Method and apparatus for completing, securing and conducting an E-commerce transaction

ABSTRACT

A method of conducting and on-line transaction. A user at a PC ( 302 ) of a first location completes a profile information sheet and transmits it across a secure network ( 2708 ) to a central registration server ( 2704 ) at a second location also disposed on the network ( 306 ). The central registration server ( 2704 ) transmits a unique bar code and associated unique ID back to the user PC ( 302 ) at the first location, in response to the user sending the completed profile information sheet to the registration server ( 2704 ). When the user accesses a vendor server ( 2700 ) disposed on the network ( 306 ) for the purchase of products and/or services, the user transmits the bar code to the vendor server ( 2700 ) when prompted to complete a vendor payment form. The vendor server ( 2700 ) sends the bar code to the central registration server ( 2704 ) where the bar code is matched to the user profile information. The profile information is returned to the vendor server ( 2700 ) and automatically inserted into the vendor payment form. The vendor server then processes the transaction according to the credit information provided. Some or all fields of the vendor payment form are inserted with encoded information depending upon the user selecting a standard or invisible mode of payment, respectively. The payment form is then presented to the user at the user PC ( 302 ) for acceptance or rejection of the transaction.

TECHNICAL FIELD OF THE INVENTION

This invention is related to a method of facilitating E-commerce and, more particularly, to an architecture for automatically inserting user profile information into a vendor payment form by submitting a bar code and/or unique ID.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a Continuation-in-Part of U.S. patent application Ser. No. 09/378,221 entitled “METHOD AND APPARATUS FOR ACCESSING A REMOTE LOCATION BY SCANNING AN OPTICAL CODE,” filed on Aug. 19, 1999, now U.S. Pat. No. 6,745,234, issued Jun. 1, 2004. U.S. patent application Ser. No. 09/378,221 is a Continuation-in-Part of the following two applications: U.S. patent application Ser. No. 09/151/471 entitled “METHOD FOR INTERFACING SCANNED PRODUCT INFORMATION WITH A SOURCE FOR THE PRODUCT OVER A GLOBAL NETWORK” filed on Sep. 11, 1998, now abandoned; and U.S. patent application Ser. No. 09/151,530 entitled “METHOD FOR CONTROLLING A COMPUTER WITH AN AUDIO SIGNAL” filed on Sep. 11, 1998, and which issued on Aug. 1, 2000 as U.S. Pat. No. 6,098,106. The present application being related to the following U.S. Patent Applications: Ser. No. 09/378,219 entitled “INTERACTIVE DOLL,” filed on Aug. 19, 1999; now U.S. Pat. No. 6,629,133, issued on Sep. 30, 2003; Ser. No. 09/378,222 entitled “METHOD AND APPARATUS FOR EMBEDDING ROUTING INFORMATION TO A REMOTE WEB SITE IN AN AUDIO/VIDEO TRACK,” filed on Aug. 19, 1999, now U.S. Pat. No. 6,970,914, issued on Nov. 29, 2005; Ser. No. 09/378,220 entitled “METHOD AND APPARATUS FOR CONTROLLING A COMPUTER FROM A REMOTE LOCATION,” filed on Aug. 19, 1999, now U.S. Pat. No. 6,526,449, issued on Feb. 25, 2003; Ser. No. 09/378,216 entitled “METHOD FOR CONTROLLING A COMPUTERUSING AN EMBEDDED UNIQUE CODE IN THE CONTENT OF VIDEO TAPE MEDIA,” filed on Aug. 19, 1999, now U.S. Pat. No. 6,643,692, issued on Nov. 4, 2003; Ser. No. 09/378,218 entitled “METHOD FOR CONTROLLING A COMPUTER USING AN EMBEDDED UNIQUE CODE IN THE CONTENT OF DVD MEDIA,” filed on Aug. 19, 1999, now U.S. Pat. No. 7,010,577, issued on Mar. 7, 2006; Ser. No. 09/378,217 entitled “METHOD FOR CONTROLLING A COMPUTER USING AN EMBEDDED UNIQUE CODE IN THE CONTENT OF CD MEDIA,” filed on Aug. 19, 1999, now U.S. Pat. No. 7,043,536, issued on May 9, 2006; Ser. No. 09/378,215 entitled “METHOD FOR CONTROLLING A COMPUTER USING AN EMBEDDED UNIQUE CODE IN THE CONTENT OF DAT MEDIA,” filed on Aug. 19, 1999, now U.S. Pat. No. 6,615,268, issued on Sep. 2, 2003; Ser. No. 09/382,427, filed on Aug. 24, 1999, now U.S. Pat. No. 6,829,650, issued on Dec. 7, 2004, and entitled “METHOD AND APPARATUS FOR OPENING AND LAUNCHING A WEB BROWSER IN RESPONSE TO AN AUDIBLE SIGNAL;” Ser. No. 09/382,424, filed on Aug. 24, 1999, now U.S. Pat. No. 6,836,799, issued on Dec. 28, 2004, and entitled “METHOD AND APPARATUS FOR TRACKING USER PROFILE AND HABITS ON A GLOBAL NETWORK;” Ser. No. 09/382,425, filed on Aug. 24, 1999, now U.S. Pat. No. 7,228,282, issued on Jun. 5, 2007, and entitled “METHOD AND APPARATUS FOR DIRECTING AN EXISTING PRODUCT CODE TO A REMOTE LOCATION;” Ser. No. 09/283,373, filed Aug. 24, 1999, now U.S. Pat. No. 7,117,240, issued on Oct. 3, 2006, and entitled “METHOD AND APPARATUS FOR LAUNCHING A WEB SITE WITH A NON-STANDARD CONTROL INPUT DEVICE;” Ser. No. 09/382,374, filed on Aug. 24, 1999, now U.S. Pat. No. 7,792,696, issued on Sep. 7, 2010, and entitled “METHOD AND APPARATUS FOR ALLOWING A BROADCAST TO REMOTELY CONTROL A COMPUTER;” Ser. No. 09/382,371, filed on Aug. 24, 1999, now U.S. Pat. No. 7,440,993, issued on Oct. 21, 2008, and entitled “METHOD AND APPARATUS FOR LAUNCHING A WEB SITE IN RESPONSE TO SCANNING OF PRODUCT INFORMATION;” Ser. No. 09/382,372, filed on Aug. 24, 1999, now U.S. Pat. No. 7,284,066, issued on Oct. 16, 2007, and entitled “METHOD AND APPARATUS FOR MATCHING A USER'S USE PROFILE IN COMMERCE WITH A BROADCAST;” Ser. No. 09/382,423, filed on Aug. 24, 1999, now U.S. Pat. No. 7,900,224, Mar. 1, 2011, and entitled “METHOD AND APPARATUS FOR UTILIZING AN AUDIBLE SIGNAL TO INDUCE A USER TO SELECT AN E-COMMERCE FUNCTION;” Ser. No. 09/382,421, filed on Aug. 24, 1999, now U.S. Pat. No. 7,424,521, issued on Sep. 9, 2008, and entitled “COMBINED PRODUCT CODE AND INSIGNIA FOR SIGNIFYING AN INTERNAL INTERACTIVE CODE;” Ser. No. 09/382,420, filed on Aug. 24, 1999, now U.S. Pat. No. 6,826,592, issued on Nov. 30, 2004, and entitled “DIGITAL ID FOR SELECTING WEB BROWSER AND USE PREFERENCES OF A USER DURING USE OF A WEB APPLICATION;” Ser. No. 09/382,422, filed on Aug. 24, 1999, now abandoned, and entitled “UNIQUE ID FOR IDENTIFYING A USER AND FACILITATING AN E-COMMERCE TRANSACTION;”Ser. No. 09/382,377, filed on Aug. 24, 1999, and entitled “METHOD AND APPARATUS FOR LINKING A WEB BROWSER TO A PROMOTIONAL OFFER OVER A GLOBAL NETWORK;” Ser. No. 09/382,376, filed on Aug. 24, 1999, now U.S. Pat. No. 6,697,949, issued on Feb. 24, 2004, and entitled “METHOD AND APPARATUS FOR CONTROLLING A USER'S PC THROUGH AN AUDIO/VISUAL BROADCAST TO ARCHIVE INFORMATION IN THE USER'S PC;” Ser. No. 09/382,375, filed on Aug. 24, 1999, now U.S. Pat. No. 7,159,037, issued on Jan. 2, 2007, and entitled “METHOD AND APPARATUS FOR UTILIZING AN EXISTING PRODUCT CODE TO ISSUE A MATCH TO A PREDETERMINED LOCATION ON A GLOBAL NETWORK;” Ser. No. 09/379,699, filed on Aug. 24, 1999, now U.S. Pat. No. 7,321,941, issued on Jan. 22, 2008, and entitled “NETWORK ROUTING UTILIZING A PRODUCT CODE;” and Ser. No. 09/379,700, filed on Aug. 24, 1999, now U.S. Pat. No. 6,701,354, issued on Mar. 2, 2004, and entitled “METHOD FOR INTERCONNECTING TWO LOCATIONS OVER A NETWORK IN RESPONSE TO USING A TOOL.”

BACKGROUND OF THE INVENTION

With the growing numbers of computer users connecting to the “Internet,” many companies are seeking the substantial commercial opportunities presented by such a large user base. For example, one technology which exists allows a television (“TV”) signal to trigger a computer response in which the consumer will be guided to a personalized web page. The source of the triggering signal may be a TV, video tape recorder, or radio. For example, if a viewer is watching a TV program in which an advertiser offers viewer voting, the advertiser may transmit a unique signal within the television signal which controls a program known as a “browser” on the viewer's computer to automatically display the advertiser's web page. The viewer then simply makes a selection which is then transmitted back to the advertiser.

In order to provide the viewer with the capability of responding to a wide variety of companies using this technology, a database of company information and Uniform Resource Locator (“URL”) codes is necessarily maintained in the viewer's computer, requiring continuous updates. URLs are short strings of data that identify resources on the Internet: documents, images, downloadable files, services, electronic mailboxes, and other resources. URLs make resources available under a variety of naming schemes and access methods such as HTTP, FTP, and Internet mail, addressable in the same simple way. URLs reduce the tedium of “login to this server, then issue this magic command . . . ” down to a single click. The Internet uses URLs to specify the location of files on other servers. A URL includes the type of resource being accessed (e.g., Web, gopher, FTP), the address of the server, and the location of the file. The URL can point to any file on any networked computer. Current technology requires the viewer to perform periodic updates to obtain the most current URL database. This aspect of the current technology is cumbersome since the update process requires downloading information to the viewer's computer. Moreover, the likelihood for error in performing the update, and the necessity of redoing the update in the event of a later computer crash, further complicates the process. Additionally, current technologies are limited in the number of companies which may be stored in the database. This is a significant limitation since world-wide access presented by the Internet and the increasing number of companies connecting to perform on-line E-commerce necessitates a large database.

SUMMARY OF THE INVENTION

The present invention disclosed and claimed herein comprises a method of conducting an on-line transaction. A user enters user profile information into a form at a user location disposed on a network. A bar code is issued in response to the user transmitting the form of profile information from the user location to a second location, the second location disposed on the network. The bar code is submitted for purchase of a product of a vendor location disposed on the network, during the on-line transaction. In response to the vendor location processing the bar code, the profile information is transmitted from the second location to the vendor location. The profile information is automatically inserted into a vendor payment form for presentation to the user.

