Systems, apparatuses, and methods for secure beacon authentication via mobile devices

ABSTRACT

Systems, apparatuses, and methods for secure beacon authentication via mobile devices are disclosed. In some example embodiments, a verification element comprises: a memory storing a plurality of non-repeated verification codes; a wireless broadcast element; and a processing circuit electronically coupled to the memory and the wireless broadcast element, the processing circuit being configured to retrieve one of the non-repeated verification codes from the memory and to transfer the non-repeated verification code to the wireless broadcast element, the wireless broadcast element being configured to wirelessly broadcast the non-repeated verification code to a plurality of mobile devices for individual verification of the plurality of mobile devices, the non-repeated verification code being different than any other non-repeated verification code previously retrieved from the memory and used for individual verification of the plurality of mobile devices.

PRIORITY PATENT APPLICATIONS

This is a continuation patent application claiming priority to U.S.patent application Ser. No. 14/983,292; filed Dec. 29, 2015, which is anon-provisional continuation patent application claiming priority toU.S. patent application Ser. No. 14/827,257; filed Aug. 14, 2015, whichis a non-provisional continuation-in-part patent application claimingpriority to U.S. patent application Ser. No. 14/249,165; filed Apr. 9,2014, which is a continuation application of, and claims priority to,U.S. patent application Ser. No. 13/379,909; filed Jul. 23, 2013, whichclaims priority to PCT Patent Application No. PCT/US 11/01962; filedDec. 9, 2011, which claims the benefit of U.S. Provisional PatentApplication No. 61/421,380; filed Dec. 9, 2010. The present patentapplication draws priority from the referenced patent applications. Theentire disclosure of the referenced patent applications is consideredpart of the disclosure of the present application and is herebyincorporated by reference herein in its entirety.

TECHNICAL FIELD

The various example embodiments disclosed herein generally relate toelectronic device security, authentication of electronic devices and,more particularly, to systems, apparatuses, and methods for securebeacon authentication via mobile devices.

BACKGROUND

Currently, people are taking their mobile electronic devices everywherewith them in their daily lives and, therefore, uses and applications ofmobile electronic devices are increasing at a rapid pace to accommodatepeople anywhere throughout their daily routines. Many of the new usesand applications of mobile electronic devices are in some mannerassociated with the commercial activity of the users. In some instances,a user may opt to use the mobile electronic device during commercialactivity. It is important for these applications to provide a securedevice and system authentication process and platform for theseelectronic device users and the related activity.

Thus, a need exists for systems, methods, and/or apparatuses thatencourage and verify authenticity of the user's electronic device andactivity. In addition, a need exists for systems, methods, and/orapparatuses that provide secure beacon authentication via mobiledevices.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of an example system for verifying useractivity and providing value to users based on user activity, amongother things;

FIG. 2 is a flowchart of an example process of verifying user activityand providing value to users based on user activity;

FIG. 3 is a flowchart of an example process of creating an account andverifying a user device;

FIG. 4 is a flowchart of an example process of action generation;

FIG. 5 is a flowchart of an example process of performing an action todetermine whether or not a user will receive value;

FIG. 6 is a flowchart of another example process of performing an actionto determine whether or not a user will receive value;

FIG. 7 is a flowchart of yet another example process of performing anaction to determine whether or not a user will receive value;

FIG. 8 is a flowchart of still another example process of performing anaction to determine whether or not a user will receive value;

FIG. 9 is a flowchart of a further example process of performing anaction to determine whether or not a user will receive value;

FIG. 10 is a flowchart of an example process of verifying user activity;

FIG. 10A is a flowchart of another example process of verifying useractivity;

FIG. 11 is a flowchart of yet another example process of verifying useractivity;

FIG. 11A is a flowchart of a further example process of verifying useractivity;

FIG. 12 is a flowchart of still another example process of verifyinguser activity;

FIG. 13 is a flowchart of a further example process of verifying useractivity;

FIG. 14 is a flowchart of an example process of value redemption;

FIG. 15 is a block diagram of an example verification element that maybe used with the system;

FIG. 16 is a block diagram of another example verification element thatmay be used with the system;

FIG. 17 is a flowchart of an example process of enabling a user toreceive value when the user's mobile electronic device lackscommunication with one or more networks;

FIG. 18 is a flowchart of another example process of enabling a user toreceive value when the user's mobile electronic device lackscommunication with one or more networks; and

FIG. 19 is a flowchart of an example process of marketing to a userbased on the user's own activity.

DETAILED DESCRIPTION

Before any independent features and embodiments of the invention areexplained in detail, it is to be understood that the invention is notlimited in its application to the details of the construction and thearrangement of the components set forth in the following description orillustrated in the drawings. The invention is capable of otherembodiments and of being practiced or of being carried out in variousways. Also, it is understood that the phraseology and terminology usedherein is for the purpose of description and should not be regarded aslimiting.

Disclosed herein are systems, methods, and apparatuses for interactingwith users during user activity, providing value to the users based ontheir user activity, and verifying the authenticity of the useractivity. The disclosed systems, methods, and apparatuses may also beused to strategically market to and/or survey the users based on theiruser activity and/or based on stated or implied preferences.

With reference to FIG. 1, a block diagram of an example system 20 of thedisclosed example embodiments is illustrated. In this illustratedexample embodiment, the system 20 includes a user electronic device 24,a global positioning system (“GPS”) 28, a first network 32, a secondnetwork 36, a plurality of accessible servers 40, a storage device ordatabase 44, a verification element 48, and a point of sale (POS) system52. It should be understood that the example elements of the system 20illustrated in FIG. 1 are provided for illustrative and example purposesto assist with an understanding of at least some of the many aspects ofthe disclosed example embodiments. These example elements are notintended to be limiting upon the disclosed example embodiments and thedisclosed example embodiments are capable of having various otherelements, which are intended to be within the spirit and scope of thedisclosed example embodiments.

With continued reference to FIG. 1, the user electronic device 24 may beany type of user electronic device such as, for example: a mobileelectronic device such as a smartphone, a personal digital assistant(“PDA”), a touch screen music player, a miniature laptop or tablet,etc.; a personal computer or laptop; a combination of a personalcomputer and a digital camera; or any other type of user electronicdevice. While the systems, methods, and apparatuses of the disclosedexample embodiments are capable of utilizing any user electronic device,a “mobile electronic device” will be used hereinafter when referring touser electronic devices in order to provide a common theme throughoutthe description, simplify the following description, and for the sake ofbrevity. However, it should be understood that the use of “mobileelectronic device” is not intended to be limiting upon the disclosure ofthe disclosed example embodiments. The illustrated example mobileelectronic device 24 includes a microprocessor 56 and memory 60. Whilethe illustrated example embodiment of the mobile electronic device 24 isshown only with a microprocessor 56 and memory 60, it should beunderstood that the mobile electronic device 24 is capable of having allnecessary elements to carry out the disclosed example embodiments.

The example system also includes a conventional GPS 28, which is wellknown in the art and, therefore, will not be described herein in greatdetail. The mobile electronic device 24 communicates with the GPS 28 todetermine the global coordinates of the mobile electronic device 24.Cellular tower and/or WI-PI triangulation via the internet may beutilized to determine the location of the mobile electronic device 24.Such triangulation is also well known in the art and will not bedescribed herein in great detail. These methods for determining thelocation of the mobile electronic device. 24 may be used individually ormay be used in any combination.

As illustrated in FIG. 1, the example system 20 includes a first network32 and a second network 36. The first and second networks 32, 36 may besimilar types of networks or may be different type of networks. Forexample, the first network may be the internet and the second networkmay be a cellular network. The mobile electronic device 24 maycommunicate with one or both of the first and second networks to sendand receive data. Also, in the illustrated example embodiment, the firstand second networks may communicate with each other to send and receivedata. Further, the mobile electronic device 24 may utilize a cellularnetwork, a WI-FI network, or a wireless local area network (WLAN) suchas, for example, first and second networks 32, 36, in addition to or inlieu of the GPS 28 to determine the global coordinates of the mobileelectronic device 24.

The plurality of servers 40 illustrated in the example system of FIG. 1:may be specifically designated for cooperation with the systems,methods, and apparatuses of the disclosed example embodiments; may beutilized in a cloud computing type environment; or may cooperate withthe systems, methods, and apparatuses of the disclosed exampleembodiments in any other manner. The illustrated example servers 40 eachinclude a microprocessor 64 and a memory 68. While the illustratedexample servers 40 are shown only with a microprocessor 64 and memory68, it should be understood that the servers 40 are capable of havingall necessary elements to carry out the disclosed example embodiments.It should also be understood that the systems, methods, and apparatusesof the disclosed example embodiments may include any number of servers,including one, to carry out the disclosed example embodiments.

With further reference to the example system illustrated in FIG. 1, anexample database 44 for storage of data is illustrated. While exampleFIG. 1 only illustrates a single database 44, the systems, methods, andapparatuses of the disclosed example embodiments are capable ofincluding any number of databases 44 for storage of data and the one ormore servers 40 are capable of communicating with the one or moredatabases 44 as needed to carry out the disclosed example embodiments.In addition, while the following description and accompanying figuresmay not specifically identify communication between the one or moreservers 40 and the one or more databases 44, communication between theone or more servers 40 and the one or more databases 44 may occur asneeded to carry out the disclosed example embodiments.

The example verification element 48 illustrated in FIG. 1 may be a widevariety of verification elements 48, which will be described in greaterdetail below. The mobile electronic device 24 and verification element48 communicate with each other to verify the authenticity of the mobileelectronic device 24, the location of the user, and user activitycarried out by the user with the mobile electronic device 24. In someexample embodiments, the verification element 48 may have a finitecommunication range. Thus, in such example embodiments, the mobileelectronic device 24 may store or cache its communications andcommunicate with the verification element 48 once it is within thecommunication range of the verification element 48.

With continued reference to FIG. 1, the example POS system 52 may be awide variety of POS systems 52 and POS systems 52 may generally besystems implemented at venues selling products and/or services to tracksales, track user activity, perform various tasks associated withcompleting sales transactions, perform calculations using sales figures,accept loyalty cards and/or programs, process payments, provide salesreceipts, and a variety of other tasks. Such POS systems 52 may include,for example, cash registers, auto-checkout devices, more advancednetworked sales programming and devices, or any other programming and/ordevices.

A variety of systems, methods, and apparatuses may be used to verifyauthenticity of user activity and provide value to users based on theiruser activity. The following description includes only some of the manysystems, methods, and apparatuses capable of verifying authenticity ofuser activity and providing value to users based on their user activity,and is included for example and illustrative purposes and is notintended to be limiting upon the disclosed example embodiments.

