Method and system for digital record verification

ABSTRACT

A system and a method are disclosed that enable a mobile device to use an encoded tag to initiate and maintain communications with at least one remote server. The encoded tag is positioned to identify a point of interest, and in response to using the mobile device to scan the encoded tag, communications regarding the point of interest may be initiated. A single encoded tag may be used to obtain and update recorded information about the point of interest, to notify others about an issue related to the point of interest, to log into the system, and to wait to be alerted about an issue related to the point of interest. If an issue relating to a point of interest has been reported, the system and method may monitor the reported issue to ensure that an action has been taken to address the reported issue.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No. 17/302,233 filed on Apr. 27, 2021, which claims the benefit of U.S. Provisional Patent Application No. 63/015,688 filed on Apr. 27, 2020, with the United States Patent and Trademark Office, the contents of which are incorporated herein by reference in their entirety.

FIELD OF THE INVENTION

The present invention relates generally to methods and systems that use tags for identifying, reporting, and monitoring reporting information related to issues at a particular point of interest. The present invention also relates generally to methods and systems that use tags to enable the electronic delivery of digital records to mobile devices that have been used to scan an encoded tag located in, on, or near a point of interest.

BACKGROUND OF THE INVENTION

It is well thought out premise that there is never the help at a location when you need someone, but always someone there when you do not need them. This relates to simple things, such as a wet floor, a nonworking toilet, a health issue, a clean or not clean table at a restaurant, a hotel room, or any number of other locations where people go.

The simple issue is that there are not always enough people who are in control of the location, whether that is to keep it safe, in proper working order, to maintain its cleanliness, or for any other reason. Nor is there a simple way to communicate to someone who is responsive as to the problem or the existence of a problem.

The methods herein detail an elegant solution to these and other problems by utilizing machine readable tags to identify a location, generate a report, and allow for members of the general public to interact as well as workers/employees to interact with a database to report, review, and update the database to solve issues.

SUMMARY OF THE INVENTION

The embodiments herein are directed to various systems and methods, specifically to identify a point of interest, whether that be the actual location, an issue happening at that location, or some other information pertaining to that point of interest, generating a request or a report regarding the same, and providing access through a single tag regarding the status of the point of interest, or providing the ability to update the status regarding the point of interest.

In a preferred embodiment, a method of delivering a record pertaining to a point of interest to a mobile device comprising: (a) receiving a first request for the record from a first mobile device, the first request received in response to using the first mobile device to scan a tag for identifying the point of interest; (b) receiving a second request for the same record from a second mobile device, the second request received in response to using the second mobile device to scan the same tag for identifying the point of interest, a time of scanning by the second mobile device different than the time of scanning by the first mobile device; (c) providing the record to the first mobile device and to the second mobile device; and (d) after providing the record to the first mobile device, updating the record in response to receiving a request to update the record from the first mobile device.

In a further preferred embodiment, the method further comprising before receiving the request to update the record, receiving log in credentials from the first mobile device.

In a further preferred embodiment, the method further comprising receiving a request for a second record from the first mobile device, the request for the second record received in response to using the first mobile device to scan a second tag for identifying a second point of interest, delivering the second record to the first mobile device, and updating the second record in response to a request to update the second record from the first mobile device.

In a further preferred embodiment, the method wherein receiving the first request for the record includes receiving the first request in response to using the first mobile device to scan a master tag and updating the record associated with the master tag and a record associated with a servant tag grouped with the master tag.

In a further preferred embodiment, the method further comprising receiving a report about an issue from the second mobile device, the report about an issue regarding a state or condition of the point of interest, the point of interest selected from the group consisting of an object, an area, and a person, and designating a status for the report about an issue as unresolved.

In a further preferred embodiment, the method further comprising determining what the report about an issue is, and sending an alert regarding the determined issue to a group consisting of: a first mobile device, an administrator, a third mobile device, a first responder, and combinations thereof.

In a further preferred embodiment, the method further comprising completing a task to address the report about an issue and changing the status for the report about an issue from unresolved to resolved.

In a further preferred embodiment, the method receiving in the first request and the second request a tag identifier, using the tag identifier to identify a target file that when rendered on the first mobile device and the second mobile device displays the requested record, sending a uniform resource locator (URL) for the target file to the first mobile device and the second mobile device, receiving a request for the target file, and returning the target file to the first mobile device and to the second mobile device.

In a further preferred embodiment, the method wherein receiving the first request for the record and the second request for the record includes receiving a request for a record selected from the group consisting of: a sanitization record, a health record, a safety record, an incident record, and a maintenance record.

In a further preferred embodiment, the method wherein providing the requested record includes providing a verified record from a blockchain ledger.

In a further preferred embodiment, the method wherein receiving the first request for the record and receiving the second request for the record includes receiving the first request for the record and receiving the second request for the record each in response to using the respective first mobile device and second mobile device to scan the tag, wherein the tag includes a code embedded in a near-field communications (NFC) chip, a code embedded in a quick response (QR) code, or both, the code including a uniform resource locator (URL) with an identifier for identifying the tag including the code and the point of interest selected from the group consisting of an object, an area, a person near the object or area, and combinations thereof.

In a further preferred embodiment, the method further comprising collecting data about the second mobile device and activities for which the second mobile device is used, and providing content to the second mobile device based on the collected data together with the requested record.

In a further embodiment, a system for reporting an issue that has occurred and monitoring a status of the issue, the system comprising: (a) a server having a computer processor and a computer memory; (b) a database operatively connected to the server and containing record information; (c) one or more tags, each tag having a unique tag identifier associated therewith, and each tag to identify a point of interest based on tag proximity to the point of interest that the tag identifies to link the unique tag identifier associated with the tag to a database record and to the point of interest that the tag identifies, and to convey the unique tag identifier to a mobile device that has scanned the tag, the unique tag identifier to be conveyed to the mobile device via a selection from the group consisting of: a machine-readable code, near-field communication (NFC), radio-frequency identification (RFID), and combinations thereof; and (d) wherein the computer memory of the server stores executable code, which when executed enables the server to perform a process comprising: (i) in response to receiving log in credentials from a first mobile device that has scanned a first tag, update record information in the database to reflect that the first mobile device has logged in to the system; (ii) in response to receiving a request to report the issue from a second mobile device that has scanned the first tag or a second tag, update the database record linked to the unique identifier associated with the second tag to reflect that the second mobile device has reported an issue relating to the point of interest that the second tag identifies; (iii) monitor the status of the issue reported by the second mobile device by taking an action selected from the group consisting of: sending an issue alert to the first mobile device, sending an issue alert to a first responder, receiving a request to mark the issue as resolved, and combinations thereof; and (iv) update the database record linked to the unique identifier associated with the second tag to reflect the action selected.

In a further preferred embodiment, the system wherein monitoring the status of the issue reported by the second mobile device includes receiving a request from the first mobile device to mark the issue as resolved, updating the database record linked to the unique identifier associated with the second tag to reflect that the issue reported by the second mobile device has been resolved, and sending a message to the second mobile device indicating that the issue reported by the second mobile device has been resolved.

In a further preferred embodiment, the system wherein the server is to perform a process comprising receiving a request from a third mobile device for the database record linked to the unique tag identifier associated with the second tag that reflects that the issue reported by the second mobile device has been resolved and in response thereto providing the database record linked to the unique tag identifier associated with the second tag that reflects that the issue reported by the second mobile device has been resolved to the third mobile device.

In a further preferred embodiment, the system wherein in response to receiving log in credentials from a first mobile device that has scanned the first tag updating the database record associated with the first tag wherein the first tag is identified as a master tag, and updating a database record associated with a servant tag grouped with the master tag.

In a further embodiment, a method for reporting an occurrence of an issue relating to a point of interest in a business comprising: (a) in response to receiving a request to report the issue from a first mobile device that has scanned a tag located on or near the point of interest, updating a database record corresponding to the point of interest and identified by a unique tag identifier that was received by the first mobile device when the first mobile device scanned the tag to reflect that the issue was reported by the first mobile device; (b) after receiving log in credentials from a second mobile device that has scanned the same tag and received the same unique tag identifier as the first mobile device, receiving a request from the second mobile device to mark the issue reported by the first mobile device as resolved; (c) using the unique tag identifier received from the second mobile device to locate the database record corresponding to the point of interest; and (d) updating the database record corresponding to the point of interest to reflect that the reported issue is resolved.

In a further preferred embodiment, the method wherein the request to report the issue is a request to report an issue selected from the group consisting of: a cleaning issue, a maintenance issue, a request for a missing item, a request for an additional item, a request to check out, a request for room service, and combinations thereof.

