capture boundary in oneembodiment. Step 1416 includes capturing 1133 an image 1134 (and/orother data) of the uniquely identifiable item 1132 within the captureboundary, resulting in a captured image 1134. Step 1418 includesidentifying a digital asset associated with the uniquely identifiableitem based on the image. Step 1420 includes presenting the digital asset1138 via the computing device 1114B.

FIG. 15 depicts another method in accordance with an embodiment of thedisclosed technology, including, in particular, a way to associate auniquely identifiable physical item with a digital asset. Step 1510includes causing a set of representations 1117 of physical items to bepresented on a computing device 1116, where each of the physical itemsis uniquely identifiable. Step 1512 includes receiving an indication ofa selection of one of the representations of the physical items. Forexample, a user might tap or click on one of the objects presented viainterface 1117.

Step 1514 includes receiving an indication of a digital asset to beassociated with the selected physical item. A user could select apicture, a video, a song, write a message, record a sound, a link to amovie or to a song, or combinations thereof. The digital asset isassociated with the selected physical item, which, in some embodiments,creates a digital link between the digital asset and the selectedphysical item(s).

Step 1516 includes storing the link in a datastore accessible by theidentification system such that the digital asset is retrievableincident to receiving a scan of the uniquely identifiable physical item.

Thus, step 1518 includes receiving a request to present the digitalasset. The request can includes a reference to a representation of thephysical item, such as a picture and/or other data. Step 1520 includesutilizing the representation of the physical item to identify thedigital asset. And step 1522 includes providing instructions to presentthe digital asset, such as via a computing device 1114B.

Digital Greeting Cards

Turning now to FIG. 16 , an illustrative system 1600 for presenting ananimated digital greeting card (for example) is provided. System 1600 islikewise useable to present animations of other objects as well, such asinvitations, postcards, notes, papers, and the like. In one embodiment,one or more computing devices 1612 facilitate the presentation of a userinterface 1614 on a remote computing device 1616. User interface 1614 isuseable to receive personalization options for customizing adigital-greeting-card animation.

For example, a user might indicate a desired background, message,picture, video, gift link (such as a QR code, unique string ofcharacters, barcode, etc.), game, sound, song, or combinations thereof.Further, a user might indicate when the greeting is to be delivered, aset of conditions that must first be satisfied to reveal the greeting(such as a presence in a geographic location, correctly answering aseries of questions, solving a puzzle, waiting one or more periods oftime, etc.). All of the aforementioned attributes and features take theform of personalization data 1622 in one embodiment.

One or more datastore(s) 1620 are coupled to the computing device(s)1612 in one embodiment. Datastore 1620 stores personalization data 1622consistent with the personalization options. Datastore 1620 can becoupled to computing device 1612 via network 1618, which, as with allnetworks described herein, may be one or more networks. Personalizationdata 1622 is usable to create an animated 3D card.

In one embodiment, rendering engine 1624 (which could be one of thecomputing devices 1612 or embodied as software as a set ofcomputer-executable instructions) is coupled to datastore 1620. Therendering engine generates one or more textures based on personalizationdata 1622 and applies the textures to a 3D model of a greeting card,thereby enabling the rendering of an animated 3D greeting card 1630 on adisplay 1628 of a remote device 1626 when requested. The animation 1630visualizes at least a portion of personalization data 1622.

Turning now FIG. 17 , an illustrative method of creating and presentingan animated greeting is provided. At a step 1710, personalizationinformation is received that useable to personalize a greeting, such asa greeting card, thank-you card, note, and the like. At a step 1712, thesystem generates an image file bas on the personalization information.In some embodiments, more than one image file is generated. If, forexample, a user customized a card with desired backgrounds, foregrounds,animations, messages, etc., then an image file is generated consistentwith those characterizations. The image file could be vector format,JPEG format, a bitmap, .png, or other format.

In some embodiments, the personalization options are tied to a physicalcard that is available to be physically printed, and the disclosedtechnology extends the reach of such a physically printable card byproviding a way to send a digital version of that card. In such anembodiment, the physical attributes of the card are known (e.g., anumber of folds, a card width, a card height, a paper type, a paperthickness, etc.).

And those can be used by system 1600 to present options associated witha digital counterpart of that card without having to create the digitalcounterpart from scratch (e.g., without the information about thephysical card).

At a step 1717, the image file is stored, in, for example datastore1620. At a step 1716, a link is associated with card information. Thelink could be a custom URL (uniform resource locator), hyperlink,QR-code, etc. The card information could include the generated imagefile, the personalization information, and/or other information, such asmetadata about the project or other information, such as a gift code(such as QR code), video, sound, or other.

The system facilitates sending the card to a recipient. For example,system 1600 could send a specific URL to an intended recipient viaemail, text, a dedicated app, push notification, or other. At a step1718, the system receives an indication that the generated link has beenreferenced. For example, a recipient may have clicked on the link ortaken a picture of a QR code (if the link was in that form).

Thus, a front-end portion of system 1600 could request data 1622 storedin datastore 1620 to be used. In one embodiment, the data is confirmedto a JSON structured format suitable for use in an animation runtime. AnAPI retrieves personalization data, enabling a JSON transformation, thatsupplies data to an animation runtime environment in one embodiment.

At a step 1722, at least a portion of the card information is used togenerate one or more textures. Image information is downloaded andconverted to a texture format useable the runtime's rendering 1624pipeline. At a step 1724, one or more textures are applied to a 3D modelof a greeting card. For example, the generated texture is applied as theprimary texture of a material applied to a 3D model of a card containedwithin the runtime. Once the relevant data is loaded, converted, andapplied, the animation is ready for playback, as indicated by a step1710, which includes generating a digital animated version of a greetingcard from the 3D model, wherein the animated version presents arepresentation of the image file and consistent with the personalizationinformation.

FIG. 18 presents another illustrative embodiment of a method forgenerating an animated version of a greeting, such as a card or otherobject. At a step 1810, system 1600 presents a user interface thatenables customization of a greeting card. The user interface ispresented on a remote computing device, such as devices 1626 or 1616 inone embodiment.

At a step 1812, personalization information is received that is useableto personalize the greeting card. Reception of the personalizationinformation is facilitated by computing device 1612 in one embodiment.The personalization information can take on a variety of forms. It couldinclude a greeting message, textual content, a code linking to amonetary value (such as QR code that allows a monetary value to beconveyed to a recipient), a link to a game, a video, a sound recording,a picture, etc.