Referring now to FIG. 2, a flowchart illustrates an example overview ofproviding value to users based on their user activity, verifying theauthenticity of the user activity, and redeeming value accumulated by auser. Initially, a user creates or activates an account 72. Aftercreating an account, action generation occurs 76, which requires theuser to perform an activity or take a particular action. Next, actionverification occurs 80, which includes the system verifying theauthenticity of the user activity. After action verification, valueredemption occurs 84, which includes the user redeeming value obtainedas a result of performing the user activity. More details pertaining toeach of the above steps will be described below.

It should be understood that the steps provided in the flowcharts ofFIGS. 2-14 are only examples and the disclosed example embodiments arecapable of including additional or fewer steps than those illustrated inFIGS. 2-14 and be within the intended spirit and scope of the disclosedexample embodiments. It should also be understood that the order ofsteps illustrated in FIGS. 2-14 are only example and the steps may beperformed in different orders relative to each other and be within theintended spirit and scope of the disclosed example embodiments.

With reference to FIG. 3, step 72 of FIG. 2 relating to a user creatingor activating an account will be addressed in more detail. The followingsteps for creating an account are only example steps presented in anexample order, and a variety of other steps, orders, and manners forcreating an account are possible and are intended to be within thespirit and scope of the disclosed example embodiments. Initially, a useraccesses one or more networks with the mobile electronic device 88. Forexample, the user may access the internet and/or a cellular network withtheir mobile electronic device. The mobile electronic device retrievesdata 92 from one or more servers and/or the database via one or morenetworks. The retrieved data is associated with performing the disclosedexample embodiments. After data retrieval, the mobile electronic devicedownloads and stores the data in the memory 96. The microprocessorassists with retrieval, downloading, and storage of the data. Uponcompletion of the data download, the mobile electronic device may send aconfirmation 100 to one or more servers via one or more networksindicating that the download was successful. Alternatively, the one ormore servers may send a confirmation to the mobile electronic device viaone or more networks to determine if the download was successful. Afterthe necessary data (e.g., operating software, etc.) is downloaded to themobile electronic device, the mobile electronic device may access one ormore networks 104 in order to communicate with and receive data from theone or more servers and one or more databases pertinent to the disclosedexample embodiments. The user may enter relevant personal information108 such as, for example, name, age, gender, home address, username,password, referral code, phone number, loyalty program, etc., which issent to the one or more servers via one or more networks and stored inthe memory of one or more servers or, in the alternative or incombination, stored in the one or more databases. This personalinformation may be retrieved at a later time for various reasons. Aftersubmission of the personal information, the system verifies authenticityof the user's information and the user's mobile electronic device 112.

The user's information and mobile electronic device may be authenticatedin a variety of different manners and at a variety of different timessuch as, for example, during account creation, during locationdeclaration, before, during, or after user activity, during purchases,during value redemption, etc. The following example embodiments ofauthentication are for illustrative and example purposes and are notintended to be limiting. Other authentication embodiments are possibleand are intended to be within the spirit and scope of the disclosedexample embodiments.

In one example embodiment, verification may be transparent to the usersuch that verification occurs without their active involvement. In otherwords, information and device verification occurs in the background. Forexample, upon establishing communication between the mobile electronicdevice and the one or more servers via the one or more networks, the oneor more servers may communicate with the user's mobile electronic deviceto verify that the device is authentic. Various types of backgroundverifying communication may occur between the one or more servers andthe mobile electronic device. These may include communications relyingon an active connection to a mobile telecommunication carrier's networkto ensure that the electronic device is active, unique, and correspondswith the identifying information provided by the user. For example, apush notification or short message service (SMS) may be sent to thedevice 24 using its device token, UDID, telephone number, telephony ID,MAC address, etc.

This allows verification via a unique identifier on the network. It alsoeliminates multiple accounts on a verified device 24 and permitspermanent banning of fraudulent accounts. This verification enablesbanning of a particular device, which is not feasible on personalcomputers via the internet. Personal computers are not tied to theircommunication platform with a unique identifiable number. While aparticular IP address can be isolated on a network with a personalcomputer, the personal computer itself can be moved to a new networkconnection or a proxy server to generate a new IP address.

In another example embodiment, upon establishing communication betweenthe mobile electronic device and the one or more servers via one or morenetworks, the one or more servers may send a communication to the mobileelectronic device that is displayed on the mobile electronic device andrequires a response from the user. Such communications may include, butare not limited to, emails, short message service (SMS) communicationssuch as text messages, or any other type of communication. In suchexample embodiments, a challenge activity may be presented to the userand the user must respond in a particular manner in order for the mobiledevice to be authenticated. For example, the user may be required toanswer a question, input a passcode, take a picture of himself/herself,take a picture of a particular item, scan a barcode that may be recordedfor future verification via automated or manual methods, etc. If theuser responds properly, then the mobile electronic device isauthenticated and may be used in accordance with the disclosed exampleembodiments. If the user responds improperly or does not respond, themobile electronic device is not authenticated and may not be used inaccordance with the disclosed example embodiments until such time thatit is authenticated.

In yet another example embodiment, upon establishing communicationbetween the mobile electronic device and the one or more servers via theone or more networks, the one or more servers may send an automatedtelephone call to the mobile electronic device or an individual mayplace a manual call to the mobile electronic device (i.e., if the mobileelectronic device is enabled for telephone communication). The user isrequired to respond to the automated or manual telephone call in aparticular manner in order for the mobile device to be authenticated.For example, the user may be required to answer a question, provideadditional information, enter a code, etc. If the user provides a properresponse, then the mobile electronic device is authenticated and may beused in accordance with the disclosed example embodiments. If the userprovides an improper response or the telephone call is not answered, themobile electronic device is not authenticated and may not be used inaccordance with the disclosed example embodiments until such time thatit is authenticated.

In a further example embodiment, the user may be near a verificationelement 48 and the verification element 48 may authenticate the user'sinformation and mobile electronic device as an authentic device. Forexample, the verification element may verify that the mobile electronicdevice is at a certain location through the use of modulatingunpredictable, non-repeated communications or codes (described in moredetail below). By this method, individuals cannot predict theverification element's current communication or code and misreport theirpresence. The mobile electronic device will receive, process, andtransmit the securitized communication or code from the verificationelement to the one or more servers via the one or more networks. The oneor more servers will compare the transmitted securitized communicationor code, the location, and time transmitted to the expected code inorder to verify the mobile electronic device's presence.

Referring now to FIG. 4, step 76 of FIG. 2 relating to action generationwill be addressed in more detail. As indicated above, action generationrequires a user to perform an activity or take a particular action. Thefollowing steps for action generation are only example steps presentedin an example order, and a variety of other steps, orders, and mannersfor action generation are possible and are intended to be within thespirit and scope of the disclosed example embodiments. Initially, a usermay log into the system 116. This can occur automatically or a user mayinput a password or passcode, which is sent via one or more networks toone or more servers to indicate that the user is ready to initiate useractivity. Next, the location of the user is identified 120 byidentifying the location of the user's mobile electronic device. Thelocation of the user's mobile electronic device may be identified in avariety of manners. In one example embodiment, the GPS system maycommunicate with the mobile electronic device to identify its locationand, subsequently, the location of the mobile electronic device is sentto one or more servers via one or more networks. In another exampleembodiment, a cellular network or a WI-FI signal is capable ofidentifying the mobile electronic device's location and the identifiedlocation is sent to one or more servers via the cellular network and/orthe internet. In still another example embodiment, one of the locationverification methods may be coupled with a product scan to verify thelocation of the mobile electronic device. In yet another exampleembodiment, the location of the mobile electronic device maybeidentified by a verification element located in the vicinity of themobile electronic device.

The verification element 48 may be a wide variety of differentverification elements and the following examples of verificationelements are not intended to be limiting. The system is capable ofincluding other verification elements and such other verificationelements are intended to be within the spirit and scope of the disclosedexample embodiments.

Referring now to FIG. 15, an example verification element 48 isillustrated. This example verification element 48 is powered by a powersupply 137 such as, for example, an alternating current (AC) powersupply, and communicates with at least one network such as, for example,the internet. The verification element includes memory 138, anintegrated circuit 139, a timing device 141, a broadcast element 142, anadjustable output strength device 143, a user interface 145, and asecondary power supply 146. In this example illustrated embodiment, alarge quantity of codes may be communicated to the verification elementfrom one or more servers via the at least one network and stored in theverification element's memory. Such a conveyance of codes from the oneor more servers to the verification element may occur a single time, inwhich case all the necessary codes would be communicated to theverification element in the single transfer of codes, or the one or moreservers may periodically communicate codes to the verification elementvia the at least one network as desired.

The integrated circuit cooperates with the timing device, such as aclock, to retrieve codes from the memory at appropriate times andcommunicates the retrieved codes to the broadcast element forinteraction with a user and his/her mobile electronic device. Theintegrated circuit retrieves and broadcasts non-repeated codes in amanner that is unpredictable to users, but is understood by the one ormore servers such that when the user's mobile electronic devicecommunicates verifying data to the one or more servers via the one ormore networks, the one or more servers recognizes the verifying data andverifies the authenticity of the user's mobile electronic device.

The integrated circuit may retrieve codes from memory and communicatethe codes to the broadcast element in any time increment and be withinthe intended spirit and scope of the disclosed example embodiments. Forexample, the integrated circuit may retrieve a new code from memory andcommunicate the new code to the broadcast element every 10 minutes, 30minutes, hour, day, week, month, or any other period or time.Continually modulating verification codes inhibits fraudulent activity.

Instances may arise where the main power supply is not available for theverification element. The on-board secondary power supply may providesufficient power to the verification element in order to maintain adesired level of operability. In some example embodiments, the secondarypower source may power the verification element in a manner thatfacilitates complete operability of the verification element. In otherexample embodiments, the secondary power source may only power thetiming device to ensure that the timing device continues to run and keepaccurate time in instances where the main power supply is not available.

It should be understood that broadcasting a unique code is only one ofthe many manners of communication between the verification element and amobile electronic device. Many other types of unique and securecommunication may occur between the verification element and a mobileelectronic device and be within the spirit and scope of the disclosedexample embodiments. For example, other types of unique and securecommunication between the verification element and a mobile electronicdevice include visual images, sonic communications through in-audiblehigh frequency sound, changing WIFI identification such as, for example,MAC address, through IP based communication, RFID or NFC, etc.

The verification element may be located in a wide variety of venueshaving a wide range of spaces. It may be desirable to have theverification element broadcast codes in an area complementary to thearea of the venue in which the verification element is positioned. A bigbox store may have a large retail space footprint, while a smallconvenience store may have a small retail space footprint. It may not bedesirable to have the broadcast element output a signal of similarstrengths for the big box retail store and the small convenience store.Thus, the verification element may include an adjustable output strengthdevice for adjusting the output strength of the signal broadcast by thebroadcast element. The adjustable output strength device may beappropriately adjusted so that the verification element broadcast astronger signal for a big box store and a weaker signal for a smallconvenience store, thereby coordinating the strength of the broadcastsignal with the environment in which the verification element islocated. The adjustable output strength device may be adjustable in avariety of manners such as, for example, manually via a user interface,automatically with the integrated circuit, through the network from alocation other than the venue in which the verification element islocated, or any of a variety of other manners, all of which are intendedto be within the intended spirit and scope of the disclosed exampleembodiments.