In a further preferred embodiment, the method wherein receiving a request to report the issue from the first mobile device comprises receiving the request in response to using the first mobile device to scan a tag located on or near the point of interest selected from the group consisting of: an entrance to a guest room, an object within the guest room, an area within the guest room, and combinations thereof.

In a further preferred embodiment, the method wherein the business is selected from the group consisting of: a healthcare facility, a religious organization, an educational facility, a sports related business, a dining establishment, and combinations thereof.

In a further preferred embodiment, a method for reporting an occurrence of an issue in a dormitory and monitoring the status of a reported issue comprising: in response to receiving a request to report the issue from a first mobile device that has scanned a tag located on, in, or near a dormitory door, updating a database record associated with the dormitory door and identified by a unique tag identifier that was received by the first mobile device when the first mobile device scanned the tag to reflect that the first mobile device reported the issue; in response to receiving log in credentials from a second mobile device, updating a database record to reflect that the second mobile device is logged in; sending an issue alert to the second mobile device, receiving a request to update the database record associated with the dormitory door from the second mobile device, the request to update the database record associated with the dormitory door received from the second mobile device selected from the group consisting of: receiving a notice that an action has been taken to resolve the reported issue, receiving a request to mark the issue as resolved, receiving a notice that emergency services have been contacted, and combinations thereof; and in response to receiving the request to update the database record associated with the dormitory door from the second mobile device, updating the record according to the type of request received.

In a further embodiment, a method for reporting an occurrence of an issue within a healthcare facility and monitoring the status of the reported issue comprising: in response to receiving a request to report the issue from a first mobile device that has scanned a tag located on, in, or near a bed in the healthcare facility, updating a database record corresponding to the bed and identified by a unique tag identifier to reflect that the first mobile device reported the issue, the unique tag identifier received in the request to report the issue and obtained by the first mobile device when the first mobile device scanned the tag; detecting that a second mobile device has scanned a tag identifying a door leading to a patient room; after detecting that the second mobile device has scanned the tag identifying the door, receiving log in credentials from the second mobile device; updating a database that includes the database record corresponding to the bed to reflect that the second mobile device is logged in; sending an issue alert regarding the reported issue to the second mobile device; and updating the database record corresponding to the bed to reflect that the issue alert has been sent to the second mobile device.

In a further preferred embodiment, the method further comprising the step of receiving, from the second mobile device, a request to update the database record corresponding to the bed selected from the group consisting of: receiving a notice that an action has been taken to resolve the reported issue and receiving a request to mark the reported issue as resolved, and in response thereto, updating the database record corresponding to the bed according to the type of request to update the database record corresponding to the bed was received by the second mobile device.

In a further embodiment, a method for reporting an occurrence of an issue in a stadium, and monitoring the status of a reported issue comprising: in response to receiving a request to report the issue from a first mobile device that has scanned a tag located on, in, or near a first point of interest in the stadium, updating a database record corresponding to the first point of interest and identified by a unique tag identifier to reflect that the first mobile device reported the issue, the unique tag identifier received in the request to report the issue and obtained by the first mobile device when the first mobile device scanned the tag; detecting that a second mobile device has scanned a tag identifying a second point of interest; after detecting that the second mobile device has scanned the tag identifying a second point of interest, receiving log in credentials from the second mobile device; updating a database that includes the database record corresponding to the first point of interest to reflect that the second mobile device is logged in; sending, to the second mobile device, an issue alert regarding the issue reported by the first mobile device; updating the database record corresponding to the first point of interest to reflect that the issue alert has been sent to the second mobile device; and in response to receiving, from the second mobile device, a request to update the database record corresponding to the first point of interest, updating the database record corresponding to the first point of interest to reflect that the issue reported by the first mobile device has been resolved.

In a further embodiment, the method further comprising, in response to receiving a request from a third mobile device for the database record corresponding to the first point of interest, providing the updated database record corresponding to the first point of interest that reflects that the issue reported by the first mobile device has been resolved, wherein the request from the third mobile device was received in response to using the third mobile device to scan the tag located on, in, or near the first point of interest in the stadium.

In a further embodiment, a method of using a plurality of tags that are quick response code (QR) enabled, near-field communication (NFC) enabled, or both to provide a database record to a mobile device comprising: assigning each tag in the plurality of tags to a different point of interest; each tag in the plurality associated with a unique tag identifier that links a database record identifiable by the unique tag identifier to the point of interest to which the tag was assigned; monitoring for access to an application by a first mobile device, access to the application by the first mobile device occurring in response to using the first mobile device to scan one tag in the plurality of tags, the application to use the unique tag identifier associated with the one tag to provide content, including the database record identified by the unique tag identifier associated with the one tag, to the first mobile device; monitoring for the database record identified by the unique tag identifier associated with the one tag to be updated via the first mobile device; monitoring for input from a second mobile that has accessed the application in response to using the second mobile device to scan the same tag or a different tag in the plurality as the first mobile device tag; and sending a message to the first mobile device, or the second mobile device, or both.

In a further preferred embodiment, the method further comprising grouping tags in the plurality, one of the tags in the group being a master tag and the remaining tags in the group being servant tags, such that when a database record identifiable by the unique tag identifier associated with the master tag is updated, all of the database records associated with servant tags in the group are automatically updated.

In a further preferred embodiment, the method wherein monitoring for input from a second mobile that has accessed the application includes monitoring for input from a second mobile selected from the group consisting of: a request for sanitization, a request for maintenance, a request to purchase a product, a request for a free product, a request for assistance, a request for emergency services, a request to check out, and combinations thereof.

In a further preferred embodiment, the method wherein sending a message to the first mobile device, or the second mobile device, or both includes sending messages selected from the group consisting of: a short message services message, a multimedia message services message, a message transmitted through a wireless application protocol, an email message, a live phone call, a voicemail message, and combinations thereof.

In a further preferred embodiment, the method further comprising forming a network of tags from the plurality of tags owned by an entity selected from the group consisting of: a restaurant, a hotel, an educational campus, a work campus, an airline, a rideshare organization, a healthcare facility, and a sports facility.

In a further preferred embodiment, the method wherein assigning each tag in a plurality of tags to a different point of interest includes causing each tag in the plurality to be physically located on, in, or near the point of interest to which it is assigned, digitally displayed on a display device that is physically on, in, or near the point of interest to which it is assigned, or both.

BRIEF DESCRIPTION OF THE FIGURES

FIG. 1 details an embodiment of the notification and reporting system.

FIG. 2 details a flow diagram of the system and methods of notifying and reporting issues in a location.

FIG. 3 details a block diagram of the system and methods of notifying and reporting an issue in a location.

FIG. 4 details a continuation of the block diagram of FIG. 3.

FIG. 5 details a flow diagram regarding cleaning of a room within an embodiment of the presently disclosed system.

FIG. 6 details a flow diagram of various tags, applications and report and related tasks and information for implementing the system of the present embodiments.

FIG. 7 depicts a flow diagram for use of an embodiment of the system from an admin user, with regard to updating a master and servant tags.

DETAILED DESCRIPTION OF THE INVENTION

Members of the general public typically do not have access to information in which they have an interest, such as sanitation reports, monitoring reports, and other types of potentially recorded activities. If members of the general public do have access to this type of information, it is typically handwritten on a sheet of paper located somewhere in the area of interest such as a public restroom. Paper cleaning logs usually lack details about when specific objects or areas were last cleaned and can be of questionable accuracy. Furthermore, employees or workers who are doing the cleaning, monitoring, or the like are also burdened by current systems. For example, the worker/employee may either handwrite the information on a paper log, submit a report to someone else who then enters the information into a tracking system, enter the information into a tracking system themselves, and redundant combinations of the forgoing. As a result, information, if tracked, may be documented in hindsight, if at all. Thus, a person who is a member of the general public either does not know when an object or area has been last cleaned, monitored, etc., or he/she has to search for a piece of paper that may or may not have accurate information. Similarly, workers/employees may spend a good amount of time documenting their activities, which may negatively affect performance of their primary job.

Members of the general public may also find it difficult to get help without leaving the area of interest such as a public bathroom. For example, if a stall does not have toilet paper, a soap dispenser is empty, or a drink is spilled on the floor, a member of the general public may either try and remedy the situation him or herself or leave the restroom to find an employee to assist. Alternatively, a member of the public may leave the situation as is until another person tries to take care of it, or a worker returns for routine servicing. Employees/workers enlisted to help may have to leave what they are doing to find the right equipment, supplies, or other employee, which may detract from workplace performance or efficiency. Alternatively, the responsible employee/worker may find out about the situation much later, when the situation is worse and will take more time and effort to remedy than if it was attended to in a timely manner. This is because workers/employees simply may not know about the problems until much later.