In the case of a QR (or other) code that conveys value, a representationof the value conveyance could be illustrated on the user interface 1614of the remote device 1616/1626 so that recipients know they havereceived it. For example, upon viewing the animated greeting, a visualdollar sign is shown on UI 1614 as sliding into a giftbox.

The personalization information could also include temporal information,such as a countdown that requires the recipient to wait a set amount oftime to receive the digital greeting. For example, perhaps a fatherdesires to send a birthday card to his daughter before she leaves forcollege, but the daughter is not allowed to see the greeting until herbirthday or the end of the semester, and the greeting conveys a vote ofconfidence (such as “You did great!”), indicating that the father alwayshad faither in her abilities.

The personalization information could include location information thatprohibits the recipient from receiving the digital greeting unless therecipient is in a specific location, such as the site of one's firstdate, or first home, or restaurant, etc.

The personalization information could include questions or riddles thatthe recipient must answer correctly. Perhaps a girlfriend conditions aboyfriend's receipt of the greeting card upon him correctly naming herfavorite color and movie. Or a grandparent requires a grandchild tosolve a playful riddle.

At a step 1814, an image file is generated based on the personalizationinformation. The image file could be a JPEG, PNG, vector, or otherformat. Ata step 1816, the personalization information is stored (forexample, in datastore 1620).

At a step 1818, metadata associated with the image file is also stored.The metadata is useable to discern characteristics of the image file insome embodiments. As mentioned, the digital greeting card can correspondto a physical version of a card that can be printed and sent.

At a step 1820, a link is associated with the customized digitalgreeting card. The link could be a web link, QR code, URL, string ofdigits, etc.

At a step 1822, an indication that the link has been referenced isreceived. For example, one of the computing devices 1612 might receivean indication that a remote computing device (1616, 1626) clicked on thelink, followed the QR code, etc.

At a step 1824, the image file and/or the personalization information isretrieved from datastore 1620, and utilized to generate one or moretextures that are applied to a 3D model of a greeting card.

At a step 1830, a digital animated version of a greeting card isgenerated from the 3D model. The animated version presents arepresentation of the image file and is consistent with thepersonalization information.

To confirm and as mentioned, the steps of FIG. 18 (and all figures) donot need to be followed in the order shown. For example, the texturescould be applied and even animation generated prior to a recipientacting on the link. This would make presentation of the animationquicker.

In one embodiment, a follow-up vignette is presented to on the recipientdevice. This follow-up vignette can be a final video, animation, photo,text message, etc. that the recipient sees after delivery of the initialanimated video.

Other aspects of the disclosed technology follow.

With reference to FIG. 1 , a computing device 100 includes a bus 110that directly or indirectly couples the following devices: memory 112,one or more processors 114, one or more presentation components 116, oneor more input/output (I/O) ports 118, one or more I/O components 120,and an illustrative power supply 122. Bus 110 represents what may be oneor more busses (such as an address bus, data bus, or combinationthereof). Although the various blocks of FIG. 1A are shown with linesfor the sake of clarity, these blocks represent logical, not necessarilyactual, components. For example, one may consider a presentationcomponent such as a display device to be an I/O component. Also,processors have memory. The inventors hereof recognize that such is thenature of the art and reiterate that the diagram of FIG. 1 is merelyillustrative of an exemplary computing device that can be used inconnection with one or more embodiments of the disclosed technology.(For example, presentation component 116 may be embodied as presentationcomponent 130 and/or may be used as part of user interface 155 of FIG.1A.) Distinction is not made between such categories as “workstation,”“server,” “laptop,” “handheld device,” etc., as all are contemplatedwithin the scope of FIG. 1 and with reference to “computing device.”

Computing device 100 typically includes a variety of computer-readablemedia. Computer-readable media can be any available media that can beaccessed by computing device 100 and includes both volatile andnonvolatile media, removable and non-removable media. By way of example,and not limitation, computer-readable media may comprise computerstorage media and communication media. Computer storage media includesboth volatile and nonvolatile, removable and non-removable mediaimplemented in any method or technology for storage of information suchas computer-readable instructions, data structures, program modules orother data. Computer storage media includes, but is not limited to, RAM,ROM, EEPROM, flash memory or other memory technology, CD-ROM, digitalversatile disks (DVDs) or other optical disk storage, magneticcassettes, magnetic tape, magnetic disk storage or other magneticstorage devices, or any other medium which can be used to store thedesired information and which can be accessed by computing device 100.Computer storage media does not comprise signals per se. Communicationmedia typically embodies computer-readable instructions, datastructures, program modules, or other data in a modulated data signalsuch as a carrier wave or other transport mechanism and includes anyinformation delivery media. The term “modulated data signal” means asignal that has one or more of its characteristics set or changed insuch a manner as to encode information in the signal. By way of example,and not limitation, communication media includes wired media, such as awired network or direct-wired connection, and wireless media, such asacoustic, RF, infrared, and other wireless media. Combinations of any ofthe above should also be included within the scope of computer-readablemedia.

Memory 112 includes computer-storage media in the form of volatileand/or nonvolatile memory. The memory may be removable, non-removable,or a combination thereof. Exemplary hardware devices include solid-statememory, hard drives, optical-disc drives, etc. The computer-storagemedia can be non-transitory and/or embody non-transitorycomputer-executable instructions. Computing device 100 includes one ormore processors 114 that read data from various entities such as memory112 or I/O components 120. Presentation component(s) 116 presents dataindications to a user or other device. Exemplary presentation componentsinclude a display device, including a projector, speaker, printingcomponent, vibrating/tactile-feedback component, presentation component130, user interface, and/or the like.

The I/O ports 118 allow computing device 100 to be logically coupled toother devices, including I/O components 120, some of which may be builtin. Illustrative components include a microphone, joystick, game pad,satellite dish, scanner, printer, wireless communication device, etc.The I/O components 120 may provide a natural user interface (NUI) thatprocesses air gestures, voice, or other physiological inputs generatedby a user, for example, a user touching, motioning towards, selecting,or pointing to content projected onto a surface in a presentationenvironment. In some instances, inputs may be transmitted to anappropriate network element for further processing. An NUI may implementany combination of speech recognition, touch and stylus recognition,facial recognition, biometric recognition, gesture recognition both onscreen and adjacent to the screen, air gestures, head and eye tracking,and touch recognition associated with displays on the computing device100. The computing device 100 may be equipped with depth cameras, suchas stereoscopic camera systems, acoustic, infrared camera systems, RGBcamera systems, RF-interference detection, or the like, and/or acombination of these for gesture detection and recognition.Additionally, the computing device 100 may be equipped with (or operatein conjunction with) accelerometers or gyroscopes that enable detectionof motion. The output of the accelerometers or gyroscopes may beprovided to the display of the computing device 100 to render immersiveaugmented reality or virtual reality.