Referring now to FIG. 16, another example verification element 48 isillustrated. This example verification element 48 is powered by a powersupply 137 such as, for example, an alternating current (AC) powersupply, and includes an integrated circuit 139, a unique identifier 147,an encryption key 149, a timing device 141, a broadcast element 142, anadjustable output strength device 143, a user interface 145, and asecondary power supply 146.

In this example illustrated embodiment, the integrated circuitcooperates with the unique identifier, the encryption key, and thetiming device to generate non-repeated, unpredictable codes, apply anencryption to the codes, and communicate the codes to the broadcastelement for interaction with a user and his/her mobile electronicdevice. The integrated circuit retrieves, encrypts, and broadcastsnon-repeated codes in a manner that is unpredictable to users, but thebroadcast non-repeated codes will match unpredictable codes derived byone or more servers utilizing a similar process and algorithm such thatwhen the user's mobile electronic device communicates verifying data tothe one or more servers via the one or more networks, the one or moreservers recognizes the verifying data and verifies the authenticity ofthe user's mobile electronic device.

Each verification element has a unique identifier and encryption key,which are never broadcast. The integrated circuit transforms the uniqueidentifier using the encryption key and the precise time to regularlymodulate non-repeated, unpredictable codes. Since it is not possible forsomeone receiving the non-repeated, unpredictable code to determine theoriginal unique identifier and encryption key, all codes remainnon-repeated and unpredictable, except to the servers that can generatetheir own matching codes because they have the unique identifier,encryption key, and current time. Periodically, the server may comparethe received non-repeated, unpredictable code to its expected andinternally generated non-repeated, unpredictable code at a particulardate and time. If the code does not match exactly for the particulartime, but matches another expected code in a designated window before orafter, the server may incorporate a time offset to sync the verificationelement's clock with its own. For example, the timing device of theverification element may not be in sync with the timing device of theone or more servers (e.g., the timing devices may be off a few seconds,minutes, hours, etc.). Thus, the code generated by the verificationelement and communicated by the user's mobile electronic device may notmatch the code generated by the one or more servers. This syncingcapability accommodates such inconsistent codes and may stillauthenticate the code sent by the user's mobile electronic device,thereby ultimately authenticating the user's mobile electronic device.

The integrated circuit may retrieve, encrypt, and communicate codes tothe broadcast element in any time increment and be within the intendedspirit and scope of the disclosed example embodiments. For example, theintegrated circuit may retrieve, encrypt, and communicate a new code tothe broadcast element every 10 minutes, 30 minutes, hour, day, week,month, or any other period of time. Continually modulating verificationcodes inhibits fraudulent activity.

Instances may arise where the main power supply is not available for theverification element. The on-board secondary power supply may providesufficient power to the verification element in order to maintain adesired level of operability. In some example embodiments, the secondarypower source may power the verification element in a manner thatfacilitates complete operability of the verification element. In otherexample embodiments, the secondary power source may only power thetiming device to ensure that the timing device continues to run and keepaccurate time in instances where the main power supply is not available.

Similarly to the example verification element illustrated in FIG. 15,the example verification element illustrated in FIG. 16 may be locatedin a wide variety of venues having a wide range of spaces. The exampleverification element illustrated in FIG. 16 includes all the samestructure and operability as the example verification elementillustrated in FIG. 15 in order to adjust the broadcast strength of thebroadcast element. Thus, for the sake of brevity, such structure andoperability will not be repeated herein. Rather, reference is made tothe description above pertaining to the example verification elementillustrated in FIG. 15.

The broadcast element described herein and illustrated in FIGS. 15 and16 may be a variety of different types of elements for broadcasting themodulating non-repeated, unpredictable codes. For example, the broadcastelement may be a WI-FI, WLAN, or other antenna enabled device forbroadcasting a signal, a sonic device, or an electronic display ormonitor.

The following is an example of a WI-FI, WLAN, or antenna enabledbroadcasting device. A periodically modulating SSID verification elementmay be a wireless router type of device capable of automaticallychanging its wireless network name (service set identifier, SSID, etc.)or MAC address, which can be picked up and transmitted via a WI-FI,WLAN, or other antenna equipped electronic device to one or moreservers. These strings may correspond to a code periodically andsecurely sent to the verification element over one or more networks suchas, for example, the internet. Alternatively, without need for a networkor internet connection, these strings may be a non-predictable code thatis independently algorithmically generated both at the one or moreservers and the verification element from a fixed code and encryptionkey, corresponding to the electronic mobile device, and one or moredynamic variables, based on the current time. The one or more serverscompare the non-predictable code to the code sent from the electronicmobile device to verify if the electronic mobile device is near aparticular verification element at a given time. Alternatively, theverification element and one or more servers may have a preset scheduleof codes unique to each particular verification element at a given time.This signal can be transmitted by the electronic mobile device to one ormore servers for verification. The modulating SSID verification elementmay also include a method to calibrate the intensity of signaltransmission so that the range of the verification element may beadjusted to fit the eligible parameters of the venue. This modulatingSSID verification element may take the form of a wireless router withthe notable exception that it does not need to be connected to theinternet as it only needs to broadcast its identifying information viaSSID and/or MAC address to the electronic mobile device. The modulatingSSID verification element may include an internal clock, battery, andpreset unique codes. The modulating SSID verification element may alsoinclude a method to calibrate the intensity of signal transmission sothat the range of the device may be adjusted to fit the eligibleparameters of the venue. By way of example, a large store with theverification element in the middle of the store might have the signalintensity set to a maximum. A small store or one with the verificationelement placed near an entryway might have the transmission intensityset to a minimum.

The following is an example of a sonic broadcasting device. Aperiodically modulating high frequency sonic verification element is adevice capable of generating ultrasound outside of human hearing atparticular pitches in particular patterns. These patterns correspond toa code that can be modulated automatically as described below. Thisauditory signal can be picked up via microphone on a mobile electronicdevice and transmitted to one or more servers for verification via oneor more networks. The sonic verification element may also include amethod to calibrate the intensity of signal transmission so that therange of the verification element may be adjusted to fit the intendedeligible parameters of the venue. By way of example, a large store withthe verification element in the middle of the store might have thesignal intensity set to a maximum. A small store or one with theverification element placed near an entryway might have the transmissionintensity set to a minimum.

The following is an example of the broadcasting device comprising anelectronic display or monitor. A periodically modulating barcodeproducing verification element may include a display that displays aperiodically changing barcode. This barcode may be a one dimensionalbarcode, a QR code, a two dimensional barcode, a universal product code(UPC), etc. The user may scan the displayed barcode with the mobileelectronic device's on-board camera and the mobile electronic device maysend the captured scan to one or more servers via one or more networksfor identification. The system will be able to verify the location ofthe mobile electronic device based on the scanned barcode. It should beunderstood that the periodically changing barcode may be modulated atany desired increment. It should also be understood that the barcode mayinstead be other images and such other images may be modulated at anydesired increment.

As used herein, the term “scan” may be interpreted to include any typeof scanning technology for scanning any type of image and/or may beinterpreted to be any type of digital imaging such as, for example, adigital picture taken with a digital camera. In addition, a “scan” maybe, among other things, an image captured with a user electronic deviceand may include a digital picture of the image as well as the decodedstring of data from the image. Further, a “scan” may be any image or anydata captured by a user electronic device.

Modulating codes transmitted by verification elements protect againstfraudulent reproduction of their signal to gain undeserved value. Suchverification elements are modulated in a manner so that the one or moreservers can match a particular code from a particular verificationelement at a particular time, while other people cannot predict thatcode. Several methods exist to synchronize these codes and such methodsare unpredictable so that fraudulent value is not obtained. Thesestrings may correspond to a code periodically and securely sent to theverification element over one or more networks such as, for example, theinternet.

Alternatively, without need for an internet connection, these stringsmay be a non-predictable, non-repeated code that are independentlyalgorithmically generated both at the one or more servers and theverification element from a fixed code, corresponding to the electronicmobile device, and one or more dynamic variables, based on the currenttime. The one or more servers compare its non-predictable code to thecode sent from the electronic mobile device to verify if the electronicmobile device is near a particular verification element at a given time.Alternatively, the verification element and one or more servers may havea preset schedule of codes unique to each particular verificationelement at a given time. These methods may require a clock, batterypower supply for the clock, active or passive storage for underlyingcode, list of codes, and/or algorithm for generating codes. In addition,a method for calibrating the one or more servers and the timing devicemay need to occur. This code will be transmitted by the mobileelectronic device to one or more servers for verification via one ormore networks.

Once the system identifies the location of the user, the mobileelectronic device may display the action opportunities 124 near thelocation of the user. For example, if the user is near a grocery store,one of the displayed action opportunities may relate to performing anaction associated with the grocery store. Once the action opportunitiesare displayed on the mobile electronic device, the user selects one ormore of the action opportunities 128. Next, the user satisfactorilyperforms the action(s) associated with the selected actionopportunity(ies) 132. Satisfactorily performing actions associated withaction opportunities will be described in more detail below. Uponsatisfactory performance of the action, the user receives value 136.Such value may be a wide variety of different types of value including,but not limited to, advertising, redeemable/reward points, coupons,special offers, gift certificates, money, user goods, charitablecontributions, sweepstakes entries, airline miles, features in an App,product review information, storing grocery list, sweepstakes, oranything else of value.

Example user activity relating to FIG. 4 will be described herein forillustrative purposes and is not intended to be limiting upon thedisclosed example embodiments. For example, a user may be in aparticular city and may activate/log into the system. The system willidentify the user's location in the particular city and display numerousaction opportunities on the user's mobile electronic device. A fewexample action opportunities may include a nearby restaurant, a coffeeshop, a grocery store, a convenience mart, etc. and a map, directions,and/or a distance from the action opportunities may also be displayed onthe mobile electronic device. As an example, the user may choose to goto the nearby grocery store. One or more particular actions such as, forexample, checking into a grocery store, scanning a particular product,etc., may be associated with the chosen grocery store. If the usersatisfactorily performs the one or more actions, the user will receivevalue such as, for example, points, coupons, gift certificates, money,user goods, charitable contributions, any of the other types of valuedisclosed herein, or anything else of value.

A variety of different types of actions may be generated and suchactions may have different requirements for performing and/or completingthe actions satisfactorily. The following paragraphs relating to FIGS.5-9 describe a few example actions generated and a few example mannersof satisfactorily performing the example actions. The following exampleactions and manners of satisfactorily performing the actions are forexample and illustrative purposes and are not intended to be limiting. Awide variety of other actions and manners of satisfactorily performingthe actions are possible and are intended to be within the spirit andscope of the disclosed example embodiments.