Embodiments of the present invention described herein alleviate concerns raised in the forgoing paragraphs by providing systems and methods for delivering real-time digital verification records such as sanitization records, monitoring records, and the like, to a mobile device (e.g., without limitation, a smartphone) being used by public user (i.e., end user who is not a worker/employee), an employee (i.e., end user who is a worker/employee) or both (i.e., mobile device users) in an easy, convenient, and accurate manner. The public user may employ embodiments of the present invention to provide feedback, report problems or issues, make requests, etc., that relate to an object/area of interest right from his/her mobile device without leaving the immediate location. Furthermore, an employee may use his/her mobile device to update digital records in real time, as objects, locations, or both are being cleaned, monitored, or otherwise tracked. Thus, embodiments of the present invention may be utilized to ensure that both public users and employees receive real-time information about or relating to a point of interest, can react to that information (without leaving the area), and if a reaction was submitted, receive an update thereto. The following paragraphs provide details about various nonlimiting embodiments of the present invention.

Entities such as hotels, airports/airlines, educational and workplace campuses, cruise ships, trains, rideshare vehicles, businesses, restaurants, sports complexes and performance stadiums, and hospitals (without limitation) may utilize embodiments of the present invention by identifying objects and/or areas of interest (i.e., points of interest). Generally, points of interest include objects (e.g., equipment, machinery, furniture, vehicles, appliances, etc.) and/or locations (e.g., rooms, waiting areas, lounges, recreation areas, spas, and other areas/locations within or around buildings), but may also include real-time issues (e.g., a medical emergency, incidents, a safety issue, desires or requests like ordering something, etc.) in which the entity has an interest in tracking data, the entity perceives public users have an interest in receiving data, or both. For example, a restaurant may want to track sanitization efforts; thus, the restaurant could identify areas such as waiting areas, restrooms, kitchens, dining areas, outdoor areas, etc., and/or objects within or near the areas such as tables, counters, chairs, benches, sinks, and the like as points of interest. As another example, a campus may want to track security, wellness, maintenance, sanitization, or other efforts (or combinations thereof); thus, the campus could identify areas such as buildings, floors, rooms, outdoor spaces, recreation areas, parking lots/garages, stadiums, and other on-campus areas as areas of interest. On a campus, objects of interest may correspond to the type of tracking effort. For example, maintenance tracking may include objects such as equipment, including sensitive equipment found in laboratories, appliances, and parts of buildings (e.g., plumbing, electrical, fixtures).

A campus may be interested in tracking the wellness of its students, faculty, and/or staff members. A person's wellness record may be associated with a room to which they are assigned such as a dorm room or an office. Thus, in some embodiments points of interest may include a person who is associated with a particular object or area. As yet another example, a healthcare provider may want to track patient information such as times and dates that vitals are checked; thus, the healthcare provider may identify areas such as patient rooms, and/or objects such as individual beds within a room, as areas/objects of interest. As with the campus example, the point of interest in the hospital setting may really be the person associated with the room, bed, or both. Thus, the types of entities that may utilize embodiments of the present invention are wide and varied, as are what an entity considers to be one or more points of interest.

An entity uses a network of tags to identify points of interest to public users and employees. The number of tags in the network and placement of tags on, in, or near points of interest is at the discretion of an entity to fit its particular assets and needs. Further, an entity may add to or subtract from the number of tags in the network at will. Each tag in the network of tags has a unique identifier (tag ID), which may be used to identify a database record for the particular point of interest. As one nonlimiting example, a hotel having an interest in tracking sanitization efforts may situate a tag inside each guest room. The tags may be placed to be easily recached by both guests and employees such as in, on, or near one or more of a wall, a door, a door frame, or a piece of furniture. Since each room has a tag with a unique tag ID, each guest may use the tag to access cleaning (or other) information for his or her room such as the date and time housekeeping last cleaned the room. Similarly, housekeeping personnel may update cleaning information for each room using the tag.

Referring to FIG. 1, a public user, an employee, or both may use system (10) to access information pertaining to a point of interest. Generally, the public user/employee may use mobile device (14 a or 14 b) to scan tag (16). Scanning the tag (16) causes the mobile device (14 a or 14 b) to initiate communications with server (20). Communications between mobile device (14 a or 14 b) and server (20) may be via one or more networks (18). In response to receiving a request from mobile device (14 a or 14 b), server (20) may communicate with server (22) to begin fulfilling device (14 a or 14 b) request. For example, server (20) may call to server (22) to find out where to direct the browser to fulfill the request. Server (20) may redirect the browser to the appropriate location. After redirection, server (22) may obtain the desired information from database (24). In turn, server (20) may then send a response with the desired information to the requesting mobile device (14). System (10) may also include a further server (26), which may collect and analyze information about, or pertaining to, mobile devices (14 a or 14 b) that have scanned a tag. Server (26) may also obtain information from other sources. Data collected by, and analysis may by server (26) may be used by server (22) and/or stored in database (24). Database (24) stores all data for system (10), including tracking data. An administrator may access system (10) via computer (12) for management and other purposes.

Although the architecture shown in FIG. 1 is reminiscent of a three-tier client/server system where processing is divided between at least two servers, embodiments are not so limited. The numbers and types of servers and software may be scaled up, down, and distributed according to system (10) demands/needs. Furthermore, more than one virtual machine may run on a single computer and a computer/virtual machine may run more than one type of server software (e.g., the software that performs a service, e.g., Web service, application service, and the like). Thus, in some instances system (10) may include one computer for all processing demands, and in other instances system (10) may include several, hundreds, or even more computers to meet processing demands. Additionally, hardware, software, and firmware may be included in system (10) to increase functionality, storage, and the like as needed/desired.

Computer (12), which is shown in FIG. 1, may be any type of computer such as a laptop computer, desktop computer, tablet, and the like. Similarly, mobile device (14 a or 14 b) may be any type of mobile processing device such as a handheld computer (e.g., phone, smartphone, tablet, personal digital assistant), wearable computer (e.g., watch, glasses), or portable computers (e.g., laptop, netbooks). Scanning of the tag (16) from the mobile device (14 a or 14 b) is performed through near-field communication (NFC) or use of a camera on the mobile device 14 a or 14 b to scan the visible quick response code (QR code). Computer (12) and mobile devices (14 a or 14 b) typically include a browser application to facilitate communications with one or more servers among other things.

Computer (12), mobile devices (14 a, 14 b), and servers (20, 22, and 26) may each be a general-purpose computer. Thus, each computer includes the appropriate hardware, firmware, and software to enable the computer to function as intended. For example, a general-purpose computer may include, without limitation, a chipset, processor, memory, storage, graphics subsystem, and applications. The chipset may provide communication among the processor, memory, storage, graphics subsystem, and applications. The processor may be any processing unit, processor, or instruction set computers or processors as is known in the art. For example, the processor may be an instruction set based computer or processor (e.g., x86 instruction set compatible processor), dual/multicore processors, dual/multicore mobile processors, or any other microprocessing or central processing unit (CPU). Likewise, the memory may be any suitable memory device such as Random Access Memory (RAM), Dynamic Random Access memory (DRAM), or Static RAM (SRAM), without limitation. The processor together with the memory may implement system and application software including instructions disclosed herein. Examples of suitable storage includes magnetic disk drives, optical disk drives, tape drives, an internal storage device, an attached storage device, flash memory, hard drives, and/or solid-state drives (SSD), although embodiments are not so limited.

In an embodiment, servers (22 and/or 24) may include database server functionality to manage database (24) or another database. Although not shown, architecture variations may allow for database (24) to have a dedicated database server machine. Database (24) may be any suitable database such as hierarchical, network, relational, object-oriented, multimodal, nonrelational, self-driving, intelligent, and/or cloud based to name a few examples. Although a single database (24) is shown in FIG. 1, in embodiments database (24) may comprise more than one database, the more than one databases may be distributed across many locations, and data may be redundantly recorded in the more than one database. Furthermore, data may be stored in blocks that are part of a chronological blockchain and may be dispersed across a decentralized distributed ledger. Blocks of data in a blockchain are linked in such a way that tampering with one block breaks the chain. Thus, digital data stored in a blockchain is verifiable with a high level of integrity.

FIG. 2 pictorially depicts embodiments of system (100) for providing a real-time record (relating to a point of interest) to mobile devices (14 a, 14 b). The record is provided in response to using mobile devices (14 a, 14 b) to scan a tag (16) that is on, in, or near a point of interest. FIG. 3 is a flow chart that schematically illustrates embodiments of a method (300) for providing the real-time record to mobile devices (14 a, 14 b). To help explain system (100) and method (300), consider a nonlimiting scenario wherein a hotel is the entity (e.g., company, business, institute, etc., that has an interest in tracking information) using a network of tags (16) to track cleaning services relating to guest rooms.

