Systems and methods for scanning a user environment and evaluating data of interest

ABSTRACT

According to various embodiments, a mobile device continuously and/or automatically scans a user environment for tags containing non-human-readable data. The mobile device may continuously and/or automatically scan the environment for tags without being specifically directed at a particular tag. The mobile device may be adapted to scan for audio tags, radio frequency tags, and/or image tags. The mobile device may be configured to scan for and identify tags within the user environment that satisfy a user preference. The mobile device may perform an action in response to identifying a tag that satisfies a user preference. The mobile device may be configured to scan for a wide variety of tags, including tags in the form of quick response codes, steganographic content, audio watermarks, audio outside of a human audible range, radio frequency identification tags, long wavelength identification tags, near field communication tags, and/or a Memory Spot device.

If an Application Data Sheet (“ADS”) has been filed on the filing dateof this application, it is incorporated by reference herein. Anyapplications claimed on the ADS for priority under 35 U.S.C. §§119, 120,121, or 365(c), and any and all parent, grandparent, great-grandparent,etc., applications of such applications, are also incorporated byreference, including any priority claims made in those applications andany material incorporated by reference, to the extent such subjectmatter is not inconsistent herewith.

CROSS-REFERENCE TO RELATED APPLICATIONS

The present application claims the benefit of the earliest availableeffective filing date(s) from the following listed application(s) (the“Priority Applications”), if any, listed below (e.g., claims earliestavailable priority dates for other than provisional patent applicationsor claims benefits under 35 U.S.C. §119(e) for provisional patentapplications, for any and all parent, grandparent, great-grandparent,etc., applications of the Priority Application(s)).

Priority Applications

This U.S. patent application is a Continuation of U.S. patentapplication Ser. No. 13/410,141, titled SYSTEMS AND METHODS FOR SCANNINGA USER ENVIRONMENT AND EVALUATING DATA OF INTEREST, filed on Mar. 1,2012, which application is hereby incorporated by reference in itsentirety.

Related Applications

If the listings of applications provided herein are inconsistent withthe listings provided via an ADS, it is the intent of the Applicants toclaim priority to each application that appears in the PriorityApplications section of the ADS and to each application that appears inthe Priority Applications section of this application.

TECHNICAL FIELD

This disclosure relates to personal data capturing devices adapted tocontinuously and/or automatically scan a user's environment.Specifically, this disclosure relates to continuously and/orautomatically scanning a user environment and aggregating data that maybe of interest to a user.

All subject matter of the Priority Applications and the RelatedApplications and of any and all parent, grandparent, great-grandparent,etc., applications of the Priority Applications and the RelatedApplications, including any priority claims, is incorporated herein byreference to the extent such subject matter is not inconsistentherewith.

SUMMARY

According to various embodiments, a mobile device continuously and/orautomatically scans a user environment for tags containingnon-human-readable data. The mobile device may continuously and/orautomatically scan the environment for tags without being specificallydirected at a particular tag. The mobile device may be adapted to scanfor audio tags, radio frequency (RF) tags, and/or image tags. The mobiledevice may be configured to scan for and identify tags within the userenvironment that satisfy a user preference. The mobile device mayperform an action in response to identifying a tag that satisfies a userpreference. In some embodiments, user preferences are provided by theuser, by a third party, based on social network information or location,and/or deduced from available information related to the user. Themobile device may be configured to scan for a wide variety of tags,including tags in the form of quick response (QR) codes, steganographiccontent, audio watermarks, audio outside of a human audible range, radiofrequency identification (RFID) tags, long wavelength identification(LWID) tags, near field communication (NFC) tags, and/or a Memory Spotdevice. In some embodiments the mobile device scans tags within anenvironment and then utilizes an integrated computing device to identifytags that satisfy a user preference and perform an action in response toan identified tag. In other embodiments, the mobile device utilizes aremote computing device, such as a cloud computing device, to identifythe tags that satisfy a user preference and/or perform actions inresponse to identified tags. The computing device may also verify theauthenticity of the tag and/or decrypt a scanned tag.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a flow chart of an exemplary method for continuouslyand/or automatically scanning a user environment for data, evaluatingthe data, and performing a desired action in response to collected data.

FIG. 2 is a flow chart of an exemplary method for continuously and/orautomatically scanning a user environment for data, decrypting andverifying the data, and performing a desired action in response tocollected data.

FIG. 3 is a flow chart of an exemplary method for continuously and/orautomatically scanning a user environment for data using an imagingdevice and for performing a desired action in response to collecteddata.

FIG. 4 is a functional block diagram of a mobile device that may be usedto continuously and/or automatically scan a user environment for dataand perform desired actions in response to collected data.

FIG. 5A is an exemplary embodiment of a personal mobile deviceconfigured to continuously and/or automatically scan a user environmentfor image data using a camera.

FIG. 5B is an exemplary embodiment of a personal mobile deviceconfigured to continuously and/or automatically scan a user environmentfor audio data using a microphone.

FIG. 5C is an exemplary embodiment of a personal mobile deviceconfigured to continuously and/or automatically scan a user environmentfor radio frequency (RF) data using an RF antenna.

FIG. 6 is an exemplary embodiment of a personal mobile device integratedinto eyeglasses, the personal mobile device configured to continuouslyand/or automatically scan a user environment for data.

FIG. 7 is an exemplary embodiment of a personal mobile device integratedinto a necklace, the personal mobile device configured to continuouslyand/or automatically scan a user environment for data.

FIG. 8 is an exemplary embodiment of a personal mobile device integratedinto a hat, the personal mobile device configured to continuously and/orautomatically scan a user environment for data.

FIG. 9A illustrates a personal mobile device used to continuously and/orautomatically scan shelves in a retail establishment for tags containingnon-human-readable data, the personal mobile device having a narrowfield of view.

FIG. 9B illustrates the personal mobile device used to continuouslyand/or automatically scan the shelves of the retail establishment forimage data with a wide field of view.

FIG. 10A illustrates a personal mobile device integrated into a hat of auser, the personal mobile device configured to continuously and/orautomatically scan a shop front environment for data.

FIG. 10B illustrates the personal mobile device integrated into the hatof the user, the personal mobile device specifically configured tocontinuously and/or automatically scan the shop front environment for RFdata.

FIG. 11 illustrates a personal mobile device integrated within a vehicleto continuously and/or automatically scan a billboard environment fordata.

FIG. 12 illustrates a personal mobile device configured to continuouslyand/or automatically scan the pages of a magazine for data.

FIG. 13A illustrates an advertisement containing image data and textualdata that can be read by a personal mobile device.

FIG. 13B illustrates the advertisement with an included matrix barcodethat can be read by a personal mobile device.

FIG. 13C illustrates the advertisement with an included barcode that canbe read by a personal mobile device.

FIG. 13D illustrates the advertisement with an included steganographicimage visible only to a personal mobile device.

DETAILED DESCRIPTION

A mobile device may continuously and/or automatically scan a userenvironment for tags containing non-human-readable data. The mobiledevice may scan for a wide variety of tags without being specificallydirected at a particular tag, including tags in the form of QR codes,steganographic content, audio watermarks, audio outside of a humanaudible range, radio frequency identification (RFID) tags, longwavelength identification (LWID) tags, near field communication (NFC)tags, and/or a Memory Spot device. The mobile device may be adapted toscan for a wide variety of audio tags, radio frequency (RF) tags, and/orimage tags.