BRIEF DESCRIPTION OF THE DRAWINGS

For a more complete understanding of the present invention and the advantages thereof, reference is now made to the following description taken in conjunction with the accompanying Drawings in which:

FIG. 1 illustrates a block diagram of the preferred embodiment;

FIG. 2 illustrates the computer components employed in this embodiment;

FIG. 3 illustrates system interactions over a global network;

FIGS. 4 a-4 e illustrate the various message packets transmitted between the source PC and network servers used in the preferred embodiment;

FIG. 5 is a flowchart depicting operation of the system according to the preferred embodiment;

FIG. 6 illustrates a flowchart of actions taken by the Advertiser Reference Server (“ARS”) server;

FIG. 7 illustrates a flowchart of the interactive process between the E source computer and ARS;

FIG. 8 illustrates a web browser page receiving the modified URL/advertiser product data according to the preferred embodiment;

FIG. 9 illustrates a simplified block diagram of the disclosed embodiment;

FIG. 10 illustrates a more detailed, simplified block diagram of the embodiment of FIG. 9;

FIG. 11 illustrates a diagrammatic view of a method for performing the routing operation;

FIG. 12 illustrates a block diagram of an alternate embodiment utilizing an optical region in the video image for generating the routing information;

FIG. 13 illustrates a block diagram illustrating the generation of a profile with the disclosed embodiment;

FIG. 14 illustrates a flowchart for generating the profile and storing at the ARS;

FIG. 15 illustrates a flowchart for processing the profile information when information is routed to a user;

FIG. 16 illustrates a general block diagram of a disclosed embodiment;

FIG. 16 a illustrates a flowchart depicting the operation wherein the input device is registered;

FIG. 17 illustrates the conversion circuit of the wedge interface;

FIG. 18 illustrates a sample message packet transmitted from the user PC to the ARS;

FIG. 19 illustrates a more detailed block diagram of the routing of the message packets between the various nodes;

FIG. 20 illustrates a block diagram of a browser window, according to a disclosed embodiment;

FIG. 21 illustrates a diagrammatic view of information contained in the ARS database;

FIG. 22 illustrates a flowchart of the process of receiving information for the user's perspective;

FIG. 23 illustrates a flowchart according to the ARS;

FIG. 24 illustrates a flowchart of the process performed at the E-commerce node;

FIG. 25 illustrates a general concept according to a disclosed embodiment;

FIG. 26 illustrates a flowchart of the process for providing the personal and credit information;

FIG. 27 illustrates system block diagram of an on-line transaction according to a disclosed embodiment;

FIG. 28 illustrates a flowchart for a standard payment transaction using the unique user ID;

FIG. 29 illustrates a flowchart for processing the credit card code according to the standard transaction;

FIG. 30 illustrates a flowchart of the process for an invisible from transaction;

FIG. 31 illustrates a flowchart for processing the credit card code according to the invisible transaction;

FIG. 32 illustrates a flowchart of the selection process for a standard and invisible payment method; and

FIG. 33 illustrates a system block diagram of an alternative embodiment where the user profile information is stored at a credit card company system.

DETAILED DESCRIPTION OF THE INVENTION

Referring now to FIG. 1, there is illustrated a block diagram of a system for controlling a personal computer (“PC”) 112 via an audio tone transmitted over a wireless system utilizing a TV. In the embodiment illustrated in FIG. 1, there is provided a transmission station 101 and a receive station 117 that are connected via a communication link 108. The transmission station 101 is comprised of a television program source 104, which is operable to generate a program in the form of a broadcast signal comprised of video and audio. This is transmitted via conventional techniques along channels in the appropriate frequencies. The program source is input to a mixing device 106, which mixing device is operable to mix in an audio signal. This audio signal is derived from an audio source 100 which comprises a coded audio signal which is then modulated onto a carrier which is combined with the television program source 104. This signal combining can be done at the audio level, or it can even be done at the RF level in the form of a different carrier. However, the preferred method is to merely sum the audio signal from the modulator 102 into the audio channel of the program that is generated by the television program source 104. The output thereof is provided from the mixing device 106 in the form of broadcast signal to an antenna 103 which transmits the information over the communication link 108 to an antenna 109 on the receive side.

On the receive side of the system, a conventional receiver 110, such as a television is provided. This television provides a speaker output which provides the user with an audible signal. This is typically associated with the program. However, the receiver 110 in the disclosed embodiment, also provides an audio output jack, this being the type RCA jack. This jack is utilized to provide an audio output signal on a line 113 which is represented by an audio signal 111. This line 113 provides all of the audio that is received over the communication link 108 to the PC 112 in the audio input port on the PC 112. However, it should be understood that, although a direct connection is illustrated from the receiver 110 to the PC 112, there actually could be a microphone pickup at the PC 112 which could pick the audio signal up. In the disclosed embodiment, the audio signal generated by the advertiser data input device 100 is audible to the human ear and, therefore, can be heard by the user. Therefore, no special filters are needed to provide this audio to the PC 112.

The PC 112 is operable to run programs thereon which typically are stored in a program file area 116. These programs can be any type of programs such as word processing programs, application programs, etc. In the disclosed embodiment, the program that is utilized in the system is what is referred to as a “browser.” The PC 112 runs a browser program to facilitate the access of information on the network, for example, a global communication network known as the “Internet” or the World-=Wide-Web (“Web”). The browser is a hypertext-linked application used for accessing information. Hypertext is a term used to describe a particular organization of information within a data processing system, and its presentation to a user. It exploits the computer's ability to link together information from a wide variety of sources to provide the user with the ability to explore a particular topic. The traditional style of presentation used in books employs an organization of the information which is imposed upon it by limitations of the medium, namely fixed sized, sequential paper pages. Hypertext systems, however, use a large number of units of text or other types of data such as image information, graphical information, video information, or sound information, which can vary in size. A collection of such units of information is termed a hypertext document, or where the hypertext documents employ information other than text, hypermedia documents. Multimedia communications may use the Hypertext Transfer Protocol (“HTTP”), and files or formatted data may use the Hypertext Markup Language (“HTML”). This formatting language provides for a mingling of text, graphics, sound, video, and hypertext links by “tagging” a text document using HTML. Data encoded using HTML is often referred to as an “HTML document,” an “HTML page,” or a “home page.” These documents and other Internet resources may be accessed across the network by means of a network addressing scheme which uses a locator referred to as a Uniform Resource Locator (“URL”), for example, “http://www.digital.com.”

The Internet is one of the most utilized networks for interconnecting distributed computer systems and allows users of these computer systems to exchange data all over the world. Connected to the Internet are many private networks, for example, corporate or commercial networks. Standard protocols, such as the Transport Control Protocol (“TCP”) and the Internet Protocol (“IP”) provide a convenient method for communicating across these diverse networks. These protocols dictate how data are formatted and communicated. As a characteristic of the Internet, the protocols are layered in an IP stack. At higher levels of the IP stack, such as the application layer (where HTTP is employed), the user information is more readily visible, while at lower levels, such as the network level (where TCP/IP are used), the data can merely be observed as packets or a stream of rapidly moving digital signals. Superimposed on the Internet is a standard protocol interface for accessing Web resources, such as servers, files, Web pages, mail messages, and the like. One way that Web resources can be accessed is by browsers made by Netscape® and Microsoft Internet Explorer®.

Referring again now to FIG. 1, the user can load this program with the appropriate keystrokes such that a browser window will be displayed on a display 118. In one embodiment, the user can run the browser program on the PC 112 such that the browser window is displayed on the display 118. While watching a preferred program, the user can also view display 118. When an audio signal is received by the receiver 110 and the encoded information is contained therein that was input thereto by the advertiser, the PC 112 will then perform a number of operations. The first operation, according to the disclosed embodiment, is to extract the audio information within the received audio signal in the form of digital data, and then transmit this digital data to a defined location on the global communication network via a modem connection 114. This connection will be described hereinbelow. This information will be relayed to a proprietary location and the instructions sent back to the PC 112 as to the location of the advertiser associated with the code, and the PC 112 will then effect a communication link to that location such that the user can view on the display 118 information that the advertiser, by the fact of putting the tone onto the broadcast channel, desires the viewer to view. This information can be in the form of interactive programs, data files, etc. In one example, when an advertisement appears on the television, the tone can be generated and then additional data displayed on the display 118. Additionally, a streaming video program could be played on the PC received over the network, which streaming video program is actually longer than the advertising segment on the broadcast. Another example would be a sports game that would broadcast the tone in order to allow a user access to information that is not available over the broadcast network, such as additional statistics associated with the sports program, etc.

By utilizing the system described herein with respect to the disclosed embodiment of FIG. 1, an advertiser is allowed the ability to control a user's PC 112 through the use of tones embedded within a program audio signal. As will described hereinbelow, the disclosed embodiment utilizes particular routing information stored in the PC 112 which allows the encoded information in the received audio signal to route this information to a desired location on the network, and then allow other routing information to be returned to the PC 112 for control thereof to route the PC 112 to the appropriate location associated with that code.

Referring now to FIG. 2, there is illustrated a computer 204, similar to computer 112, connected to display information on display 118. The computer 204 comprises an internal audio or “sound” card 206 for receiving the transmitted audio signal through receive antenna 109 and receiver 110. The sound card 206 typically contains analog-to-digital circuitry for converting the analog audio signal into a digital signal. The digital signal may then be more easily manipulated by software programs. The receiver 110 separates the audio signal from the video signal. A special trigger signal located within the transmitted advertiser audio signal triggers proprietary software running on the computer 204 which launches a communication application, in this particular embodiment, the web browser application located on the PC 204. Coded advertiser information contained within the audio signal is then extracted and appended with the address of a proprietary server located on the communication network. The remote server address is in the form of a URL. This appended data, in addition to other control codes, is inserted directly into the web browser application for automatic routing to the communication network.

The web browser running on PC 204, and communicating to the network through an internal modem 208, in this embodiment, transmits the advertiser information to the remote server. The remote server cross-references the advertiser product information to the address of the advertiser server located on the network. The address of the advertiser server is routed back through the PC 204 web browser to the advertiser server. The advertiser product information is returned to PC 204 to be presented to the viewer on display 118. In this particular embodiment, the particular advertiser product information displayed is contained within the advertiser's web page 212. As mentioned above, the audio signal is audible to the human ear. Therefore the audio signal, as emitted from the TV speakers, may be input to the sound card 206 via a microphone. Furthermore, the audio signal need not be a real-time broadcast, but may be on video tapes, CDs, DVD, or other media which may be displayed at a later date. With the imminent implementation of high definition digital television, the audio signal output from the TV may also be digital. Therefore, direct input into a sound card for A/D purposes may not be necessary, but alternative interfacing techniques to accommodate digital-to-digital signal formats would apply.

Referring now to FIG. 3, there is illustrated a source PC 302, similar to PCs 204 and 112, connected to a global communication network (GCN) 306 through an interface 304. In this embodiment, the audio signal 111 is received by PC 302 through its sound card 206. The audio signal 111 comprises a trigger signal which triggers proprietary software into launching a web browser application residing on the PC 302. The audio signal 111 also comprises advertiser product information which is extracted and appended with URL information of an Advertiser Reference Server (“ARS”) 308. The ARS 308 is a system disposed on the GCN 306 that is defined as the location to which data in the audio signal 111 is to be routed. As such, data in the audio signal 111 will always be routed to the ARS 308, since a URL is unique on the GCN 306. Connected to the ARS 308 is a database 310 of product codes and associated manufacturer URLs. The database 310 undergoes a continual update process which is transparent to the user. As companies sign-on, i.e., subscribe, to this technology, manufacturer and product information is added to the database 310 without interrupting operation of the source PC 302 with frequent updates. When the advertiser server address URL is obtained from the ARS database 310, it and the request for the particular advertiser product information are automatically routed back through the web browser on PC 302, over to the respective advertiser server for retrieval of the advertiser product information to the PC 302. Additionally, although the disclosed invention discusses a global communication network, the system is also applicable to LANs, WANs, and peer-to-peer network configurations. It should be noted that the disclosed architecture is not limited to a single source PC 302, but may comprise a plurality of source PCs, e.g., PC 300 and PC 303. Moreover, a plurality of ARS 308 systems and advertiser servers 312 may be implemented, e.g., ARS 314, and advertiser server A 316, respectively.