According to the above mentioned scenario, the hotel has placed a tag (16) in each guest room on, in, or near the entrance to the room (either inside or outside of the door). The hotel has also placed at least two tags within each room, one in the bathroom, and the other on, in, or near an object such as a telephone, refrigerator, microwave, remote control, lamp, headboard, and the like, inside the room. Additionally, or alternatively, the hotel may display a tag (16) on a device having a display screen (e.g., telephone, a television, appliance, and the like). Thus, each guest room in the hotel has one to four tags (16) associated therewith. Hotel guests (i.e., public user) and housecleaning staff (i.e., employees) may both use embodiments of system (100) and/or method (300) to obtain the latest cleaning records relating to guest rooms and/or points of interest therein. Hotel employees, however, may also update cleaning records using mobile devices (14 a), which is discussed with respect to FIG. 4.

Referring to FIG. 2, at “A,” both the employee and the guest uses his/her respective mobile device (14 a, 14 b) to scan tag (16), which in this example is located on, in, or near the entrance to the room assigned to the guest. Notably, both mobile device users (e.g., collective term for public users and employees) use their respective mobile device (14 a, 14 b) to scan the same tag (16) and obtain the same cleaning record information for the assigned room. Using one tag for both employee and guest access to the same information decreases the number of tags needed to identify a particular point of interest, which may also reduce confusion as to who (e.g., employee or guest) should scan what tag in a system using two tags to identify the same point of interest. Usually, however, guests and employees do not scan the same tag (16) at the same time. It is more likely that an employee will scan a particular tag (16) with his/her mobile device (14 a) before and/or after a guest. Generally, the time between tag (16) scans (by any mobile device [14 a and/or 14 b]) depends upon the frequency of tag (16) use; hence, it can be less than a minute to hours or even days between the time an employee scans a particular tag (16) and a public user scans the same tag (16) with their respective mobile devices (14 a, 14 b).

Tags (16), in embodiments, include encoded information that may cause each mobile device (14 a, 14 b) to independently send a request for a record to a remote server such as server (20). Each tag (16) in the network of tags (16) may include machine-readable code, instructions encoded on a chip, or both. Machine-readable code, for example, may include quick readable (QR) code, universal product code (UPC), and/or other types of machine-readable graphics (e.g., having a pattern, matrix, or the like) coding. Alternatively, technologies that use data stored on a chip include, without limitation, near-field communication (NFC) technology and radio-frequency identification (RFID) technology. Thus, each tag (16) in an entities network of tags (16) may include one or more of a machine-readable graphics code, NFC encoding, or RFID encoding, although embodiments are not so limited.

Information encoded on or in a tag (16) may include a uniform resource locator (URL), according to an embodiment. URLs may provide an address to a resource on the network (18). In this way, a browser application knows where to send an initial request for a resource a record. According to embodiments of the invention, each tag (16) may include a base URL to direct Web browsers (including mobile Web browsers) to a server such as content/endpoint server (200), which is tantamount to server (20) (FIG. 1) in an embodiment. Moreover, each tag (16) in the plurality of tags (16) may have a unique a tag identifier (e.g., tag ID) as part of the encoded information to communicate to the content/endpoint server (200) which specific tag was scanned by mobile devices (14 a, 14 b).

Thus, when mobile devices (14 a, 14 b) scan tags 16, the tag URL (e.g., including the base URL and tag ID) may be conveyed to the mobile devices (14 a, 14 b). For example, most mobile devices (14 a, 14 b) include a camera already enabled to scan/read machine-readable codes. If a camera is not already enabled to function as a scanner/reader, scanner/reader applications are typically available for download to mobile device (14 a, 14 b). Likewise, many mobile devices (14 a, 14 b) come NFC/RFID enabled. NFC/RFID technology uses wireless (very short range) technology to transfer data. Thus, moving a mobile device (14 a, 14 b) close enough to a tag (16) will enable the mobile device (14 a, 14 b) to receive data.

Tags (16) may have a physical (e.g., tangible) form, a digital (e.g., virtual/intangible) form, or may be combinations of both forms. Physical versions of tags (16) may be constructed from diverse types of materials. In the case of machine-readable tags, the code may be printed, etched, or fabricated on materials such as paper, glass, plastic, metal, fabric, and the like as a few nonlimiting examples. In the case of NFC/RFID enabled tags (16), the tags (16) may be adhered to, attached to, embedded in, or fabricated on (or combinations thereof) a natural or manmade material such as metal (e.g., aluminum, stainless steel), wood, polymer (e.g., plastic), film, glass, and combinations thereof. The material may then be incorporated into or affixed (e.g., adhesive or other form of attachment) to an object or location. Digital portions of tags (16) may be displayed on a screen or communicated via radio waves. In the case of machine-readable tags, the graphical code may be displayed on a display screen associated with the point of interest.

Armed with the tag URL obtained from the scanned tag (16) (e.g., tag [16] that has just been scanned by mobile device [14 a and/or 14 b]), the Web browser on mobile device (14 a and/or 14 b) sends a request to content/endpoint server (200), as is shown at “B” in FIG. 2. The browser request may be sent to content/endpoint server (200) over the one or more networks (18). Since content/endpoint server (200) recognizes browser requests directed toward it, content/endpoint server (200) receives the request, which is pictorially shown in FIG. 2 at “C” and starts method (300) at step (302). As the tag ID for a particular tag (such as the tag (16) on, in, or near the entrance to the guest room) references a database (e.g., FIG. 1, database [24]/FIG. 2, verification database) entry, content/endpoint server (200) begins processing the browser request. See FIG. 3 at step (304). For instance, content/endpoint server (200) may send a call to data server/verification database (220). In embodiments, the call may include the tag URL or information extracted therefrom.

Data server/verification database (220) receives the call from content/endpoint server (200) and continues with processing the browser request, which is shown at “D” in FIG. 2. Processing may include one or more queries/requests to one or more databases such as verification database(s). The tag ID, in embodiments, may be referenced in a request to the database, which is shown in FIG. 3, step (306). Simply stated, the query may reference a unique tag ID (e.g., from tag by the room entrance) in a request for specific information linked or related to the tag ID. In response to the current database request, the query returns an identifier to a particular target (target ID) and the tag ID from the request. The target ID and tag ID may be attached to a base URL for the target thereby completing a target URL. Target URLs may redirect the mobile device (14 a and/or 14 b) browser to a location to obtain the desired content. Generally, redirection points a browser to content that the entity owning the tag (16) (e.g., the hotel in the scenario) wants the mobile device users to see. When a tag (16) is created, it may not yet be owned by particular entity. Redirection enables any entity to purchase the tag (16); linking the tag ID to a particular target ensures that a requesting browser will end up in the right place for the entity that now owns the tag. Similarly, the entity owning a plurality of tags (16) may want to redirect a browser somewhere else in response to a tag (16) scan. For example, instead of obtaining cleaning information, a hotel may want to redirect mobile devices to content relating to a special event or circumstance. This may be accomplished by changing the target ID associated with the tag ID to an identifier (target ID) for the new target.

As is pictured in FIG. 2 at “E,” the data server/verification database (220) responds to the call sent by content/endpoint server (200) so that content/endpoint server (200) can reply to the browser request. See, also, FIG. 3 at step (308). In embodiments, content/endpoint server (200) responds to the request initiated via the tag URL with the completed target URL, which includes both the target ID and the tag ID. In this way, the browser on the mobile device (14 a, 14 b) that scanned the tag (16) will be redirected, via the received target URL, to the proper location.

Before the browser running on scanning mobile device (14 a, 14 b) can display record data, the browser sends another request to content/endpoint server (200), this request via the completed target URL. Like the request via a tag URL, the content/endpoint server (200) receives the target request, which is shown at step (310) of FIG. 3. In processing the request for the identified target, the data server/data verification database (220) may use the tag ID in a query for data related to the tag ID. The server (220) may also use the target ID to obtain target instructions corresponding to the target ID, which may in embodiments include instructions for obtaining content to be displayed together with the requested record such as ads, third-party content, health metrics content, coupons, promotions, and the like. See, e.g., FIG. 3 at (312).