Referring now to FIG. 5, an example manner of satisfactorily performinga selected action, which is generally represented as step 132 in FIG. 4,is illustrated and will be described in more detail. After a userselects an action (see step 128 in FIG. 4), a user is prompted via thedisplay 140 on the mobile electronic device if he/she wishes to performthe action 144. If the user does not wish to perform the action, theuser does not receive any value 148. If the user wishes to perform theaction, the user initiates the action 152 and completes the action 156.Upon completion of the action, the system determines if the action wascompleted successfully 160. If the user does not complete the actionsatisfactorily, the user does not receive value 164. If the usercompletes the action satisfactorily, the user receives value 168. Step168 shown in FIG. 5 pertaining to the user receiving value maycorrespond to step 136 shown in FIG. 4 pertaining to the user receivingvalue.

Example user activity relating to FIG. 5 will be described herein forillustrative purposes and is not intended to be limiting upon thedisclosed example embodiments. In some instances, a user may be asked ifthey would like to perform a particular action such as, for example, goto a grocery store and scan a particular item. If the user does not wantto go to the grocery store, then the user will not receive value. If theuser does wish to go to the grocery store and scan the particular item,the user travels to the grocery store and scans the particular item.Then, the system determines if the user went to the grocery store andscanned the item. If the user did not go to the grocery store or did notscan the particular item, the user will not receive value. If the userdoes travel to the grocery store and scans the particular item, the userwill receive value.

Referring now to FIG. 6, another example manner of satisfactorilyperforming a selected action, which is generally represented as step 132in FIG. 4, is illustrated and will be described in more detail. In someinstances, the selected action does not require a significant investmentof time and effort by the user. FIG. 6 illustrates such an instance. Inthis example instance, the user is not required to perform anyadditional activity 172 after selection of the action in order toreceive value 176. In other words, the user may automatically receivevalue associated with certain actions. In some example embodiments,authentication of the electronic mobile device may occur prior toreceipt of value. The mobile electronic device may be authenticated inany of the authentication or verification manners described herein orany other possible manner. After authentication, the user receives value176. Step 176 shown in FIG. 6 pertaining to the user receiving value maycorrespond to step 136 shown in FIG. 4 pertaining to the user receivingvalue.

Example user activity relating to FIG. 6 will be described herein forillustrative purposes and is not intended to be limiting upon thedisclosed example embodiments. An example instance where a, user mayreceive value for performing no additional activity may includeactivating an account. After activating an account, the user may receivevalue without performing any action.

Referring now to FIG. 7, yet another example manner of satisfactorilyperforming a selected action, which is generally represented as step 132in FIG. 4, is illustrated and will be described in more detail.Similarly to FIG. 6, FIG. 7 illustrates one of many possible exampleinstances where the selected action does not require a significantinvestment of time and effort by the user. However, as illustrated inFIG. 7, some instances requiring little activity by the user may includeactivity in the background possibly without explicit user action inorder for the user to receive value. For example, in FIG. 7, the systemmay desire to confirm the user's location 180 prior to the userreceiving value 184. The system identifies the user's location byidentifying the location of the user's mobile electronic device. Thelocation of the user's mobile electronic device may be identified in anyof the variety of manners described herein or any other possible manner.After the user's location is identified, the user receives value 184.Step 184 in FIG. 7 pertaining to the user receiving value may correspondto step 136 in FIG. 4 of the user receiving value.

Example user activity relating to FIG. 7 will be described herein forillustrative purposes and is not intended to be limiting upon thedisclosed example embodiments. An example action may require a user to“check-in” at a particular venue such as, for example, a grocery store.All the user needs to do to receive value is travel to the grocerystore. The system will identify that the user is at the grocery store byidentifying the location of the user's mobile electronic device. Uponarrival of the user at the grocery store, the user will receive valueautomatically (i.e., without actively performing a significant quantityof other steps or actions).

Referring now to FIG. 8, still another example manner of satisfactorilyperforming a selected action, which is generally represented as step 132in FIG. 4, is illustrated and will be described in more detail. Afterthe user selects an action (see step 128 in FIG. 4), the system displaysthe instructions on the display of the mobile electronic device 188 thatare required for satisfactorily performing the action. Next, the userperforms an action 192 and the system determines if the instructionswere followed 196 when the user performed the action. If the userperformed an action in accordance with the displayed instructions, theuser receives value 200. If the user performs an action that does notfollow the displayed instructions, the user does not receive value 204.Step 200 in FIG. 8 pertaining to the user receiving value may correspondto the step 136 in FIG. 4 of the user receiving value.

Example user activity relating to FIG. 8 will be described herein forillustrative purposes and is not intended to be limiting upon thedisclosed example embodiments. An example action pertaining to FIG. 8may include displaying instructions on a user's mobile electronic devicethat instruct the user to travel to a particular venue such as, forexample, a grocery store, and perform particular activities at thegrocery store. For example, the instructions may instruct the user to goto the store, find a particular brand of cereal, and purchase thecereal. In response to the instructions, the user performs an action oractions. The system then determines if the user satisfactorily followedthe instructions with his/her action(s). If the user did notsatisfactorily follow the instructions, the user does not receive value.If the user satisfactorily follows the instructions, the user receivesvalue. Other example user activities that may relate to FIG. 8 include,but are not limited to, displaying instructions for downloading aparticular application and downloading the particular application toreceive value, displaying instructions to complete a survey andresponding to the survey to receive value, displaying instructions forpublicizing actions or messages to one or more social networks andpublicizing actions or messages to the one or more social networks toreceive value, displaying instructions to enter a promotional code andentering a promotional code to receive value, etc.

Referring now to FIG. 9, a further example manner of satisfactorilyperforming a selected action, which is generally represented as step 132in FIG. 4, is illustrated and will be described in more detail. Afterthe user selects an action (see step 128 in FIG. 4), the system maydisplay a plurality of secondary action opportunities associated withthe selected action 208. The user then selects one of the secondaryaction opportunities 212. In the illustrated example embodiment, afterthe user selects the secondary action opportunity, the camera on themobile electronic device activates 216. After activation of the camera,the user takes a picture or scans an item or a portion of the item, suchas, for example, a barcode, associated with the selected secondaryaction opportunity 220. The user then receives value 224. Step 224 inFIG. 9 pertaining to the user receiving value may correspond to the step136 in FIG. 4 of the user receiving value.

Example user activity relating to FIG. 9 will be described herein forillustrative purposes and is not intended to be limiting upon thedisclosed example embodiments. For example, a user may be at aconvenience store and one or more action opportunities associated withthe convenience store may be displayed on the user's mobile electronicdevice. One such displayed action opportunity may include, for example,finding a particular brand of potato chips, scanning the bag of potatochips, and receiving value for scanning the bag of potato chips.

As indicated above, a variety of different actions and valueopportunities exist beyond the example actions and value opportunitiesdescribed herein. Another example action and value opportunity includesreceiving value for referring another user to the system. Referralactions and value receipt for the referral actions may be achieved in avariety of different manners. For example, a current user may provide areferral code to a new prospective user and, upon registration of thenew user, the new user enters the referral code and the current or firstuser receives value. Also, for example, a current user may provide aregistration link to a new prospective user and the new prospective usermay follow the registration link to ultimately register as a new user.If the new user follows the link and becomes a new registered user, thecurrent or first user receives value.

Unfortunately, in instances where users receive any type of value, therewill be those people who perform fraudulent activity in order to deceivethe system and receive value to which they are not entitled. Thus, thedisclosed example embodiments include numerous systems, methods, andapparatuses to provide an audit trail of actions, verify authentic useractivity, provide value for such authentic activity, and also identifyfraudulent activity and withhold value for such fraudulent activity. Thefollowing examples of verifying authentic activity are provided forexample and illustrative purposes and are not intended to be limiting.In addition, the following examples are only some of the many possiblemanners of verifying authentic activity, all of which are intended to bewithin the intended spirit and scope of the disclosed exampleembodiments.

With reference to FIG. 10, an example manner of verifying authenticactivity, which is generally represented as step 80 in FIG. 2, isillustrated. The following steps for action verification are onlyexample steps presented in an example order, and a variety of othersteps, orders, and manners for action verification are possible and areintended to be within the spirit and scope of the disclosed exampleembodiments. In this example embodiment, the system verifies authenticactivity after a user satisfactorily performs an action 228 (also seestep 136 in FIG. 4). As a user satisfactorily performs an action, thesystem identifies the user's location 232 by identifying the location ofthe user's mobile electronic device. The location of the user's mobileelectronic device may be identified in any of the manners describedherein or any other possible manner. The identified location of themobile electronic device is sent to one or more servers via one or morenetworks 236. The one or more servers determine if the location of themobile electronic device corresponds to the selected action 240. Oneexample where the location of the mobile electronic device maycorrespond to the selected action is if the selected action relates to auser venue and the mobile electronic device is identified to be in ornear the particular user venue. If the location of the mobile electronicdevice does not correspond to the selected action, the user does notreceive value 244. If the location of the mobile electronic devicecorresponds to the selected action, the user receives value 248.

Step 248 in FIG. 10 pertaining to the user receiving value maycorrespond to the step 136 in FIG. 4 of the user receiving value.Example verification of user activity as it relates to FIG. 10 will bedescribed herein for illustrative purposes and is not intended to belimiting upon the disclosed example embodiments. For example, if a usersatisfactorily performs an action such as, for example, scanning orpurchasing a particular brand of ice cream at a grocery store, thesystem determines the user's location to ensure that the user isactually at the grocery store. If the user is not at the grocery storecorresponding to the ice cream just scanned or purchased, then the userdoes not receive value. If the user is located at the grocery storewhere the ice cream was just scanned or purchased, then the userreceives value. This type of verification may be used to verify scans orpurchases originating at the actual location. Mobile electronic devicesmay be fraudulently manipulated to create fraudulent scans or purchasesin an effort to receive undeserved value. Such fraudulent scans orpurchases may be generated from a location other than at the actuallocation (e.g., grocery store). The present verification activity willidentify that the mobile electronic device is not at the actual location(e.g., grocery store) and will know that the scan or purchase isfraudulent.

As indicated above, the examples provided herein for verifying authenticactivity are only example and many other examples of verifying authenticactivity are intended to be within the spirit and scope of the disclosedexample embodiments. For example, the steps provided in the exampleillustrated in FIG. 10 may be performed in a different order. One suchexample is illustrated in FIG. 10A.