The information transactions, in general, which occur between the networked systems of this embodiment, over the communication network, are the following. The web browser running on source PC 302 transmits a message packet to the ARS 308 over Path “A.” The ARS 308 decodes the message packet and performs a cross-reference function with product information extracted from the received message packet to obtain the address of an advertiser server 312. A new message packet is assembled comprising the advertiser server 312 address, and sent back to the source PC 302 over Path “B.” A “handoff” operation is performed whereby the source PC 302 browser simply reroutes the information on to the advertiser server 312 over Path “C,” with the appropriate source and destination address appended. The advertiser server 312 receives and decodes the message packet. The request-for-advertiser-product-information is extracted and the advertiser 312 retrieves the requested information from its database for transmission back to the source PC 302 over Path “D.” The source PC 302 then processes the information, i.e., for display to the viewer. The optional Path “E” is discussed hereinbelow. It should be noted that the disclosed methods are not limited to only browser communication applications, but may accommodate, with sufficient modifications by one skilled in the art, other communication applications used to transmit information over the Internet or communication network.

Referring now to FIG. 4 a, the message packet 400 sent from the source PC 302 to ARS 308 via Path “A” comprises several fields. One field comprises the URL of the ARS 308 which indicates where the message packet is to be sent. Another field comprises the advertiser product code or other information derived from the audio signal 111, and any additional overhead information required for a given transaction. The product code provides a link to the address of the advertiser server 312, located in the database 310. Yet another field comprises the network address of the source PC 302. In general, network transmissions are effected in packets of information, each packet providing a destination address, a source address, and data. These packets vary depending upon the network transmission protocol utilized for communication. Although the protocols utilized in the disclosed embodiment are of a conventional protocol suite commonly known as TCP/IP, it should be understood that any protocols providing the similar basic functions can be used, with the primary requirement that a browser can forward the routing information to the desired URL in response to keystrokes being input to a PC. However, it should be understood that any protocol can be used, with the primary requirement that a browser can forward the product information to the desired URL in response to keystrokes being input to a PC. Within the context of this disclosure, “message packet” shall refer to and comprise the destination URL, product information, and source address, even though more than a single packet must be transmitted to effect such a transmission.

Upon receipt of the message packet 400 from source PC 302, ARS 308 processes the information in accordance with instructions embedded in the overhead information. The ARS 308 specifically will extract the product code information from the received packet 400 and, once extracted, will then decode this product code information. Once decoded, this information is then compared with data contained within the ARS advertiser database 310 to determine if there is a “hit.” If there is no “hit” indicating a match, then information is returned to the browser indicating such. If there is a “hit,” a packet 402 is assembled which comprises the address of the source PC 302, and information instructing the source PC 302 as to how to access, directly in a “handoff” operation, another location on the network, that of an advertiser server 312. This type of construction is relatively conventional with browsers such as Netscape® and Microsoft Internet Explorer® and, rather than displaying information from the ARS 308, the source PC 302 can then access the advertiser server 312. The ARS 308 transmits the packet 402 back to source PC 302 over Path “B.” Referring now to FIG. 4 b, the message packet 402 comprises the address of the source PC 302, the URL of the advertiser server 312 embedded within instructional code, and the URL of the ARS 308.

Upon receipt of the message packet 402 by the source PC 302, the message packet 402 is disassembled to obtain pertinent routing information for assembly of a new message packet 404. The web browser running on source PC 302 is now directed to obtain, over Path “C,” the product information relevant to the particular advertiser server 312 location information embedded in message packet 404. Referring now to FIG. 4 c, the message packet 404 for this transaction comprises the URL of the advertiser server 312, the request-for-product-information data, and the address of the source PC 302.

Upon receipt of the message packet 404 from source PC 302, advertiser server 312 disassembles the message packet 404 to obtain the request-for-product-information data. The advertiser server 312 then retrieves the particular product information from its database, and transmits it over Path “D” back to the source PC 302. Referring now to FIG. 4 d, the message packet 406 for this particular transaction comprises the address of the source PC 302, the requested information, and the URL of the advertiser server 312.

Optionally, the ARS 308 may make a direct request for product information over Path “E” to advertiser server 312. In this mode, the ARS 308 sends information to the advertiser server 312 instructing it to contact the source PC 302. This, however, is unconventional and requires more complex software control. The message packet 408 for this transaction is illustrated in FIG. 4 e, which comprises the URL of the advertiser server 312, the request-for-product-information data, and the address of the source PC 302. Since product information is not being returned to the ARS 308, but directly to the source PC 302, the message packet 408 requires the return address to be that of the source PC 302. The product information is then passed directly to PC 302 over Path “D.”

Referring now to FIG. 5, the method for detecting and obtaining product information is as follows. In decision block 500, a proprietary application running resident on a source computer PC 302 (similar to PC 204) monitors the audio input for a special trigger signal. Upon detection of the trigger signal, data following the trigger signal is decoded for further processing, in function block 502. In function block 504, the data is buffered for further manipulation. In decision block 506, a determination is made as to whether the data can be properly authenticated. If not, program flow continues through the “N” signal to function block 520 where the data is discarded. In function block 522, the program then signals for a retransmission of the data. The system then waits for the next trigger signal, in decision block 500. If properly authenticated in decision block 506, program flow continues through the “Y” signal path where the data is then used to launch the web browser application, as indicated in function block 508. In function block 510, the web browser receives the URL data, which is then automatically routed through the computer modem 208 to the network interface 304 and ultimately to the network 306. In function block 514, the ARS 308 responds by returning the URL of advertiser server 312 to the PC 302. In function block 516, the web browser running on the source PC 302, receives the advertiser URL information from the ARS 308, and transmits the URL for the product file to the advertiser server 312. In block 518, the advertiser server 312 responds by sending the product information to the source PC 302 for processing.

The user may obtain the benefits of this architecture by simply downloading the proprietary software over the network. Other methods for obtaining the software are well-known; for example, by CD, diskette, or pre-loaded hard drives.

Referring now to FIG. 6, there is illustrated a flowchart of the process the ARS 308 may undergo when receiving the message packet 400 from the source PC 302. In decision block 600, the ARS 308 checks for the receipt of the message packet 400. If a message packet 400 is not received, program flow moves along the “N” path to continue waiting for the message. If the message packet 400 is received, program flow continues along path “Y” for message processing. Upon receipt of the message packet 400, in function block 602, the ARS 308 decodes the message packet 400. The product code is then extracted independently in function block 604 in preparation for matching the product code with the appropriate advertiser server address located in the database 310. In function block 606, the product code is then used with a lookup table to retrieve the advertiser server 312 URL of the respective product information contained in the audio signal data. In function block 608, the ARS 308 then assembles message packet 402 for transmission back to the source PC 302. Function block 610 indicates the process of sending the message packet 402 back to the source PC 302 over Path “B.”

Referring now to FIG. 7, there is illustrated a flowchart of the interactive processes between the source PC 302 and the advertiser server 312. In function block 700, the source PC 302 receives the message packet 402 back from the ARS 308 and begins to decode the packet 402. In function block 702, the URL of the advertiser product information is extracted from the message packet 402 and saved for insertion into the message packet 404 to the advertiser server 312. The message packet 404 is then assembled and sent by the source PC 302 over Path “C” to the advertiser server 312, in function block 704. While the source PC 302 waits, in function block 706, the advertiser server 312 receives the message packet 404 from the source PC 302, in function block 708, and disassembles it. The product information location is then extracted from the message packet 404 in function block 710. The particular product information is retrieved from the advertiser server 312 database for transmission back to the source PC 302. In function block 712, the product information is assembled into message packet 406 and then transmitted back to the source PC 302 over Path “D.” Returning to the source PC 302 in function block 714, the advertiser product information contained in the message packet 406 received from the advertiser server 312, is then extracted and processed in function block 716.

Referring now to FIG. 8, after receipt of a trigger signal, a web browser application on a source PC 302 is automatically launched and computer display 800 presents a browser page 802. Proprietary software running on the source PC 302 processes the audio signal data after being digitized through the sound card 206. The software appropriately prepares the data for insertion directly into the web browser by extracting the product information code and appending keystroke data to this information. First, a URL page 804 is opened in response to a Ctrl-O command added by the proprietary software as the first character string. Opening URL page 804 automatically positions the cursor in a field 806 where additional keystroke data following the Ctrl-O command will be inserted. After URL page 804 is opened, the hypertext protocol preamble http:// is inserted into the field 806. Next, URL information associated with the location of the ARS 308 is inserted into field 806. Following the ARS 308 URL data are the characters /? to allow entry of variables immediately following the /? characters. In this embodiment, the variable following is the product information code received in the audio signal. The product code information also provides the cross-reference information for obtaining the advertiser URL from the ARS database 310. Next, a carriage return is added to send the URL/product data and close the window 804. After the message packet 400 is transmitted to the ARS 308 from the source PC 302, transactions from the ARS 308, to the source PC 302, to the advertiser server 312, and back to the source PC 302, occur quickly and are transparent to the viewer. At this point, the next information the viewer sees is the product information which was received from the advertiser server 312.

Referring now to FIG. 9, there is illustrated a block diagram of a more simplified embodiment. In this embodiment, a video source 902 is provided which is operable to provide an audio output on an audio cable 901 which provides routing information referred to by reference numeral 904. The routing information 904 is basically information contained within the audio signal. This is an encoded or embedded signal. The important aspect of the routing information 904 is that it is automatically output in realtime as a function of the broadcast of the video program received over the video source 902. Therefore, whenever the program is being broadcast in realtime to the user 908, the routing information 904 will be output whenever the producer of the video desires it to be produced. It should be understood that the box 902 representing the video source could be any type of media that will result in the routing information being output. This could be a cassette player, a DVD player, an audio cassette, a CD ROM or any such media. It is only important that this is a program that the producer develops which the user 908 watches in a continuous or a streaming manner. Embedded within that program, at a desired point selected by the producer, the routing information 904 is output.

The audio information is then routed to a PC 906, which is similar to the PC 112 in FIG. 1. A user 908 is interfaced with the PC to receive information thereof, the PC 906 having associated therewith a display (not shown). The PC 906 is interfaced with a network 910, similar to the network 306 in FIG. 3. This network 910 has multiple nodes thereon, one of which is the PC 906, and another of which is represented by a network node 912 which represents remote information. The object of the present embodiment is to access remote information for display to the user 908 by the act of transmitting from the video program in block 902 the routing information 904. This routing information 904 is utilized to allow the PC 906 which has a network “browser” running thereon to “fetch” the remote information at the node 912 over the network 910 for display to the user 908. This routing information 904 is in the form of an embedded code within the audio signal, as was described hereinabove.

Referring now to FIG. 10, there is illustrated a more detailed block diagram of the embodiment of FIG. 9. In this embodiment, the PC 906 is split up into a couple of nodes, a first PC 1002 and a second PC 1004. The PC 1002 resides at the node associated with the user 908, and the PC 1004 resides at another node. The PC 1004 represents the ARS 308 of FIG. 3. The PC 1004 has a database 1006 associated therewith, which is basically the advertiser database 310. Therefore, there are three nodes on the network 910 necessary to implement the disclosed embodiment, the PC 1002, the PC 1004 and the remote information node 912. The routing information 904 is utilized by the PC 1002 for routing to the PC 1004 to determine the location of the remote information node 912 on the network 910. This is returned to the PC 1002 and a connection made directly with the remote information node 912 and the information retrieved therefrom to the user 908. The routing information 904 basically constitutes primary routing information.

Referring now to FIG. 11, there is illustrated a diagrammatic view of how the network packet is formed for sending the primary routing information to the PC 1004. In general, the primary routing information occupies a single field which primary routing information is then assembled into a data packet with the secondary routing information for transfer to the network 910. This is described hereinabove in detail.