The mobile device may automatically enhance a scanning parameterassociated with the mobile device's ability to scan for tags. Forexample, the mobile device may adjust the aim of the mobile device(e.g., a steerable microphone), adjust the focus of the mobile device,adjust the field of view of the imaging device, adjust the exposure ofthe imaging device, and/or apply a noise-reduction or noise-cancelingalgorithm. The ability of the mobile device to enhance a scanningparameter may depend on the type of tag being detected. For example, inthe case of a mobile imaging device, the mobile device may adjust anoptical focus. In the case of a mobile device adapted to detect RF tags,the mobile device may adjust a sensor focal point or sensitivity to aspecific frequency. In the case of a mobile device adapted to detectaudio tags, the mobile device may adjust an auditory focus point withinan environment, such as focusing on a particular speaker in anenvironment containing multiple speakers.

Once a tag has been scanned within the user environment, the mobiledevice may determine if the tag satisfies a user preference. In someembodiments, the mobile device may include an integrated computingdevice capable of processing the scanned tag to determine if itsatisfies a user preference. In other embodiments, the mobile device mayrely on a remote computing device, such as a cloud computing device. Theuser preferences may be specified by a user, based on historical userinput, based on social network information associated with the user,based on an absolute or relative location of the user, and/or the dateor time. For example, user preferences may include certain topics,brands, information types, advertisements, pricing, reviews, saleinformation, and/or other information as directly or indirectlyspecified by a user.

For instance, a user may be interested in rock climbing and may thetopic of rock climbing may be incorporated as a user preference. Topicsincorporated as user preferences may include topics that are broadand/or relatively narrow. For example, a broad topic such as a user'sinterest in horses may be a broad topic user preference. A user'sinterest in methods of shoeing horses during the eighteenth century maybe a relatively narrow topic incorporated as a user preferences. Othertopics may be related to food, clothing, work, hobbies, vacations,educational, animals, behavior, course curriculums, medical conditions,anthropology, politics, sports, science, arts, history, technology,news, and the like. Similarly, a user's interest in purchasing clothing,electronics, multimedia, and/or other consumer goods of a certain brandmay be incorporated as a user preference. Such as, for example, a user'stemporary interest in purchasing sunglasses of a particular brand name.A user's interest in brands associated with goods or services may beincorporated as user preferences.

The mobile device may perform an action in response to identifying a tagthat satisfies one or more user preferences. For example, the mobiledevice may store or aggregate information from one or more tags. In oneembodiment, the tag may contain or provide a link to supplementalcontent. The supplemental content may be in the form of informationaldata related to the tag, a filename, a web address, such as a universalresource locator (URL), an Internet protocol (IP) address, a mediaaccess control (MAC) address, an email address, a social network handleor address, a messaging address, a phone number, and/or othersupplemental content. Supplemental content obtained from an identifiedtag may be directly provided to a user, stored for eventual retrieval,aggregated with related supplemental content or tags, and/or provided tothe user in the aggregate with other related supplemental content ortags. Additionally, supplemental content obtained from an identified tagmay be compared with supplemental content obtained from other tags,and/or historical data associated with the identified tag. For example,pricing information associated with an identified tag or set of tags maybe compared to pricing information of associated tags previously scannedand/or with pricing information of associated tags stored in anaccessible database.

In some embodiments, the mobile device may perform an action thatincludes notifying the user or a third party that a tag has beenidentified that satisfies one or more user preferences. For example, themobile device may provide an audible alert or visual alert, send amessage or email to a user, and/or update a webpage, database, blog,and/or social network site. The mobile device may additionally, oralternatively, notify a third party. For instance, the mobile device maytransmit a purchase order, a request for a sample, a request for acoupon, and/or a request for additional information. Such an action maybe automatically performed by the mobile device or after verification bythe user. In response to identifying a tag that satisfies one or moreuser preferences, the mobile device may transmit information to a thirdparty related to the user, such as demographic information, contactinformation, a username, a password, financial information, a userlocation, a user comment, social network information associated with theuser, and/or other information related to the user. Such information maybe provided to a third party anonymously or with personal identifyinginformation.

The mobile device may be configured to continuously and/or automaticallyscan any of a wide variety of user environments for any of a widevariety of tags. User environments may include areas proximate the user,including areas within visual or audible range of the user, print media,audio media, visual media, store displays, and billboards. Additionally,the mobile device may be configured to continuously and/or automaticallyscan for RF tags within a predetermined range of a user. The mobiledevice may scan for tags in the form of visual tags, audio tags, and/orRF tags, including, but not limited to, bar codes, QR codes,steganographic content, audio watermarks, audio outside of a humanaudible, RFID tags, LWID tags, NFC tags, and/or Memory Spot devices. Forexample, a camera on a mobile device may be configured to scan forvisual tags that are not visible to the human eye, such as infrared tagsand ultraviolet tags.

In some embodiments, the mobile device includes an integrated computingdevice configured to identify tags that satisfy the one or more userpreferences and perform actions in response to an identified tag.Alternatively, the mobile device may utilize a remote computing device,such as a cloud computing device, to identify the tags that satisfy auser preference and/or perform actions in response to identified tags.The computing device may also verify the authenticity of the tag and/ordecrypt a scanned tag. The mobile device and/or the computing device maybe integrated within and/or include a cellular telephone, a personalcomputer, a laptop, a tablet device, a wearable device, clothing,jewelry, headgear (such as eyeglasses, earphones, earbuds), a briefcase,and/or other portable accessory.

The mobile device may be configured to visually scan for image tagsusing a camera having a fixed or adjustable field of view. For example,the camera may have a wide angle lens, such as a fisheye lens, adaptedto continuously and/or automatically scan a wide field of view.Alternatively, the camera may be configured to continuously and/orautomatically scan a field of view approximating that of the user. Themobile device may alternatively, or additionally, be configured tocontinuously and/or automatically scan for audio tags using one or moremicrophones and/or scan for RF tags using one or more antennas.

As used herein, the term “automatically scanning” refers to scanningindependent of, or without, user action once a device has beenactivated. For example, the mobile device may be initially activated bya user, after which the mobile device may scan the user's environmentfor one or more tags without additional user action. As used herein, theterm “continuously scanning” refers to scanning without interruptiononce activated. For example, the mobile device may be initiallyactivated by a user, after which the mobile device may scan the user'senvironment for one or more tags without interruption.

Some of the infrastructure that can be used with embodiments disclosedherein is already available, such as general-purpose computers, RF tags,RF antennas and associated readers, cameras and associated imageprocessing components, microphones and associated audio processingcomponents, computer programming tools and techniques, digital storagemedia, and communications networks. A computing device may include aprocessor such as a microprocessor, microcontroller, logic circuitry, orthe like. The processor may include a special purpose processing devicesuch as an ASIC, PAL, PLA, PLD, FPGA, or other customized orprogrammable device. The computing device may also include acomputer-readable storage device such as non-volatile memory, staticRAM, dynamic RAM, ROM, CD-ROM, disk, tape, magnetic, optical, flashmemory, or other computer-readable storage medium.

Various aspects of certain embodiments may be implemented usinghardware, software, firmware, or a combination thereof. As used herein,a software module or component may include any type of computerinstruction or computer executable code located within or on acomputer-readable storage medium. A software module may, for instance,comprise one or more physical or logical blocks of computerinstructions, which may be organized as a routine, program, object,component, data structure, etc., that performs one or more tasks orimplements particular abstract data types.