In the illustrated example embodiment of FIG. 10A, another examplemanner of verifying authentic activity, which is generally representedas step 80 in FIG. 2, is illustrated. The following steps for actionverification are only example steps presented in an example order, and avariety of other steps, orders, and manners for action verification arepossible and are intended to be within the spirit and scope of thedisclosed example embodiments. In this example embodiment, the systemverifies authentic activity by identifying the user's location 232A byidentifying the location of the user's mobile electronic device. Thelocation of the user's mobile electronic device may be identified in anyof the manners described herein or any other possible manner. Theidentified location of the mobile electronic device is sent to one ormore servers via one or more networks 236A. The one or more serversdetermine if the location of the mobile electronic device corresponds tothe selected action 240A. One example where the location of the mobileelectronic device may correspond to the selected action is if theselected action relates to a user venue and the mobile electronic deviceis identified to be in or near the particular user venue. If thelocation of the mobile electronic device does not correspond to theselected action, the user does not receive value 244A. If the locationof the mobile electronic device corresponds to the selected action, auser may satisfactorily perform an action 228A (also see step 136 inFIG. 4). As a user satisfactorily performs an action, the user receivesvalue 248A. Step 248A in FIG. 10A pertaining to the user receiving valuemay correspond to the step 136 in FIG. 4 of the user receiving value.

Example verification of user activity as it relates to FIG. 10A will bedescribed herein for illustrative purposes and is not intended to belimiting upon the disclosed example embodiments. The present examplewill utilize a grocery store environment. For example, the systemdetermines the user's location to ensure that the user is actually atthe grocery store. If the user is not at the grocery store correspondingto a particular brand of ice cream that is associated with the action,then the user does not receive value. If the user is located at thegrocery store where the ice cream associated with the action is located,then the user needs to satisfactorily perform the action associated withthe ice cream, which may include, for example, scanning or purchasingthe particular brand of ice cream at a grocery store. If the usersatisfactorily scans or purchases the ice cream, the user receivesvalue. This type of verification may be used to verify scans orpurchases originating at the actual location. Mobile electronic devicesmay be fraudulently manipulated to create fraudulent scans or purchasesin an effort to receive undeserved value. Such fraudulent scans orpurchases may be generated from a location other than at the actuallocation (e.g., grocery store). The present verification activity willidentify that the mobile electronic device is not at the actual location(e.g., grocery store) and will know that the scan or purchase isfraudulent.

With reference to FIG. 11, another example manner of verifying authenticactivity, which is generally represented as step 80 in FIG. 2, isillustrated. The following steps for action verification are onlyexample steps presented in an example order, and a variety of othersteps, orders, and manners for action verification are possible and areintended to be within the spirit and scope of the disclosed exampleembodiments. In this example embodiment, the system verifies authenticactivity after a user satisfactorily performs an action 252 (also seestep 132 in FIG. 4). After a user satisfactorily performs an action, thesystem identifies the user's location 256 by identifying the location ofthe user's mobile electronic device. The location of the user's mobileelectronic device may be identified in any of the manners describedherein or any other possible manner. The identified location of themobile electronic device is sent to one or more servers via one or morenetworks 260. The one or more servers determine if the location of themobile electronic device corresponds to the selected action 264. Oneexample where the location of the mobile electronic device maycorrespond to the selected action is if the selected action relates to auser venue and the mobile electronic device is identified to be in ornear the particular user venue. If the location of the mobile electronicdevice does not correspond to the selected action, the user does notreceive value 268. If the location of the mobile electronic devicecorresponds to the selected action, the user may be required to purchasea product corresponding to the selected action 272. One example where apurchased product corresponds to a selected action may occur in a uservenue such as a grocery store. In such an example, the selected actionmay relate to a particular product in the grocery store and the usermust purchase the particular product from the grocery store in order toeventually receive value.

With continued reference to FIG. 11, a user travels to a second location276 such as, for example, the user's home, after purchasing the product.At the second location, the user takes a picture or scans the purchasedproduct 280. For this example, the user's picture or scan at the secondlocation may be a second picture or scan of the product. As part ofsatisfactorily performing an action (see step 252 and step 132 in FIG.4), the user may have been required to take a first picture or scan ofthe product (see step 220 in FIG. 9). Thus, the picture or scan of theproduct occurring at step 280 in FIG. 11 may be a second picture or scanof the product. After the second picture or scan occurs, the system maydetermine if the second picture or scan occurred within a designatedtime limit 284. The time limit may be any quantity of time and be withinthe intended spirit and scope of the disclosed example embodiments.Example time limits may include, but are not limited to, 30 minutes, 1hour, 2 hours, etc. If the second picture or scan does not occur withinthe time limit, the user may not receive value 288. If the secondpicture or scan occurs within the time limit, the mobile electronicdevice sends the second picture/scan to the one or more servers via oneor more networks 292. The one or more servers then determine if thesecond picture/scan is taken of the same product from which the firstpicture or scan was taken 296. If the second picture/scan is not of thesame product, then the user does not receive value 300. If the secondpicture/scan is of the same product, then the system identifies thelocation of the mobile electronic device at the second location 304. Thelocation of the mobile electronic device may be determined in any of themanners described herein or any other manners and be within the intendedspirit and scope of the disclosed example embodiments. An additionalexample manner of determining the second location of the mobileelectronic device may include a second verification element at thesecond location. The second verification element can identify the secondlocation of the electronic mobile device in similar manners to thatdescribed herein in connection with the first verification element.Continuing, the system then determines if the location of the mobileelectronic device at the second location is the same as thepredetermined designated location 308. As indicated above, for example,the designated location could be the user's home. A user's home may beverified in a variety of manners including, for example, frominformation provided by the user upon account activation, professionalor certified installation of the second verification element discussedabove, credit card billing address, US mailing address, frequentlyvisited GPS coordinates, or any other manner. If the second location ofthe mobile electronic device is at the designated location, then theuser receives value 312. If the second location of the mobile electronicdevice is not at the designated location, the user does not receivevalue 316—Step 312 in FIG. 11 pertaining to the user receiving value maycorrespond to the step 136 in FIG. 4 of the user receiving value.

It may also be desirable to verify the authenticity of the scan taken bythe camera of the mobile electronic device. Fraudulent scans may be anartificially generated barcode, picture of a product barcode instead ofthe actual barcode on the product, or other fraudulent mannersattempting to receive undeserved value from fraudulent activity.Authenticity of the scan may be verified in a variety of differentmanners. The following example embodiments are provided for illustrativeand example purposes, and are not intended to be limiting. Other exampleembodiments of authenticating scans taken by a mobile electronic deviceare possible and are intended to be within the spirit and scope of thedisclosed example embodiments.

With respect to the example embodiment illustrated in FIG. 11, multiplescans may require authentication. It should be understood that theverification of the authenticity of scans of the disclosed exampleembodiments may be performed in connection with any scan taken with acamera of a mobile electronic device. However, for illustrative andexample purposes, the following example embodiments of scan verificationrelate to the example embodiment illustrated in FIG. 11.

In one example embodiment, the authenticity of a scan may be performedmanually. In such an embodiment, step 292, as well as any other scanningor picture taking step, may be replaced or followed by a step of anindividual visually inspecting the second scan. If the individualbelieves the second scan is authentic, the individual will thendetermine if the second scan is taken of the same product from which thefirst scan is taken. This manual determination occurs at query step 296in FIG. 11. After this manual verification at step 296, the processcontinues as illustrated in FIG. 11. Alternatively, manual verificationmay occur after value is credited or it may occur at certain valuethresholds to target certain behavioral patterns of users.

In another example embodiment, the authenticity of a scan may beperformed automatically by a computer system without manual interaction.For example, such a computer system may include network, servers,storage media with databases of scanned pictures, CPU, memory, temporarydrive, or memory for performing image comparisons. In such an exampleembodiment, step 292, as well as any other scanning or picture takingstep, may be replaced by or followed by a step of automated imageduplication detection. This detection discovers if one or more users aresubmitting similar scans of a picture of a product or a generatedbarcode rather than an actual product barcode. Methods of verifyingauthenticity include ensuring uniqueness by comparing the entire imageto scans of the same product submitted by the same and/or other users todetecting identical shading and lighting (this will occur if a user isscanning the same photograph of a barcode that he or another usersubmitted). Uniqueness may also be confirmed by comparing scans of thesame product submitted by the same and/or other users by examiningportions of the image in the background outside of the barcode. Thismethod will detect if multiple scans of the same photograph of a barcodeare submitted. To increase the possibility that portions of thebackground are included in the image taken by the camera of the mobileelectronic device, the display or screen of the mobile electronic deviceseen by the user shows less than the full image that will be captured bythe camera when the camera takes the image. For example, the imagedisplayed on the screen of the mobile electronic device will be smallerthan the actual size of the image captured by the camera. That way, theuser will be unaware that more images will be captured then he/sheexpects. Yet another method for verifying the authenticity of a scan mayinclude comparing the scan to one or more known verified versions of theproduct. This will confirm that the barcode is not artificiallygenerated via a fraudulent method such as reproducing a barcode via aprinter, electronic monitor, etc. Since the scans of true products willappear similar because packages are the same, artificially createdbarcodes will not match the actual product. Artificially createdbarcodes may be of the wrong color, and/or include pixilation, may notinclude background images from packaging, etc. Thus, this method willfind scans that are not of the actual product. Using these methods ofverifying similarity to actual products and/or dissimilarity topreviously submitted scans, automated methods can rate the fraudulentlikelihood of a given scan. To make an actual comparison, the one ormore servers may divide up an image into a set of many smaller imagesand compare similarity of the entire image, a subset of only the barcodeportion, or a subset excluding the barcode portion.

Example verification of user activity as it relates to FIG. 11 will bedescribed herein for illustrative purposes and is not intended to belimiting upon the disclosed example embodiments. For example, a user mayhave an action involving traveling to a grocery store and purchasing aparticular brand of shampoo. By traveling to the grocery store andpurchasing the shampoo, the user satisfactorily performs the action.Next, the system determines if the user is actually at the grocery storeand has purchased the shampoo. Verification of the user's location isperformed to determine that the user is at the grocery store and theuser may scan the particular shampoo to confirm an interaction and beginconfirming purchase of the shampoo. If the user is not at the grocerystore or has not scanned the particular shampoo, the user does notreceive value. After purchasing the particular shampoo, the user travelsto a designated second location such as, for example, his/her home, tounload the shampoo along with any other purchased products. In someinstances, it may be desirable to disqualify particular locations asappropriate designated second location. For example, the system maydisqualify locations within a particular radius of the venue from whichthe product was purchased or may disqualify locations within aparticular radius of venues offering the same product. Returning to theillustrated example embodiment, the user may take a second scan of theshampoo at the designated second location. If the user does not take thesecond scan within a particular time limit such as, for example, 1 hour,the user does not receive value. If the user performs the second scanwithin 1 hour, the mobile electronic device sends the second scan of theshampoo to one or more servers. The system determines if the second scanof the shampoo is of the same bottle of shampoo from which the firstscan was taken. If the scans are not of the same bottle of shampoo, theuser does not receive value. If the scans are of the same bottle ofshampoo, the location of the user is determined by determining thelocation of the user's mobile electronic device. If the user is in factat his/her designated second location, the user receives value. If theuser is not at his/her designated second location, the user does notreceive value. If the designated second location is a user's home,verification of the user's home may occur by comparison with a creditcard address, US mail address, a post card send to the user's home, anyother home and address verification manner described herein, or othertypes of home and address verification manners not explicitly disclosedherein, but intended to be within the intended spirit and scope of thedisclosed example embodiments.