Referring now to FIG. 12, there is illustrated an alternate embodiment to that of FIG. 9. In this embodiment, the video source 902 has associated therewith an optical region 1202, which optical region 1202 has disposed therein an embedded video code. This embedded video code could be relatively complex or as simple as a grid of dark and white regions, each region in the grid able to have a dark color for a logic “1” or a white region for a logic “0.” This will allow a digital value to be disposed within the optical region 1202. A sensor 1204 can then be provided for sensing this video code. In the example above, this would merely require an array of optical detectors, one for each region in the grid to determine whether this is a logic “1” or a logic “0” state. One of the sensed video is then output to the PC 906 for processing thereof to determine the information contained therein, which information contained therein constitutes the primary routing information 904. Thereafter, it is processed as described hereinabove with reference to FIG. 9.

Referring now to FIG. 13, there is illustrated a block diagram for an embodiment wherein a user's profile can be forwarded to the original subscriber or manufacturer. The PC 906 has associated therewith a profile database 1302, which profile database 1302 is operable to store a profile of the user 908. This profile is created when the program, after initial installation, requests profile information to be input in order to activate the program. In addition to the profile, there is also a unique ID that is provided to the user 908 in association with the browser program that runs on the PC 906. This is stored in a storage location represented by a block 1304. This ID 1304 is accessible by a remote location as a “cookie” which is information that is stored in the PC 906 in an accessible location, which accessible location is actually accessible by the remote program running on a remote node.

The ARS 308, which basically constitutes the PC 1004 of FIG. 10, is operable to have associated therewith a profile database 1308, which profile database 1308 is operable to store profiles for all of the users. The profile database 1308 is a combination of the stored in profile database 1302 for all of the PCs 906 that are attachable to the system. This to be distinguished from information stored in the database 310 of the ARS 308, the advertiser's database, which contains intermediate destination tables. When the routing information in the primary routing information 904 is forwarded to the ARS 308 and extracted from the original data packet, the lookup procedure described hereinabove can then be performed to determine where this information is to be routed. The profile database 1302 is then utilized for each transaction, wherein each transaction in the form of the routing information received from the primary routing information 904 is compared to the destination tables of database 310 to determine what manufacturer is associated therewith.

The associated ID 1304 that is transmitted along with the routing information in primary routing information 904 is then compared with the profile database 1308 to determine if a profile associated therewith is available. This information is stored in a transaction database 1310 such that, at a later time, for each routing code received in the form of the information in primary routing information 904, there will associated therewith the IDs 1304 of each of the PCs 906. The associated profiles in database 1308, which are stored in association with IDs 1304, can then be assembled and transmitted to a subscriber as referenced by a subscriber node 1312 on the network 910. The ARS 308 can do this in two modes, a realtime mode or a non-realtime mode. In a realtime mode, each time a PC 906 accesses the advertiser database 310, that user's profile information is uploaded to the subscriber node 1312. At the same time, billing information is generated for that subscriber 1312 which is stored in a billing database 1316. Therefore, the ARS 308 has the ability to inform the subscriber 1312 of each transaction, bill for those transactions, and also provide to the subscriber 1312 profile information regarding who is accessing the particular product advertisement having associated therewith the routing information field 904 for a particular routing code as described hereinabove. This information, once assembled, can then be transmitted to the subscriber 1312 and also be reflected in billing information and stored in the billing information database 1316.

Referring now to FIG. 14, there is illustrated a flowchart depicting the operation for storing the profile for the user. The program is initiated in a block 1402 and then proceeds to a function block 1404, wherein the system will prompt for the profile upon initiation of the system. This initiation is a function that is set to activate whenever the user initially loads the software that he or she is provided. The purpose for this is to create, in addition to the setup information, a user profile. Once the user is prompted for this, then the program will flow to a decision block 1406 to determine whether the user provides basic or detailed information. This is selectable by the user. If selecting basic, the program will flow to a function block 1408 wherein the user will enter basic information such as name and serial number and possibly an address. However, to provide some incentive to the user to enter more information, the original prompt in function block 1404 would have offers for such things as coupons, discounts, etc., if the user will enter additional information. If the user selects this option, the program flows from the decision block 1406 to a function block 1410. In the function block 1410, the user is prompted to enter specific information such as job, income level, general family history, demographic information and more. There can be any amount of information collected in this particular function block.

Once all of the information is collected, in either the basic mode or the more specific mode, the program will then flow to a function block 1412 where this information is stored locally. The program then flows to a decision block 1414 to then go on-line to the host or the ARS 308. In general, the user is prompted to determine whether he or she wants to send this information to the host at the present time or to send it later. If he or she selects the “later” option, the program will flow to a function block 1415 to prompt the user at a later time to send the information. In the disclosed embodiment, the user will not be able to utilize the software until the profile information is sent to the host. Therefore, the user may have to activate this at a later time in order to connect with the host.

If the user has selected the option to upload the profile information to the host, the program will flow to the function block 1416 to initiate the connect process and then to a decision block 1418 to determine if the connection has been made. If not, the program will flow along a “N” path to decision block 1420 which will timeout to an error block 1422 or back to the input of the connect decision block 1418. The program, once connected, will then flow along a “Y” path from decision block 1418 to a function block 1428 to send the profile information with the ID of the computer or user to the host. The ID is basically, as described hereinabove, a “cookie” in the computer which is accessed by the program when transmitting to the host. The program will then flow to a function block 1430 to activate the program such that it, at later time, can operate without requiring all of the setup information. In general, all of the operation of this flowchart is performed with a “wizard” which steps the user through the setup process. Once complete, the program will flow to a Done block 1432.

Referring now to FIG. 15, there is illustrated a flowchart depicting the operation of the host when receiving a transaction. The program is initiated at a Start block 1502 and then proceeds to decision block 1504, wherein it is determined whether the system has received a routing request, i.e., the routing information 904 in the form of a tone, etc., embedded in the audio signal, as described hereinabove with respect to FIG. 9. The program will loop back around to the input of decision block 1504 until the routing request has been received. At this time, the program will flow along the “Y” path to a function block 1506 to receive the primary routing information and the user ID. Essentially, this primary routing information is extracted from the audio tone, in addition to the user ID. The program then flows to a function block 1508 to look up the manufacturer URL that corresponds to the received primary routing information and then return the necessary command information to the originating PC 108 in order to allow that PC 108 to connect to the destination associated with the primary routing information. Thereafter, the program will flow to a function block 1510 to update the transaction database 1310 for the current transaction. In general, the routing information 904 will be stored as a single field with the associated IDs. The profile database 1308, as described hereinabove, has associated therewith detailed profiles of each user on the system that has activated their software in association with their ID. Since the ID was sent in association with the routing information, what is stored in the transaction database 1310 is the routing code, in association with all of the IDs transmitted to the system in association with that particular routing code. Once this transaction database 1310 has been updated, as described hereinabove, the transactions can be transferred back to the subscriber at node 312 with the detailed profile information from the profile database 1308.

The profile information can be transmitted back to the subscriber or manufacturer at the node 312 in realtime or non-realtime. A decision block 1512 is provided for this, which determines if the delivery is realtime. If realtime, the program will flow along a “Y” path to a function block 1514 wherein the information will be immediately forwarded to the manufacturer or subscriber. The program will then flow to a function block 1516 wherein the billing for that particular manufacturer or subscriber will be updated in the billing database 1316. The program will then flow into an End block 1518. If it was non-realtime, the program moves along the “N” path to a function block 1520 wherein it is set for a later delivery and it is accrued in the transaction database 1310. In any event, the transaction database 1310 will accrue all information associated with a particular routing code.

With a realtime transaction, it is possible for a manufacturer to place an advertisement in a magazine or to place a product on a shelf at a particular time. The manufacturer can thereafter monitor the times when either the advertisements or the products are purchased. Of course, they must be scanned into a computer which will provide some delay. However, the manufacturer can gain a very current view of how a product is moving. For example, if a cola manufacturer were to provide a promotional advertisement on, for example, television, indicating that a new cola was going to be placed on the shelf and that the first 1000 purchasers, for example, scanning their code into the network would receive some benefit, such as a chance to win a trip to some famous resort in Florida or some other incentive, the manufacturer would have a very good idea as to how well the advertisement was received. Further, the advertiser would know where the receptive markets were. If this advertiser, for example, had placed the television advertisement in ten cities and received overwhelming response from one city, but very poor response from another city, he would then have some inclination to believe that either the one poor-response city was not a good market or that the advertising medium he had chosen was very poor. Since the advertiser can obtain a relatively instant response and also content with that response as to the demographics of the responder, very important information can be obtained in a relatively short time.

It should be noted that the disclosed embodiment is not limited to a single source PC 302, but may encompass a large number of source computers connected over a global communication network. Additionally, the embodiment is not limited to a single ARS 308 or a single advertiser server 312, but may include a plurality of ARS and advertiser systems, indicated by the addition of ARS 314 and advertiser server A 316, respectively. It should also be noted that this embodiment is not limited only to global communication networks, but also may be used with LAN, WAN, and peer-to-peer configurations.

It should also be noted that the disclosed embodiment is not limited to a personal computer, but is also applicable to, for example, a Network Computer (“NetPC”), a scaled-down version of the PC, or any system which accommodates user interaction and interfaces to information resources.

One typical application of the above noted technique is for providing a triggering event during a program, such as a sport event. In a first example, this may be generated by an advertiser. One could imagine that, due to the cost of advertisements in a high profile sports program, there is a desire to utilize this time wisely. If, for example, an advertiser contracted for 15 seconds worth of advertising time, they could insert within their program a tone containing the routing information. This routing information can then be output to the user's PC which will cause the user's PC 302 to, via the network, obtain information from a remote location typically controlled by the advertiser. This could be in the form of an advertisement of a length longer than that contracted for. Further, this could be an interactive type of advertisement. An important aspect to the type of interaction between the actual broadcast program with the embedded routing information and the manufacturer's site is the fact that there is provided information as to the user's PC 302 and a profile of the user themselves. Therefore, an advertiser can actually gain realtime information as to the number of individuals that are watching their particular advertisement and also information as to the background of those individuals, profile information, etc. This can be a very valuable asset to an advertiser.

In another example, the producer of the program, whether it be an on-air program, a program embedded in a video tape, CD-ROM, DVD, or a cassette, can allow the user to automatically access additional information that is not displayed on the screen. For example, in a sporting event, various statistics can be provided to the user from a remote location, merely by the viewer watching the program. When these statistics are provided, the advertiser can be provided with profile information and background information regarding the user. This can be important when, for example, the user may record a sports program. If the manufacturer sees that this program routing code is being output from some device at a time later than the actual broadcast itself, this allows the advertisers to actually see that their program is still being used and also what type of individual is using it. Alternatively, the broadcaster could determine the same and actually bill the advertiser an additional sum for a later broadcast. This is all due to the fact that the routing information automatically, through a PC and a network, will provide an indication to the advertiser the time at which the actual information was broadcast.

The different type of medium that can be utilized with the above embodiment are such things as advertisements, which are discussed hereinabove, contests, games, news programs, education, coupon promotional programs, demonstration media (demos), and photographs, all of which can be broadcast on a private site or a public site. This all will provide the ability to allow realtime interface with the network and the remote location for obtaining the routed information and also allow for realtime billing and accounting.