The metaverse is associated with multiple definitions. For example, themetaverse refers to a universal and immersive virtual world that isfacilitated by the use technologies such as virtual reality (VR) andaugmented reality (AR) headsets. It can also include a network of 3Dvirtual worlds that facilitate social connections. Another definition isa virtualized reality that reflects real life. Although some might referto “The Sandbox” as a metaverse or to “Decentraland” as a metaverse, asused herein, the term “metaverse” extends beyond such uses more akin to“universe,” and thereby encompassing all such items and the hardware andsoftware that facilitates interacting with and between suchdevelopments.

FIG. 1B depicts an illustrative operating environment suitable forpracticing an embodiment of the disclosed technology. A server 150 iscoupled to a communication network 152 by way of a logical or physicallink 154. Server 150 could take the form of the computing devicedepicted in FIG. 1A. Link 154 could be a wired or wireless link.Communications network 152 could be a telecommunications network, datanetwork, long-distance network, short-range network, or any type ofcommunications network.

Server 150 is coupled to client device 156 through communicationsnetwork 152 by way of link 158, which is similar in nature to link 154.Communications network 152 is coupled to a blockchain 160 by way of link162. Blockchain 160 could utilize distributed-ledger technology and iscapable of facilitating interaction with a smart contract 164. Smartcontract 164 is a set of code that executes automatically anddeterministically in response to a set of inputs. Information to andfrom blockchain 160 can be facilitated by way of one or more oracles.

Blockchain 160 stores a series of transactions represented by numeral166. In this way, a non-fungible token 168 or number of tokens (“NFTs”)can be kept track of by way of blockchain 160. Although technically, NFT168 might be a token stored on blockchain 160, herein, the term “NFT” isused synonymously herein to refer to a digital asset 170 to which NFT168 refers (reference is made to the digital asset as the NFT despitesome making a technical distinction). Blockchain 160 can be, forexample, the Ethereum blockchain or similar. Item 160 also representsmultiple blockchains, include side chains, shard chains, or chains atdifferent layers, such as layer-2 blockchains that rollup transactionsor report only net results on an underlying layer-1 chain.

In some embodiments, digital asset 170 is associated with user 178, asrepresented by dashed line 174. For example, a user's digital wallet 180is useable to access the public & private keys that are associated withdigital asset 170. As indicated by broken line 176, user 178 can also beassociated with client device 156, which could be a computer, mobilephone etc., and could include metaverse-related hardware such as a VRheadset or other.

In FIG. 1B (and in all figures), items depicted in the singular couldactually be multiple (e.g., server 150 could be multiple servers,communications network 152 could be multiple networks, etc.). All or aportion of the various items depicted facilitate interaction with avirtualized environment 190.

An aspect of an embodiment of the disclosed technology relates tovirtualized gifting. For example, crowns, hats, necklaces or otherwearable items can be obtained, purchased, or conveyed to others to helpthem mark special days or occasions. These items could also provideexclusive access to events, experiences or locations.

Wearables in virtualized environment 190 can include items that adigital avatar could wear, including all forms of clothing, accessories,and similar. In one embodiment, the wearables are context-specific tocelebrations. Thus, an avatar is outfitted with a first set ofwearables, but upon entering a given location or participating in acertain event, the wearables are automatically updated. Thus, forexample, users 178 could customize their avatars with wearablesrepresented as digital assets 170. Ownership records of the wearablescan be stored via blockchain 160. As users 178 enter into atropical-themed space, for example, their wearable 170 would transform(actually or in appearance) to tropical-themed clothing. For example,the wearable 170 could be exchanged with a different digital asset 170or it could be a single asset that is capable of assuming differentappearances. The wearable could be a dynamic NFT.

Thus, digital assets 170 could be digital wearables, digital displayable(e.g. ornaments, yard signs, etc.), digital collectibles, digital“tools” that have unlock abilities. For example, the asset 170 isprogressively more revealed or more fulfilled the more it is unlocked,which could occur by completing levels of engagement, answering triviaquestions, completing games, completing a threshold number of giftings,etc. Ownership of virtual items 170 could be provided as a result ofpurchasing of physical goods in some embodiments.

Context-specific wearables can be used to recognize significantoccasions, events, and holidays in a virtual space. For example, theycan satisfy a desire to give a surprising and meaningful item to others,such as user 178 gifting item 184 to user 182. In that way, atransaction 166 would be logged in blockchain 160 to indicate thatdigital asset 170 was now associated with user 182 instead of 178.

The wearables 170 can be unique and traceable assets that connect todata about the owner whether actively connected or passively derived.This data can cause the wearable to automatically accent or adorn theowner's avatar in a virtual space on specific days, in specific virtuallocations or during specific celebrations.

Wearables 170 can be digital assets that connect to information aboutthe owners of the items. When purchased or received, they can beused/worn immediately and then upon future pre-programmed occurrences(e.g., in the virtual environment, via smart contract 164, etc.), theycan also automatically appear from an avatar's inventory, storage orother non-active location onto the avatar's active person. This canoccur through triggers pre-programmed into the item for example,birthday, holiday (like Halloween), anniversary of a friendship or event(e.g. first purchase in the metaverse), proximity to a location (e.g.upon arrival at a virtual event hall), proximity to another avatar (e.g.arrival to a location of a friend), in recognition of a milestonetransaction/achievement (e.g. 60th purchase), etc.

Upon activation, the item 170 could either replace an existing item,whereupon that item would be transferred to inventory, storage oranother accessible location, or be superimposed upon the previous itemfor a time that the celebration wearable is used. Although thecelebration wearable may be smaller than the original accessory, theoriginal item may not appear below it while superimposed, essentiallyalso making the original item invisible. Any other participants in thevirtual world will only see the celebration item in the area that it isworn as well.

These virtual items may be visible when observed in a digital 2D screen,3D video on a VR device or movement-sensitive 2D screen, or throughaugmented reality lenses.