In certain embodiments, a particular software module may comprisedisparate instructions stored in different locations of acomputer-readable storage medium, which together implement the describedfunctionality of the module. Indeed, a module may comprise a singleinstruction or many instructions, and may be distributed over severaldifferent code segments, among different programs, and across severalcomputer-readable storage media. Some embodiments may be practiced in adistributed computing environment where tasks are performed by a remoteprocessing device linked through a communications network.

In the exemplary embodiments depicted in the drawings, the size, shape,orientation, placement, configuration, and/or other characteristics oftags, computing devices, advertisements, cameras, antennas, microphones,and other aspects of mobile devices are merely illustrative.Specifically, mobile devices, computing devices, tags, and associatedelectronic components may be manufactured very small and may notnecessarily be as obtrusive as depicted in the drawings. Moreover,image, audio, and RF tags, which may be significantly smaller thanillustrated, may be less intrusively placed and/or configureddifferently from those depicted in the drawings.

The embodiments of the disclosure will be best understood by referenceto the drawings, wherein like parts are designated by like numeralsthroughout. The components of the disclosed embodiments, as generallydescribed and illustrated in the figures herein, could be arranged anddesigned in a wide variety of different configurations. Furthermore, thefeatures, structures, and operations associated with one embodiment maybe applicable to or combined with the features, structures, oroperations described in conjunction with another embodiment. In otherinstances, well-known structures, materials, or operations are not shownor described in detail to avoid obscuring aspects of this disclosure.

Thus, the following detailed description of the embodiments of thesystems and methods of the disclosure is not intended to limit the scopeof the disclosure, as claimed, but is merely representative of possibleembodiments. In addition, the steps of a method do not necessarily needto be executed in any specific order, or even sequentially, nor need thesteps be executed only once.

FIG. 1 illustrates a flow chart of an exemplary method 100 forcontinuously and/or automatically scanning a user environment for data,evaluating the data, and performing a desired action in response tocollected data. A mobile device may continuously and/or automaticallyscan a user environment for tags containing non-human-readable data, at110. The mobile device may be a stand-alone personal mobile device orintegrated within a mobile telephone, a laptop, a tablet computer, orother portable electronic device. Alternatively the mobile device may beintegrated within a user's clothing, headgear, briefcase, hat, jewelry,or other personal accessory. In one embodiment, the mobile device mayinclude a camera configured to continuously and/or automatically scanfor image tags. In one embodiment, the mobile device may include amicrophone configured to continuously and/or automatically scan foraudio tags. In one embodiment, the mobile device may include an RFantenna and an associated RF sensor configured to continuously and/orautomatically scan for RF tags. The tags may be integrated within orassociated with various products, advertisements, print material,solicitations, offers, and/or other marketing or informationalmaterials.

A computing device may then identify a tag within the user environmentthat satisfies one or more user preferences, at 120. The computingdevice may be integrated within the mobile device. Alternatively, themobile device may be in communication with a remote computing device,such as a computing device in a cloud computing environment, configuredto identify the tag within the user environment. The computing devicemay then determine what action should be performed in association withthe identified tag, at 130.

The computing device, alone or in conjunction with the mobile device,may perform the determined action, at 140. For example, the mobiledevice may provide an audible, visual, or haptic alert to the user thata tag satisfying one or more user preferences has been detected.Information from the tag, or supplemental information related to thetag, may be presented to the user via the mobile device. For instance, adisplay screen may present supplemental information related to anadvertisement in a retail establishment. An email or other messagerelated to the tag may be provided to the user.

FIG. 2 is a flow chart of an exemplary method 200 for continuouslyand/or automatically scanning a user environment for data, decryptingand verifying the data, and performing a desired action in response tocollected data. A mobile device may continuously and/or automaticallyscan a user environment for tags containing non-human-readable data, at210. As an example, a personal mobile device may include a camera and bewearable. Accordingly, the mobile device may continuously and/orautomatically scan an environment for image tags as a user wears thepersonal mobile device.

A computing device may then identify a tag within the user environmentthat satisfies one or more user preferences, at 220. As an example, asthe user visits various retail establishments, the mobile device maycontinuously and/or automatically scan for image tags as the userwearing the personal mobile device visits various retail establishments.The user preferences may be specified by a user, based on historicaluser input, based on social network information associated with theuser, based on an absolute or relative location of the user, and/or thedate or time. The user preferences may include certain topics, brands,information types, advertisements, pricing, reviews, sale information,and/or other information as directly or indirectly specified by a user.Accordingly, as the user visits the various retail establishments, themobile device may identify image tags that are associated with an itemon sale, associated with a particular brand item, correspond to itemspurchased in the past, and/or are associated with user-providedpreferences. In addition, the user preferences may include criteria suchas the current location of the user, the current time and/or date, andimage data proximate the tag. For example, user preferences may indicatean interest in all tags proximate a certain type of image,advertisement, topics, and/or the like.

The computing device may be integrated within the mobile device.Alternatively, the mobile device may be in communication with a remotecomputing device, such as a computing device in a cloud computingenvironment, configured to identify the tag within the user environment.The computing device may also decrypt the identified tag, at 230. It maybe necessary to decrypt the tag, at 230, prior to identifying the tag,at 220. In some embodiments, it may be possible to identify the tagprior to decrypting the tag. In such embodiments, it may be necessary todecrypt supplemental content associated with an identified tag. Theauthenticity of the decrypted tag may also be verified by the computingdevice, at 240.

Various components and systems may utilize encryption and decryptionalgorithms in order to provide increased security. For example,transmission of data to or from the mobile device may be encrypted. Insome embodiments, an scanned and/or identified tag may only be decryptedby authorized users. Accordingly, unauthorized users may not have accessto the tag and/or supplemental content associated with a particular tag.In some embodiments, a user may be considered an authorize user based onthe age of the user, a membership of the user, a subscription of theuser, a fee paid by the user, and/or by other distinguishingcharacteristics. Tags may contain information encrypted using aplurality of different encryption keys, such that decrypting a tag mayinclude decrypting an identified tag using a decryption key specific toa particular user.

Once the identified tag has been decrypted and verified, the computingdevice may determine an action that should be performed associated withthe identified tag, at 250. The computing device, alone or inconjunction with the mobile device, may perform the determined action,at 260. For example, the mobile device may store or aggregateinformation from one or more tags. The tag itself may be recorded, orinformation from the tag may be recorded. Additionally, the context inwhich the tag was read may be recorded. Accordingly, the tag may berecorded, information obtained from the tag may be recorded, and/or thedate, time, location, nearby imagery, and/or other contextualinformation may be recorded as well.

In one embodiment, the tag may contain or provide a link to supplementalcontent. The supplemental content may be in the form of informationaldata related to the tag, a filename, web address, such as a URL, an IPaddress, a MAC address, an email address, a social network handle oraddress, a messaging address, a phone number, and/or other supplementalcontent. Supplemental content obtained from an identified tag may bedirectly provided to the user, stored for eventual retrieval, aggregatedwith related supplemental content or tags, and/or provided to the userin the aggregate with other related supplemental content or tags.