Referring now to FIG. 16, there is illustrated a general block diagram of a disclosed embodiment. A bar code scanning wand 1600 is provided by a wand distributor to customers and is associated with that distributor via a wand ID stored therein. The wand 1600 is either sold or freely distributed to customers for use with their personal computing systems. Since more and more products are being sold using bar codes, it can be appreciated that a user having the wand 1600 can scan bar codes of a multitude of products in order to obtain more information. Information about these products can be made immediately available to the user from the manufacturer for presentation by the user's computer 302. Beyond simply displaying information about the product in which the user is interested, the wand distributor may include additional advertising information for display to the user such as information about other promotions or products provided or sold by the wand distributor. Similarly, advertisers may provide catalogs of advertisements or information in newspapers or periodicals where the user simply scans the bar code associated with the advertisement using the wand 1600 to obtain further information. There is provided a paper source 1602 having contained thereon an advertisement 1604 and an associated bar code 1606. (Note that the disclosed concept is not limited to scanning of bar codes 1606 from paper sources 1602, but is also operable to scan a bar code 1606 on the product itself. Also, the wand 1600 can be any type of device that will scan any type of image having information encoded therein.) Further description of applications and operation of the bar code scanning wand 1600 and the use of the bar code information is found in pending U.S. patent application Ser. No. 09/151,471 filed on Sep. 11, 1998 and entitled “METHOD FOR INTERFACING SCANNED PRODUCT INFORMATION WITH A SOURCE FOR THE PRODUCT OVER A GLOBAL NETWORK,” which application is incorporated by reference in its entirety herein.

After obtaining the wand 1600 from the wand distributor, the user connects the wand 1600 to their PC 302. During a scanning operation, wand 1600 reads bar code data 1606 and the wand ID into a “wedge” interface 1608 for conversion into keyboard data, which keyboard data is passed therefrom into the keyboard input port of PC 302. The importance of the wand ID will be discussed in more detail hereinbelow.

The wedge interface 1608 is simply an interface box containing circuitry that accommodates inputs from both the scanning wand 1600 and a computer keyboard 1610. This merely allows the information scanned by the wand 1600 to be input into the PC 302. In the disclosed embodiment, the wedge interface 1608 will convert any information. The data output from the wand 1600 is passed into the wedge interface 1608 for conversion into keyboard data which is readily recognizable by the PC 302. Therefore, the wand 1600 is not required to be connected to a separate port on the PC 302. This data is recognized as a sequence of keystrokes. However, the output of the wand 1600 can be input in any manner compatible with the PC 302. When not receiving scanner data, the wedge interface 1608 simply acts as a pass-through device for keyboard data from the keyboard 1610. In any case, the information is ultimately processed by a processor in the C 302 and can be presented to the user on a display 1612. The wedge interface 1608 is operable to provide a decoding function for the bar code 1606 and conversion thereof to keystroke input data.

In operation, the product code of a product is provided in the form of a bar code 1606. This bar code 1606 is the “link” to a product. The disclosed embodiment is operable to connect that product information contained in the bar code 1606 with a web page of the manufacturer of that product by utilizing the bar code 1606 as the product “identifier.” The program operating on the PC 302 provides routing information to the ARS 308 after launching the browser on the PC 302 and connecting to the ARS 308 over the GCN 306, which ARS 308 then performs the necessary steps to cause the browser to connect to the manufacturer web site, while also providing for an accounting step, as will be described in more detail hereinbelow.

The bar code 1606 by itself is incompatible with any kind of network for the purposes of communication therewith. It is primarily provided for a retail-type setting. Therefore, the information contained in the bar code 1606, by itself, does not allow for anything other than identification of a product, assuming that one has a database 1614 containing information as to a correlation between the product and the bar code 1606.

The wedge interface 1608 is operable to decode the bar code 1606 to extract the encoded information therein, and append to that decoded bar code information relating to an ID for the wand 1600. This information is then forwarded to the ARS 308 by the resident program in the PC 302. This is facilitated by intermediate routing information stored in the program indicating to which node on the GCN 306 the scanned bar code information is to be sent, i.e., to the ARS 308. It is important to note that the information in the bar code 1606 must be converted from its optical image to numerical values which are then ultimately input to the keyboard input port of PC 302 and converted into data compatible with communication software residing on the PC 302 (in this case, HTML language for insertion into a browser program). When the scanned information is input to the PC 302, the resident program launches the browser program and then assembles a communication packet comprised of the URL of the ARS 308, the wand ID and the user ID. If another type of communications program were utilized, then it would have to be converted into language compatible with that program. Of course, a user could actually key in the information on the bar code 102 and then append the appropriate intermediate routing information thereafter. As will be described hereinbelow, the intermediate routing information appended thereto is the URL of the ARS 308 disposed on the GCN 306.

As part of the configuration for using the wand 1600, the PC 302 hosts wand software which is operable to interpret data transmitted from the wand 1600, and to create a message packet having the scanned product information and wand ID, routing information, and a user ID which identifies the user location of the wand 1600. The wand software loads at boot-up of the PC 302 and runs in the background. In response to receiving a scanned bar code 1606, the wedge interface 1608 outputs a keystroke code (e.g., ALT-F10) to bring the wand program into the foreground for interaction by the operating system. The wand program then inserts the necessary information into the browser program. The message packet is then transmitted to interface 304 across the global communication network 306 to the ARS 308. The ARS 308 interrogates the message packet and performs a lookup function using the ARS database 310. If a match is found between particular parameters of the message packet, a return message packet is sent back to the PC 302 for processing.

The wand program running on PC 302 functions to partition the browser window displayed to the user into several individual areas. This is for the purpose of preparing to present to the user selected information in each of the individual areas (also called “framing”). The selected information comprises the product information which the user requested by scanning the bar code 1606 using the wand 1600, information about the wand distributor which establishes the identity of the company associated with that particular wand 1600, and at least one or more other frames which may be advertisements related to other products that the wand distributor sells. Note that the advertisements displayed by the wand distributor may be related to the product of interest or totally unrelated. For example, if a user scans the bar code 1606 of a soda from Company A soda, the wand distributor may generate an advertisement of a new soft drink being marketed by Company A, that it sells. On the other hand, the wand distributor may also structure the display of information to the user such that a user requesting product information of a Product X may get the requested information of Product X along with advertisements for a competing item Product Y. Essentially, the wand distributor is free to generate any advertisement to the user in response to the user requesting product information.

The return message packet transmitted from the ARS 308 to the PC 302 is then transmitted back across the GCN 306 to the advertiser server 312. The advertiser server 312 restructures the message packet and appends the particular product information for transmission back to the PC 302. Upon receiving the particular advertiser information from advertiser server 312, the PC 302 then retransmits a message to the wand distributor site 1616 and E-commerce site 1618 to obtain the information that needs to be framed in the browser window displayed to the user.

Therefore, the wand 1600 is associated with the wand distributor by way of a wand ID such that scanning a product bar code 1606 in order to obtain information about that particular product generates one or more responses from one or more remote sites disposed on the GCN 306. Stored in the wand 1600 is the wand ID which establishes its relationship to the wand distributor. Proprietary wand software running on the PC 302 operates to decode scanned bar code information and the wand ID received from the wand 1600 and wedge interface 1608, and also provides a unique user ID for establishing the location of the user of the wand 1600. The wand software also assembles message packets and works in conjunction with the on-board communication software (e.g., a browser) to automatically route the message packets across the GCN 306 such that the one or more remote sites disposed on the GCN 306 return information to be framed for presentation to the user.

Referring now to FIG. 16 a, there is illustrated an addition to the flowchart of FIG. 14 for registering an input device, for one embodiment of the disclosure, with the ARS 308 in conjunction with a user ID. As described hereinabove, each user, when they generated their user profile when first contacting the ARS 308 to activate their software, defines a user ID for storage in their PC resident software. This user ID, as also described hereinabove, is utilized to identify the PC 302 to the ARS 308 whenever making a transaction. This is utilized for, among other things, updating profile information in the database 310. However, when an input device, such as the input device in the form of a wand 1600, is utilized, there are a number of ways to identify this wand 1600. One can be with the use of a unique wand ID associated with the wand 1600, as will be described hereinbelow. The other is to create a wand ID in the software program operating in the PC 302 running the PC resident background program as described hereinabove. In a situation where the ID is created in the program, reference is made to block 1410 of FIG. 14 and subsequent thereto. After the user has entered very specific information, jobs, history and demographics, etc., the system will then prompt the individual for information regarding the input device, as indicated by a function block 1630. This prompt will basically inquire as to whether the user has an input device for reading machine readable code or for sensing audible signals. It may desire to know whether the user has received an audible code from a broadcast system such as a TV, or the wand 1600 is being utilized to scan machine readable code in the form of a bar code. The program block will then flow to a function block 1632 wherein various input device types are presented to the user on their display returned over the network 306 from the ARS 308, and then the user selects which type of input device is attached to their computer. For example, it might be a scanning wand, it might be an audio input device, or any other type of device that allows for input of information. For example, it is conceivable that the unique wand ID is that of some type of tool being utilized in conjunction with the program as an input device. The unique want ID could even be the idea of a disk drive wherein the wand ID would be generalized as a tool ID.

Once the type of input device is input, then the prompt will query what type of device is attached, such as the type of scanning wand 1600. The system will then ask for the distributor of the wand 1600. Of course, as described hereinabove, the wand 1600 could have embedded therein a unique wand ID which would remove the need for inputting the distributor, as the ARS 308 will recognize this particular wand ID. However, in the situation wherein the wand ID is not disposed within the wand 1600, then the user will have to view the wand or tool 1600 to determine the distributor thereof. This is what input information would then be noted in the user profile in the ARS 308. This allows the ARS 308, at a later time, to match up the user ID, requiring no other user ID, with their user profile to determine what distributor distributed their wand 1600, such that information can be returned associated with that distributor, as will be described hereinbelow. Therefore, the combination of a user ID and a corresponding entry in the database of the ARS 308 will constitute the wand ID or tool ID.

Referring now to FIG. 17, there is illustrated a conversion circuit of the wedge interface. A microcontroller 1700 provides conversion of the data from the wand 1600 and controls interfacing of the keyboard 1610 and wand 1600 with the PC 302. The microcontroller 1700 has contained therein a memory 1702 for storing a wand ID (or even a URL for some applications) or it can have external memory. There are provided a plurality of wand interfaces 1704 to the wand 1600, a plurality of PC interfaces 1706 to the PC 302, and plurality of keyboard interfaces 1708 to the keyboard 1610. In general, the wand interfaces 1704 comprise a serial data line, a ground line, and a power line. Similarly, the keyboard interfaces 1708 comprise a serial data line, a ground line, a clock line, and a power line. The PC 302 provides a clock line, a power line, a serial data, and a ground line for input to the microcontroller 1700. The microcontroller 1700 is operable to receive signals from the keyboard 1610 and transfer the signals to the PC 302 as keyboard signals. Operation with the keyboard 1610 is essentially a “pass-through” procedure. Data output from the keyboard 1610 is already in keyboard format, and therefore requires no conversion by the wedge interface 1608. With respect to the wand 1600, the serial data is not compatible with a keyboard 1610 and, therefore, it must be converted into a keyboard format in order to allow input thereof to the keyboard input of the PC 302.

The microcontroller 1700 performs the conversion function after decoding this bar code information, and conversion of this bar code information into an appropriate stream of data which is comprised of the bar code information and the appended wand ID (or even a URL in some applications). This appended wand ID (and/or URL) will be pre-stored in the memory 1702 and is programmable at the time of manufacture. It is noted that the memory 1702 is illustrated as being contained within the microcontroller 1702 to provide a single chip solution. However, this could be external memory that is accessible by the microcontroller 1702. Therefore, the microcontroller 1700 provides an interface between the wand 1600 and the keyboard 1610 to the PC 302 which allows the wand 1600 to receive coded information and convert it to keyboard strokes or, alternatively, to merely pass-through the keystrokes from the keyboard 1610. Therefore, the user need not install any type of plug-in circuit board into the motherboard of the PC 302 in order to provide an interface to the wand 1600; rather, the user need only utilize the already available keyboard port in order to input the appropriate data into the system.