As indicated above, the examples provided herein for verifying authenticactivity are only example and many other examples of verifying authenticactivity are intended to be within the spirit and scope of the disclosedexample embodiments. For example, the steps provided in the exampleillustrated in FIG. 11 may be performed in a different order. Forexample, with reference to FIG. 11A, the user's satisfactory performanceof an action 252A may be performed after the mobile electronic device'slocation is determined to correspond to the action opportunity (i.e.,step 252A may be performed between step 264A and step 272A). Also, forexample, the location of the user may be determined 304A and compared tothe designated location 308A at various times in the process. Oneexample illustrated in FIG. 11A establishes that the location of theuser may be determined 304A and compared to the designated location 308Aafter the user travels to the second location 276A and prior to scanningthe product a second time 280A. These examples are only a few examplesof the many possibilities for alternative step orders and theillustrated and described process steps are not intended to be limitingupon the disclosed example embodiments. Rather, the steps may occur inany order and additional or less steps may be included in the process.

With reference to FIG. 12, yet another example manner of verifyingauthentic activity, which is generally represented as step 80 in FIG. 2,is illustrated. The following steps for action verification are onlyexample steps presented in an example order, and a variety of othersteps, orders, and manners for action verification are possible and areintended to be within the spirit and scope of the disclosed exampleembodiments. In this example embodiment, the system verifies authenticactivity after a user satisfactorily performs an action 320 (also seestep 132 in FIG. 4). After a user satisfactorily performs an action, oneor more servers communicate with a point of sale (POS) system associatedwith the user activity via one or more networks 324. The POS system maybe any of a variety of different POS systems including, but not limitedto, a cash register, payment processing system or pin pad, self-checkoutsystem, loyalty program system, near field communication system,transaction confirmation screen, etc. In one example, the user activitymay relate to a user venue and the POS system may be incorporated withthe user venue to track user activity such as, for example, productpurchases within the user venue. In this example, the one or moreservers communicate with the POS system to determine if the user made apurchase associated with the action 328. If the user did not make apurchase associated with the action, the system may continuously orintermittently recheck to determine if the user has made the purchase.If the user makes the purchase, the user receives value 332. Step 332 inFIG. 12 pertaining to the user receiving value may correspond to thestep 136 in FIG. 4 of the user receiving value.

Example verification of user activity as it relates to FIG. 12 will bedescribed herein for illustrative purposes and is not intended to belimiting upon the disclosed example embodiments. For example, an actionmay require a user to travel to a grocery store and the usersatisfactorily performs that action by traveling to the grocery store.To receive value, the user may also be required to purchase a particularproduct at the grocery store. When, the system identifies that the useris at the grocery store, it communicates with a POS system of thegrocery store to determine if the user has purchased the particularproduct. If the POS system has not yet indicated that the user haspurchased the particular product, the system and the POS system mayperiodically communicate to determine if the user has purchased theparticular product. If the user purchases the particular product, thePOS system and the system communicate to verify the user's purchase ofthe particular product and the user receives value.

Referring now to FIG. 13, a further example manner of verifyingauthentic activity, which is generally represented as step 80 in FIG. 2,is illustrated. The following steps for action verification are onlyexample steps presented in an example order, and a variety of othersteps, orders, and manners for action verification are possible and areintended to be within the spirit and scope of the disclosed exampleembodiments. In this example embodiment, the system verifies authenticactivity after a user satisfactorily performs an action 336 (also seestep 132 in FIG. 4). After a user satisfactorily performs an action, theuser may decide to purchase a product associated with the satisfactorilyperformed action 340. Upon purchasing a product, a point of sale (POS)system associated with the venue from which the product was purchasedgenerates an image 344. In some example embodiments, the image may bepreprinted on the receipt paper and such preprinted receipt paper may beprovided to the venue in the form of a triggered coupon, an image on theuser POS terminal, etc. The venue then loads the registers with thepreprinted receipt paper and prints relevant information on the receiptpaper as users purchase products. In other example embodiments, theimage is not preprinted on the receipt paper and is instead printed onthe receipt paper as the receipt is being generated for the user'spurchase. In this embodiment, the POS system prints an image on thereceipt paper during generation of the receipt for the user.

The image may be a wide variety of types of images. For example, theimage may be a barcode, a code consisting of letters, numbers, and/orcharacters, an image of a product (either the product being purchased orsome other product), an image associated with the venue (e.g., atrademark associated with the venue, abbreviation or acronym of thevenue, etc.), a QR code, or two-dimensional barcode, or any other typeof image.

After receipt generation, the user receives the image 348. The useractivates his/her camera 352 on the mobile electronic device andperforms a scan of the image on the receipt with the camera 356. Then,the mobile electronic device sends the scan of the receipt image 360 toone or more servers via one or more networks for verification 364. Theauthenticity of the receipt image may be verified in any of the mannersdescribed herein such as, for example, manually, automatically, etc., orany other manner, all of which are intended to be within the spirit andscope of the disclosed example embodiments. This verification stepattempts to determine if the receipt image corresponds to the purchasedproduct and/or the venue of purchase 368. If the receipt imagecorresponds to the purchased product and/or venue, the user receivesvalue 372. If the receipt image does not correspond to the purchasedproduct and/or the venue, the user does not receive value 376. Step 372in FIG. 13 pertaining to the user receiving value may correspond to thestep 136 in FIG. 4 of the user receiving value. Example verification ofuser activity as it relates to FIG. 13 will be described herein forillustrative purposes and is not intended to be limiting upon thedisclosed example embodiments. The example used above to illustrate FIG.12 will be relied upon herein with reference to FIG. 13 at least inconnection with the similar elements between the two flowcharts. Forexample, an action may require a user to travel to a coffee shop and theuser satisfactorily performs that action by traveling to the coffeeshop. To receive value, the user may also be required to purchase aparticular coffee drink. Upon the user purchasing the particular coffeedrink, the POS system of the coffee shop generates a receipt for theuser's purchase of the particular coffee drink. An image such as, forexample, a barcode is included on the receipt. After the user receivesthe receipt, the user activates the camera on his/her mobile electronicdevice and performs a scan of the barcode on the receipt. The user thensends the scan of the barcode for verification. The system verifiesauthenticity of the barcode by determining if the barcode corresponds tothe particular coffee drink and/or the coffee shop. If the barcode inthe scan does not correspond to the particular coffee drink and/or thecoffee shop, the user does not receive value. On the other hand, if thebarcode in the scan does correspond to the particular coffee drinkand/or the coffee shop, the user receives value.

Now that numerous examples of action generation and action verificationhave been described, at least one example of value redemption will bedescribed herein. The example value redemption described herein is notintended to be limiting. Many other manners of value redemption may beperformed and are intended to be within the spirit and scope of thedisclosed example embodiments.

As shown in FIG. 2, a general representation of value redemption isillustrated at step 84. Referring now to FIG. 14, an example manner ofvalue redemption is illustrated in more detail. Initially, the userindicates that value redemption is desired 380. The user may accomplishthis by selecting, on the mobile electronic device, that valueredemption is desired. The mobile electronic device then communicateswith one or more servers via one or more networks to indicate the user'sdesire to redeem value. The one or more servers then send appropriatedata back to the mobile electronic device relating to value redemption.The mobile electronic device then displays one or more value redemptionopportunities by category 384. The user then determines if a desiredcategory is displayed 388. If a desired category of value redemption isdisplayed, the user selects the desired value redemption category 392.After selection of a category, one or more specific value redemptionopportunities within the category are displayed on the mobile electronicdevice 396. The user selects one of the value redemption opportunities400 and the mobile electronic device may display additional informationrelating to the selected redemption opportunity 404. After displayingthe additional information, the user executes redemption of the value408. The mobile electronic device communicates with the one or moreservers via the one or more networks to indicate the redemption of valueperformed by the user 412. It should be understood that the user mayredeem value on user electronic devices other than mobile electronicdevices such as, for example, personal computers, laptops, or any otherelectronic device capable of communicating with the one or more serversvia one or more networks.

Returning to step 388, if the user does not see a desired redemptionopportunity displayed on the mobile electronic device, the user mayinitiate a search for value redemption opportunities 416. In thealternative, the user may desire to perform a search for valueredemption opportunities at the onset of attempting to redeem value.Such an alternative may be desirable if the user does not want to lookthrough the full list of redemption opportunities. After initiation ofthe search, the user enters information into the mobile electronicdevice related to a desired redemption opportunity 420. The user thenexecutes the search 424 with the mobile electronic device after enteringdesired information. The mobile electronic device communicates theentered search criteria to one or more servers via one or more networks428. The one or more servers communicate search results related to thesearch criteria to the mobile electronic device via one or more networks432. The mobile electronic device then displays the search results forviewing by the user 436. Next, the user determines if a desired valueredemption opportunity is displayed 440. If not, a new search may beinitiated 444. If a desired value redemption opportunity is displayed,the user selects the desired redemption opportunity as illustrated atstep 400 in FIG. 14. Then, steps 404-412 are followed in a similarmanner to that described above.

An example of value redemption as it relates to FIG. 14 will bedescribed herein for illustrative purposes and is not intended to belimiting upon the disclosed example embodiments. As an example, the userhas accrued sufficient reward points from satisfactorily performingvarious user activities and wishes to redeem at least a portion of thereward points for a product or service. The user begins by indicating onhis/her mobile electronic device that he/she desires to redeem points.The user's mobile electronic device displays redemption opportunities bycategory such as, for example, gift cards, gadgets, e-delivery, charity,coupons, etc. For purposes of this example, we will assume the userdesires to redeem points for a gift card. The user sees the gift cardcategory displayed on the mobile electronic device and selects the giftcard category. Next, the mobile electronic device displays more specificgift card redemption opportunities. The user selects one of the giftcard redemption opportunities and, if necessary, the mobile electronicdevice displays additional information about the selected gift cardredemption opportunity such as, for example, an expiration date, use andlocation restrictions, etc. The user executes the redemption rewardpoints for the gift card via the mobile electronic device, which thencommunicates the redemption to the one or more servers via the one ormore networks. Returning to the point in this example where thecategories of redemption opportunities are displayed on the mobileelectronic device, if the user does not see a desired category or doesnot want to survey the entire list of categories, the user may initiatea search for a particular type of redemption category. For purposes ofthis example, let's assume the user wants to redeem reward points for adigital music player. The user enters the words “digital music player”into the mobile electronic device and the user executes the search. Themobile electronic device sends the search criteria to the one or moreservers, which return the search results to the mobile electronic devicepertaining to “digital music player”. The mobile electronic devicedisplays the search results relating to digital music players. If thedisplayed search results are not satisfactory to the user, he/she caninitiate a new search. If the search results contain a desirable digitalmusic player, the user selects the desired digital music player,executes the redemption of reward points, and the redemption of pointsfor the digital music player is complete.