Automatic deployment can be carried out based on data triggers.Context-specific designs (e.g. birthday hat for birthday occasions,friendship necklaces for friend proximity, etc.) Visual prioritizationcan be relevant to pre-existing adornment

Similar capabilities could be embedded within decorative virtual objectsfor virtual homes, lands, space, or even other objects or virtual pets.Upon receipt of an item, instead of the trigger being automatic, anowner may be prompted to indicate at what time, date, location, etc.they would like the item to deploy. Items could also be used asscreening for admission to online events only during that specifiedtime, discounts, or exclusive interactions.

Aspects of one embodiment of the disclosed technology, including aspectsrelated to virtual gift items and functional formats. In accordance withan embodiment of the disclosed technology, user 178 can gift virtualitems 184 that bestow new interactive or virtually functional benefitson their owners. For example, user 178 can give user 182 a bow thatshoots ornament-laden arrows up onto user 182's virtual Christmas treeto make a decorating experience more engaging.

There are problems with the prior art. Virtual displays of NFTs, itemsor creations can—absent the disclosed technology—be static,uninteresting and unimaginative, often not reflecting the behavior orinteraction a human has with them in real life. Plus, placement of itemsin 3D virtual worlds can be difficult requiring movement by avatars thatis not enabled.

The functional items described herein can carry unique item/avatarinteractions in the decorating, delivery, and similar processes. Theyare dynamic and entertaining, encompassing directed or automaticanimation, temporary effects or permanent, and have virtual impact. Someillustrative use cases follow.

An ornament launcher is a new way to place items (including 3D items)within virtual environment 190. Instead of awkward and clunky movementsand interactions to place decorative objects in 3D space, users can aima target using the launcher onto any owned/rented 3D space. Once thetarget is locked on that location, an item (e.g., 170) in theirinventory or held by their avatar can be “launched” to that locationwhere it will be displayed until removed or until it's period of displayends.

A card shower is a delivery of virtual messages shown in rendered paperforms, starbursts, or even chirping birds. When sent to a location, theyappear and burst into a cascade or cloud of messages that flutter to thevirtual ground. Each singular object/item carries with it a uniquemessage from a sender in one embodiment.

The snowball sweater is a wearable experience generator that can enablethe avatar wearing it to throw virtual snowballs a certain distance fromtheir position. This distance may vary and may be affected by factorssuch as walking/running, location (uphill, indoors, etc), skill level ofthe wearer, or even strength of the relationship from the person whogave it.

If an existing item is in that location, the decor item may not belaunched/dropped or may be automatically redirected to an adjacentspace, preventing overlap in one embodiment. An owner and any otherparticipants in the virtual world 190 will be able to see the displayeditems in their location and also the movement of them from their pointof origin (e.g. avatar holding them, appearance in the “sky”, etc.) inone embodiment.

Virtual items and actions may be visible when observed in a purelydigital 2D screen, 3D video on a VR device or movement-sensitive 2Dscreen, or through augmented reality lenses. They will appear differentfrom different angles as a realistic 3D item would in one embodiment.The movement or presentation of them would be temporary and only able tobe revisited through video of the event in one embodiment.

An embodiment of the disclosed technology facilitates dynamicpresentation/placement and aided display of virtual goods.

An embodiment of the disclosed technology facilitates dynamicpresentation/placement and aided display of virtual goods.

Multiple participants, each carrying an enabling object/service, couldparticipate at one time in one embodiment.

Embodiments of the disclosed technology contemplate functional virtualitems and decor. For example, a gift, meanwhile, becomes a relationshipexperience. In virtualized environment 190, gifts can come with playfulbonuses or a social interaction built in. A holiday sweater, forexample, can be purchased in a local environment. It can come with abackpack full of snowballs. Thus, it can become an invitation for peopleto connect and play in the virtual snow. Holiday décor could be sold inkits, to facilitate overlaying one's virtualized home or event spacewith intriguing, interactive elements, such as hearts falling like snowon a Valentine's Day date or reindeer flying through a family holidayparty. Multiple themes are available in some embodiments and aestheticsso people could choose a desired design look and feel.

Aspects of celebration items are contemplated in accordance with anembodiment of the disclosed technology. Digital items, accessories, anddecor 170 are made available to celebrate a special day in oneembodiment. These could include digital balloons, flower bouquets andstreamers or wearable items likes crowns, capes, party hats, and stringsof beads.

Items could confer special abilities, experiences or access to theowner/wearer. This allows familiar formats available to recognizesomeone's important day, making them feel special. An embodiment of thedisclosed technology enables reminders and keepsakes of virtualinteractions.

Aspects related to dynamic augmented reality experiences includekeepsakes unboxing. For example, positions of an ornament box lid unlockdifferent levels of an augmented-reality experience, beginning with aglimmering of excited anticipation, followed by celebration as the boxis opened and culminating in full animation when the box is fully open.

As another example, moving a box lid relative to a phone camera (part ofdevice 156) identifies different images associate with a folded paperbox and enhances the opening experience. As shown, the front of the boxbegins an anticipatory experience while turning the box to view the lidin addition to the front of the box advances the excitement of theanimation in one embodiment. When the box is completely open, ananimation specific to the ornament is augmented across the screen in oneembodiment.

Wrapped gifts viewed through a digital lens glimmer with excitedanticipation while still closed/filled, followed by celebration as thegift bag is opened or tissue is removed and culminating in fullanimation when the bag is fully open in one embodiment.

In another example, as a parent takes a video of a child on Christmasmorning, one package wrapped in a gift bag gleams on his video screen.As his daughter opens the gift bag, the animation builds with confettiand streamers until the bag is fully open and all the tissue paperremoved in one embodiment. Then, on his screen digital reindeer thatmatch the gift wrap design begin dancing in one embodiment.

There are problems with the prior art. Augmented experiences that changebased on the form/position of a 3-dimensional object are not on themarket today. Reality is three-dimensional, with rich data to moreenhance gifting actions that foster rich interpretation, delivering deeppersonalization has yet to be harnessed.

Augmented experiences that transform based on the form/position of a3-dimensional object will fundamentally transform the nature of gifting.An aspect of this disclosed technology simplifies the process oflayering computerized information over living or non-living objects tocreate deeper personalization of the gifting process.

In one embodiment, augmented reality can be deployed using special 3Dprograms which superimpose animation in the computer program, to aunique AR “marker” in the real world.

Positions of an AR “marker” unlock different levels of AR experience,beginning with a glimmering of excited anticipation, followed bycelebration and culminating in full animation.

A working mechanism of augmented reality leverages a smartphone cameraas an input device for image recognition. As the camera points at areal-world object such as a bag or box, the camera lens switches tograyscale for faster image processing. The presence of a unique markerdefines the experience.