In embodiments where the target URL is considered a dynamic request for an HTML document, the data server/verification database 220 may use instructions obtained by the target ID to dynamically create a hypertext markup language (e.g., HTML) page. This type of HTML document may be based on an HTML template where data from the database is inserted into the document according to the template, although embodiments are not so limited. For example, content/endpoint server (200) may reply to the browser's target URL request with an application such as a such as a Web-based application, cloud-based application, progressive Web application or the like “wrapped” or contained in a Web page. As yet another alternative, the content/endpoint server (200) may reply with a native application/native mobile application for download onto mobile device (14 a, 14 b). Thus, the target ID may identify target application code to be wrapped in the Web page, or it may identify native application code in the language of the operating system of the mobile device (14 a, 14 b). Ultimately, content endpoint server (200) replies to the browser's target URL request with the appropriate file, as is shown in step (314).

Referring to the left branch of FIG. 3, information from the mobile device (14 a, 14 b) that scanned the tag may be obtained. This information may be gleaned from a browser request and/or other sources of information. See, e.g., step (316). Cookie information, for example, may be included in a browser request. Cookies, in an embodiment, may help maintain the state of a session, keep track of preferences, keep track of other information, and combinations thereof. At step (318), data server/verification database (220) may store information about or related to the mobile device (14 a, 14 b).

In an embodiment, information about a mobile device (14 a, 14 b) and/or information linked thereto may already be stored in the database; that is, before the current scanning activity. Thus, this information from prior activity may be obtained for use in personalizing content as one nonlimiting example. See FIG. 3 at steps (320) and (330). In this way, personalized content (and/or links thereto) may be included in the file to be delivered to mobile device (14 a, 14 b). See FIG. 3 at (314).

Once received, mobile device (14 a, 14 b) browser starts processing the file for display on a display screen. The browser may use code, scripts, server pages, style sheets, tags, and the like delivered with and/or embedded in the HTML file to display content and to facilitate interactions between mobile device (14 a, 14 b) and data server/verification database (220) (by way of content/endpoint server [200]). See FIG. 2 at “F.” Displayed content may include, without limitation, the most up-to-date tracking information (e.g., date of cleaning), and a “log in” icon (32), as is shown in FIG. 2. Both the employee and the guest may view the same HTML document. In an embodiment, method (300) may continue at “Z” to method (400), which is shown in FIG. 4. It is conceivable, however, that no further action is taken by the employee or the guest and method (300) stops after rendering the HTML document that was received by mobile device (14 a, 14 b).

Thus, per the original hotel scenario, and in particular example using the architecture of FIGS. 2 and 3, is that the hotel has placed a tag (16) on, in, or near a bathroom. An employee using their mobile device (14 a) scans the tag (16) and receives the date in which the bathroom was last cleaned. Similarly, a guest can, at a time before or after the employee has scanned the same tag (16), also perform a scan of the tag (16) to check when the bathroom was last cleaned. Use of a single tag (16) allows for a reduction of visual tags (e.g., if one was for the guest and a second one for management) and allows for simply and efficient record keeping of the facilities.

This same architecture can be applied to an employee updating a record after subsequently cleaning the bathroom, or for reporting an issue or incident. Assume that the toilet in the hotel room of the example has malfunctioned. Typically, someone would have to get the phone, make a call, wait on hold, get to service or housekeeping, and then address the issue. In some instances, people do not want to report an issue as they are embarrassed at the cause of the issue, and thus some of the issues remain unreported. The use of the tag (16) and a mobile device (14 a, 14 b) allows for contactless communication and reporting of the issue. The user can scan a tag (16), use an icon in a graphical user interface (GUI) (34) or other form within the URL to identify the issue and a report is generated to the owner of the business. The user can further upload an image or provide additional context to further explain the perceived issue. Such information can be added via the GUI or form within the GUI. Then an employee can resolve the issue, and once resolved, scan the tag (16) to mark the issue as resolved. In an embodiment, additional information may be added that is desired to close the issue that was reported. This information would then live in the database (220) so that the resolved issue could be identified, as necessary. The particular issues can be genericized for the public user so as to not disclose personal information but may remain available to the business owner.

FIG. 4 shows a flowchart that schematically illustrates embodiments of method (400) for enabling interactions between mobile devices (14 a, 14 b) and data server/verification database (220), (see, e.g., system [10 and/or 100] of FIG. 1 and FIG. 2, respectively). With respect to an employee, the method (400) enables the employee to use his/her mobile device (14 a) to update one or more database records. With respect to the public user, method 400 enables the public user to use his/her mobile device (14 b) to send a report about an issue and/or other interactions, as is described in conjunction with the method (400). The method (400) also enables monitoring of reported issues.

Referring to FIG. 4, at step (404) an employee may log into an employee-facing side of method (400), such as by selecting the “log in” button on the display of mobile device (14 a, 14 b) (see, e.g., FIG. 2 at “F”), although embodiments are not so limited. If, at step (404), an employee does not log in, method (400) continues with a public user facing side of method (400). Thus, if an employee does not log in, additional actions taken by the employee will result in being processed as if the employee is acting as a public user. This is perfectly acceptable if it is the employee's intent.

After logging in, an employee may or may not choose to update record data currently displayed on his/her mobile device (14 a). For instance, referring the display screen (36) of mobile device (14 a) in FIG. 5, a page is shown that provides record data (e.g., the date that a room was last cleaned) and instructions to prompt data server/verification database (220) to update the record (e.g., with the current date) by selecting the “submit” button (38), which is shown at step (406) of FIG. 4. In response to selecting a submit button or the like, data server/verification database (220) updates the record linked to the tag ID of the tag (16) that was last scanned by employee mobile device (14 a). If the employee does not elect to update the record, the employee's mobile device (14 a) may wait to be sent an issue alert, which is shown at step (412).

If the employee has updated the record (via his/her mobile device [14 a]), the employee may use his/her mobile device (14 a) to scan another tag (16) (step [408]) and receive (e.g., from content/endpoint server [200]) a record linked to the tag ID for the newly scanned tag (16). That is, the content/endpoint server (200) and data server/verification database (220) may coordinate to deliver a different page (step [410]) to the employee's mobile device (14 a). Since the employee is already logged in, however, the delivered page includes record data linked to the tag ID from the last scanned tag (16) (e.g., at step [408]) with the ability to update the record data (step [406]) for the tag most recently scanned. This loop may continue until the employee stops scanning tags (16) with his or her mobile device (14 a).

It should be noted that in some embodiments record data corresponding to more than one tag ID may be updated with a single scanned tag. Using the hotel scenario as an example, the tag (16) positioned on, in, or near the guest room door may be a master tag for the other tags in that guest room, which server as servant tags. (See, e.g., FIGS. 6 and 7, detailing master tags). The servant tags (16) in the room are linked in such a way, that when the employee updates the record corresponding to the master tag's tag ID, all of the records corresponding to the linked tags (16) update as well.

Referring to step (420), a public user may use his or her mobile device (14 b) to report an issue. Issues may be defined by the entity owning the network of tags. Issues that may occur at the hotel for example, may include inadequate daily cleaning, a malfunctioning appliance (e.g., refrigerator, hair dryer, television), a maintenance issue (e.g., a clogged sink), a missing item (e.g., no soap, toilet paper), a needed item (e.g., extra pillows, blankets, a toothbrush), as a few nonlimiting examples. Thus, the hotel may include selectable icons on a Web page or the like to enable reporting issues such as issues relating to the aforementioned examples. The selectable icons may be included on the rendered Web page that was delivered to mobile devices (14 a, 14 b) (see, e.g., FIG. 3 at step [314]), or they may be rendered on a Web page delivered to guest mobile device (14 b) in response to selecting a “report” button like the “log in” button shown in FIG. 2. As yet another option, a displayed Web page may include one or more fillable fields for reporting an incident, adding additional information about a selected incident, uploading a photograph, and the like. When data server/verification database (220) detects that an issue has been reported (step [420]), it may determine what type of issues was reported, for example based on a selected icon or information in a fillable field. See step (422). Thereafter data server/verification database (220) may determine, based on the type of reported issue, an employee assignment, or the like, where it should send an issue alert. See step (424). For example, if the reported issue relates to housekeeping, data server/verification database (220) may send an issue alert to a housekeeping employee, but if the reported issue relates to a maintenance issue, the data server/verification database (220) may send an issue alert to a different employee. If the reported incident relates to an emergency situation such as in a campus or hospital setting, data server/verification database (220) may determine that emergency services should be notified (if so enabled), an employee specifically designated to manage emergency situations (e.g., security, nurse, etc.) should be notified, an administrator for the entity should be notified, or combinations thereof.