The system is capable of having real-time or substantially real-timeoperation and non-real-time operation. Real-time or substantiallyreal-time operation may occur when the user electronic device is capableof communicating with one or more networks and the one or more networksare continuously or substantially continuously available. With thesecapabilities, the system is capable of performing necessary steps andactions as such steps and actions are required. The system may operatein a non-real-time manner for a variety of reasons. Some example reasonsinclude, but are not limited to, when one or more networks are notavailable (e.g., no internet access, poor or no cellular coverage,etc.), when the user electronic device is capable of communicating withonly a particular type of network (e.g., iPod Touch™ is not cellularcapable and is only internet capable) and such particular type ofnetwork is not available (e.g., internet not available), or a variety ofother reasons.

In instances where non-real time operation is necessary, the systemstores or caches data to allow the user to utilize his/her mobileelectronic device to receive value associated with the present system.The system is capable of storing or caching data in a variety ofdifferent manners and the following described manners are only examplemanners of storing or caching data.

While not explicitly described herein, the system is capable ofperforming other manners of storing or caching data and such othermanners are intended to be within the spirit and scope of the disclosedexample embodiments.

For example, an instance may arise where the user is in an area havingpoor or no cellular coverage and no WI-FI or WLAN availability. In suchan instance, the user's mobile electronic device may not communicatewith one or more servers via one or more networks. However, the user maybe in a location where an action may be performed to receive value.

With reference to FIG. 17, an example manner of enabling a user toobtain value when in a location lacking communication with one or morenetworks is illustrated. The following steps are only example stepspresented in an example order, and a variety of other steps, orders, andmanners for enabling a user to obtain value when in a location lackingcommunication with one or more networks are possible and are intended tobe within the spirit and scope of the disclosed example embodiments. Inthis example embodiment, an action is performed 500 such as, forexample, mobile electronic device communication with a verificationelement, user satisfactorily performs an action, etc. Data is obtainedas a result of the action 504.

Communication between the mobile electronic device and one or morenetworks needs to be determined 508. If the mobile electronic device isin a location with access to one or more networks, the data associatedwith the action is communicated via one or more networks 512.Subsequently, the user receives value 516. If the mobile electronicdevice is in a location without access to one or more networks, the datais stored or cached in the mobile electronic device 520. The mobileelectronic device may check for the availability of one or more networkson a periodic or continuous basis 524. When one or more networks becomeavailable, the mobile electronic device communicates the stored orcached data via the one or more available networks 528. Subsequently,the user receives value 516.

A real-world example of enabling a user to obtain value when in alocation lacking communication with one or more networks will bedescribed herein for illustrative purposes and is not intended to belimiting upon the disclosed example embodiments. The present examplewill utilize a grocery store environment and a user attempting to scan aparticular product to receive value.

Before the user enters the grocery store, the mobile electronic devicemay communicate with a verification element and the mobile electronicdevice may store or cache data in its memory associated with theverification element for use when a network is not available. The usermay then proceed to an aisle in a store with a network not available,view stored or cached opportunities, and scan the barcode of aparticular item. The mobile electronic device may store or cachetransmission data associated with the scanned item when a network is notavailable. The user may then decide to purchase the scanned item andleaves the grocery store. As the user travels home, the user may driveinto an area having good cellular coverage. After entering the goodcellular coverage area, the mobile electronic device communicates thestored or cached data associated with the verification element and thestored or cached data associated with the scanned item to the one ormore servers via the now available cellular network. Upon the one ormore servers' receipt and verification of the stored or cached data, theuser receives the deserved value. Had the mobile electronic device notstored or cached data of the opportunities available and/or the useraction when it was out of communication with one or more networks, theuser would not have received value obtained during the period ofnon-communication.

As another example, the user may have a mobile electronic device that isonly WIFI internet capable and is not cellular capable (e.g., tabletcomputer, iPod Touch™, etc.). In such an instance, the user may haveinternet access at home, but may not have internet access away fromhis/her home. When the user is at home, the mobile electronic device maystore or cache data or preload data into its memory associated withactions and value receiving opportunities within a particular area. Sucha particular area may be, for example, a particular radius from theuser's home, a particular city, county, state, nation, or any otherarea. In the present example, the predetermined area will be a 50 mileradius from the user's home. Thus, the system stores or caches dataassociated with all the actions and value receiving opportunities withinthe 50 mile radius of the user's home. When the user leaves his/her homeand travels within the 50 mile radius, the various actions and valuereceiving opportunities are displayed on the user's mobile electronicdevice. The user may desire to perform an action and a value receivingopportunity within the 50 mile radius. For example purposes, assume theuser is in a grocery store within the 50 mile radius and the user wantsto scan a particular product to receive value. When the user enters thegrocery store, the mobile electronic device may communicate with averification element and the mobile electronic device may store or cachedata in its memory associated with the verification element. The usermay then proceed to a particle aisle and scan the barcode of aparticular item. The mobile electronic device may store or cache dataassociated with the scanned item. The user may then decide to purchasethe scanned item and leaves the grocery store for home. As the userarrives at his/her home, the user enters into his/her WI-FI, WLAN, orother network range. After entering the user's network range, the mobileelectronic device communicates the stored or cached data associated withthe verification element and the stored or cached data associated withthe scanned item to the one or more servers via the now available homenetwork. Upon the one or more servers' receipt and verification of thestored or cached data, the user receives the deserved value. Had datanot been stored or cached or preloaded into the mobile electronic devicewhen the mobile electronic device was in communication with the internetand had the mobile electronic device not stored or cached data when itwas out of communication with the internet, the user would not havereceived value for his/her activities performed out of communicationwith the internet.

As users move from place to place, the mobile electronic device willgain and loose access to networks. The disclosed example embodimentsaccommodate such gain and loss of networks and still facilitates properfunctionality. With reference to FIG. 18, another example manner ofenabling a user to obtain value when access to one or more networks isunavailable is illustrated. The illustrated example embodiment is onlyone of many different manners of enabling a user to obtain value whenaccess to one or more networks is unavailable and all of such mannersare intended to be within the spirit and scope of the disclosed exampleembodiments. Initially, the mobile electronic device determines if oneor more networks is available 532. If a network is available, the mobileelectronic device accesses a server via the accessible network andstores opportunities in the storage device of the mobile electronicdevice 534. At some point after the opportunities are stored on themobile electronic device, a user may attempt an action 536. Returning tostep 532, if a network is not available, the mobile electronic devicecannot access a server over a network and the mobile electronic devicemust use one or more of the opportunities previously stored in thestorage device of the mobile electronic device 538. Subsequently, a usermay attempt one of the previously stored opportunities 536. The mobileelectronic device again determines if one or more networks is available540. If a network is available, the user will receive value if theaction is verified 542. If a network is not available, data associatedwith the action is stored on the mobile electronic device until anetwork is available 544. When a network becomes available, the data iscommunicated and the user receives value if the action is verified 542.

With reference to FIG. 19, as users perform various activities 550 incommerce, data associated with the users' activities may be generated554, collected, stored, and utilized for a variety of reasons 558. Insome example embodiments, user data may be utilized to effectivelymarket to the user 558. If the user is presented with value and/oropportunities 562 such as, for example, display advertising, videos,coupons, digital coupons, grocery list creation, discounts, highlightedproducts, special offers, etc., based on the user's own activity, thevalue and/or opportunities are more likely to be relevant to and desiredby the user. In some example embodiments, the system may present valueand/or opportunities relating to products the user purchased or productsin which the user is otherwise interested. In other example embodiments,the system may present value and/or opportunities similar to or relatingto competitors (e.g., having a different brand) of those products theuser purchased or is otherwise interested in. In further exampleembodiments, the system may present value and/or opportunities relatingto one or more demographics of a user such as, for example, age, sex,race, household income, geographic location, marital status, with orwithout children, etc.

An example manner of marketing to a user based on the user's ownactivity is described herein. The example manner is not intended to belimiting and many other manners of marketing to users based on theusers' own activity are intended to be within the spirit and scope ofthe disclosed example embodiments. In addition, the steps provided inthe illustrated example embodiment may occur in a variety of differentorders and the illustrated example manner of marketing to a user mayinclude more or fewer steps, all of such possibilities are intended tobe within the spirit and scope of the disclosed example embodiments. Forexample, a user may be presented with an activity to scan specificproducts or specific categories of products at a designated locationsuch as, for example, the user's home. The user may scan specificproducts or categories of products for value, which, along with otherdata, may trigger targeted advertisements, action opportunities, and/orother forms of value. In some instances, it may be desirable for thesystem to discern a designated location from a nearby store. The systemmay choose to make ineligible a designated location within a radius ofthe venue from which products were purchased by the user, or withinradii of venues offering the same product. The designated location, ifit is a user's home, may be verified in a variety of manners such as,for example, credit card address verification, a postcard send, and/orother address confirmation methods. When a user scans previouslypurchased products at home, data associated with the scanned productswill be stored in a history of that user's purchases along with the timescanned. These purchases made by the user may be combined with databaseinformation from POS systems and verified shopping trips to create amore comprehensive buying history. This database may also be combinedwith demographics of the user. Based on these demographics and/or buyinghistory and/or immediate scans, triggers can be created resulting incustomized experiences for particular users. These triggers may resultin targeted advertisements, action opportunities, and/or other forms ofvalue that could appear immediately or at a later time such as, forexample, when a user enters a location, when the users is in othersmartphone Apps on the mobile electronic device, when the user isperforming smartphone web browsing on the mobile electronic device,and/or upon scanning a future purchased product. Triggers, by way ofexample, may include marketing a competing brand of soda to a user thatscanned a different brand at home. Another trigger may be identifying acoffee drinker and marketing a new type of instant coffee to the coffeedrinker. Another trigger may be identifying a family with baby food inthe house and marketing a brand of diaper. Another trigger may includeidentifying an elderly user via demographics and offering value uponcompleting a survey on vitamins designed for older individuals. Theseare only a few of the many possible types of marketing triggers and areprovided for example and illustrative purposes only. Any possibletriggers are intended to be within the spirit and scope of the disclosedexample embodiments.

The many possible manners of marketing to users based on their ownactivity may allow targeted advertisements to reach a user based onspecific demographics, product ownership, and/or location visits.Additionally, these manners of marketing to users do not require, butmay work with, connection to a POS system. Users may receive thetargeted value, action opportunities, etc., at many times such as, forexample, when the user is actively shopping or before a purchase ismade. Reaching users prior to purchase may be a more effective manner ofmarketing than targeting a user post-sale as the users are leaving thestore and are less likely to retain any value, coupons, etc. for areturn visit.