In some embodiments, the mobile device performs an action that includesnotifying or interacting with a third party. For example, the mobiledevice may notify a user that a tag has been identified that satisfiesone or more user preferences. The mobile device may provide an audiblealert, a visual alert, or a haptic alert, send a message or email to auser, and/or update a webpage, database, blog, and/or social networksite. As another example, the mobile device may transmit a purchaseorder, a request for a sample, a request for a coupon, and/or a requestfor additional information. Such an action may be automaticallyperformed by the mobile device or after verification by the user. Themobile device may notify a user that a tag has been identified thatsatisfies one or more user preferences and then perform a related secondaction. For example, once the user has been notified, the mobile devicemay perform a second follow-up action unless the user opts out, only ifdirected by the user, and/or based on a user selection of a secondfollow-up action. For instance, the mobile device may identify a tagoffering a free sample of a product, the user may be notified that thefree sample is available and that the free sample will be ordered unlessthe user opts out within a specified time frame.

In response to identifying a tag that satisfies one or more userpreferences, the mobile device may transmit information to a third partyrelated to the user, such as demographic information, contactinformation, a username, a password, financial information, and/or otherinformation related to the user. Such information may be provided to athird party anonymously or with personal identifying information. Themobile device may communicate with the third party and receiveinstructions to perform a second follow-up action. For example, themobile device may identify a tag that satisfies one or more userpreferences and perform an action that includes communicating with athird party. The third party may direct the mobile device to perform asecond action. The second, third-party-directed action may beautomatically performed, performed only if the third party is a trustedthird party, and/or performed only if the user authorizes theperformance.

FIG. 3 is a flow chart of an exemplary method 300 for continuouslyand/or automatically scanning a user environment for data using animaging device and for performing a desired action in response tocollected data. A personal mobile imaging device is used to continuouslyand/or automatically scan a user environment for image tags containingnon-human-readable data, at 310. Alternatively, the personal mobiledevice may be adapted to scan the user environment for RF tags or audiotags.

A computing device associated with the personal mobile imaging devicemay identify an image tag within the user environment that satisfies oneor more user preferences, at 320. The computing device may be a remotecomputing device or integrated within the personal mobile imagingdevice. The authenticity of the identified image tag may be verified bythe remote computing device, at 330, by a third party, or by the user.The computing device may determine an action to be performed withrespect to the user based upon the identified image tag, at 340. Thecomputing device may also determine an action to be performed withrespect to a third party based on the identified image tag, at 350. Theaction(s) with respect to each of the third party and the user may thenbe performed, at 360.

For example, the computing device, alone or in conjunction with thepersonal mobile imaging device, may provide an alert, purchase aproduct, request additional feedback from the user, request additionalinformation related to the image tag from a third party, and/orotherwise interact with a third party and/or the user. In someembodiments, the personal mobile device aggregates information from aplurality of tags that satisfy one or more user preferences. Theaggregate data, whether obtained directly from the image tags or fromsupplemental material associated with the plurality of tags, may then bepresented to the user and/or a third party.

FIG. 4 is a functional block diagram of a mobile device 400 that may beused to continuously and/or automatically scan a user environment fordata and perform desired actions in response to collected data. Asillustrated, the mobile device 400 may include a camera module 405configured to continuously and/or automatically scan a user environmentfor image tags. The camera module 405 may include various imageprocessing hardware and/or software components. A camera incommunication with the camera module 405 may include a fixed oradjustable field of view. In one embodiment, the camera may beconfigured with a field of view wider than that of a user, equal to thatof a user, or narrower than that of a user. An alert module 410 may beconfigured to provide an audible, visual, vibration, and/or other hapticalert to a user. The alert module 410 may be utilized as part of anaction performed in association with a tag that is determined to satisfyone or more user preferences. For example, the alert module 410 mayinclude a light, an audible beep, a vibrator, a tactile response, hapticfeedback, and/or other feedback mechanism.

The location identification module 415 may provide the mobile device 400with relative and/or absolute location information. For example, thelocation identification module 415 may include a global positioningsystem (GPS) receiver. The location identification module 415 mayadditionally or alternatively be configured to receive or determine therelative location of the mobile device 400 with respect to a fixedobject, such as a building, or with respect to people, such as thefriends of a user of the mobile device 400. The speaker module 420 maybe configured to provide audible feedback to a user. In variousembodiments, the speaker module 420 may be utilized as part of an actionperformed in association with a tag that is determined to satisfy one ormore user preferences. For example, the mobile device 400 may audiblyinform a user via the speaker module 420 that an item is on sale, that aparticular brand item has been detected, that a needed service is beingoffered, or that a solicitation satisfying a user-specified conditionhas been identified.

The microphone module 425 may be configured to continuously and/orautomatically scan an environment for audio tags. Additionally, oralternatively, the microphone module 425 may be configured to receiveand process voice input from a user. For example, the microphone module425 may be utilized by a user to provide voice commands, provide userpreferences, and/or store voice memorandums. The data and/or charge port430 may provide an interface to charge a power supply 440 and/or toupload or download data from storage and/or memory module 450. In oneexample, the data/charge port 430 may conform to an industry standard,such as universal serial bus (USB) or IEEE 1394 (FireWire). Theprocessing unit 435 may perform visual, audio, and/or RF processingassociated with one or more of the camera module 405, the speaker module420 and an RF module 455. The processing unit 435 may also be configuredto identify scanned tags that satisfy one or more user preferences. Insome embodiments, the mobile device 400 does not include the processingunit 435; rather, the mobile device may be in communication with aremote processing unit.

The time signal module 445 may be configured to provide an accuraterelative or absolute time. In some embodiments, the time signal module445 may be in communication with a GPS receiver or include avoltage-controlled oscillator, a voltage-controlled crystal oscillator,and/or other time-keeping device. The data storage and/or memory may beaccessible to various other modules 405-460 and may be adapted to storevarious user preferences. The RF module 455 may be configured tocontinuously and/or automatically scan a user environment for RF tags.For example, the RF module 455 may include a remote sensor, such as anRFID sensor, adapted to receive identification information from anelectronic identification device (EID), such as an RFID tag. In someembodiments, the mobile device 400 includes a display interface module460. The display interface module 460 may be configured to providevisual feedback to a user via a display, such as a liquid crystaldisplay (LCD) or organic light-emitting diode (OLED) display.Furthermore, the display interface module 460 may be configured toreceive user input via a touch interface associated with the displayscreen.

According to various embodiments, various modules 405-460 described inconjunction with FIG. 4 may be omitted and/or other modules notillustrated may be added to any given embodiment of the mobile device400. For example, the mobile device 400 may include each of the cameramodule 405 for scanning image tags, the microphone module 425 forscanning audio tags, and the RF module 455 for scanning RF tags.Alternatively, the mobile device 400 may include only one of the cameramodule 405, the microphone module 425, and the RF module 455. Similarly,the mobile device 400 may rely on the processing unit 435 as a computingdevice, or the mobile device 400 may utilize a remote computing deviceinstead of or in addition to the processing unit 435.

FIG. 5A is an exemplary embodiment of a personal mobile device 500configured to continuously and/or automatically scan a user environmentfor image data using a camera 505. As illustrated, the personal mobiledevice 500 may include a case 502 with various peripheral input/outputdevices. The case 502 is merely illustrative and may be modified to haveany shape, size, weight, or dimensions, and may be made from any of awide variety of materials. Moreover, the case 502 may be omitted and thevarious functions and components of the mobile device 500 may beintegrated into any of a wide variety of alternative portable electronicdevices, such as cellular telephones and tablet computers.