In this particular disclosed embodiment, the microcontroller 1700 comprises a PIC16C73 microcontroller by Microchip Technologies™. The PIC16C73 device is a low cost CMOS 8-bit microcontroller with an integrated analog-to-digital converter. The PIC 16C73 device, as illustrated in the disclosed embodiment, has 192 bytes of RAM and 4 k×4 of EPROM memory. The microcontroller 1700 can accommodate asynchronous or synchronous inputs from input devices connected to it. In this disclosed embodiment, communication to the keyboard 1610 is synchronous while it is asynchronous when communicating with wand 1600.

It should be noted that, although in this particular embodiment bar code information of the bar code 1606 is input into the keyboard input port of the PC 302, disclosed methods may also be advantageously utilized with high speed port architectures such as Universal Serial Bus (“USB”) and IEEE 1394.

Bar codes are structured to be read in either direction. Timing considerations need to be addressed because of the variety of individuals scanning the bar code introduce a wide variety of scan rates. Bar codes use bars of varying widths. The presence of a black bar generates a positive pulse, and the absence of a black bar generates no pulse. Each character of a conventional bar code has associated therewith seven pulses or bars. Depending on the width of the bars, the time between pulses varies. In this disclosed embodiment, the interface circuitry 1608 performs a “running” calculation of the scan time based upon the rising edge of the pulses commencing with the leader or header information. The minimum and maximum scans times are calculated continuously in software with the interface 1608 during the scanning process to ensure a successful scan by the user.

Referring now to FIG. 18, there is illustrated a sample message packet transmitted from the user's PC 302 to the ARS 308. The message packet 1800 comprises a number of bits of information including the bar code information 1802 obtained from the user scanning the bar code 1606 with the wand 1600; the wand ID 1804 which is embedded in a memory in the wand 1600 and identifies it with a particular wand distributor; and a user ID 1806 which is derived from the software running on the PC 302 and which identifies uniquely with the user location. Note that the message packet includes other necessary information for the proper transmission for point to point.

Referring now to FIG. 19, there is illustrated a more detailed block diagram of the routing of the message packets in order to present the framed information to the user. As is mentioned hereinabove, when the user scans a bar code 1606 using the wand 1600, a wand program running on the user PC 302 is operable to interpret the information output by the wand 1600 and generate a message packet for transmission over the GCN 306. The wand program assembles the message packet such that it is directed to the ARS 308 disposed on the GCN 306. The message packet contains several pieces of information including the wand ID 1804 which links it to the wand distributor, the user ID 1806 which identifies the particular user using the wand 1600, and bar code information 1802 describing a particular product of interest to the user. This message from the PC 302 is transmitted over a path 1900 to the ARS 308 where the ARS database 310 is accessed to cross reference the ID information 1804 and bar code information 1802 to a particular advertiser and wand distributor. The ARS 308 returns a message packet over a path 1902 to the user PC 302 which contains routing information as to the location of various other sites disposed on the GCN 306, for example, the advertiser server 312 and wand distributor site 1616.

It is noted that, when the wand (or tool) is utilized, the program at the PC may recognize this and merely input the user ID in the want (or tool) ID field. Alternatively, the mere receipt of a user ID in association with product code information will trigger the ARS 308 to assume that the want 1600 was utilized. It is only important that the use of the want (or tool) be recognized and that the user's PC be routed to a location on the network preassociated with that wand (or tool) distributor. Further, it is the routing of the user's PC to a predetermined location on the network based upon the use of a particular tool, a particular type of tool or a general class of tools that elicits the connection. For example, it would be that the network connection is made in response to the user utilizing a bar code scanner. This would connect the user to a website for a general bar code scanner tool. For a disk drive, the program would recognize that a disk drive had been installed (or merely used) and then route the user to the website of the disk drive manufacturer, a competitor of such or even to some marketing firm that wants to contact individuals that use or initiate such a piece of equipment.

It can be appreciated that other information can also be provided by the ARS 308 which more closely targets the particular user of the wand 1600. For example, if it is known that a particular wand 1600 is sold in a certain geographic area, this information can be useful in targeting the particular user with certain advertising information relevant to that geographic area. In any case, the information returned from the ARS 308 over path 1902 provides enough information for the wand program running on the user PC 302 to identify a number of other sites disposed on the GCN 306. The user PC 302 then processes the return message packet and routes another message packet over a path 1904 to the advertiser server 312. The advertiser server 312 then returns product information of the particular product in which the user was interested back to the user PC 302 over a path 1906. Similarly, the user PC 302 routes information (e.g., the URL of the wand distributor site and the user profile) to the wand distributor site 1616 over a path 1908 in order to obtain information back over a path 1910 for framing any banners which identify the wand distributor. Additionally, the user PC 302 forwards a message packet to the E-commerce site 1618 over a path 1912 in order to return information regarding any particular advertisements the wand distributor wants to display to the user. The advertisements are returned to the PC 302 over a path 1914.

Referring now to FIG. 20, there is illustrated a block diagram of a browser window according to the disclosed embodiment. The browser window 2000 is partitioned into a plurality of areas for framing specific information. A bar code area 2002 displays that product information in which the user was interested; a wand-specific area 2004 displays information about the wand distributor; and an E-commerce area 2006 displays advertising information that the wand distributor selects for display according to this particular user and wand 1600. As mentioned hereinabove, a program operable to process scanned bar code information with the unique wand 1600 develops the browser window by partitioning it into specific areas for the framing of information. Therefore, information returned from the E-commerce site 1608 is passed through the GCN 306 to the particular E-commerce frame 2006. Similarly, information about the particular product of interest is returned from the advertiser site 312 across the GCN 306 to the particular bar code specific area 2002. Information placed in the wand specific area 2004 is information about the wand distributor which is returned from the wand distributor site 1616 across GCN 306.

Referring now to FIG. 21, there is illustrated a structure of information contained in the ARS database. The ARS database 310 contains a variety of information required to properly interrogate and assemble packets for obtaining information from the various sites disposed on the GCN 306. The ARS database 310 has a database structure 2100 which contains addresses for the web sites containing the product information requested by the user when scanning the bar code 1606 with the wand 1600. Under a product heading 2102 are listed the particular bar codes and associated routing information for addressing the respective server location. For example, the ARS server 308 may contain any number of advertisers having unique URL addresses associated therewith. Therefore, the bar code 1606 of a particular product is associated with a unique URL address which routes any request for information of that product to that particular advertiser's site. Also part of the ARS database structure 2000 is a heading of Wand 2104 under which is the wand ID 1804 and the distributor associated with that wand ID 1804.

It can be appreciated that there may be a number of distributors using the disclosed architecture such that each distributor has an ID embedded in the wand which uniquely identifies that wand 1600 with the particular distributor. Therefore, the unique wand ID 1804 needs to be listed with the respective distributors of that wand 1600 in order to process the information that needs to be framed and displayed to that particular user. Another heading under the ARS database structure 2100 is a user heading 2106 which contains profile information associated with that particular user ID 1806. As mentioned hereinabove, the user ID 1806 is obtained via the wand software running on the PC 302 and upon installation or subsequent configuration may request that the user input certain profile information which may be used to target that particular user with products and services which identify with that user profile. The ARS database structure 2100 also contains an E-commerce heading 2108 which contains information related to the bar code 1606 and an advertisement that may be triggered by the request for that information. For example, any bar code 1606 associated with a paper source 1602 can be associated with the specific information in the ARS database 310. A user wishing to obtain information about a specific soft drink may, in fact, trigger an advertising response of a competitor product. Similarly, the user interested in information about that particular soft drink may also trigger information which is relevant to that particular product or a product which may normally be served in conjunction with that soft drink. Furthermore, if the user profile indicates that this individual has significant interest in finance or insurance, the request for information regarding this particular bar coded product may trigger advertisement from an E-commerce server 1618 related to information about finance and insurance. It should be noted that the information described as contained within the ARS database structure 2100 is not limited to what has been described, but may comprise any number of pieces of information used to present desired information to the computer display of the user.

Referring now to FIG. 22, there is illustrated a flowchart of the process of receiving information from the user's perspective, and according to the disclosed embodiment. The wand software running on the user's PC 302 runs in the background until activated by output from the wand 1600. Therefore, flow moves to a decision block 2200 where if a scanned input does not occur, flow moves out the “N” path and loops back to the input of decision block 2200. On the other hand, if scanned input information is received, flow moves out the “Y” path to a function block 2202 where the wand software assembles a message packet containing the bar code information, the wand ID 1804 and the ARS 308 URL address. Additionally, the browser is launched in which this information is placed for transmission to the ARS 308. Flow then moves to a function block 2204 where the browser is partitioned into any number of areas in which information is displayed when obtained from the wand distributor site 1616, the E-commerce site 1618, and the advertiser server 312. It should be known that although three frames are shown in the particular window 2000 of this embodiment, the number of frames displayed in the window 2000 is limited only by the available real estate of the window 2000 area itself.

After the wand software partitions the browser window into one or more frames in preparation of receipt of return information, flow moves to a decision block 2206 where the computer waits for information to be returned from the various sites disposed on the GCN 306. If information is not returned, flow moves out the “N” path and simply loops back to the input to continue monitoring for receipt of the information. If information has been received, flow moves out the “Y” path to a function block 2208 where routing information for each frame (or partitioned area of the window 2000) is inserted into one or more packets for transmission to the various sites. The various sites then return the requested information back to the PC 302, as indicated in function block 2210. Flow is then to a function block 2212 where the proprietary software working in conjunction with the hosted browser places the returned information into the respective frames of the window. The user, viewing the display at PC 302, then perceives a variety of information, one of which is the particular product information which he or she requested, in addition to wand distributor information, and possibly other advertisements based upon the user's profile.

Referring now to FIG. 23, there is illustrated a flowchart of the process according to the ARS. The ARS 308 is operable to decode and process messages received from the GCN 306. Therefore, flow is to a decision block 2300 where, if bar code information is not received, flow is out the “N” path with loop-back to its input. If bar code information has been received, flow is to a function block 2302 where a matching process occurs to link the bar-coded product information to its respective manufacturer. The ARS database 310 also associates the URL address of the manufacturer's server. When a match is found, the ARS 308 begins to assemble a message packet of information for transmission back to the PC 302, as indicated in function block 2304. The message packet contains the product information and the URL address of the manufacturer's website. Flow then moves to a decision block 2306 where the wand ID 1804 is compared with the list of wand IDs issued by the particular wand distributor. If the wand ID 1804 is validated, flow moves out the “Y” path to a function block 2308 where the message packet is appended with the wand ID 1804 and distributor routing address. Flow then moves to a decision block 2310 where the ARS 308 determines if any E-commerce information is to be associated with a particular wand ID 1804. If so, flow is out the “Y” path to a function block 2312 where the message packet is appended with the E-commerce routing string. The E-commerce routing string provides addressing for the E-commerce server 1618. Flow then moves to a function block 2314 where all message packets are returned back to the PC 302 for processing.

Referring back to decision block 2306, if the wand ID 1804 is determined to be invalid, flow moves out the “N” path and jumps forward to the input of decision block 2314, since the lack of a wand ID 1804 interrupts the link to any advertising provided by the E-commerce server 1618. At this point, the only information provided is the link to the advertiser server 312 for return of product information. Referring now to decision block 2310, if no E-commerce information is available, flow moves out the “N” path and jumps forward to the input of function block 2314 where the message packet back to the PC 302 contains only the URL of the advertiser server 312, the bar code information, the distributor server 1616 address and wand ID 1804 information.