Users also have opportunities to earn value without making a purchaseby, for example, scanning a product, entering a particular location,etc. Engaging a user without requiring a purchase may increase thelikelihood that a user will take an action such as, for example,scanning a product, entering a location, etc. Upon finding a product,entering a location, etc., the user is further down the purchasing pathand can be marketed again to evaluate the offer and ultimately make apurchase. With this process, the user may be motivated to at leasttravel to the product or location, collect value, and gain moreinformation about the product's fit for the user. To the contrary,post-purchase targeting such as coupons for random products may besimply and outright dismissed by the user because the user is notinterested in the product. The process of target marketing users basedon the user's activity facilitates surveying of user activity atcritical decision making times in response to triggers.

Further, users may receive value in response to purchase interest orhistory. Users may interact with products they have purchased withinproduct categories to provide value. Users may also indicate interest inproducts, services, or stores via clicks or selections on digitalcoupons, offers, grocery list creation, loyalty card history, specificstores visited, etc. Value received by the user may include triggeredvalue advertising or offers targeted to specific categories of productsand/or stores through mobile electronic experiences. Such triggeredvalue may occur immediately after a triggering event or it may occur ata later time. Such triggered value may also occur in another application(App) on the mobile electronic device or on another electronic device ina household. Such value may occur outside of the system or applicationwhere the action occurred and may include, for example, targetedmessaging or advertising appearing via push, SMS message, email, inanother application, on a web browser, or another device within the samehousehold. The triggered value may be triggered by a specific store, aspecific product, or a range of stores and products. Also, the triggeredvalue may attempt to market the user a competing, a complementary, or asimilar category.

As can be seen above, a user may be required to perform any number ofsteps in order to satisfactorily perform an action and receive value. Insome instances no steps and/or actions are required to receive value,while in other instances numerous steps and/or actions are required toreceive value. It should be understood that, in instances where numeroussteps are required, a user may receive value only after satisfactorilyperforming all steps, a user may receive value after satisfactorilyperforming each step, or a user may receive value after satisfactorilyperforming any number of the various required steps. In instances wherea user may receive value after satisfactorily performing individualsteps or other numbers of steps less than the total number of steps, theuser may receive value even if the user does not satisfactorily performall the steps.

Many other applications (also referred to as “Apps”) exist that may beoperated on mobile electronic devices or other electronic devices. Thesystems, apparatuses, and methods disclosed herein may be utilized withother Apps to provide users of the other Apps with value. Such otherApps may be developed by an application developer, which may be any ofan individual person, a company or business entity, a software orprogram capable of developing Apps. The systems, apparatuses, andmethods disclosed herein may be utilized with the other Apps in avariety of different manners and value may be provided to users of theother Apps and/or to the application developer in a variety of differentforms and manners. For example, value provided to a user may includecurrency in a game app, phone minutes, advertising removal, etc. Also,for example, value that may be provided to an application developer mayinclude monetary value. The following example scenarios are forillustrative purposes only and are not intended to be limiting upon thedisclosed example embodiments. Rather, any possible utilization betweenthe systems, apparatuses, and methods disclosed herein and other Apps,and any manner of providing value to users of the other Apps areintended to be within the spirit and scope of the disclosed exampleembodiments.

In some example embodiments, an example secondary or other App mayinclude free operation and may include upgraded operation requiringpayment to gain access to the upgraded operation. Rather than make amonetary payment for the upgraded operation, a user of the secondary Appmay have the option to perform functionality associated with thesystems, apparatuses, and methods disclosed herein. For example, a userof the secondary App may be able to perform an action such as, forexample, checking into a location, scanning product(s) at a particularlocation, or scanning product(s) at home, etc., similarly to thosemanners described and illustrated herein, and the user may receiveaccess to the upgraded operation by satisfactorily performing such anaction(s). In addition, the application developer of the secondary Appmay receive monetary value from business entities when the user performsthe above listed actions.

It should be understood that the present disclosure may be incorporatedwith any other or secondary Apps, may be incorporated into other orsecondary Apps in any manner, and may provide value to users of theother or secondary Apps in any form, all of which are intended to bewithin the spirit and scope of the disclosed example embodiments.

It should also be understood that a variety of different manners ofinteraction between mobile electronic devices and products are disclosedherein, and many other manners of interaction between mobile electronicdevices and products are contemplated and are intended to be within thespirit and scope of the disclosed example embodiments. For example,mobile electronic devices may interact with a product by taking apicture of the product or a portion of the product, scanning a barcodeor 2D code on the product, radio frequency identification (RFID) or nearfield communication (NFC) interaction, etc.

In one example embodiment as disclosed herein, a system is provided forproviding value to a user based on user activity. In another exampleembodiment as disclosed herein, a system is provided for verifying useractivity. In yet another example, a method of providing value to a userbased on user activity is provided. In still another example, a methodof verifying user activity is provided. In a further example, anapparatus is provided for providing value to a user based on useractivity. In yet a further example, an apparatus is provided forverifying user activity. In still a further example, a method ofproviding value to a user is provided and includes performing an actionwith a mobile electronic device, generating data associated with theaction, communicating the data to a server via a network, storing thedata in a storage device, identifying value using the data, andproviding the value to a user. In another example, a method of providingvalue to a user is provided and includes performing a first actionassociated with a mobile electronic device, communicating dataassociated with the first action to a server, performing a second actionassociated with the mobile electronic device, communicating dataassociated with the second action to the server, verifying authenticityof at least one of the first action and the second action using the dataassociated with the first action and the second action, and providingvalue to the user if the at least one of the first action and the secondaction is determined to be authentic. In yet another example, a methodof verifying a location of a mobile electronic device is provided andincludes providing a verification element in a location, theverification element including a memory, a plurality of uniquecommunications stored in the memory, and a broadcast element,broadcasting one of the plurality of unique communications with thebroadcast element, receiving the one of the plurality of uniquecommunications with the mobile electronic device, communicating the oneof the plurality of unique communications to a server with the mobileelectronic device via a network, and verifying the one of the pluralityof unique communications is associated with the verification element. Ina further example, a method of verifying a location of a mobileelectronic device is provided and includes providing a verificationelement in a location, the verification element may include a memory, aunique id and secret key for generating non-predictable codes from analgorithm, a battery backup clock, a plurality of unique codes generatedon the fly or stored in the memory, and a broadcast element broadcastingand periodically changing one of the plurality of unique codes with thebroadcast element, receiving the one of the plurality of unique codeswith the mobile electronic device, communicating the one of theplurality of unique codes to a server with the mobile electronic via anetwork, and verifying the one of the plurality of unique codes isassociated with the verification element. In still another example, amethod of providing value to a user is provided and includes performingan action with a mobile electronic device when the mobile electronicdevice is without access to a network, the mobile electronic deviceincluding a data storage device, generating data associated with theaction, storing the data in the data storage device in the mobileelectronic device, gaining access to a network with the mobileelectronic device, communicating the data to a server via the networkwhen the mobile electronic device has access to a network, and providingvalue to the user. In a further example, a method of providing value toa user is provided and includes communication data to a mobileelectronic device via a network when the network is accessible by themobile electronic device, the mobile electronic device including a datastorage device, storing the data in the data storage device of themobile electronic device, wherein the data is associated with an actionopportunity, prompting a user via the mobile electronic device of theaction opportunity when the mobile electronic device does not haveaccess to a network, performing an action, with the mobile electronicdevice, associated with the action opportunity when the mobileelectronic device does not have access to a network, and providing valueto the user. In still a further example, a method of providing value toa user is provided and includes operating an application on a mobileelectronic device, performing an action with the mobile electronicdevice when the application is not operating on the mobile electronicdevice, generating data associated with the action, communicating thedata to a server via a network, identifying value using the data,wherein the value is associated with the application, and providing thevalue to the user. In yet a further example, a method of verifyingproduct interaction is provided and includes providing a product,capturing an image associated with the product with a mobile electronicdevice, transmitting the image over a network for verification, andverifying that the image is associated with the product.

The foregoing description has been presented for purposes ofillustration and description, and is not intended to be exhaustive or tolimit the invention to the precise form disclosed. The descriptions wereselected to explain the principles of the invention and their practicalapplication to enable others skilled in the art to utilize the inventionin various embodiments and various modifications as are suited to theparticular use contemplated. Although particular constructions of thedisclosed example embodiments have been shown and described, otheralternative constructions will be apparent to those of ordinary skill inthe art and are within the intended scope of the disclosed exampleembodiments.

What is claimed is:
 1. A verification system comprising: a memorystoring an identifier and an encryption key; a wireless broadcastelement; a timing device configured to generate a time value; aprocessing circuit electronically coupled to the memory, the timingdevice, and the wireless broadcast element, the processing circuitconfigured to periodically generate a verification code from atransformation of the identifier, the encryption key, and the time valuegenerated by the timing device, wherein the wireless broadcast elementis configured to broadcast the verification code, a plurality of mobiledevices receiving the broadcast verification code and sending theverification code to a server; and the server, wherein the server isconfigured to synchronize a time value of a server clock and the timevalue of the timing device, wherein the server is configured to comparea received verification code to expected server-generated verificationcodes, wherein the server is configured to authenticate one or more ofthe plurality of mobile devices based on whether the receivedverification code matches one or more expected server-generatedverification codes.
 2. The verification system of claim 1 wherein a timeperiod between wireless broadcasts is configurable.
 3. The verificationsystem of claim 1 wherein a strength of the wireless broadcast isconfigurable.
 4. The verification system of claim 1 wherein the memoryis configured to not receive or alter values stored in the memory afterdeployment.
 5. The verification system of claim 1 wherein the broadcastverification code corresponds to a location of the wireless broadcastelement.
 6. The verification system of claim 1 configured with anadjustable output strength element to dynamically adjust a signalstrength of the wireless broadcast element, wherein the adjustableoutput strength element is dynamically adjusted via the processingcircuit to cause the signal strength of the wireless broadcast elementto correspond with a signal transmission range configured to fit a venuein which the verification system is positioned.
 7. A method comprising:periodically generating, by a processing circuit, a verification codefrom a transformation of an identifier, an encryption key, and a timevalue generated by a timing device; broadcasting, by a wirelessbroadcast element, the verification code; receiving, by a plurality ofmobile devices, the broadcast verification code and sending theverification code to a server; comparing, by the server, a receivedverification code to expected server-generated verification codes; andauthenticating, by the server, one or more of the plurality of mobiledevices based on whether the received verification code matches one ormore expected server-generated verification codes.
 8. The method ofclaim 7 wherein a time period between wireless broadcasts isconfigurable.
 9. The method of claim 7 wherein a strength of thewireless broadcast is configurable.
 10. The method of claim 7 wherein amemory is configured to not receive or alter values stored in the memoryafter deployment.
 11. The method of claim 7 wherein the broadcastverification code corresponds to a location of the wireless broadcastelement.
 12. The method of claim 7 including dynamically adjusting asignal strength of the wireless broadcast element to cause the signalstrength of the wireless broadcast element to correspond with a signaltransmission range configured to fit a venue in which the verificationsystem is positioned.