As illustrated, the mobile device 500 may include various input buttons535, a display screen 560, a data/charge port 530, a speaker 520, amicrophone 525, and an LED 510. A strap 570, or other attachment device,may be used to secure the mobile device 500. For example, the strap 570may be used to secure the mobile device 500 around the neck, shoulder,or wrist of a user. According to various embodiments, any of the variousfunctions, operations, structures, and modules described in conjunctionwith FIGS. 1-4 may be integrated within the mobile device 500.Similarly, some of the various functions, operations, structures, andmodules described in conjunction with FIGS. 1-4 may be performedremotely. For example, a wireless communication module may be integratedwithin the mobile device 500 enabling various data storage and/orprocessing operations to take place in a cloud computing environmentrather than within the mobile device 500.

According to the illustrated embodiment, the camera 505 may beconfigured to continuously and/or automatically scan a user environmentfor image tags. A computing device, either a remote computing device ora computing device integrated within the mobile device 500, may thenidentify image tags that satisfy one or more user preferences andperform an associated action.

The mobile device 550, illustrated in FIG. 5B, may not include a cameraand may instead be adapted to scan for audio tags using a microphone525. The personal mobile device 550 of FIG. 5B may include one or moreof the various input buttons 535, the display screen 560, thedata/charge port 530, the speaker 520, the LED 510, and the strap 570.In similar fashion, the mobile device 575, illustrated in FIG. 5C mayinclude an RF antenna 555 configured to continuously and/orautomatically scan a user environment for RF tags. The personal mobiledevice 575 may not include a camera, and is illustrated as having alarger display screen 560. Again, the shape, size, configuration,layout, and dimensions of the various components of the mobile device575 may be adapted for a particular application. Specifically, somefeatures may be omitted from some embodiments, integrated within otherpersonal electronic devices, and/or performed by remote electronicdevices.

FIG. 6 is an exemplary embodiment of a personal mobile device 600integrated into eyeglasses 680. As illustrated, the eyeglasses 680include a camera configured to continuously and/or automatically scan auser environment for image tags. The eyeglasses 680 are also illustratedwith an RF antenna configured to continuously and/or automatically scanthe user environment for RF tags and a microphone configured tocontinuously and/or automatically scan the user environment for audiotags. The mobile device 600 may include a camera 605, an LED alert 610,a GPS receiver 615, a speaker 620, a microphone 625, a data and/orcharge port 630, a processing unit 635, a power supply 640, a clock 645,a data storage 650, an RF sensor 655, and a display 660. As may beappreciated by one of skill in the art, one or more of modules 605-660may be omitted in order to reduce the overall size, power consumption,and/or weight of the mobile device 600.

Additionally, one or two of the camera 605, the RF sensor 655 andassociated antenna, and the microphone 625 may be omitted from themobile device 600. In such embodiments, a wireless communication modulemay connect one or more of the camera, the RF antenna, and themicrophone to a remote device configured to perform one or more of thefunctions associated with modules 605-660. For example, in oneembodiment, the eyeglasses 680 may include only the camera 605, a powersupply 640, and a communication module (either wireless or via the dataport 630).

In such an embodiment, the camera 605 may be configured to continuouslyand/or automatically scan a user environment for image tags and transmit(wireless or via the data port 630) scanned image tags to a remotedevice capable of identifying those image tags that satisfy one or moreuser preferences. The remote device may then perform an action inresponse to the image tags that satisfied the one or more userpreferences. In one embodiment, the mobile device 600 may furtherinclude a feedback mechanism, such as LED alert 610 or the display 660,capable of providing feedback to a user wearing the eyeglasses 680. Anyof the various functions, operations, structures, and modules describedin conjunction with FIGS. 1-4 may be integrated within or performed bythe mobile device 600. Similarly, some of the various functions,operations, structures, and modules described in conjunction with FIGS.1-4 may be performed remotely.

FIG. 7 is an exemplary embodiment of a personal mobile device 700integrated into a necklace 780. As illustrated, the mobile device 700may include a microphone 725 configured to continuously and/orautomatically scan a user environment for audio tags. Additionally, themobile device 700 may include one or more of the modules 705-760. Forexample, the mobile device 700 may include a camera 705, an LED alert710, a GPS receiver 715, a speaker 720, a microphone 725, a data and/orcharge port 730, a processing unit 735, a power supply 740, a clock 745,a data storage 750, an RF sensor 755, and a display 760. Again, as maybe appreciated by one of skill in the art, one or more of the modules705-760 may be omitted in order to reduce the overall size, powerconsumption, and/or weight of the mobile device 700.

In such embodiments, the data port 730 and/or a wireless communicationmodule may facilitate communication between the microphone 725 in thenecklace 780 and other of the modules 705-760 in a remote device.Accordingly, the microphone 725 may continuously and/or automaticallyscan a user environment for audio tags and transmit scanned audio tags(wirelessly or via the data port 730) to a remote device configured toidentify those audio tags that satisfy one or more user preferences. Theremote device may then perform an action in response to the audio tagsthat satisfied the one or more user preferences. In some embodiments,some processing and/or data storage may be performed locally within themobile device 700 integrated within the necklace 780. Any of the variousfunctions, operations, structures, and modules described in conjunctionwith FIGS. 1-4 may be integrated within or performed by the mobiledevice 700, and, as described herein, some of the functions, operations,structures, and modules described in conjunction with FIGS. 1-4 may beperformed remotely.

Audio tags may comprise audio generated using parametric ultrasonictechniques, audio from an electromechanical speaker, audio from a radiobroadcast, audio from a live event, or audio from a televisionbroadcast. The audio tags may be ultrasonic, subsonic, and/or within therange of human hearing. According to various embodiments, audio tags, atany frequency range, may be embedded or encoded within audio detectableby a human user. In some embodiments, an audio tag may be embedded as anaudio watermark within other audio content.

FIG. 8 is an exemplary embodiment of a personal mobile device 800integrated into a hat 880. As illustrated, the mobile device 800 mayinclude an antenna 854 configured to continuously and/or automaticallyscan a user environment for RF tags. A computing device may identifythose scanned RF tags that satisfy one or more user preferences. Themobile device 800 may include one or more of the modules 805-860. Thatis, the personal mobile device 800 may include a camera 805, an LEDalert 810, a GPS receiver 815, a speaker 820, a microphone 825, a dataand/or charge port 830, a processing unit 835, a power supply 840, aclock 845, a data storage 850, an RF sensor 855, and a display 860.Again, as may be appreciated by one of skill in the art, one or more ofthe modules 805-860 may be omitted in order to reduce the overall size,power consumption, and/or weight of the mobile device 800.

The data port 830 and/or a wireless communication module may facilitatecommunication between the RF antenna 854 (and associated RF sensor 855)in hat 880 and other of the modules 805-860 in a remote device.Accordingly, the RF antenna 854 and the RF sensor 855 may continuouslyand/or automatically scan a user environment for audio tags and transmitscanned RF tags (wirelessly or via the data port 830) to a remote deviceconfigured to identify those RF tags that satisfy one or more userpreferences. The remote device may then perform an action in response tothe RF tags that satisfied the one or more user preferences. In someembodiments, some processing and/or data storage may be performedlocally within the mobile device 800 integrated within the hat 880. Anyof the various functions, operations, structures, and modules describedin conjunction with FIGS. 1-4 may be integrated within or performed bythe mobile device 800, and some of the functions, operations,structures, and modules described in conjunction with FIGS. 1-4 may beperformed remotely by a remote computing device.