Referring to step (412) of the employee-facing side of method (400), an issue alert may be sent to an employee who is already logged in. The issue alert may be sent to the employee's mobile device (14 a) such as via a push notification, short messaging service (SMS), multimedia messaging service (MMS), email, phone call, and combinations thereof. If an employee has received an issue alert and has resolved the issue (e.g., fixed the toilet) the employee may use his or her mobile device (14 a) to mark the issue as resolved. See step (414). If the employee receiving the issue alert does not mark the issue as resolved, the status of the issue may continue to be monitored.

Referring to the left side of FIG. 4, data server/verification database (220) may also send an alert to an administrator for the entity (e.g., if not already alerted). Data server/verification database (220) may update the database every time an incident is reported in connection with a recently scanned tag (16). For example, the data server/verification database (220) may use the tag ID to link the record for the tag (16) with data related to the reported incident. See step (428). As a courtesy, the data server/verification database (220) may prompt content/endpoint server (200) to send a reply to the public user's mobile device (14 b). Alternatively, or additionally, an SMS message, MMS message, email message, or the like regarding the reported incident may be sent to the public user's mobile device (14 b).

Regardless of whether an issue has been reported (see, e.g., step [420] where no issue has been reported), data server/verification database (220), after a predetermined amount of time has passed (step [432]), may cause a notice to be sent to the public user's mobile device (step [433]). If an issue was reported, the notice may relate to the incident. For example, the notice may seek to find out if the issue has been resolved, and if so, if it has been taken care of to the public user's satisfaction. Or if the reported issue related to needing emergency help, the notice may seek to find out if the needed emergency service has arrived. If the public user did not report an issue, the notice may simply thank the public user or to send the public user additional content (e.g., ads, incentives, questionnaires, etc.).

As yet another alternative, the notice may provide the opportunity for further engagement, such as checking out from the hotel, ordering room service, purchasing merchandise, and the like. If a response has not been received, (step [434]) method (400) may continue to step (438) and update the database if needed before ending. If, however, a response has been received (step [434]), data server/verification database (220) may complete additional actions to be taken (step [436]). For example, if the public user has responded indicating that a reported incident is still unresolved, data server/verification database (220) may send another issue alert to the same employee, or an issue alert to a different employee and/or an entity administrator. In embodiments, data server/verification database (220) may continue to follow up on an unresolved incident until the incident resolved (see, e.g., step [414]) and/or adequately addressed (e.g., emergency service/first responder contacted) and the database is updated to reflect incident resolution. See steps (415 and 438). Alternatively, if the public user responded to further engagement, data server/verification database (220) may take an action in accordance therewith, such as checking out, ordering room service, paying for merchandise and the like. Before ending the public user facing instructions, data server/verification database (220) updates the database (step [438]) with information relating to the scanned tag (16). For example, incident report activity is updated and/or engagement transactions are noted. Similarly, before exiting employee-facing instructions (step [416]), data server/verification database (220) updates the database (step [415]) with data relating to a tag (16) in question (e.g., regular updates, issue alerts and the like).

During execution of both the public user facing instructions and/or employee facing instructions, information may be gathered (step [450]), for example by the analytics portal (240) running on an analytics server (see FIGS. 2 and 5), and saved to a database associated therewith (not shown) or the database maintained by data server/verification database (220). Data collected through analytics portal may include tracking data, clickstream data, data from devices (14 a, 14 b), data about devices (14 a, 14 b), browser requests and the like. Collected data may be subject to machine learning to predict the type of content to display to one or more public users, according to an embodiment.

Entity administrators such as managers, administrative professionals, information technology specialists, and the like may view and/or manage the entity's network of tags using an administration software tool (250). See FIG. 5 at “B.” In an embodiment, administration software tool (250) is part of a Web-based software platform running on system (10). An administrator may access administration software tool (250) via a portal such as browser-based Web pages, a Web-based application, a progressive Web application, a downloadable application, a native application, and a cloud-based application (to name just a few examples), which may be delivered to computer (12) by content/endpoint server (200). Thus, as is shown at “B” of FIG. 5, the administrator may use administration software tool (250) to view the real-time status of all tags and endpoint/target URLs located within the system (10). Similarly, the administrator may use administration software tool (250) to manage endpoints/targets and content.

Referring to FIG. 5, the system (500) comprises a data server/verification database (220) to manage data stored in a database such as database (24). See, e.g., FIG. 1. Data stored in database (24) may relate to tags, public users, employees, content, third party data, and the like. Thus, in embodiments of the invention, administration software tool (250) may send requests (e.g., query, read, write, etc.) to data server/verification database 220. Data server/verification database (220) may, in response to a request, provide real-time verification records to administration software tool (250), which is shown in FIG. 5 at “A.” In embodiments, data server/verification database (220) may provide data that has been verified using verification techniques/algorithms. And in an embodiment, data server/verification database (220) may provide data that has been verified as part of a blockchain distributed ledger.

In addition to providing a portal to the computer (12), content/endpoint server (200) may deliver content to mobile device (14 a, 14 b) through browser-based Web pages which may be part of a Web-based application, cloud-based application, progressive Web application, and the like. Alternatively, mobile device (14 a, 14 b) may receive a native application from the content/endpoint server (200). See FIG. 5 at “D.” Analytics portal (230), running on an analytics server may be included in the Web-based software platform. See FIG. 5 at “E.” Analytics portal (230) retains user requests and/or data from past user interactions with one or more tags, including interactions assigned to an individual mobile device/user and/or collective interactions of some or all mobile devices/users. The analytics portal may also incorporate third party data from outside sources and platforms such as health metrics APIs, third party advertising metrics APIs, as a few nonlimiting examples (see, e.g., FIG. 2). Furthermore, to complete the cycle, analytics server may run software that uses data points from analytics portal (230) to report information to the data/verification server (220). See FIG. 5 “E” to “A.” As nonlimiting examples, analytics server (230) may use information from cookies, log files, page tags (e.g., JavaScript code embedded in Web pages), and combinations thereof for reporting to data server/verification database (220).

Referring to FIG. 6, four arbitrary categories are listed to represent areas in which an administrator may view/manage data. These categories are designated only for purposes of clarity and are not limitations upon data, and/or how an entity may choose to view, manage, generate, store, or otherwise manipulate data. Oftentimes a task may fall into two of the categories, with part of the task falling in one of the categories and the other part of the task in another category. The four general categories listed in FIG. 6 include tag management (610) application management (620), tag monitoring (630), and reports (640).

Tag management (610) may include administrative tasks such as, without limitation, assigning each tag that an entity possesses to a different point of interest, creating groups of tags, assigning a worker to one or more tags or groups of tags, and assigning a worker to respond to incident reports. It is imperative that each tag is properly assigned to a particular object or area to avoid providing incorrect information. To clarify, each tag includes a unique identifier corresponding to a database record, and each object and/or area of interest is tagged (e.g., has a tag on or in the object/location). Ideally, when a tag on, in, or near a point of interest is scanned, the record for the desired point of interest is delivered to the scanning mobile device (14 a, 14 b). The administrator may be tasked with ensuring that the tag-object and tag-area assignments in the database correspond to actual tagged points of interest. Toward this end, content delivered to the scanning mobile device (14 a, 14 b) may also include a description of the point of interest corresponding to the delivered record data.

Strategic tag associations in a restaurant may serve as a nonlimiting illustration. For example, a restaurant may assign a different tag to each section of the restaurant such as the dining area, waiting area, bar, restroom, kitchen, etc., to track cleaning records for the sections as a whole. The restaurant may also assign a different tag to individual objects (e.g., tables, counters, menus, chairs, sinks, toilets, etc.) commonly found within the different sections to track the cleaning record for each object. The database associations (e.g., tag: record) should correspond to reality such that when a tag on Table 10 is scanned, the scanning device receives the most recent sanitization record for Table 10. As another nonlimiting illustration, a campus may assign a different tag to each room in a building such as each room in a dormitory, lecture hall, lab, and the like. When a tag near a given room is scanned, the database associations should match reality so that a mobile device (14 a, 14 b) receives information corresponding to the tag near that room. Thus, for a mobile device user to receive accurate information regarding a point of interest, database tag/record associations must match actual tag/point of interest associations.

In addition to creating tag associations, an administrator may create groupings of tags using the administration tool (250). The manner in which tags are grouped is flexible to meet the needs of the particular entity at any time. Grouping tags may be advantageous for many reasons. As one nonlimiting example, tags may be grouped to deliver different content to different groups of active users (e.g., mobile device users that have used their mobile device to scan a tag). To illustrate, without limitation, a restaurant may create groups of tags based on their location within a restaurant. If the restaurant is experiencing a heavy rush, the administrator may cause the system to send a coupon for a discounted meal to mobile devices of active customers in the waiting area and a free drink coupon to the mobile devices of active users in the bar area. As another nonlimiting illustration, a campus administrator may group tags in a dormitory by floor, wing, residential assistant assignments, or the like. In this way, each grouping may receive content relevant to just that grouping.