After the initial object detection, built-in AR software extractsimportant features and stores them in the system's available memory. Inreal-time, the details captured are object coordinates, length, width,relative distance, and main features like shape, color, size, etc.

Once the data is stored, the camera and the object form a relationship.The software chooses the content associated with the marker and sends itout to overlay the object. In some cases, it downloads virtual contentfrom a host server, also known as AR Cloud, such as server 150.

Reflectors, such as smart mirrors can be an integral part of AR devicesas it overrides the physical background with virtual overlays for theviewer. An array of concave or convex mirrors can be used to align imageillumination with the user's vision and hype up the perception ofreality.

Packaging could include an indicator of the type of corresponding ARenhancement that is possible to activate with a particular item of giftpresentation.

Memorable moments captured within the AR experience could be storedthrough the app-access or in the phone's native album. These could alsobe projected at scale into virtual environment 190 for enjoyment by agiver over distance.

In one embodiment, a gift container can be scanned from a number ofdifferent angles and software recommends specific products to includeinside of the specific container to build out a perfect gift in a basketor container that the giver already owns.

In one embodiment, a user can swap in/out different items to virtually“build their basket” and then order the collection of things as a totalset to be mailed directly to them . . . even the clear plastic wrap!

Aspects of a gift giving service or delivery service are included. Inone embodiment, when someone wants to give a gift to another invirtualized environment 190, it arrives through public delivery by ananimated character. The character delivering the gift could follow therecipient's avatar around the virtual world until the gift was openedand as more gifts are received, the line of deliverers could grow in oneembodiment.

There are problems with the current state of the art. The exchange ofgifts is deeply rooted in many societies and has been widely recognizedas both socially and economically important. Gifting services are alongstanding aspect of traditional physical/online retail experiencesand are now finding their way into the metaverse. A myriad of digitalartifacts can be exchanged online. While previous studies suggest thatthese are sometimes considered to be gifts, a feature of this disclosedtechnology is a process that will enhance explicit acts of digitalgifting by which we mean situations in which people deliberately chooseto give (and receive) digital media as gifts from the outset.

A method enabling a first party to purchase a gift and to deliver thegift to a second party includes providing a virtual environment 190 thatenables the first party 178 to mint an ERC-1155 ASSET NFT 168 as a gift184 in the environment, receiving a pseudonym or identifier of thesecond party 182 from the first party, procuring a location in thevirtual environment of the second party 182, and delivering the gift 184to the procured location. Gifting the 168 NFT is the process oftransferring an NFT from one's wallet 180 to someone else's wallet inone embodiment.

An embodiment of the disclosed technology enables a gift-giver 178 tosend a gift 184 to a recipient 182 even when the gift recipient'svirtual environment (e.g., world) location is unknown to the gift-giver178. However, the receiver of the gift is a part of a list of allowedparticipants in one environment. For example, a “Friends List” couldcontains the realm, coordinates, and island of the potential recipient.

An illustrative process is now described. Connect one's ERC-20compatible digital wallet 180. Mint an ERC-1155 ASSET NFT 168 (entities(peoples or animals), equipment (swords, shields, or helmets), andwearables (cosmetic items changing an avatar's looks)) of the proposedgift in the ERC-20 token representing cryptocurrency supporting avirtual world 190. Create or retrieve a cute avatar of the gift bearer(Unicorn, Puppy, etc.).

A second embodiment is now described. Mint an ERC-721 LAND NFT 168 thatrepresents plots of virtual land of the proposed gift 184 in thecryptocurrency supporting a virtual world 190. Choose the ERC-1155 ASSETrepresenting the personalized “box” for the ERC-1155 gift. Choose thecute default gift bearer avatar or purchase the ERC-1155 avatar upgradein the virtual world marketplace. Deploy cute gift bearer using realm,coordinates, and island or recipient.

In one example, a gift presentation becomes an unwrappingexperience—where the delivery method is part of the surprise, the revealis something magical, and the recipient feels extra special.

In one example, anytime someone wants to give a gift to another personin the virtualized environment 190, it arrives as a wrapped item outsideof their “home” location. The gifts could amass in a large pile in frontof the recipient's home in anticipation of an event or until they areopened.

In one embodiment, anytime someone wants to give a gift to anotherperson in the metaverse 190, it arrives in a fantastic and visiblefashion. This could be through public delivery by an animated characteror the appearance of the wrapped item outside of their “home” location.The character delivering the gift could follow the recipient's avatararound the virtual world until the gift was opened. Or gifts could amassin a large pile in front of the recipient's home in anticipation of anevent.

Unique perspectives can be created by looking at layers of paper throughdifferent views unlock or transition between different AR experiences inone embodiment.

Aligning a camera to look through the archway (vs. from the side or atan angle) aligns the image of the layers of paper just right to unlockthe associated 3-dimensional AR animation of girls swinging in oneembodiment.

When viewed from other angles, different animated experiences may beunlocked to help guide the viewer into the experience. Or they maypresent different content like animated views of what the scene couldlook like outside the card.

This facilitates expansion of an immersive experience beyond a singledimension to multiple dimensions and varied experiences.

A feature of the disclosed technology provides for an expansion of animmersive experience beyond a single dimension to multiple dimensionsand varied experiences.

Expansion of an immersive experience beyond a single dimension tomultiple dimensions and varied experiences

In one embodiment, AR applies multiple different image trackers in asingle product for a dynamic experience. Depending on which image isvisible, the experience changes. An initial recognized tracking point orimage may initiate the digital 3D experience and that experience maypersist as the object rotates and moves continuing to tether the 3Dvirtual animation to the physical marker in one embodiment. However,when the object folds or rotates to a new position in which a new markeris identified, the experience may change. This new position may beachieved by rotation, but also by folding and transforming the paperfrom one shape to another.

These virtual experiences may be visible when observed in 360 degrees ona VR device or movement-sensitive 2D screen, or through augmentedreality lenses

Virtual experience persistence is enabled while consistently comparingvisual input to known image triggers. Physical objecttransformation/manipulation yields a virtual experience transformation.

Other folded paper or transformative devices can include multipleoptical triggers (e.g. folded packaging—Greeting Card Explanation—wherea folded flat card can trigger an explanatory AR experience while thefully unfolded card can yield a more interactive and entertainingexperience)

As added content in the video of an experience opening a card or packageand/or as a descriptive and informational overlay to help understandmore about the product/object

Aspects of the disclosed technology could be used as instructional stepsthroughout the construction of an object—every time the next step isreached successfully, the image is recognized and the next step isdescribed/displayed (e.g. origami folding).