FIG. 9A illustrates a personal mobile device 915 used to continuouslyand/or automatically scan a portion of the shelves 925 in a retailestablishment 900 for tags containing non-human-readable data. Themobile device 915 is illustrated as having a relatively narrow field ofview 920. As illustrated, the field of view 920 encompasses only theportion of the shelves 925 that are shown in solid lines. Accordingly,the portion of the shelves 925 shown in dashed lines may be outside thefield of view 920 of the mobile device 915. In some embodiments, themobile device 915 may be configured with a relatively narrow field ofview 920 and be adapted to sweep across a wider area, such as theshelves 925. Alternatively, the mobile device 915 may include a field ofview that is narrower than the field of view 920 illustrated in FIG. 9A.In such an embodiment, the mobile device 915 may be adapted to sweep therelatively narrow field of view across the field of view 920 shown inFIG. 9A.

The mobile device 915 may be configured to be worn around the neck ofthe user 910, or may alternatively be integrated within the clothing orother accessory of the user 910. The field of view 920 may be adjustableor fixed. As previously described, the shape, size, configuration,layout, and available functions and peripheral input/outputs of themobile device 915 may be modified, omitted, or augmented for aparticular application.

Alternatively, the mobile device 915 may be selectively and/ortemporarily carried by the user 910. For example, user 910 may be handedthe mobile device 915 upon entering the retail establishment 900. Themobile device 915 may be temporarily provided to the user 910 until theuser 910 leaves the retail establishment 900. In such embodiments, themobile device 915, may be carried by, worn by, and/or otherwiseassociated with the location of the user 910 while the user 910 is inthe retail establishment 900.

According to the illustrated embodiment, the mobile device 915 may beconfigured to continuously and/or automatically scan the shirts 950, thecans 940, and the print material 930 for associated tags. According tovarious embodiments, the mobile device 915 may continuously and/orautomatically scan for RF tags, image tags, and/or audio tags. Forexample, the shirts 950 may be associated with tags containingnon-human-readable data in the form of an RFID tag or an image tag, suchas a QR code. The user 910 may visually observe each of the printmaterial 930, the cans 940, and the shirts 950; however, the mobiledevice 915 may scan tags associated with each of them and identify thosetags that satisfy one or more user preferences.

For example, the user 910 may not notice that the print material 930contains a coupon for a new bicycle. The mobile device 915, whilecontinuously and/or automatically scanning the environment, may scan atag containing non-human-readable data associated with the printmaterial 930. A computing device (remote or local to the mobile device915) may determine that the scanned tag satisfied a user preference. Thesatisfied user preference indicating an interest in bicycles may havebeen user-provided, based on social network information, deduced fromavailable information related to the user, and/or otherwise determined.The computing device may then determine what action should be taken inresponse to identifying a tag that satisfied a user preference.

The action taken may be with respect to the user 910 and/or a thirdparty. For example, the mobile device 915 may provide an audible alert,a visual alert, vibrate, send a message or email to the user 910, and/orupdate a webpage, database, blog, and/or social network site. The mobiledevice 915 may additionally, or alternatively, notify a third party. Forinstance, the mobile device 915 may transmit a purchase order for thebicycle or the print material 930, request the coupon, and/or requestadditional information about the print material 930, the coupon, or thebicycle. The mobile device 915 may transmit information to a third partyrelated to the user 910, such as demographic information, contactinformation, a username, a password, financial information, and/or otherinformation related to the user 910. Such information may be provided toa third party anonymously or with personal identifying information.

FIG. 9B illustrates the mobile device 915 used to continuously and/orautomatically scan the shelves 925 of the retail establishment 900 forimage tags, such as the barcode 975 and QR code 976. The mobile device915 may have a relatively wide field of view 922 corresponding to aboutthe same field of view the user 910 may have. Accordingly, the mobiledevice 915 may continuously and/or automatically scan approximately thesame portion of the retail establishment 900 that the user 910 visuallyobserves. In one embodiment, the human-readable advertisement 930,advertising a 50% off sale, may be observed by the user 910. Anunderlying image tag containing non-human-readable data may also beassociated with the advertisement 930. If the image tag associated withthe advertisement 930 satisfies one or more user preferences, then themobile device may perform an action, such as alerting the user 910,uploading information, and/or storing the information for later use.

Similarly, the mobile device 915 may scan the barcode 975 and the QRcode 976 associated with the boxed items 960. In one embodiment, the QRcode 976 may satisfy one or more user preferences and the user 910 maybe alerted that the boxed items 960 are within his field of view. As anexample, the user 910 may have routinely purchased the boxed items 960in the past. The mobile device 915 may have automatically included auser preference to look for the boxed items 960 at a price below acertain price point. The mobile device 915 may have scanned the QR code976, identified that the boxed items were below the price point(therefore satisfying a user preference), and taken an action to alertthe user 910. The field of view 922 of the mobile device 915 may befixed or adjustable and may be made narrower or wider than illustrated.In some embodiments, particularly in those embodiments including audioor RF scanning, the field of view may be limited only by the range ofcommunication.

FIG. 10A illustrates a personal mobile device 1015 integrated into a hat1017 of a user 1010. The personal mobile device 1015 may be configuredto continuously and/or automatically scan a shop front environment 1000for image tags containing non-human-readable data. Some portions of theshop front environment 1000 may be out of range, such as the building1050 illustrated in dashed lines. The personal mobile device 1015 mayalternatively be configured to continuously and/or automatically scanthe shop front environment 1000 for audio tags containingnon-human-readable data. Alternatively, as illustrated in FIG. 10B, themobile device 1015 may be configured to continuously and/orautomatically scan the shop front environment 1000 for RF tagscontaining non-human-readable data.

As illustrated in FIG. 10A, the shop fronts may contain variousadvertisements, information, and/or promotions visually available to theuser 1010, such as a discount on camera lenses 1025, cheese 1030, cars1040, and clothes 1035. Each shop front, advertisement, product,promotion, or information piece may also include non-human-readable datain the form of an image tag, an audio tag, and/or an RF tag. The mobiledevice 1015 may continuously and/or automatically scan the shop frontsfor such tags. The mobile device 1015, or a computing device incommunication with the mobile device 1015, may identify those tags thatsatisfy one or more user preferences. It may be useful to decrypt thetags and/or verify that the scanned or identified tags are authentic.

Once a tag has been identified that satisfies one or more userpreferences, the computing device may perform an action. The actiontaken may be depend on the user preferences, the identified tag, a thirdparty's instructions, and/or the user's instructions. Any of the variousfunctions, operations, structures, and modules described in conjunctionwith FIGS. 1-4 may be integrated within or performed by the mobiledevice 1015, and some of the functions, operations, structures, andmodules described in conjunction with FIGS. 1-4 may be performedremotely by a remote computing device in communication with the mobiledevice 1015.

As previously described, FIG. 10B illustrates a mobile device 1016integrated into the hat 1017 of the user 1010 configured to continuouslyand/or automatically scan the shop front environment 1000 for RF tags.In the illustrated embodiments, each shop front may include an RFID tag,such as tags 1026, 1031, 1036, and 1041. Again, the range of the mobiledevice 1016 may be selectively or technologically limited, asillustrated by the building 1051 shown in dashed lines that cannot bescanned.