Referring now to FIG. 24, there is illustrated a flowchart of the process performed at the E-commerce site. The E-commerce server 1618 receives the message picket from the user PC 302, as indicated in function block 2400, and decodes the packet to perform a match with the bar coded information. Moving on to a decision block 2402, if the match is unsuccessful, flow is out the “N” path to a function block 2404 where the match is rejected. A message may be returned to indicate that a problem occurred and the user may need to re-scan the product bar code 1606. If a successful match occurs, flow moves out the “Y” path to a function block 2406 where the wand ID 1804 is matched with the bar code product information. The bar coded information may be distributed to customers over a large geographic area. However, the wand 1606 may be coded for certain geographic areas. For example, a wand 1600 having an XXX ID may be restricted for sale in the Southwestern United States while a wand 1600 having a YYY ID may be sold only in the Northeast. In this way, geographic areas may be targeted with advertising more appealing to that particular area. Advertising returned to the user PC 302 may be focused further by obtaining a user profile when the software or wand 1600 are installed. In this way, advertising may be focused based upon the user profile. Therefore, flow moves to a function block 2408 to lookup the E-commerce action based upon the wand ID 1804 and the bar code information. Flow moves to a function block 2410 to assemble all the information into a packet for return to the user PC 302. The product information and/or user profile information may be returned. Flow is then to a function block 2412 where the message packet is transmitted.

Referring now to FIG. 25, there is illustrated a general concept according to the disclosed embodiment. Eventually, when a user makes on-line purchases, the user is required to fill out sometimes lengthy forms in order to provide the payment information required to complete the transaction. The disclosed architecture provides a solution where the user need only fill in a form of personal and credit information (hereinafter called “profile information”) one time. Subsequently digital user ID and associated bar code are provided which references all of this personal and credit information. Therefore, for any subsequent on-line purchases, the user simply needs to provide the bar code and/or unique user ID to provide any personal or credit information for completing the transaction. The need for the user to repeatedly fill out lengthy forms for each on-line transaction is now obviated. The architecture can now be marketed where a user purchases or is freely given the wedge interface device 1608 and the software needed to provide the digital user ID/bar code. Note that the bar code may be of a type universal product code (UPC), a European product code standard EAN, and an ISBN numbering convention.

Upon installation of the wedge interface 1608, the user is required to install the software and fill out the personal and credit information form provided in the software. The form may request such information as the user's name, address, phone number, the ship-to information, credit card information, such as the account number, the issuing credit card company name and address, and any other credit information required. This software may also require that the user provide more than one credit card, that is, a primary credit card, and a secondary credit card. Therefore if the first credit card for some reason does not allow charging of the on-line purchase, the secondary credit card can be used to complete the transaction. Therefore, the user at PC 302 uses a keyboard 1610 which is connected to the wedge interface 1608 to key information into the form provided by the software. Upon providing all the information required in the form, a bar code 2500 is issued which is unique to the individual and is associated with the profile information provided by the user. The bar code 2500 also has associated with it a unique ID number 2502 which the user may provide to an on-line vendor to complete the purchase transaction. Therefore upon issuance of the bar code 2500, the user at PC 302 may use a scanning wand 1600 to scan the bar code for subsequent input to vendors to complete the purchase process for an on-line purchase. As mentioned hereinabove, in lieu of scanning the bar code for input in the PC 302, the user may simply use the keyboard 1610 to input the unique ID number 2502 to complete the purchase process.

The bar code 2500/unique ID number 2502 may also be placed on a user's credit card 2504 for ease of use. The bar code 2500 may be placed on the front face 2506 of the credit card or optionally may be placed on the back side 2508 of the credit card 2504 in a convenient location. It is conceivable that the bar code 2500 may also be placed directly on top of a magnetic strip portion 2510 located on the back 2508 of the credit card 2504. In any case, the bar code 2500 needs to be situated appropriately such that it can be swiped with a credit card swipe unit 2512 for later use. The credit card swiping 2512 may be constructed such that if the bar code 2500 were placed directly on the magnetic strip 2510 that magnetic coupling means in the unit may be used to read the information on the magnetic strip 2510 while an optical reading means in the same read portion of credit card swipe unit 2512 may read the bar code 2500 information. Since credit cards can be lost or stolen, an enhanced measure of security may provide that the user be issued a personal identification number (PIN) which must be supplied along with the unique ID/bar code, when used. Note that when the architecture is used in conjunction with a credit card company, the logistics of placing a bar code on the credit card is convenient in that the information can be provided at the time the customer first applies for a credit card. Therefore when the credit card is issued, it already arrives at the customer location with the bar coded information on the credit card.

Referring now to FIG. 26, there is illustrated a flowchart of the process for providing the personal and credit information. Flow begins at a starting point 2600 and moves to a function block 2602 where the user inputs personal and credit information into a form. To provide a secure environment in which this personal and credit information is provided, the form may be either mailed as a hard-copy form to the user to fill out or the user may be asked to call a telephone number and provide the information over the phone to an assistant at the other end. Flow is then to a function block 2604 where the user sends the form to the registration site (e.g., the credit card company). Flow is then to a function block 2606 where the registration site issues a bar code and unique ID back to the user (in the case of a credit card company, the credit card is issued to the user with the bar code 2500 and unique ID 2502 imprinted thereon). The user then retains the bar code 2500 and unique ID 2502 for any on-line use, as indicated in function block 2608. Flow is then to an end point where the process is completed.

Referring now to FIG. 27, there is illustrated a system block diagram of an on-line transaction according to a disclosed embodiment. After completing the registration process as mentioned hereinabove along a secure path {circle around (1)} (using the U.S. postal system or the public switched telephone network (PSTN)), the user then goes on-line and accesses a vendor server 2700 disposed on the GCN 306 along a path {circle around (2)}. The user browses the vendor server 2700 for products or services for purchase, and upon selecting one or the other, enters the payment process provided by the vendor server 2700. One option offered by the vendor server 2700 is that the individual may pay according to standard on-line payment practices by providing a credit card information. Alternatively, if the user is reluctant to provide such information over the unsecure network, the disclosed architecture offers an alternative where the vendor may provide that the individual may simply provide the bar code 2500 or unique ID 2502 to complete the payment process. Upon selecting the alternative plan, the vender server 2700 then prompts the user to input the bar code 2500 and/or unique ID 2502 information, as indicated along a path {circle around (3)}.

The user at PC 302 then responds in one of several ways, which include scanning the bar code 2500 with a scanner 1600 through an interface unit 1608 into the PC 302. Software running on the PC 302 is operable to receive the scanned bar code information and forwards it to a browser program resident on the PC 302. The browser program then transmits the bar code information in a browser frame which is sent the vendor web site. Note that the software which is operable to receive the scanned bar code information may also interface directly to the GCN 306 for passing information thereacross. Information is then transmitted back to the vendor server 2700 for processing along a path {circle around (4)}. The user may also simply key the unique ID number 2502 into the PC 302 using the keyboard 1610 which is then transmitted by the onboard software through the network interface 304 across the GCN 306 to the vendor server 2700. Furthermore, the user may simply use the credit card 2504 which was issued with the bar code 2500 placed thereon, and swipe it through the credit card swipe unit 2512 which then transmits the bar code 2500 and unique ID 2502 information into PC 302 across the network 306 to the vendor server 2700. The vendor server 2700 then obtains information from a vendor database 2702 which is associated therewith, which indicates that the bar code 2500 and/or unique ID 2502 information should be routed to a central registration server (CRS) 2704 also disposed on the GCN 306.

The CRS 2704 is operable to receive the bar code/unique ID information along a path {circle around (5)} and perform a matching operation with information stored on a CRS database 2706. The CRS 2706 contains all the profile information obtained from the user upon registration. After matching the bar code/unique ID with the user profile information contained in database 2706, the profile information is transmitted over a secure network back to the vendor server 2700, as indicated by a path {circle around (6)}. The profile information is then inserted into the on-line payment form automatically for the customer, who can now view this information from his or her PC 302. As discussed in more detail hereinbelow, the inserted information may be all encoded (unintelligible to the user) or only portions of the information is encoded (e.g., credit information). This secure path {circle around (6)} is over, for example, the PSTN 2708 to a back-office accounting server 2710 in close association with the vendor server 2700. The back-office accounting server has an accounting database 2712 which stores all accounting files of the vendor. (Note that the vendor server may request the bar code/unique ID information from the CRS 2704 over the secure PSTN 2708, as indicated by path {circle around (7)})

In either case, the accounting server 2710 then obtains the primary credit card information and performs a credit authorization function back across the secure PSTN network 2708 along a path {circle around (8)} to a credit card company server 2714. The credit card server 2714 is shown as connected to the GCN 306, but in some cases may not be connected thereto. The credit card server 2714 has associated therewith a credit card database 2716 which provides a cross-reference of the credit card number with the user account and all of the credit information of the user. Upon successful credit verification of the user, this information is transmitted back along a path {circle around (9)} over the secure PSTN network 2708 to the back-office accounting server 2710 of the vendor. The back-office server 2710 then performs the necessary accounting processes to charge the amount of the product/services purchased to the appropriate credit account of the user, and also assigns and forwards an order number to the user PC 302 along a path {circle around (10)}. The user may use the order number to track the purchase and to reference the order if any future problems or questions arise. Note that where the user provides more than one credit card in the user profile information, the vendor back-office server 2710 may access more than one credit company server 2714 (only one credit card server shown) to complete the payment transaction, since most credit card companies do not issue more than one card to the same customer.

Referring now to FIG. 28, there is illustrated a flowchart for a standard payment transaction using the unique user ID. Flow begins at a start block 2800 and proceeds to a function block 2802 where the customer transmits the bar code 2500 and/or unique ID 2502 to the vendor web server 2700. Flow continues to a function block 2804 where the vendor server 2700 accesses the CRS server 2704 to obtain the user profile information stored thereon and associated with the unique user ID 2502. The matching operation is performed, as indicated in decision block 2806, to determine if the unique ID 2502 has any matching user profile information. If not, flow is out the “N” path to a function block 2808 where a message is returned to the vendor and ultimately to the user indicating that the transaction was invalid. Otherwise, flow is out the “Y” path to a function block 2810 where the personal information is returned to the vendor over the secure PSTN 2508 and inserted into the vendor's payment form. The filled-in form is then transmitted to the user with a coded information inserted into the credit information fields to protect the sensitive information associated with the users credit card account. Flow is then to a decision block 2812 to determine if the user has accepted the transaction. If not, flow is out the “N” path to a function block 2814 which indicates that the user has canceled the transaction. If the user decides to accept the transaction, flow is out the “Y” path to a function block 2816 where the vendor processes the credit card codes for payment of the selected products or services.

Referring now to FIG. 29, there is illustrated a flowchart for processing the credit card code according to a standard transaction. Flow begins at a Start block 2900 and moves to a function block 2902 where the primary credit card code information is sent to the primary credit card company over secure lines. The secure lines are typically in the form of the PSTN 2708. Flow is then to a decision block 2904 to determine if the credit card information provided in the vendor form is valid and whether it is sufficient to cover payment of the selected products or services. If so, flow is out the “Y” path to end block 2906 where the transaction is processed and completed. If not, flow is out the “N” path to a decision block 2908 to process the purchase transaction using the secondary credit card information provided by the user in the profile information. If the user has not provided secondary credit card account information, flow is out the “N” path to a function block 2910 where invalid credit transaction occurs along with some messaging sent back to the vendor to indicate that the transaction has failed.

If the secondary credit card is provided, flow is out the “Y” path of decision block 2908 to a function block 2912 where the secondary credit card code is sent to the secondary credit card company for decoding and processing. Flow is then to a decision block 2914 to determine if the secondary credit card account has sufficient funds to cover payment of the products and services. If not, flow is out the “N” path to the function block 2910 where an invalid credit transaction occurs and appropriate messaging is provided. On the other hand, if the secondary credit card account is sufficient to cover the transaction, flow is out the “Y” path of decision block 2914 to the end block 2906 where the transaction is processed and completed.