Other aspects of dynamic augmented reality experiences include greetingcard explanation. These aspects relate to an experience such as shoppinga display of upright, folded cards initiates an AR experience of productexplanation while using the same AR lens on the unfolded productinitiates a fully animated, digitally extended experience.

For example, shopping the greeting card display through the AR lensshows what a card could look like unfolded without the shopper needingto remove it from the shelf. When the card is removed from the shelf andpopped open, unfolded or otherwise transformed, different visual markersrevealed launch new AR experiences or animated content. This could beachieved through popping up the layers of paper, moving them relative toeach other or even opening up the greeting card.

Aspects of physical gifts/me-to-you connecting include automatic “photo”card delivery. In one example, a card arrives at someone's home with amessage and “photo” from their friend that they have only knownvirtually. This friend doesn't know their address (and doesn't have to)and the card was automatically sent, for free, based on in-gameinteractions.

Physical delivery can be designed according to the expected recipientpredefined meta preferences or insights about the sender and/orrecipient.

Additionally, the likelihood of physical card sending may increase atcertain occasions, seasons or events known to have meaning to eithersender and/or recipient.

Game-based connecting extends beyond the screen into real world space.

The disclosed technology enables reminders and keepsakes of virtualinteractions and provides exposure to a commercial targets with relevantsolutions and potential loyalty growth. It can favorably influenceevolution of digital connecting behaviors and increased brand awareness.

Prior-art problems include preference for interaction with physical, IRLobjects can be provided, and electronic-free memory-keeping andcommunication devices

Automatic-card-delivery aspects mark a moment in time when a thresholdof digital/virtual communication is reached by automatically sending aphysical greeting, postcard or note to one or both of the parties in therelationship. This card can include photos, content and/or textrepresentative or directly derivative of the virtual communication.

One method includes, upon setting up an account, a user indicates awillingness to share address information with the greeting cardmanufacturer for the purpose of redeeming in-game rewards. This addressis kept confidential and not shared with other game participants orcompanies and is used solely for the purpose of fulfilling rewards.

Thresholds of interaction and/or communication can be set. Upon reachingone of these thresholds a stored photo from the game could be applied toa greeting card design, physically printed and automatically mailed tothe recipient by the card manufacturer.

Alternatively, the sender could be notified that they have reached therequired reward level and asked to choose among variables for thecreation of the card, such as the included photo, specific message tothe recipient, and/or card design. They may also be asked whether theychoose to redeem this reward now or at some later date.

An accumulation of rewards could unlock more unique, larger and/orvaluable printed cards.

Automatic deployment based on significant data triggers and storedaddresses can be provided, as well as printing of images from virtualscenarios.

Aspects of physical gifts/me-to-you connecting include automatic giftcreation. In one example, automatic product creation based oninteraction in a virtualized environment is provided. Physical giftingengagement and creation and sending of a unique make-on-demand productcorresponding to meta engagement/preferences are provided.

Physical gifts could include 2D images printed onto 3D substrates, 3Dprinted items (e.g. ornaments, figures, toys, etc.) from a 3D in-gamerendering of a character, object or scene, or other custom manufacturedobject.

Aspects of physical artifacts include connection to digital gifts. Inone embodiment, receipt of a digital gift causes an excited motion ordisplay in a tangible item. Whether currently in the metaverse or not,the recipient will anticipate the surprise of their virtual giftopening.

Aspects of the disclosed technology relate to a social network usingtangible collectables. This can take the form of tangible productscommunicating with each other in the same household or to otherhouseholds. Each object enables the virtual presence of a person orgroup of people and facilitates one-to-one, one-to-many, many-to-one,many-to-many communication in one embodiment. Each product can send datato each other in the form of (image, audio, video, text, motion,animation, play pattern, etc.) in one embodiment.

This aspect uses turn based interactions and leverages existinginfrastructure. An embodiment of the disclosed technology can be used torecord an input from the user, send this data to another connectedproduct, then interpret and display the data based on the concept/formfactor in which the product is designed. This data can affect the(physical) state of the receiving product, depending on the form factor.(e.g. it can cause it to change color or glow with a response, move withexcitement, display a text message, shift figures on a diorama, play anaudio recording, cause more lights to come on a tree, etc.)

Example: A connected book that records and sends consumer audio toanother connected book, allowing the 2nd book to play that recordingback. A sculpted figurine that allows you to choose a pre-recordedlicensing message to activate within another connected figure connectedacross the miles. E.g. One person has a figurine and another person hasanother figuring. They could send catch phrases to each other byselecting one that would activate it in the other. “I love you.” “Iknow.”

Family legacy Audio album—each family member has own copy of same album.Each use can initiate by recording their voice into any frame in theircollection. Each member records their answer to their prompt in thealbum. Voice message is shared with corresponding frame(s) connectedacross the internet. All recorded answers are collected in all albumsand are accessible by designated group of users (the family).

Aspects of connected physical artifacts include in real life (“IRL”),NFT, or digital memory display. A holographic display projects 3Dimages/video of meaningful art or memories in physical space. EXAMPLE: Awireless connection allows display of an NFT, avatar, or other assetfrom the metaverse into real space. A speaker, mini projector(s) and aholographic 3D canvas allow 360 viewing/experiencing of the asset. Asensor could control its orientation and a mute button its sound. Indisplay mode it might stay silent and just cycle through a few previewframes, but play mode it would enable the full experience in oneembodiment. When turned on, it becomes an extension of the virtualasset, checking with blockchain 160, so there can be only one physicalinstance of the digital asset 170 in one embodiment.

Aspects of connected physical artifacts include connection to digitallocation/engagement. Playful plush avatars provides an illustrativecontext. EXAMPLE: A plush with accessories (birthday hat, Santa hat,adventure hat, etc.) Consumer puts accessory on the plush and it sends asignal to the virtual avatar of the same plush in the metaverse. Nowthat avatar is ready for a party, or ready to adventure, etc. This couldwork with other concepts.

Aspects of physical artifacts include sensory companion items.Ornaments, cards or other physical objects deliver sensory enhancementsto the digital experience. EXAMPLE: physical objects round out a virtualexperience by delivering the multisensory components of the metaverse.Small textiles or scented greeting cards corresponding to places orobjects in the metaverse create full immersion. These objects could alsoserve as automatic rewards sent to a recipient based on in-gameinteraction between the sender and the recipient or they could bephysical objects delivered when the corresponding digital item ispurchased in the metaverse marketplace.