FIG. 11 illustrates another example of a use for a personal mobiledevice that is integrated within or used from within a vehicle 1110. Themobile device may continuously and/or automatically scan a billboardenvironment 1100 for tags containing non-human-readable data. Tagsassociated with each of the billboards 1116, 1126, 1136 and 1146 may becontinuously and/or automatically scanned by the mobile device withinthe vehicle 1110. The tags may include image tags, audio tags, and/or RFtags; the mobile device may be adapted to continuously and/orautomatically scan for one or more types of tags. As illustrated in FIG.11, the tags associated with the billboards 1116 and 1146 may be inrange of the vehicle 1110, while the tags associated with the billboards1126 and 1136 may not yet be within scanning range. The range and fieldof view of the mobile device may be adjustable or fixed and may belimited by third parties, user preferences, technology, and/or otherlimiting factors.

FIG. 12 illustrates another example of a use for a personal mobiledevice 1210. As illustrated, the mobile device 1210 may be integratedinto a desk lamp or stand 1205. The field of view 1215 of the mobiledevice 1210 may be adapted to correspond to the surface of the desk orto accommodate a particular size of print material. In the illustratedembodiment, the mobile device 1210 is configured to continuously and/orautomatically scan the pages of a magazine 1250 for tags. The tags maybe image tags, such as the QR code 1275 associated with the sodaadvertisement 1270, or image tags embedded or hidden within the text1255 and the graph 1260. The magazine 1250 may alternatively oradditionally include RF and/or audio tags.

In the illustrated embodiment, as a user turns the pages of the magazine1250, the mobile device 1210 may continuously and/or automatically scaneach page for image tags. A computing device, either remote orintegrated within the mobile device 1210, may identify tags that satisfyone or more user preferences. If a tag is identified that satisfies oneor more user preferences, then the computing device may perform aresponsive action. For example, the mobile device may audibly, visually,vibrationally, haptically or otherwise provide an alert to the user. Anyof the various functions, operations, structures, and modules describedin conjunction with FIGS. 1-4 may be integrated within or performed bythe mobile device 1210, and some of the functions, operations,structures, and modules described in conjunction with FIGS. 1-4 may beperformed remotely by a remote computing device.

As an example, the user preferences may include advertisements forcertain products at or below a certain price point. Accordingly, ratherthan read each advertisement within the magazine 1250, a user mayquickly turn the pages of the magazine and allow the mobile device 1210to identify any tags, such as the QR code 1275, that satisfy one or moreuser preferences. As previously described, the mobile device 1210 maythen perform an action in response to the identified tag, such asalerting the user, storing the information obtained from the identifiedtag, obtaining and/or storing supplemental information obtained from theidentified tag, and/or other action.

FIG. 13A illustrates an advertisement 1300 containing image data 1325and textual data 1315 and 1320 that can be read by a personal mobiledevice, according to various embodiments. In addition to data visuallyor audibly available to an observant user, the advertisement 1300 mayinclude tags containing non-human-readable data. For example, theadvertisement 1300 may include QR codes, steganographic content, audiowatermarks, audio outside of a human audible range, RFID tags, LWIDtags, NFC tags, a Memory Spot device, and/or other image tags, RF tags,and/or audio tags.

In other embodiments, the advertisement 1300 may include image data thatis only readable using polarization-dependent imaging orspectrally-limited imaging. For instance, the image data may only appearwith horizontal (or other) polarization. The total image may includeimagery that is either unpolarized or includes both horizontal andvertical polarizations. Accordingly, a user may not notice theinsignificant portion of the image that is polarized, while the mobiledevice may scan only that information that is polarized (i.e.,horizontal, vertical, left-hand circular, or right-hand circular).

Similarly, a tag may be encoded within an image using spectrally-limitedimaging. In such embodiments, the image visible to a user may includeimage data that is within a narrow range of the visible spectrum. Thecontent within the narrow bandwidth may not obstruct or otherwise impairthe user's view of the image, while the mobile device may be adapted toscan for tags within the narrow bandwidth. For instance, an image mayinclude imagery between approximately 400 nanometers and 700 nanometers.The image data for a tag may be encoded between 430 nanometers and 450nanometers. The relatively insignificant portion of the bandwidth usedfor the tag may be unnoticeable to a user, while the mobile device maybe adapted to ignore anything outside of the relatively narrowbandwidth.

Tags associated with the advertisement 1300 may provide the sameinformation available to the user, provide related information, and/orcontain or provide a link to supplemental content. The supplementalcontent may be in the form of informational data related to the tag, afilename, a web address, an IP address, a MAC address, an email address,a social network handle or address, a messaging address, a phone number,a telephone address, a VoIP address, a fax number, a search term, akeyword, and/or other supplemental content. Supplemental contentobtained from an identified tag may be directly provided to a user,stored for eventual retrieval, aggregated with related supplementalcontent or tags, and/or provided to the user in the aggregate with otherrelated supplemental content or tags.

FIG. 13B illustrates the advertisement 1300 with an included matrixbarcode 1350, also known as a QR code, that can be scanned by a personalmobile device. The QR code 1350 may be visible to a user, or mayalternatively be invisible to the user. For example, the QR code 1350may be steganographically encoded in the image 1325, visible in theultraviolet or infrared spectrum, too small for the human eye, and/orotherwise only machine-readable. The QR code 1350 may provideinformation related to the advertisement 1300 or may be entirelyunrelated.

FIG. 13C illustrates the advertisement 1300 with a barcode 1355 that canbe scanned by a personal mobile device. The barcode 1355 may besteganographically encoded in the image 1325, visible in the ultravioletor infrared spectrum, too small for the human eye, and/or otherwise onlymachine-readable.

FIG. 13D illustrates the advertisement 1300 with an includedsteganographic image comprising a matrix of dots 1370 not visible ornoticeable to a human user. The matrix of dots 1370 may be visible onlyin the ultraviolet or infrared range and/or otherwise invisible or notdistracting from the underlying image of toothpaste 1325. A mobiledevice may scan the matrix of dots 1370 and determine if the associatedinformation satisfies one or more user preferences. The use ofadvertisements as examples in FIGS. 13A-13D is merely illustrative; thepresently described mobile device may be adapted to continuously and/orautomatically scan any environment containing any type of information,including, but not limited to, advertisements, store fronts, museums,shopping malls, retail establishments, roads, sidewalks, areas proximatethe user of a mobile device, areas within visual range of a user of amobile device, store displays, print media, television, photographs,movies, theaters, and/or other environments in which tags may be placed.

This disclosure has been made with reference to various exemplaryembodiments including the best mode. However, those skilled in the artwill recognize that changes and modifications may be made to theexemplary embodiments without departing from the scope of the presentdisclosure. For example, various operational steps, as well ascomponents for carrying out operational steps, may be implemented inalternate ways depending upon the particular application or inconsideration of any number of cost functions associated with theoperation of the system, e.g., one or more of the steps may be deleted,modified, or combined with other steps.

Additionally, as will be appreciated by one of ordinary skill in theart, principles of the present disclosure may be reflected in a computerprogram product on a computer-readable storage medium havingcomputer-readable program code means embodied in the storage medium. Anytangible, non-transitory computer-readable storage medium may beutilized, including magnetic storage devices (hard disks, floppy disks,and the like), optical storage devices (CD-ROMs, DVDs, Blu-Ray discs,and the like), flash memory, and/or the like. These computer programinstructions may be loaded onto a general purpose computer, specialpurpose computer, or other programmable data processing apparatus toproduce a machine, such that the instructions that execute on thecomputer or other programmable data processing apparatus create a meansfor implementing the functions specified. These computer programinstructions may also be stored in a computer-readable memory that candirect a computer or other programmable data processing apparatus tofunction in a particular manner, such that the instructions stored inthe computer-readable memory produce an article of manufacture,including implementing means that implement the function specified. Thecomputer program instructions may also be loaded onto a computer orother programmable data processing apparatus to cause a series ofoperational steps to be performed on the computer or other programmableapparatus to produce a computer-implemented process, such that theinstructions that execute on the computer or other programmableapparatus provide steps for implementing the functions specified.