Referring now to FIG. 30, there is illustrated a flowchart of the process for an invisible form transaction. Flow begins at a starting point 3000 and moves to a function block 3002 where the user transmits the unique ID and/or bar code to the vendor in response to selecting a method of payment. The vendor server 2700 receives the unique ID from the user at the user PC 302 and accesses the CRS database 2704 having the unique ID in association with profile information of the user, as indicated in function block 3004. As mentioned hereinabove, the user completed a form with information which comprises personal information, ship-to address, and credit information (usually credit card account information). (Note that the credit information may also include checking account data which would allow for direct deduction of the purchase price from the user checking account according to current practices.)

Flow is then to a decision block 3006 where the CRS server 2704 performs a matching operation with the unique user ID 2502 (and/or bar code 2500) and the CRS database 2706 to arrive at the user profile information. If no match is found, flow is out the “N” path to a function block 3008 where a message is returned to vendor the effect that no match was found for the unique ID. Otherwise, if a match was found, flow is out the “Y” path to a function block 3010 where the user profile information is transmitted back to the vendor server 27000 over the secure PSTN 2708 and inserted into the appropriate fields of the vendor payment form. However, using this particular payment method, the inserted information is “invisible,” in that, all fields have alphanumeric text inserted therein which is unintelligible to a person who looks at the form. The form also provides an order number which the user may reference for future inquiries related to the purchase transaction. This form with invisible personal information is then transmitted over the GCN 306 to the user as a record of the transaction. Flow is then to a decision block 3012 where the user is offered the option to accept the transaction. If not, flow is out the “N” path to a function block 3014 where the transaction is canceled. Otherwise, the user chooses to accept the transaction, and flow is out the “Y” to a function block 3016 where the transaction is processed according to the particular credit card account information provided.

Referring now to FIG. 31, there is illustrated a flowchart of the credit card account processing for the invisible payment method. Flow begins at a starting point 3100 and moves to a function block 3102 where the vendor server extracts the credit card account information from the user profile information received over secure lines from the CRS server 2704. As mentioned hereinabove, when first completing the user profile information form, the user was asked to submit primary and secondary credit card account information. In this way, if the first card was invalid, the second credit card account will probably cover the transaction. Therefore, the vendor server extracts the primary credit card account information and processes it by transmitting it to the appropriate credit card company server 2714 over a secure communication network (e.g., the public switched telephone network 2708).

The credit card company then performs a confirmation process to determine if the user of the card has a valid account, as indicated in decision block 3104. If so, flow is out the “Y” path to a function block 3106 where the credit card company receives the field information from the vendor back-office server 2710 across the PSTN 2708, and processes the transaction. Flow is then to an end block 3108 where the transaction is completed. On the other hand, if the user is not confirmed to have a valid account at the primary card company, flow is out the “N” path to a decision block 3110 to process the second credit card provided in the user profile information. If the user failed to provide secondary credit account information, flow is out the “N” path of decision block 3110 to a function block 3116 to process the transaction as an invalid transaction. If the user provided secondary credit account information, flow is out the “Y” path to a function block 3112 where the vendor server 2700 extracts the secondary credit card information and transmits it to the secondary credit card company server (not illustrated in FIG. 27), again over the secure PSTN 2708 mentioned hereinabove. The second credit card company performs a confirmation process to determine if the user has a valid account, as indicated in decision block 3114. If confirmed, flow is out the “Y” path to the end point 3108, where the transaction is processed and completed. If the second credit card account is invalid, flow is out the “N” path of decision block 3114 to the function block 3116 where the transaction is processed as an invalid transaction, and the appropriate messaging provided to the vendor and user indicating as such.

Referring now to FIG. 32, there is illustrated a flowchart of the selection process for a standard and invisible transaction. Flow begins at a starting point 3200 and moves to a function block 3202 where the user accesses the vendor server 2700 to potentially select products and/or services for purchase. Flow is to a function block 3204 where the user selects the purchase. Flow is to a function block 3206 where the user selects the disclosed payment method, and inputs the unique ID and/or bar code for transmission to the vendor server 2700. The means of input may be by scanning the associated bar code 2500, keying in the unique ID number 2502 using a computer keyboard 1610, or by passing the credit card 2504 having the bar code through the swipe card unit 2512. The user then transmits the unique ID 2502 to the vendor server 2700, as indicated in function block 3208. The user then has the option of selecting a standard form transaction or an invisible form transaction, as indicated in decision block 3210.

If the user selects the standard form transaction, flow is out the “N” path to a decision block 3212 where the vendor server 2700 has transmitted the user credit information to the appropriate credit card company and, with flow out the “N” path, awaits for return of the confirmation message. With the return of the confirmation message, flow is out the “Y” path to a decision block 3214 where the user is given the option of accepting or rejecting the transaction. If rejected, flow is out the “N” path to a function block 3216 where the transaction is canceled. If accepted, flow is out the “Y” path to a function block 3218 where the user transmits the acceptance signal back to the vendor, who then processes the transaction. Flow is then to an end point 3220. If, on the other hand, the user selects the invisible form transaction, as indicated in decision block 3210, flow is out the “Y” path to a function block 3222, where coded information is returned to the vendor for insertion into the electronic form being returned and presented to the user PC 302. Flow is then to the decision block 3214 where the user is offered the option to accept or reject the transaction, and follows the illustrated paths, as discussed above.

Referring now to FIG. 33, there is illustrated a system block diagram of an alternative embodiment where the user profile information is stored at the credit card company, as opposed to a CRS server 2704, as discussed hereinabove. The profile information is provided directly to the credit card company (e.g., VISA or MASTERCARD) over a secure network (e.g., the PSTN 2708) in response to the user taking advantage of an offer to obtain a credit card. A credit card server 3300 has an associated database 3302 which contains all users and account numbers having a VISA card. Alternatively, the database 3302 may contain the names and accounts of all users who have a MASTERCARD. The software program hosting the profile information is issued to the user having a unique bar code and a unique ID number. When the user requests a credit card from, for example, VISA, the credit card company requests the unique ID number, and retains the unique ID number and profile information in its database 3302. Therefore, when the user accesses the vendor server 2700 along a path {circle around (1)}, selects products and/or services for purchase, and selects the disclosed payment method, the vendor server prompts the user for the bar code/unique ID, as indicated along a path {circle around (2)}. The vendor, in this particular embodiment, also queries the user for the type of card to use (e.g., VISA or MASTERCARD). The user inputs the bar code/unique ID information according to methods disclosed hereinabove, which is then transmitted back to the vendor server along a path {circle around (3)}. If the user indicated that a VISA card is to be used, the vendor connects to the VISA card company server 3300 over secure lines (a path {circle around (4)}) and requests user profile information associated with the transmitted unique ID. The credit card server performs a matching operation with the database 3302 of profile information and transmits the profile information back to the vendor back-office system 2710 along a secure path {circle around (5)}. As mentioned hereinabove, the information is then inserted and presented to the user along a path {circle around (6)} according to whether he or she selected a standard or invisible form method.

Although the preferred embodiment has been described in detail, it should be understood that various changes, substitutions and alterations can be made therein without departing from the spirit and scope of the invention as defined by the appended claims. 

1. A method of processing profile information of a user for conducting an on-line transaction between the user and a vendor, comprising the steps of: entering profile information of a user into a profile form at a user location disposed on a network prior to conduction of an on-line transaction between the user and the vendor, the vendor disposed at a vendor location on the network; issuing to the user a unique code representing stored profile information of the user in response to the user transmitting the profile form from the user location to a second location on the network for storage thereat, the second location disposed on the network; initiating an on-line transaction by selecting a product of the vendor at a user location; after selecting the product, providing to the vendor location by the user the unique code for purchase of the product, during the on-line transaction, which on-line transaction requires the user to view a vendor payment form at the user location representing information about the transaction, and which vendor payment form includes fields that are associated with information obtainable from the stored profile information of the user and which must be viewed by the user prior to completion of the on-line transaction; providing the stored profile information from the second location to the vendor location in response to the vendor location receiving and processing the unique code; and automatically inserting by the vendor at least a portion of the stored profile information of the user into the vendor payment form for respective associated fields therein for presentation to the user at the user location after such insertion such that, when the user receives the form for viewing, such insertion has already occurred, such that the user has not viewed the form other than with already populated certain fields prior to reception, and wherein said vendor location receives said profile information from said second location in response to said vendor location transmitting said unique code to said second location.
 2. The method of claim 1, wherein the user fills in the profile form only one time.
 3. The method of claim 1, wherein the profile form is transmitted to the second location over a public switched telephone network.
 4. The method of claim 1, wherein the unique code is unique and has a unique ID number associated therewith.
 5. The method of claim 1, wherein the unique code has a unique ID number associated therewith and the user provides the unique ID number to the vendor location for payment purposes.
 6. The method of claim 1, wherein the step of automatically inserting causes all of the profile information to be entered into the vendor payment form as encoded information.
 7. The method of claim 1, wherein the step of automatically inserting causes only a portion of the profile information to be entered into the vendor payment form as encoded information.
 8. The method of claim 7, wherein the portion of the profile information is credit information.
 9. The method of claim 1, wherein the profile information comprises name, address, ship-to address, and credit information.
 10. The method of claim 4, wherein the second location is a central registration server having a database of the profile information associated with respective unique codes and unique ID numbers.
 11. The method of claim 10, wherein the second location is a credit card company server.
 12. The method of claim 1, wherein the unique code is placed on a credit card.
 13. A system for processing profile information of a user for conducting an on-line transaction between the user and a vendor, comprising; profile information of a user entered into a profile form at a user location disposed on a network prior to conduction of an on-line transaction between the user and the vendor, the vendor disposed at a vendor location on the network; a unique code representing stored profile information of the user issued to the user in response to said user transmitting said profile form from said user location to a second location on the network for storage thereat, said second location disposed on said network; wherein said unique code is provided to the vendor location by the user for purchase of a product of the vendor after the user has viewed and made a selection of the product, during the on-line transaction, which on-line transaction requires the user to view a vendor payment form at the user location representing information about the transaction, and which vendor payment form includes fields that are associated with information obtainable from the stored profile information of the user and which must be viewed by the user prior to completion of the on-line transaction; wherein said profile information is provided from said second location to said vendor location in response to said vendor location processing said unique code; and wherein at least a portion of said stored profile information of the user is automatically inserted into said vendor payment form by the vendor for respective associated fields therein for presentation to said user at the user location after such insertion such that, when the user receives the form for viewing, such insertion has already occurred, such that the user has not viewed the form other than with already populated certain fields prior to reception, and wherein said vendor location receives said profile information from said second location in response to said vendor location transmitting said unique code to said second location.
 14. The system of claim 13, wherein said user fills in said profile form only one time.
 15. The system of claim 13, wherein said profile form is transmitted to said second location over a public switched telephone network.
 16. The system of claim 13, wherein said unique code comprises a bar code.
 17. The system of claim 13, wherein said unique code has a unique ID number associated therewith and said user provides said unique ID number to said vendor location for payment purposes.
 18. The system of claim 13, wherein all of said profile information is automatically inserted into said vendor payment form as encoded information.
 19. The system of claim 13, wherein only a portion of said profile information is entered into said vendor payment form as encoded information.
 20. The system of claim 19, wherein said portion of said profile information is credit information.
 21. The system of claim 13, wherein said profile information comprises the user's name, address, ship-to address and credit information.
 22. The system of claim 17, wherein said second location is a central registration server having a database of said profile information associated with respective said unique code and said unique ID number.
 23. The system of claim 22, wherein said second location is a credit card company server.
 24. The system of claim 13, wherein said unique code is placed on a credit card.
 25. The system claim 17, wherein said second location is a central registration server having a database of said profile information associated with respective said unique code and said ID number.
 26. The method of claim 1, and further comprising transmitting the populated form to the vendor location to complete the on-line transaction.
 27. The system of claim 13, wherein the populated form is transmitted to the vendor location to complete the on-line transaction. 