Tag groupings may also be used to update data in multiple records with the same information at substantially the same time. FIG. 7 details this concept wherein the steps remain virtually identical to the other elements as detailed in the system, but adding in a step wherein upon submission, there is a check of whether this tag is a master (16) or a servant (16 a or 16 b) tag. The system (700), comprises wherein if the tag positioned on a surface (701), is the master tag (16), then the request is whether to update both the master (16) and the servant (16 a and 16 b) tags, or just the master tag (16). In this way, an employee may need to only scan one tag in the group (e.g., a master tag [16]) to update the records for the master tag and the remaining tags (16 a and 16 b), etc., in the group. Thus, upon scanning from a device (14 a), of the code (16) on a surface (701), the display screen (36) provides an interface for engaging with the system (700), including a submit button. Upon submitting, a determination is made of the master (16) tag or a non-master tag. If a master tag (16), then a decision of updating only the master tag (16), or the master (16) and all servant tags (16 a, 16 b). Note that there may be one or an unlimited number of servant tags. The analytics server portal (230) then communicates with the data server/verification database (220), and then to the administration software (250), and to the content/endpoint server (200). This follows a path for each subsequent scan of a tag as detailed within the embodiments here.

To illustrate, a hotel administrator may create tag groupings based individual rooms. The master tag (16) may be in, on, or near the door of the room, and the servant tags (16 a, 16 b), may in, on, or near points of interest within the room. After cleaning a particular room, the housekeeping employee may scan the master tag (16) (with mobile device [14 a]) to update cleaning data associated with the master tag and all of the servant tags within that room. With this type of master/servant tag relationship in place, the housekeeping employee does not have to scan each individual tag in the room as the employee cleans. The hotel guest, however, may scan any tag within the room to see cleaning data for the point of interest associated with the scanned tag. The guest may see a record for the point of interest that was updated via the master tag or an update corresponding to just that point of interest, whichever is the latest data entry.

As another nonlimiting illustration, a hospital may group tags by room (master) (16) and one or more beds (servants) (16 a, 16 b), within the room. A nurse may use the master tag (16) to update the records (e.g., time/date of most recent vitals check) relating to the entire room. The patient/patient visitor may use the tag on, in, or near the bed to access the record for just that bed/person in the bed. Similarly, a master tag may be associated with a larger group of servant tags (16 a, 16 b), for example a master tag (16) for an entire wing of the hospital, with dozens or more servant tags relating to rooms and/or patients in the wing. A scan of the master tag (16) can be utilized to update all of the servant tags (16 a, 16 b), with the same information, instead of scanning dozens of tags. This provides a significant efficiency gain for employees, while also increasing consistency of data across all records.

In view of the above illustrations, it may be appreciated that tag management may include many different ways to assign tags to points of interest and ways to group/make secondary assignments (e.g., by employee) and/or other designations relating to the tags within an entity's tag network. Since there is a degree of flexibility, each entity may create assignments, groups, designations, etc., at any time to meet its needs. That is, once configured, the administrator can reconfigure to meet real-time needs.

The administrator may also use the administration tool (250) to manage (620) various features of the platform such as, without limitation, selecting targets for URLs, configuring content parameters such as type, conditions, triggering events, and the like, and identifying additional engagement opportunities to offer to mobile device users. In embodiments, a target may provide instructions and/or structure for use by a specific entity. Different targets may have different instructions, which may produce different results. Each target may have its own unique identifier (target ID). Thus, in embodiments an administrator may enter a target ID in the database to ensure that a desired result occurs in response to scanning a particular tag. The target ID and a tag ID may be incorporated to a base URL thereby directing a Web browser to the intended endpoint and record for a tag scan, although embodiments are not so limited.

In addition to the record data, and optionally a description of the point of interest and/or log in button, the mobile device user may view other content when a page is rendered on the display of mobile device (14 a, 14 b). The other content may be in the form of text, video, images, audio, software, scripts, and third-party plugins/addons (e.g., review opportunities, shopping carts, banner ads, popup ads, polling opportunities) to name a few nonlimiting examples. Furthermore, the content may be adapted by subject matter limitations, the occurrence of a condition or event, based on user data (individual or collective), based on the types of incidents that may occur, and engagement opportunities to name a few nonlimiting examples. With respect to subject matter limitations, different entities may wish to provide content that relates to their industry or entity type. For example, a campus may provide only campus-related content, whereas a hotel provide content relating to local attractions, events, restaurants, and the like.

There are many ways to distribute content based on the occurrence of an event or the meeting of a condition. For example, content may be distributed based on a real-time condition, a time of day, a location, and usage, to name just a few examples. Recall the illustration of a restaurant providing a meal discount/free drink during a heavy rush. Wait times may be expected at a popular restaurant, but excessively long wait times may deter people altogether. To compensate for an excessively long wait time, the restaurant may distribute the incentive only after a wait time that exceeds 30 minutes. Similarly, the restaurant may distribute a happy hour coupon only after 5 PM, or only after 5 PM on days with slow traffic. As yet another example, an incentive may be distributed by an entity after a mobile device has been used to scan one or more tags on ten different days. The mobile device user may also receive an SMS or MMS thanking them for scanning tags on x number of separate occasions.

An entity may also have the opportunity to determine what types of feedback it would like from public users and/or what types of engagement opportunities it would to offer public users, if any. User input may be a valuable source of information for a wide variety of purposes such as determining user satisfaction and evaluating employee performance. According to embodiments of the invention, input may be received via a written review, an incident report, or both. Generally, public users may use a fillable field on a Web page or the like to provide a written comment or to describe an incident. Public users may also have selectable reporting options on the same as the fillable field or on a different Web page. Selectable options may be desired by a mobile device user due to their ease of use on mobile device (14 a, 14 b). Thus, a particular entity may want to include specific, commonly occurring incidents as selectable options and leave a fill-in option for incidents that are not on the list. A hotel, for example, may want to include selectable options such as requests for housekeeping services (e.g., the room was not cleaned to satisfaction), item requests (e.g., something missing in the room that should have been there, something that may not normally be in a room, but the hotel offers either at a cost or for free), maintenance requests (e.g., a broken appliance or fixture), as a few examples. A campus, however, may offer different selections such as after-dark escorts (e.g., to campus locations), for maintenance services (e.g., sink stopper does not work), and even for emergency services in the case of an emergency (e.g., injury, accident, overdose).

Similarly, an entity may want to include engagement opportunities on one or more Web pages, push notifications, or the like. In some embodiments there may not be a distinction between engagement opportunities and incident reports, especially from the perspective of the public user. As expected, engagement opportunities may vary widely between industries and entity types. For example, a hotel may enable engagement opportunities such as checking out of the hotel, ordering room service, purchasing merchandise, and the like, whereas a campus may include engagement opportunities such as buying tickets to a game or an event, registering for free events, taking polls, creating study groups, and the like.

Monitoring and reporting (630, 640), via the administration tool (250) may be flexible to enable viewing data in various graphic forms such as graphs, charts, diagrams, and the like. The administrator may monitor the status of points of interest (e.g., via the network of tags) in real time as employees and/or public users cause data in the database change. In this way, the administrator may see employee interaction with tags as the employee is performing routine tasks and incident reports from public user devices as they are reported. During the course of monitoring, an administrator may manually update content based on data collected by the system, data collected by employees, comments made in digital format, and the like.

To illustrate, as an administrator for a restaurant is monitoring data, he or she may note that the guests at Table 1 have provided a comment (e.g., to the restaurant and/or on social media) that they are impressed with the cleanliness of the restaurant. In contrast, the guests at Table 10 have submitted a request to have their table cleaned for a second time. The administrator may look at the data for Table 10 and see that it was cleaned five minutes ago by a different employee than the one who cleaned Table 1. The administrator may use a short message service (SMS), email, multimedia message service (MMS), phone call, or combinations thereof to remind the employee who cleaned Table 10 reclean the table. Alternatively, the administrator may ask the employee who cleaned Table 1 to clean Table 10 and provide that employee with a reward for doing extra work all via the employee's mobile device. Regardless of which employee actually cleaned Table 10, he or she may scan the tag on Table 10 to update the record or the administrator may do so through the administration portal. The administrator may prefer to update manually to input comments regarding the event. The administrator may also communicate with the guests at Table 10, such as via an SMS, MMS, email, and the like, to ensure that the table has been cleaned to their satisfaction. In embodiments, however, the forgoing may be automated based on prior conditions, data points, or the like provided by the administrator or as configured when the system was initially put in place.