While the principles of this disclosure have been shown in variousembodiments, many modifications of structure, arrangements, proportions,elements, materials, and components, which are particularly adapted fora specific environment and operating requirements, may be used withoutdeparting from the principles and scope of this disclosure. These andother changes or modifications are intended to be included within thescope of the present disclosure.

The foregoing specification has been described with reference to variousembodiments. However, one of ordinary skill in the art will appreciatethat various modifications and changes can be made without departingfrom the scope of the present disclosure. Accordingly, this disclosureis to be regarded in an illustrative rather than a restrictive sense,and all such modifications are intended to be included within the scopethereof. Likewise, benefits, other advantages, and solutions to problemshave been described above with regard to various embodiments. However,benefits, advantages, solutions to problems, and any element(s) that maycause any benefit, advantage, or solution to occur or become morepronounced are not to be construed as a critical, a required, or anessential feature or element. As used herein, the terms “comprises,”“comprising,” and any other variation thereof, are intended to cover anon-exclusive inclusion, such that a process, a method, an article, oran apparatus that comprises a list of elements does not include onlythose elements but may include other elements not expressly listed orinherent to such process, method, system, article, or apparatus. Also,as used herein, the terms “coupled,” “coupling,” and any other variationthereof are intended to cover a physical connection, an electricalconnection, a magnetic connection, an optical connection, acommunicative connection, a functional connection, and/or any otherconnection.

Those having skill in the art will appreciate that many changes may bemade to the details of the above-described embodiments without departingfrom the underlying principles of the invention. The scope of thepresent invention should, therefore, be determined only by the followingclaims.

What is claimed is:
 1. A method for capturing and evaluating data ofinterest to a user, comprising: automatically scanning a userenvironment by a mobile device for one or more radio frequency (RF)tags, wherein at least some of the RF tags specify one or more actionsto be performed by a computing device; identifying at least one RF tagwithin the user environment that satisfies one or more user-definedcriteria; determining, via the mobile device, which of a plurality ofactions associated with the identified RF tag is to be performed basedon the identified RF tag; and performing, via the computing device, theaction specified by the at least one identified RF tag that satisfiesthe one or more use-defined criteria.
 2. The method of claim 1, whereinautomatically scanning the user environment comprises continuouslyscanning the user environment.
 3. The method of claim 1, wherein atleast one user-defined criteria is specified by the user.
 4. The methodof claim 1, wherein at least one user-defined criteria is based at leastin part on historical user input or actions.
 5. The method of claim 1,wherein the action specified by the identified RF tag comprises usinginformation provided by the identified tag to obtain a first set ofsupplemental content via a communication network associated with themobile device.
 6. The method of claim 5, wherein the first set ofsupplemental content is obtained from an owner of the RF tag via thecommunication network.
 7. The method of claim 6, further comprising:determining a second action based on the supplemental content obtainedfrom the owner of the RF tag; and performing the second action by acomputing device.
 8. The method of claim 5, wherein the action comprisesretrieving the first set of supplemental content from an external sourceusing a link in the identified RF tag.
 9. The method of claim 5, whereinthe action comprises aggregating the first set of supplemental contentwith other sets of supplemental content associated with previouslyscanned RF tags.
 10. The method of claim 9, wherein the action comprisescomparing the first set of supplemental content with other sets ofsupplemental content associated with previously scanned tags.
 11. Themethod of claim 1, wherein the action comprises notifying the user aboutthe identified RF tag in the user environment.
 12. The method of claim11, further comprising: determining a second action to be performedfollowing the notification of user; and performing the second action bya computing device.
 13. The method of claim 12, wherein the secondaction is automatically performed by the computing device unless theuser cancels the performance of the second action.
 14. The method ofclaim 12, wherein the second action is only performed by the computingdevice if the user authorizes the performance of the second action. 15.The method of claim 1, wherein automatically scanning the userenvironment comprises sweeping the RF device across a wide area.
 16. Themethod of claim 1, wherein identifying an RF tag within the userenvironment comprises enhancing a scanning parameter associated with themobile device.
 17. The method of claim 16, wherein enhancing a scanningparameter associated with the mobile device comprises one of adjustingthe aim of the mobile device, adjusting the sensitivity of the mobiledevice, adjusting the focus point of the mobile device, and applying anoise-reduction algorithm to an RF tag.
 18. A system for capturing andevaluating data of interest to a user, comprising: a mobile device toautomatically scan a physical user environment for one or more radiofrequency (RF) tags, wherein at least some of the RF tags specify one ormore actions to be performed by a computing device; an identificationcomponent to identify an RF tag within a physical user environment thatsatisfies one or more user-defined criteria; and an action component todetermine which of a plurality of actions associated with the identifiedRF tag is to be performed by the computing device based the identifiedRF tag.
 19. The system of claim 18, wherein the action causes thecomputing device to transmit a request to a third party on behalf of theuser.
 20. The system of claim 18, wherein the action causes thecomputing device to send user information to a third party.
 21. Thesystem of claim 20, wherein the user information includes one or more ofdemographic information, contact information, a username, a password,financial information, a user location, a user comment, and socialnetwork information associated with the user.
 22. The system of claim20, wherein the user information is provided to a creator of the tag.23. The system of claim 18, wherein the action causes the computingdevice to send information to an entity associated with the tag.
 24. Thesystem of claim 23, wherein the information is used by the entityassociated with the tag to modify information referenced by the RF tag.25. The system of claim 18, wherein the action causes the computingdevice to place an order for an item referenced by the identified RFtag.
 26. The system of claim 18, wherein the action causes the computingdevice to send a coupon to the user for a product or service referencedby the identified RF tag.
 27. The system of claim 18, wherein the userenvironment comprises an area within a detection range of the RF tag.28. The system of claim 18, wherein the user environment comprises astore display.
 29. The system of claim 18, wherein the user environmentcomprises print media.
 30. The system of claim 18, wherein theidentified RF tag comprises a radio-frequency identification (RFID) tag.31. The system of claim 18, wherein the identified RF tag comprises along wavelength identification (LWID) tag.
 32. The system of claim 18,wherein the identified RF tag comprises a near field communication (NFC)device.
 33. The system of claim 18, wherein the identified RF tagcomprises a Memory Spot device.
 34. The system of claim 18, wherein themobile device comprises a cellular telephone.
 35. A non-transitorycomputer-readable storage medium comprising program code that, whenexecuted, causes a system to perform operations comprising:automatically scanning a user environment by a mobile device for one ormore radio frequency (RF) tags, wherein at least some of the RF tagsspecify one or more actions to be performed by a computing device basedon an authorization status; identifying an RF tag within the userenvironment that satisfies one or more user preferences; determining anauthorization status of the mobile device relative to the identified RFtag; determining which of a plurality of actions associated with theidentified RF tag is to be performed based on the determinedauthorization status with respect to the identified RF tag; andperforming, via the computing device, the action specified by theidentified RF tag that satisfies the one or more user preferences basedon the determined authorization status.