Another example follows. Recordable Storybook with legacy upload andvirtual playback experience. A problem with the prior art is thatrecordings are not forever and sometime are lost as thebooks/electronics age. This is especially hard on the consumer when theloved one who recorded the book initially has lost their voice or passedaway.

An embodiment of this disclosed technology will solve this legacy issueand allow a virtual twin of the experience to come into being by: addinga title and unique identifier code and cable connection (or wirelessradio or audio signal) into the book to allow the recordings to beuploaded into the same virtual title, tied to a user account in oneembodiment. Consumers will have the option of experience the sameconsumer audio playing while a virtual version of the book is heldbefore them.

Should the real-life version of the recordable book fail in the future,consumers will have the option to download their virtual copy of theaudio into a recordable book purchased at retail (or ordered online) inone embodiment. In the latter case the replacement book will arrivealready with the audio they initially associated with that title.

Other versions can have the consumer recording directly into theirmobile device or VR wearable and having the audio stored for futurevirtual experiencing or POD tangible output.

Aspects related to connecting items/services are contemplated within thescope of an embodiment of the disclosed technology. An example includesa greeting card in a virtualized environment 190 becomes a new form ofecard and can range from a simple designed message like you see here(which is a step up from the plain messages one can send today) to afull virtual-reality story and wish.

Aspects of virtual gift tags include tags to add giver information andmeaningful context. EXAMPLE: a virtual gift given in a virtualizedenvironment 190, across platforms, has a virtual gift tag added toprovide context to the giving scenario, convey a feeling or identify thegiver, e.g., a paired virtual gifting experience with reciprocity.

The act of gift giving is often an experiential in real life experiencethat is enhanced by the consumer taking the extra step in wrapping andpresenting the gift in a “special” manner. Putting this extra effortinto the giving makes the receiving of the gift that much meaningful.There is no easy way to give and enhance the giving while also closingthe loop with the sender.

An embodiment of the disclosed technology provides an experience thatmimics the gift presentation and surprise and delight that occur in reallife and brings it into the metaverse. The process takes advantage ofthe visual and experiential storytelling that can occur virtually andgives the sender and recipient a level of privacy protection andspecialness with the giving and receiving. It also allows the closing ofa giving loop by automatically sending a conceptual message back to thesender (letting them know that it was opened) as well as giving therecipient a chance to thank the sender quickly and easily.

An embodiment of a virtual gift tag acts as a gift identifier and comeswith an associated virtual wrapper/container. The tag can bepersonalized with the recipient's avatar and/or name. It can have apublic (recipient name/avatar) AND private state (message, handwriting,photo, video recording).

The gift tag can operate in conjunction with a virtualwrapper/container, which can take on numerous forms within an invisiblegeometric 3d bounding box, sphere or other shape. The wrapper thatcontains the virtual gift can be any decorated static or animatedstorified form (bird, spaceship, blooming flower, swarm of fireflies,box, skull etc.) or any state of matter. The wrapper will hover near theavatar waiting until selected by the recipient whose account isassociated with it in one embodiment.

No one else can interact with the wrapper at this point, but they cansee it in one embodiment. Selecting the wrapper will allow the user toaccess the virtual gift tag. At this point the user will know who it isfrom. Only the user can select the tag and experience the privatemessage from the sender it in one embodiment.

The user can then open the wrapper/container which does 2 things it inone embodiment. First, it allows the wrapper to “open” experiential way.(e.g. the fireflies fly away, the box unfolds, the bird explodes intofeathers, etc.). Second, it reveals the virtual gift (which grows insize to fit the original invisible bounding box).

Depending on the user's privacy settings, others within the metaversemay see this gift as well. Third, a return message is sent to the senderin the form of a miniature conceptual version of whatever the originalwrapper was. (Like a single firefly zooming off to the sender.)

One feature of this service is that the virtual gift tags and wrapperwould be available within any virtual gift checkout on any number ofvirtual worlds. This would add an interoperable universal storytellinggifting enhancement to any giving situation. At the point of checkout,the gifter can choose from any experiential gift wrap option to enclosetheir gift within. They will see an animated preview of what therecipient will experience.

Aspects of calling-card type of features are contemplated. Virtualobjects with identification information. EXAMPLE: the disclosedtechnology provides for meeting someone new in the metaverse, assistedwith the transfer of digital calling cards. These cards could providemethods for direct virtual connection or even greater functionality likethe ability to know when a contact is also online and where to findthem.

Event spaces in a virtualized environment 190 are disclosed and relatedto themed spaces. Pre-decorated spaces by season, occasion or theme arerentable for personal use or gatherings in one embodiment. EXAMPLE:people can rent a space fully equipped with seasonal or themed decor fortheir friends, family or acquaintances to gather for an event. Thesespaces could include interactive items, décor, or even games.

Aspect of collaborative virtual home ownership are described. Oneexample relates to a place where traditions, history, and culture areembedded into the decorations and activities. EXAMPLE: families cancreate shared virtual spaces to decorate, gather and relive personaltraditions for the holidays. These virtualized “homes” becomecollaborative collections of objects and architecture that represent thethings and people that mean the most to them.

Rights to the space can be determined by designations given to eachparticipant/family member. The original host can choose to sharehost/hostess access, member, or guest access with each person andassigns the associated rights. Hosts/hostesses can be multiple and eachcan add to/take things from the space and move things around. Membersmay be able to move things around and pick them up, but cannot removethem. Guests may only be able to move or look in detail atobjects/scenery.

Open access to multiple people as defined either by the host/hostess orowner(s) is provided.

Another example related to celebrations in the metaverse is described.The disclosed technology provides for an event architect, planner, andhost. A themed 360-degree dream is provided for parties with creativeenvironments, decor, playlists, digital wearables, activities and games.An immersive licensed experience could be offered—like a party in awell-known space, where participants could fly on broomsticks or designa magical birthday cake. Celebrations in the Metaverse combinecreativity, storytelling, bringing people together.

Home-related aspects include allowing users to create shared virtualspaces to decorate, gather and relive personal traditions for theholidays. These metaverse homes become collaborative collections ofobjects and architecture that represent the things and people that meanthe most to them. This provides customizable space for people to sharetraditions and experiences and an opportunity to connect from anywhere.It also provides digital land/space sales revenue and/or digital productsales revenue, exposure to a new consumer target with relevantsolutions, and influence evolution of digital connecting behaviors.