An administrator can run reports on gathered data to view information relating to usage statics, employee performance, incident reporting, and much more. As a few nonlimiting examples, the administrator may run reports on tag usage by public users. These reports may be with respect to the entity's entire network or tags, a group of tags in the network, an individual tag, and the like. In an embodiment, the administrator may even be able to run a limited report on tag usage across several entities. Usage reports may be configured for information such as the number of times a given tag has been scanned by any user during a period of time (e.g., day, week, hour, etc.) or the number of times any tag has been scanned by a particular user during a period of time. Incident reports may be run with respect to a tag, an employee, a group of tags, incident type, and the like. Incident reports may provide information about customer satisfaction, employee performance, and other areas of concern. Incident handling reports may provide information regarding response times, which may translate to customer satisfaction, employee performance, and the like. Report information may be useful to help make business decisions, with employee reviews, to understand customer satisfaction, and the like.

In an educational setting, the systems herein can be especially utilized for incident reporting. Wherein, a tag can be placed within a dorm room, a public setting, a floor of a dormitory, or other accessible location. The tag can be utilized with the GUI or a form opened on a mobile device to report a particular issue, including specifics of an emergency or nonemergency. This allows for reporting of issues, without the personalized aspect of having to call to report an issue that may be embarrassing or where a person may fear facing repercussions for engaging in certain activities. The anonymous aspect and ability to report allows for such reporting with specificity to a location to address the incident.

A further benefit of such system is that the user, whether an employee or a person to the public at large, is able to bring their own device and use a generic device for access to the system. For an employee, the ability to use their own device allows for temporary workers to use a myriad of generic devices to perform their duties. Similarly, it allows a small business to use existing hardware devices instead of investing in new, specialized devices for reporting. At the same time, because cellphones are ubiquitous, the use of nearly any smart cellphone to access and use the system creates a significant advantage, especially when there arises a need to report an incident or other issue.

It will be appreciated that the embodiments and illustrations described herein are provided by way of example, and that the present invention is not limited to what has been particularly disclosed. Rather, the scope of the present invention includes both combinations and subcombinations of the various features described above, as well as variations and modifications thereof that would occur to persons skilled in the art upon reading the forgoing description and that are not disclosed in the prior art. 

What is claimed is:
 1. A system for contactless communication within a business comprising: a. a network of scannable tags distributed throughout the business, each tag in the network associated with a unique tag identifier and a point of interest proximate to the tag; b. a remote server having a computer processor and a computer memory; c. a database operatively connected to the remote server, the database containing information relating to each tag in the network, information for each tag including: i. the associated unique tag identifier and the point of interest; ii. content to be sent to a mobile device in response to being scanned by the mobile device, the content to include a link for reporting an issue; and iii. a status indicator to indicate a status of a reported issue; and d. wherein the computer memory of the remote server stores executable code which, when executed, enables the remote server to perform a process comprising: i. delivering requested content to a user mobile device that has sent a request for content upon scanning a particular tag in the network of tags; ii. in response to receiving a report of an issue from the user mobile device, sending an issue alert to an employee device to notify the employee device about the issue, the employee device receiving the issue alert already logged into the system by scanning any tag in the network of tags; and iii. updating the status indicator for the particular tag to indicate that the issue has been reported and that the issue alert has been sent.
 2. The system of claim 1 wherein updating the status indicator further comprises, in response to receiving a request to update the status indicator for the particular tag, updating the status indicator for the particular scanned tag to indicate that the reported issue is resolved.
 3. The system of claim 2 wherein the request to update the status indicator for the particular tag is received from an administrator device.
 4. The system of claim 2 wherein the request to update the status indicator for the particular tag is received from the employee device that received the issue alert, an employee device that did not receive the issue alert, a nonemployee device, the user mobile device, and combinations thereof.
 5. The system of claim 1 further comprising monitoring a status of the reported issue and sending a notice to the user mobile device to see if the reported issue has been resolved.
 6. The system of claim 5 further comprising sending a communication to the same employee device that received the issue alert, a different employee device that did not receive the issue alert, or both, the communication to indicate that the reported issue has not been resolved.
 7. The system of claim 1 further comprising receiving a photo, text, or both together with the reported issue and uploading the photo, text, or both to the database in association with the particular tag.
 8. The system of claim 1 wherein the network of scannable tags includes scannable tags selected from the group consisting of: quick response (QR) code tags, near-field communications (NFC) tags, radio-frequency identification (RFID) tags, and combinations thereof.
 9. The system of claim 1 wherein reporting the issue includes reporting an engagement opportunity selected from the group consisting of: providing feedback, closing a bill, ordering, purchasing, payment, and combinations thereof.
 10. The system of claim 1 wherein receiving a report of the issue includes receiving a report of an issue selected from the group consisting of: a wellness issue, an emergency issue, a maintenance issue, a safety issue, a housekeeping issue, and combinations thereof.
 11. The system of claim 1 further comprising receiving from an administrative device a plurality of grouping of tags within the network of tags, one grouping in the plurality to include a master tag and the particular tag, and wherein updating the status indicator for the master tag also updates the status indicator for the particular tag.
 12. The system of claim 1 further comprising receiving a request from an administrator device to redirect the mobile device to alternative content in response to scanning a tag in the network of tags with the mobile device.
 13. The system of claim 1 further comprising receiving from an administrator device a triggering event to be associated with each tag in the network of tags, the triggering event, if it occurs, to cause the system to send additional content to each user mobile device within the business that has scanned at least one tag in the network of tags.
 14. A method for reporting an occurrence of an issue relating to a point of interest in a business comprising: a. in response to receiving a request to report the issue from a first mobile device that has scanned a tag located on or near the point of interest, updating a database record to reflect that the issue was reported by the first mobile device, the database record corresponding to the point of interest and identified by a unique tag identifier obtained by the first mobile device when the first mobile device scanned the tag; b. sending, to a second mobile device, an issue alert to notify a user of the second mobile device that the issue was reported, the second mobile device having been logged in by scanning a same tag as the first mobile device or a different tag or by logging in, without first scanning any tag, via a browser-based Web page, a Web-based application, a cloud-based application, a progressive Web application, or a native application; and c. in response to receiving an indicator that the issue has been resolved, updating the database record to reflect a resolved status for the issue.
 15. The method of claim 14 wherein the issue is selected from the group consisting of: a cleaning issue, a maintenance issue, a missing item, an additional item, a request to check out, a request for room service, a safety issue, a wellness issue, an emergency, and combinations thereof.
 16. The method of claim 14 wherein the business is selected from the group consisting of: a healthcare facility, a religious organization, an educational facility, a sports-related business, a dining establishment, and combinations thereof.
 17. The method of claim 14 further comprising receiving, from an administrative device, an instruction regarding the second mobile device to which the issue alert should be sent.
 18. The method of claim 14 wherein the indicator that the issue has been resolved is received from an administrative device, the second mobile device, or both.
 19. A method of reporting an issue about a point of interest using a network of tags, each tag in the network associated with a distinct point of interest and encoded with a unique tag identifier, the method comprising: a. receiving a login request from an employee device, the login request received after using the employee device to scan a tag in the network of tags; b. receiving a content request from a nonemployee device, the content request received in response to using the nonemployee device to scan a tag in the network of tags, the tag scanned by the employee device and the tag scanned by the nonemployee device being either a same tag or a different tag within the network of tags; c. providing content associated with the content request to the nonemployee device, the provided content relating to the distinct point of interest associated with the tag scanned by the nonemployee device and including an icon or a fillable field for reporting the issue relating to the distinct point of interest; and d. monitoring the network of tags for an issue report request from the nonemployee device reporting an issue relating to the distinct point of interest.
 20. The method of claim 19 further comprising detecting the issue report request from the nonemployee device and in response thereto sending an issue alert to the employee device, to a first responder, to an administrator, and combinations thereof.
 21. The method of claim 20 further comprising updating a database record associated with the distinct point of interest to indicate that the issue report request was received, the issue alert has been sent, and the issue relating to the distinct point of interest is not yet resolved.
 22. The method of claim 21 further comprising receiving instructions from an administrator device to change the database record to indicate that the issue relating to the distinct point of interest is resolved.
 23. The method of claim 20 wherein the issue relating to the distinct point of interest regards a state or condition of the distinct point of interest, the distinct point of interest selected from the group consisting of: an object, an area, and a person.
 24. The method of claim 19 wherein the network of tags includes tags that are encoded according to near-field communications (NFC) chip technologies, quick response (QR) code technologies, or both, the tag encoded to include a uniform resource locator (URL) which includes the unique tag identifier. 