Entertainment avatars/services include birthday-party hosts. Oneembodiment provides virtual birthday party assistants. EXAMPLE: anyonecan host a virtual birthday party without all the curation, imaginationand direction required to put one together completely. Services areprovided to decorate the space, deploy the games and serve as hostswhile guests arrive and participate in activities.

Many different arrangements of the various components depicted, as wellas components not shown, are possible without departing from the scopeof the claims below. Embodiments of the disclosed technology have beendescribed with the intent to be illustrative rather than restrictive.Alternative embodiments will become apparent to readers of thisdisclosure after and because of reading it. Alternative means ofimplementing the aforementioned can be completed without departing fromthe scope of the claims below. Certain features and sub-combinations areof utility and may be employed without reference to other features andsub-combinations and are contemplated within the scope of the claims.

Although the subject matter has been described in language specific tostructural features and/or acts, it is to be understood that the subjectmatter defined in the appended claims is not necessarily limited to thespecific features or acts described above. Rather, the specific featuresand acts described above are disclosed as examples of implementing theclaims, and other equivalent features and acts are intended to be withinthe scope of the claims.

What is claimed is:
 1. One or more non-transitory computer-storage mediahaving computer-executable instructions embodied thereon that, whenexecuted by a computing device, cause the computing device to perform amethod, the method comprising: receiving a first image of a firstportion of a greeting card wherein the first image includes identifyingdata useable to identify the first image; storing the identifying datain a datastore; associating the identifying data with a first user;determining characterization information from the first image thatcharacterizes aspects of the first image; receiving from a computingdevice a second image of a second portion of the greeting card whereinthe second image includes at least part of the first portion of thegreeting card; utilizing the second image to identify the first user;correlating the characterization information of the first image toattributes of one or more product offerings; and communicating anindication of at least one of the product offerings to the computingdevice.
 2. The computer-storage media of claim 1, wherein the firstimage includes a set of fiducial marks that are recognizable by acomputer software program, wherein the fiducial marks allow the size andlocation of the image to be determined in absolute terms.
 3. Thecomputer-storage media of claim 1, wherein the greeting card is aphysical card or digital card.
 4. The computer-storage media of claim 1,wherein the identifying data is all or a portion of the first imageitself, including an image on a face of the greeting card.
 5. Thecomputer-storage media of claim 1, wherein storing the identifying datain a datastore includes one or more of (1) storing the first imageitself or (2) storing information about the first image.
 6. Thecomputer-storage media of claim 1, wherein utilizing the second image toidentify the first user is facilitated by comparing attributes of thesecond image and to attributes of the first image, wherein theattributes of both the first and second images were stored via thecomputing device.
 7. The computer-storage media of claim 1, whereincorrelating the characterization information of the first image withattributes of one or more digital offerings includes referencing adatastore that stores information about one or more of the following:past purchasing information about other users who have attributes incommon with the first user; products rated highly by other users whohave attributes in common with the first user; past purchasinginformation about purchases of the second user; attributes of the seconduser; attributes of the first user; attributes of other users who haveattributes in common with the first user; attributes of other users whohave attributes in common with the second user; or attributes of thefirst image.
 8. A memory-curation system comprising at least oneprocessor and at least one non-transitory memory including computerprogram code, wherein the computer program code, when executed by the atleast one processor, cause the processor to perform steps comprising:receiving a first image from a first computing device; storing the firstimage in the datastore; associating the first image with a first user;receiving a request to send the first image to a second computingdevice, wherein the request is made via a first instance of amemory-curation application, sending the first image to second instanceof the memory-curation application running on a receiving device;receiving from the second instance of the memory-curation application areciprocity-help request that includes a request to receive proposeditems to send to the first user in response to receiving the firstimage; identifying proposed items incident to receiving thereciprocity-help request; sending at least a portion of the proposeditems to the second instance of the memory-curation application.
 9. Thememory-curation system of claim 8, wherein the proposed items includedone or more of the following: a physical item such as a physical gift; adigital item such as a song, movie, picture, digital writing, or audioclip; a suggested message, such as what to write on a greeting card,what to say for a life event (such as a joyous event or a bereavement),what to write on a hang tag of a gift bag, a customization panel on acustomizable ornament, or combinations thereof.
 10. The memory-curationsystem of claim 8, wherein identifying proposed items incident toreceiving the reciprocity-help request includes referencing a data storeto determine the proposed items and wherein the datastore stores one ormore of the following: past purchasing information about other users whohave attributes in common with the first user; products rated highly byother users who have attributes in common with the first user; pastpurchasing information about purchases of the second user; attributes ofthe second user; attributes of the first user; attributes of other userswho have attributes in common with the first user; attributes of otherusers who have attributes in common with the second user; or attributesof the first image.
 11. The memory-curation system of claim 8, furthercomprising: receiving from the second instance of the memory-curationapplication a sending request to send at least one of the proposed itemsto the first user; and facilitating the sending of the at least oneproposed item to the first user.
 12. The memory-curation system of claim10, wherein facilitating the sending of the at least one proposed itemto the first user includes one or more of the following: sending the atleast one proposed item to the first user by referencing a user profileassociated with the first user to obtain address information of thefirst user; in the case where the at least one proposed item is adigital item, sending the digital item to the first instance of thememory-curation application running on the first computing device or toa digital address associated with the first user; in the case where theat least one proposed item is a physical item, sending the physical itemto a physical address associated with the first user.
 13. One or morenon-transitory computer-storage media having computer-executableinstructions embodied thereon that, when executed by a computing device,cause the computing device to perform a method, the method comprising:receiving at a memory-curation server memories information related to afirst set of images that are associated with a first user, wherein thememories information is received through a communications network andsent by a first computing device; receiving at the memory-curationserver a privacy indication that indicates at least a portion of thememories information is allowed to be accessed by others; receiving atthe memory-curation server a request for proposed gift ideas relevant tothe first user, wherein the request is received from a second computingdevice; referencing a datastore that stores historical information aboutgift ideas including attributes of potential gifts; correlatingattributes of the memories information with the attributes of thepotential gifts to determining a set of proposed gifts; and sending tothe second computing device gift information related to the set ofproposed gifts.
 14. The computer-storage media of claim 13, wherein thecorrelating further includes considering attributes of a second user,wherein the second-user attributes are associated with a user of thesecond computing device.
 15. The computer-storage media of claim 13,wherein the method further comprises receiving a request to send to thefirst user a desired item based on the gift information sent to thesecond computing device.